Advertisement
Guest User

Comptia A+ Core 2 Active Recall Questions.

a guest
Aug 12th, 2021
3,159
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 36.96 KB | None | 0 0
  1. What does an operating system allow us to do?
  2. Control the computer hardware (memory, hard drives, keyboards) and applications.
  3.  
  4. What are some standard OS features?
  5. File management, application support, input and output support, and OS configuration tools.
  6.  
  7. What are some advantages of Microsoft Windows?
  8. Large industry support, broad OS selection, and a wide variety of software support.
  9.  
  10. What are some disadvantages of Microsoft Windows?
  11. A big target for security exploitation, has to support a large variety of hardware which is often difficult.
  12.  
  13. What are some advantages of macOS?
  14. Easy to use, extremely compatible, and has fewer security concerns.
  15.  
  16. What are some disadvantages of macOS?
  17. Requires Apple hardware, less industry support than Windows, and higher initial hardware cost.
  18.  
  19. There is no single linux operating system, instead there is a combination of features put together called what?
  20. Distributions.
  21.  
  22. What are some examples of Linux distributions?
  23. Ubuntu, Mint, Debian, Fedora, Red Hat, etc…
  24.  
  25. What are some advantages of Linux?
  26. Free, works on a lot of hardware, and has an active and passionate community.
  27.  
  28. What are some disadvantages of Linux?
  29. Limited driver support (especially with laptops) and limited support options.
  30.  
  31. What is a major difference between a 32-bit and 64-bit processor?
  32. A 64-bit processor can process and store more information. 2^32 (4 GB max ram) vs 2^64 (17 billion GB max ram).
  33.  
  34. What is the abbreviation for a 32-bit and 64-bit OS?
  35. 32-bit=(x86), 64-bit=(x64).
  36.  
  37. 64-bit OS can run 32-bit programs, but 32-bit OS cannot run what?
  38. 64-bit programs.
  39.  
  40. What OS is Android based on?
  41. Linux.
  42. Android apps can be developed on Windows, macOS, and Linux using what tool?
  43. The Android Software Developers Kit (SDK).
  44.  
  45. What OS is iOS based on?
  46. Unix.
  47.  
  48. iOS apps can be developed with what?
  49. iOS Software Developers Kit (SDK) on macOS only.
  50.  
  51. What must happen to an iOS app before release?
  52. It must be approved by Apple.
  53.  
  54. What OS is ChromeOS based on?
  55. Linux kernel.
  56.  
  57. What does ChromeOS rely heavily on?
  58. The cloud.
  59.  
  60. Why do web-based apps have potential?
  61. Because they can seamlessly be used across many different operating systems.
  62.  
  63. What are the 6 Windows 7 editions?
  64. Starter, Home Basic, Home Premium, Ultimate, Professional, and Enterprise.
  65.  
  66. When was Windows 7 released?
  67. October 22, 2009.
  68.  
  69. When did mainstream support for Windows 7 end?
  70. January 13, 2015.
  71.  
  72. What are netbooks?
  73. Low performance inexpensive laptops that were replaced by tablets.
  74.  
  75. What operating system was built for netbooks?
  76. Windows 7 Starter.
  77.  
  78. Why did Windows 7 Starter have no Aero, DVD playback, Internet Connection Sharing (ICS), Enterprise technologies, or Windows Media Center?
  79. Because netbooks had very limited hardware that could not handle a lot of features.
  80.  
  81. What bit version and how many GB of ram does Windows 7 Starter support?
  82. 32-bit and a maximum of 2 GB of ram.
  83.  
  84. Who was Windows 7 Home Premium built for?
  85. The consumer market.
  86.  
  87. What bit version and how many GB of ram does Windows 7 Home Premium support?
  88. 64-bit and a maximum of 16 GB of ram.
  89.  
  90. How many processors does Windows 7 Home Premium support?
  91. 2 physical processors.
  92.  
  93. What did Windows 7 Ultimate provide home users?
  94. Complete functionality.
  95.  
  96. What are some features of Windows 7 Ultimate?
  97. All enterprise technologies like Domain support, Remote Desktop, (encrypting file system) EFS, and full disk encryption with BitLocker.
  98.  
  99. What bit version and how many GB of ram does Windows 7 Ultimate support?
  100. 64-bit and a maximum of 192 GB of ram.
  101.  
  102. Windows 7 Ultimate is for the home user, but it has what?
  103. The same features and Windows 7 Enterprise.
  104.  
  105. What was Windows 7 Professional missing?
  106. Enterprise technologies like BitLocker.
  107.  
  108. What bit version and how many GB of ram does Windows 7 Professional support?
  109. 64-bit and a maximum of 192 GB of ram.
  110.  
  111. Who was Windows 7 Enterprise designed for?
  112. Very large organizations.
  113.  
  114. What is one important feature of Windows 7 Enterprise?
  115. Full disk encryption with BitLocker.
  116.  
  117. What is the difference between the hardware requirements for Windows 7 (x86) and Windows 7 (x64)?
  118. 1 GB ram (x86) vs 2 GB ram (x64). 16 GB free disk space (x86) vs 20 GB free disk space (x64).
  119.  
  120. What is the video requirement for both Windows 7 x86 and x64?
  121. DirectX 9 graphics device that is compatible with Windows Display Driver Model (WDDM) 1.0 or higher.
  122.  
  123. When was Windows 8 released?
  124. October 17 2012.
  125.  
  126. When was Windows 8.1 released and was it a free update?
  127. October 2013 and it was a free update.
  128.  
  129. When did mainstream support end for Windows 8 and 8.1?
  130. January 9, 2018.
  131.  
  132. What are the Windows 8 and 8.1 editions?
  133. Windows 8/8.1 (Core), Windows 8/8.1 (Pro), Windows 8/8.1 (Enterprise).
  134.  
  135. What are some features of Windows 8/8.1 (Core)?
  136. x86 and x64 version support, Microsoft account integration, and Windows Defender integration, and Windows Media Player.
  137.  
  138. What are some features of Windows 8/8.1 (Pro)?
  139. Very similar to Windows 7 Professional / Ultimate. Full support for BitLocker and EFS. Windows Domain support.
  140.  
  141. What is the function of BitLocker?
  142. Full disk encryption.
  143.  
  144. What does BitLocker encrypt?
  145. Everything on the hard drive including the operating system.
  146.  
  147. What is EFS?
  148. (Encrypting File System) A single encryption file feature built into Windows using the NTFS file system.
  149.  
  150. What does EFS protect?
  151. Individual files and folders. Makes it so that hackers cannot see anything inside those files and folders.
  152.  
  153. What feature does Windows Domain allow?
  154. Group Policy used by an IT team.
  155.  
  156. Who is Windows 8/8.1 (Pro) made for?
  157. “Software Assurance” customers who require large volume licenses.
  158.  
  159. What are some features of Windows 8/8.1 (Enterprise)?
  160. AppLocker, Windows To Go, DirectAccess, and Branch Cache.
  161.  
  162. What are the Windows 8/8.1 processor requirements?
  163. PAE (Physical Address Extension) support, NX, and SSE2.
  164.  
  165. What is PAE (Physical Address Extension)?
  166. A feature in cpus that allows 32-bit processors the ability to use more than 4 GB of physical memory.
  167.  
  168. What is the NX Processor Bit?
  169. A CPU technology that protects against malicious software.
  170.  
  171. What is SSE2 (Streaming SIMD Extension 2)?
  172. Processor instruction set used by third-party application and driver developers.
  173.  
  174. What are the hardware requirements for Windows 8/8.1?
  175. 1 GB ram (x86) vs 2 GB ram (x64). 16 GB free disk space (x86) vs 20 GB free disk space (x64). 1 GHz processor with support for PAE, NX, and SSE2.
  176.  
  177. What is the difference between the maximum RAM support in Windows 8/8.1 Core vs. Windows 8/8.1 Pro and enterprise?
  178. Maximum ram support for Windows 8/8.1 Core is 128, but in Windows 8/8.1 Pro and Enterprise, the maximum is 512 GB.
  179.  
  180. When was Windows 10 installed?
  181. July 29, 2015.
  182.  
  183. Why were upgrades from Windows 7 and 8.1 to Windows 10 free for the first year?
  184. Because Microsoft wanted to get as many people on Windows 10 as possible.
  185.  
  186. Who is Windows 10 Home made for?
  187. Home users.
  188.  
  189. What does Windows 10 home include by default?
  190. Integration with a Microsoft Account and OneDrive, Windows Defender, and Cortana.
  191.  
  192. Who is Windows 10 Pro made for?
  193. Professional users.
  194.  
  195. What are some features of Windows 10 Pro?
  196. Remote Desktop host, BitLocker, and Windows Domain.
  197.  
  198. What is the minor difference between Windows 10 Education and Windows 10 Enterprise?
  199. Windows 10 Education is meant to be used in a school environment while Windows 10 Enterprise is meant to be used in a business setting.
  200.  
  201. What is AppLocker?
  202. A tool that controls what applications can run.
  203.  
  204. What is BranchCache?
  205. A tool that allows files to be cached in a remote location instead of a very slow wide area network.
  206.  
  207. What is the concept of a cache?
  208. A form of data storage that allows the stored data to be accessed quickly.
  209.  
  210. What other feature does Windows 10 Education and Enterprise allow?
  211. Granular User Experience (UX) control.
  212.  
  213. What is Granular User Experience (UX) control useful for?
  214. Kiosk and workstation customization.
  215.  
  216. The hardware requirement for Windows 10 is exactly the same as what OS?
  217. Windows 8/8.1.
  218.  
  219. What is the maximum x64 ram support for Windows 10 Home, Pro, and Enterprise/Education.
  220. Windows 10 Home=128 GB. Windows 10 Pro and Enterprise/Education=2048 GB.
  221.  
  222. What feature allows Windows to excel in an enterprise?
  223. Active Directory Domain Services.
  224.  
  225. What information does the Active Directory Domain Services contain?
  226. Contains information about all of the users in an enterprise, the computers the users use, and the system the users connect to.
  227.  
  228. Why is Active Directory Domain Services useful?
  229. Because most enterprises use many different servers, workstations, and printers. The Active Directory Domain Services allows all of this to be managed in one simple resource.
  230.  
  231. What can Active Directory Domain Services also be used for?
  232. Authentication by storing usernames and passwords.
  233.  
  234. What is PXE (“Pixie”)?
  235. Preboot eXecution Environment is a standard client–server environment that can boot software using a Network Interface Card.
  236.  
  237. What is NetBoot?
  238. An apple technology that allows users to boot macOS from a network (similar to PXE).
  239.  
  240. What is unattended installation?
  241. A type of windows installation that has no interruptions.
  242.  
  243. Why does unattended installation have no interruption?
  244. Because the installation questions are already answered and stored in a file called unattend.xml.
  245.  
  246. What is an In-place upgrade?
  247. When a newer version of Windows is installed on top of an older version.
  248.  
  249. What is the benefit of in-place upgrades?
  250. Existing applications and data are maintained.
  251.  
  252. What is a clean install?
  253. When an old operating system is wiped clean and a newer one is installed.
  254.  
  255. What is an image?
  256. A clone of an operating system that can be installed quickly on many computers simultaneously.
  257.  
  258. What is a repair installation used for?
  259. Used to fix problems with the operating system.
  260.  
  261. Why is a repair installation useful?
  262. Because it does not modify user files.
  263.  
  264. Running two or more operating systems from a single computer is known as what?
  265. Multiboot.
  266.  
  267. What is a recovery partition?
  268. A hidden partition with installation files.
  269.  
  270. What is a recovery partition commonly used with?
  271. Repair installation and refresh/restore.
  272.  
  273. What is disk partitioning?
  274. A process of separating a physics drive into logical pieces.
  275.  
  276. What is disk partitioning useful for?
  277. Separating and maintaining operating systems.
  278.  
  279. Formatted partitions are called what?
  280. Volumes.
  281.  
  282. What is MBR (Master Boot Record)?
  283. An older partition style used by older operating systems.
  284.  
  285. What are the two different types of MBR partitions?
  286. Primary and Extended.
  287.  
  288. What does the Primary partition contain?
  289. The bootable OS.
  290.  
  291. What does the Extended partition contain?
  292. Additional logical partitions.
  293.  
  294. What is the maximum number of primary partitions allowed per disk in MBR?
  295. 4.
  296.  
  297. Which operating system gets booted from by default in MBR?
  298. The one contained in the active primary partition.
  299.  
  300. What is the maximum number of extended partitions allowed per disk in MBR?
  301. 1.
  302.  
  303. What is GPT (GUID Partition Table)?
  304. The latest partition format standard that uses a Globally Unique Identifier.
  305.  
  306. What type of BIOS is required for GPT?
  307. UEFI.
  308.  
  309. UEFI allows GPT to have how many partitions?
  310. 128 primary partitions. No need for extended partitions or logical drives.
  311.  
  312. What is dynamic disk storage?
  313. A Windows feature that allows users to add multiple disks to their system and extend partitions across all of those physical disks. Data can be striped or mirrored.
  314.  
  315. What is a file system?
  316. A set of data structures that controls how data is stored and retrieved.
  317.  
  318. What are the two popular file systems?
  319. FAT32 and NTFS.
  320.  
  321. What are some other examples of file systems?
  322. FAT, exFAT, etc…
  323.  
  324. What is FAT (File Allocation Table)?
  325. One of the first PC-based file systems created around 1980.
  326.  
  327. What is FAT32 (File Allocation Table)?
  328. Newer version of FAT that allows larger volume sizes (2TB) and file sizes (4GB).
  329.  
  330. What is exFAT?
  331. An extended version of FAT32 that is used on flash drives to allow files larger than 4GB.
  332.  
  333. What is NTFS (NT File System)?
  334. File system that offers improvements over FAT 32.
  335.  
  336. What are some features of NTFS?
  337. Quotas, file compression, encryption, symbolic links, large file support, security, and recoverability.
  338.  
  339. What is CDFS (Compact Disk File System)?
  340. A file system that uses the ISO 9660 standard which can be read by all operating systems.
  341.  
  342. What is ext3?
  343. Third extended file system commonly used by the Linux OS.
  344.  
  345. What is ext4?
  346. Fourth extended file system commonly used in Linux and Android OS.
  347.  
  348. What is NFS (Network File System)?
  349. A file system that allows users to access files stored on a storage device that is across a network. The drive appears to be a local drive; however, it is stored on a network.
  350.  
  351. NFS clients are available across what?
  352. Many operating systems.
  353.  
  354. What is HFS+ (Hierarchical File System)?
  355. A file system used by Mac OS (also Mac OS Extended).
  356.  
  357. What replaced HFS+ and when?
  358. APFS (Apple File System) in High Sierra (10.13).
  359.  
  360. What is a Swap partition?
  361. A storage device that is used for memory management.
  362.  
  363. What does a Swap partition do?
  364. It frees up memory by moving unused pages onto a fast drive and copies back to RAM when needed. Relates to hibernation.
  365.  
  366. What is the difference between a Quick Format and a Full Format?
  367. A Quick Format quickly creates a new file table without erasing any data or performing physical checks. A full format completely wipes the whole disk and checks for bad sectors, which is more time consuming.
  368.  
  369. What command can be used to create a full format?
  370. diskpart
  371.  
  372. What is the difference between an Upgrade and a Clean Install?
  373. An upgrade keeps files in place. A Clean Install starts over completely fresh.
  374.  
  375. You cannot upgrade x86 to x64 or vice versa. What will you need to do instead?
  376. Migrate the OS.
  377.  
  378. Running a command prompt as an administrator grants users what?
  379. Elevated privileges.
  380.  
  381. What Windows command can be used to fix "OS not found" type of errors?
  382. bootrec. Variations include bootrec /fixmbr, bootrec /fixboot, and bootrec /rebuildbcd.
  383.  
  384. What Windows command lists files and directories?
  385. dir
  386.  
  387. What Windows command changes the directory being used?
  388. cd
  389.  
  390. What Windows command gives you the option to go to the folder above the current folder?
  391. ..
  392.  
  393. What Windows command can be used to shutdown a computer after 60 seconds?
  394. shutdown /s /t 60
  395.  
  396. What Windows command can be used to reboot a computer after 60 seconds?
  397. shutdown /r /t 60
  398.  
  399. What Windows command can be used to abort the shutdown of a computer?
  400. shutdown /a
  401.  
  402. What Windows command can be used to repair your Windows image (WIM) or to modify Windows installation media?
  403. dism
  404.  
  405. What Windows command can be used to scan all of the core operating system files for potential problems?
  406. sfc
  407.  
  408. What Windows command can be used to check drives for errors?
  409. chkdsk (/f (fixes logical file system) /r (locate bad sectors recover readable info (implies /f))
  410.  
  411. What Windows command can be used to manage different drives from the command line?
  412. diskpart
  413.  
  414. What Windows command can be used to manage tasks from the command line?
  415. tasklist and taskkill
  416.  
  417. When using taskkill, what must be added to kill an application from its executable or PID (Process ID)?
  418. executable= taskkill /im notepad.exe PID= taskkill /pid 1234 /t
  419.  
  420. What allows administrators to control every aspect of the operating system?
  421. Group Policy.
  422.  
  423. What allows administrators to manage multiple machines?
  424. Active Directory Domain.
  425.  
  426. What Windows command can be used to force a group policy update to a computer?
  427. gpupdate /target:computername /force
  428.  
  429. What Windows command can be used to look at Group Policy settings on a computer?
  430. gpresult /r.
  431.  
  432. What Windows command can be used to look at Group Policy settings of a specific user and in a specific domain on a remote device?
  433. gpresult /user sgc/domain /v
  434.  
  435. What Windows command can be used to wipe a disk for use?
  436. format
  437.  
  438. When using the copy command on Windows, what must be added to verify that the file was copied correctly?
  439. /v
  440.  
  441. When using the copy command on Windows, what must be added to override any existing file that is being copied?
  442. /y
  443.  
  444. What Windows command can be used to copy files in a directory (folder) to a different location?
  445. xcopy
  446.  
  447. What Windows command is better than xcopy in that it allows an admin to resume an initiated copy in case anything goes wrong?
  448. robocopy
  449.  
  450. What keys can be pressed to cancel commands that are not instantaneous like scan now?
  451. control + c
  452.  
  453. What Windows command can be used to gather information about how a computer is configured on a network?
  454. ipconfig
  455.  
  456. What command can be used to test reachability?
  457. ping
  458.  
  459. What protocol does the command “ping” use?
  460. ICMP (Internet Control Message Protocol).
  461.  
  462. What Windows command can be used to determine the route a packet takes to a destination?
  463. tracert
  464.  
  465. What protocol does the command “tracert” use?
  466. ICMP (Internet Control Message Protocol).
  467.  
  468. What command can be used to determine the type of connections that are occurring inbound or outbound from a local computer?
  469. netstat
  470.  
  471. What command can be used to lookup information from DNS servers?
  472. nslookup
  473.  
  474. What network command is specific to the Windows OS?
  475. net
  476.  
  477. What tool can be used to manage different tools like device manager, event viewer, and services all in one place?
  478. Computer Management.
  479.  
  480. What allows the operating system to communicate with connected hardware?
  481. Drivers.
  482.  
  483. What tool can be used to manage different users on a computer?
  484. Local Users and Groups.
  485.  
  486. What tool can be used to manage security policies?
  487. Local Security Policy.
  488.  
  489. What tool can provide long term statistics of disk, memory, CPU, and other utilization?
  490. Performance Monitor.
  491.  
  492. Background processes that have no user interaction are known as what?
  493. Services.
  494.  
  495. What tool can be used to schedule an application or batch file to execute at a particular time?
  496. Task Scheduler.
  497.  
  498. What service allows developers to build and view programs for the Windo ws platform?
  499. Component Services (Microsoft COM+).
  500.  
  501. What allows an application developer to write an application without any concern of the type of database running on the backend?
  502. ODBC Data Resources.
  503.  
  504. What tool allows administrators to manage everything related to printers?
  505. Print Management.
  506.  
  507. What tool can be used to see what is happening or has happened in an operating system?
  508. Event Viewer.
  509.  
  510. What is System Configuration (msconfig)?
  511. A Windows program that is able to manage boot processes, startup, services, and etc...
  512.  
  513. What type of information does Task Manager provide?
  514. Real-time system statistics.
  515.  
  516. What is the process called when data is being copied to a new replacement drive in RAID 1?
  517. Resynching.
  518.  
  519. What is the process called when data is being rebuilt to a new replacement drive in RAID 5?
  520. Regenerating.
  521.  
  522. What is a way to make a new drive look like a regular folder?
  523. By mounting the drive.
  524.  
  525. What is a storage pool?
  526. A group of storage devices combined together.
  527.  
  528. What is the Windows registry (regedit)?
  529. A large database used by almost every aspect of Windows.
  530.  
  531. What is msinfo32 used for?
  532. Viewing Windows System Information.
  533.  
  534. What is dxdiag used for?
  535. Viewing information relating to 3D graphics, audio, and input options.
  536.  
  537. How can you move file fragments so that they are next to each other, allowing for much quicker read and write times on a spinning hard drive?
  538. By using defragmentation (defrag).
  539.  
  540. What windows tool can be used to go back-in-time to correct problems?
  541. System Restore.
  542.  
  543. What is the difference between Sleep (standby) mode and Hibernate mode in Windows?
  544. In sleep mode, open apps are stored in memory. In hibernate mode, open apps are saved to disk, allowing the system to shut down completely and not use any power.
  545.  
  546. What is the Credential Manager used for in Windows?
  547. Manage saved usernames and passwords and other credentials for different sites.
  548.  
  549. What piece of hardware is recommended to have installed on your motherboard before using BitLocker?
  550. A TPM (Trusted Platform Module).
  551.  
  552. If a motherboard does not have TPM, what other tools can be used with BitLocker?
  553. A flashdrive and a password.
  554.  
  555. What is the Sync Center?
  556. A Windows feature that allows people to have access to their data even without being directly connected to their network. “Always available offline.”
  557.  
  558. When Sync Center is enabled, what happens when a person returns back to their network?
  559. Any changes made to their files get automatically saved to their network.
  560.  
  561. What is the network-based installation method?
  562. A type of software installation where all of the application is placed on one central server and any installation occurs across the network.
  563.  
  564. Where and how does Windows HomeGroup work?
  565. It works only on a single private network to share files, photos, videos, and other things between all devices.
  566.  
  567. What does Windows Workgroup allow a user to do?
  568. To create a logical grouping of devices that will be used to share files across multiple networks.
  569.  
  570. What is one challenge of working with a Windows Workgroup?
  571. Each device is a standalone system, meaning not everything is uniform across different domains (Ex: Shipping department has a different username and password from accounting department).
  572.  
  573. What is Windows Domain?
  574. A centralized system that allows a user to manage users, devices, and anything else on the network all from one central authentication service.
  575.  
  576. What is the difference between Remote Assistance and Remote Desktop Connection?
  577. Remote Assistance is only available on Home editions and allows for one-time remote access. Windows Desktop Connection is only available on Non-Home editions and allows for ongoing access.
  578.  
  579. What is the function of a Proxy Server?
  580. To act as a buffer between a network connection and the internet. This can be a great source of security and privacy.
  581.  
  582. What is Network Share in windows?
  583. A feature that allows a drive to be shared across multiple users on the same network.
  584.  
  585. What does a VPN concentrator allow a person to do?
  586. Securely communicate with a corporate network while not being directly connected to the corporate network.
  587.  
  588. Why can a Dial-up connection be useful?
  589. Because it can allow a system administrator to connect to a remote network when the primary network connection is not available.
  590.  
  591. WPA2-Enterprise uses what authentication method?
  592. 802.1X authentication.
  593.  
  594. What does WPA2-Enterprise (802.1X authentication) allow users to do?
  595. Access a wireless network using their login credentials rather than one router password.
  596.  
  597. What is WWAN?
  598. Wireless access through a cellular frequency.
  599.  
  600. What is a loopback address (127.0.0.1) used for?
  601. To reference a local computer by IP address.
  602.  
  603. What is Wake on LAN?
  604. A networking standard that allows a computer to be turned on or awakened by a network message.
  605.  
  606. What is Quality of Service (QoS)?
  607. A set of technologies that can prioritize network traffic.
  608.  
  609. What is DSCP (Differentiated Services Code Points)?
  610. A networking architecture that is able to manage network traffic and provide quality of service (QoS).
  611.  
  612. What is a Time Machine?
  613. A built-in backup program included in MacOS.
  614.  
  615. What does Time Machine do when the backup drive is filled on a Mac?
  616. It starts deleting the oldest information and replaces them with newer ones.
  617.  
  618. When do system updates occur in MacOS?
  619. The App Store.
  620.  
  621. What is intentionally invisible in MacOS?
  622. The internals of the operating system.
  623.  
  624. Drivers in MacOS are in what mode?
  625. View only mode, meaning no changes can be made.
  626.  
  627. MacOS does not come with built in antivirus/antimalware, what can be done instead?
  628. A 3rd-party option can be downloaded if a user wishes to do so.
  629.  
  630. When dealing with Image recovery on MacOS, the operating system creates what in Disk Utility?
  631. An Apple Disk Image (.dmg) file.
  632.  
  633. What is the command line called in MacOS and Linux?
  634. Terminal.
  635.  
  636. In MacOS, remote desktop is known as what?
  637. Screen sharing.
  638.  
  639. 3rd-party utilities that are compatible with screen sharing can use what in MacOS?
  640. VNC (Virtual Network Computing).
  641.  
  642. What is Mission Control in MacOS?
  643. A feature that allows users to quickly view everything that’s running at the same time.
  644.  
  645. What is Spaces/Multiple desktops?
  646. A feature in MacOS that allows users to separate what they’re doing into separate logical desktops.
  647.  
  648. What is Keychain?
  649. A centralized password management utility used in MacOS.
  650.  
  651. What is Spotlight?
  652. The search utility used in MacOS.
  653.  
  654. What is iCloud?
  655. Apple’s cloud-based service that allows users to integrate MacOS and iOS devices into one single cloud-based service.
  656.  
  657. File explorer is to Windows as what is to MacOS?
  658. Finder.
  659.  
  660. What is Remote Disc?
  661. A feature in MacOS that allows a device with a DVD rom player to share data from the DVD rom with others on the network.
  662.  
  663. The taskbar is to Windows as what is to MacOS?
  664. The Dock.
  665.  
  666. What tool can be used to Dual-boot into Windows on Mac hardware?
  667. Boot Camp.
  668.  
  669. What is tar (Tape Archive)?
  670. A utility commonly used to back up and restore data in Linux.
  671.  
  672. What is rsync?
  673. A utility used in Linux to sync files between storage devices.
  674.  
  675. What is su/sudo?
  676. A Linux command that temporarily provides a user account root privileges.
  677.  
  678. What is apt-get, yum?
  679. (Advanced Packaging Tool) A command used in Linux to install, update, and remove programs.
  680.  
  681. What is Patch Management?
  682. The process of scheduling updates.
  683.  
  684. What also happens when the kernel updates in Linux?
  685. Drivers get updates.
  686.  
  687. What is dd?
  688. A Linux command line utility that can backup and restore entire partitions. Can also copy and convert files.
  689.  
  690. What are some 3rd-party backup and restore Linux utilities?
  691. GNU Parted, Clonezilla.
  692.  
  693. What is vi?
  694. A Linux text editor used for configuration files (Visual Mode Editor).
  695.  
  696. What does the “ls” command do in Linux?
  697. Lists files and directory contents.
  698.  
  699. Instead of using a backslash when using command (like in Windows), Linux and MacOS use what type of slash?
  700. A forward slash (/).
  701.  
  702. Adding a “-l” to the “ls” command does what in Linux?
  703. Provides more information about the directories.
  704.  
  705. What is the “grep” command used for in Linux?
  706. To find text in a file (kind of like ctrl+f).
  707.  
  708. What other key can be used to stop a processing command in Linux?
  709. q.
  710.  
  711. What is the difference between the command “pwd” and “passwd” in Linux?
  712. “pwd” stands for Print Working Directory, and it displays the current working directory name. The “passwd” command is used to change passwords for accounts.
  713.  
  714. What is the “mv” command used for in Linux?
  715. It is used to rename a file.
  716.  
  717. What is the “cp” command used for in Linux?
  718. It is used to duplicate files or directories.
  719.  
  720. What is the “rm” command used for in Linux?
  721. It is used to delete files or directories.
  722.  
  723. In Linux, directories can only be removed once they are what?
  724. Empty. This can be bypassed by adding -r to the rm command.
  725.  
  726. What is the “mkdir” command used for in Linux?
  727. It is used to create directories or a folder for file storage.
  728.  
  729. What is the “chmod” command used for in Linux?
  730. It is used to change the mode or permissions of a file.
  731.  
  732. What is the “chown” command used for in Linux?
  733. It is used to change a file’s owner and group.
  734.  
  735. What is the “iwconfig” command used for in Linux?
  736. It is used to view or change wireless network configuration.
  737.  
  738. What is the “ifconfig” command used for in Linux?
  739. It is used to view or configure a network interface and IP configuration of a wired network.
  740.  
  741. What Linux command has started to replace the “ifconfig” command?
  742. The “ip” command.
  743.  
  744. What is the “ps” command used for in Linux?
  745. It is used to view current processes (like Windows’ Task Manager).
  746.  
  747. What is the “kill” command used for in Linux?
  748. It is used to force close applications.
  749.  
  750. What is a Mantrap?
  751. A small area with two doors where only 1 person or very few people can move through at a time.
  752.  
  753. In a Mantrap, both doors are never what at the same time?
  754. Opened.
  755.  
  756. What is Biometric authentication?
  757. A type of authentication that incorporates a human (Fingerprint, retina, voiceprint).
  758.  
  759. What are locking cabinets used for?
  760. They are used to store hardware from unauthorized users.
  761.  
  762. What is a USB lock used for?
  763. It is used to physically lock USB ports.
  764.  
  765. What is a Privacy Filter used for?
  766. It is used to hide the screen of a laptop from those who are not sitting directly in front of it.
  767.  
  768. Active Directories are organized into what?
  769. OUs (Organizational Units).
  770.  
  771. What is MDM (Mobile Device Management)?
  772. The administration of mobile devices.
  773.  
  774. What is Port Security?
  775. A feature that prevents unauthorized users from connecting to a switch interface (Alert or disable the port).
  776.  
  777. MAC (Media Access Control) Filtering is used to do what?
  778. A feature that only allows specific MAC address access on a router or switch.
  779.  
  780. Smart cards use what kind of authentication?
  781. Certificate-based authentication.
  782.  
  783. What is a PIV (Personal Identity Verification) card?
  784. A type of smart card used by the US Federal Government.
  785.  
  786. What is a CAC (Common Access Card)?
  787. A type of smart card used by the US Department of Defense.
  788.  
  789. What are Host-based firewalls?
  790. Software-based “personal” firewalls included in many operating systems.
  791.  
  792. What are Network-based firewalls?
  793. A type of firewall that can encrypt traffic into/out the network and can proxy traffic.
  794.  
  795. What is a VPN concentrator?
  796. A hardware device that is responsible for encrypting and decrypting information.
  797.  
  798. What is DLP (Data Loss Prevention)?
  799. A tool that can be used to protect against data leakages.
  800.  
  801. What are Access Control Lists (ACLs) used for?
  802. Used to allow or deny traffic.
  803.  
  804. What are Email filters used for?
  805. Used to identify and stop any email to users that contain unsolicited messages or software.
  806.  
  807. What term is used to refer to users who have rights and permissions set to the bare minimum?
  808. Least privilege.
  809.  
  810. What is the least secure wireless encryption method?
  811. WEP (Wired Equivalent Privacy).
  812.  
  813. What wireless encryption method was a step above WEP in terms of security?
  814. WPA (Wi-Fi Protected Access).
  815.  
  816. With WPA, each packet gets what type of encryption key?
  817. A unique 128-bit encryption key.
  818.  
  819. What kind of capabilities did TIKP (Temporal Key Integrity Protocol) bring to WPA?
  820. Mixing root keys, preventing replay attacks, and protecting against tampering.
  821.  
  822. What is WPA2?
  823. Wireless encryption method that is better than WPA. It uses CCMP and AES (Advanced Encryption Standard) for encryption.
  824.  
  825. How does AES work?
  826. It uses the one key to both encrypt and decrypt data.
  827.  
  828. What type of wireless encryption uses RADIUS and TACACS?
  829. WPA2-Enterprise (WPA2-802.1X).
  830.  
  831. What is RADIUS and TACACS?
  832. Authentication servers that allow users to be individually authenticated using their login username and password. RADIUS= Wireless authentication.
  833.  
  834. What is Randsomeware?
  835. A type of malware where you pay attackers to remove.
  836.  
  837. What is a Trojan Horse?
  838. A type of malware that pretends to be something else.
  839.  
  840. What is Spyware?
  841. A type of malware that watches what a user does.
  842.  
  843. What is a Keylogger?
  844. A tool that can capture every keystroke and send it back to a hacker.
  845.  
  846. What is a Rootkit?
  847. A type of malware that modifies core system files (essentially part of the system).
  848.  
  849. What makes Rootkits so dangerous?
  850. They can be invisible to the operating system and antivirus utilities.
  851.  
  852. What is a Virus?
  853. A type of malware that can reproduce itself with a user’s assistance.
  854.  
  855. What are some types of viruses?
  856. Program viruses (part of an application), Boot sector viruses (runs with the OS), Script viruses (comes in through a browser), and Macro viruses (found in Microsoft Office).
  857.  
  858. What are Worms?
  859. A type of malware that can replicate itself from system to system without a user’s assistance.
  860.  
  861. What are Botnets?
  862. A type of malware that turns your computer into a robot used to execute attacks.
  863.  
  864. What can be used to repair a virus-infected system that does not want to boot?
  865. A Recovery console (Windows Recovery Environment).
  866.  
  867. What method can be used to permanently remove a virus or malware?
  868. Restoring from an old backup.
  869.  
  870. What tool can be used to monitor the local computer and prevent malware communication?
  871. Software firewalls like Windows Firewall.
  872.  
  873. What can Secure DNS services do?
  874. They can be used to block domains that are known to contain viruses.
  875.  
  876. Why is fighting social engineering difficult?
  877. Because it is constantly changing.
  878.  
  879. What are the social engineering principles?
  880. Authority (posing as someone important), Intimidation, Social Proof/ Consensus (normal/ convincing situation), Scarcity (given time frame), Urgency (act quick, don’t think), Familiarity (friend of a friend), and Trust (“Certified Microsoft Technician” btw). (AISSUFT (kind of like airsoft))
  881.  
  882. What is Vishing?
  883. Voice Phishing. Ex: “IRS” calling you and telling you to send money right now!
  884.  
  885. What is Tailgating?
  886. The process of gaining access to something by following someone who already has access.
  887.  
  888. What is Dumpster Diving?
  889. The process of gathering information by digging through a garbage bin.
  890.  
  891. What is a DoS (Denial of Service)?
  892. When some type of external force forces a service to fail by overloading the service or using a vulnerability.
  893.  
  894. What is a DDoS (Distributed Denial of Service)?
  895. A type of Denial of Service that comes from many different places (botnet) simultaneously.
  896.  
  897. What are the devices in a Botnet doing the attacking known as?
  898. Zombies.
  899.  
  900. What does the term “Zero-day” mean when dealing with vulnerabilities?
  901. It means the vulnerability has not been detected or published.
  902.  
  903. What is the concept of a Man-in-the-middle?
  904. An attacker watches the communication a user makes with a device and intercepts that information (kind of like a spyware but not really).
  905.  
  906. What is the concept of ARP poisoning Spoofing?
  907. When an attacker pretends to be a router and sends an incorrect MAC address. The attacker then connects to the actual router and intercepts information.
  908.  
  909. What is a Brute Force attack?
  910. The constant trial and error method to find a password. A dictionary can speed up the process.
  911.  
  912. What are Rainbow tables?
  913. Tables of reversed hashes used to crack password hashes. Speeds up the hashing process.
  914.  
  915. What is the concept of Spoofing?
  916. Pretending to be something you are not.
  917.  
  918. What are non-compliant systems?
  919. Systems that do not meet the requirements of or have the same settings as an organization.
  920.  
  921. What are the levels of users and groups?
  922. Administrator > Power User > Standard Users > Guest.
  923.  
  924. What is the difference between NTFS permissions and Share permissions?
  925. NTFS permissions apply to local connections. Share permissions apply to connections over the network.
  926.  
  927. What symbol hides system files and folders?
  928. $.
  929.  
  930. What is SSO (Single sign-on)?
  931. A feature that gives access to other resources by only needing to log in once.
  932.  
  933. What profile stores all local configurations and synchronizes them on centralized servers?
  934. The Roaming user profile.
  935.  
  936. What process moves file fragments so they are next to each other?
  937. Defragmentation.
  938.  
  939. What is one way to boot into safe mode from the desktop?
  940. Restart the PC and hold shift.
  941.  
  942. What are the 7 steps of malware removal?
  943. 1. Identify and research malware symptoms. 2. Quarantine the infected systems. 3. Disable System Restore (in Windows). 4. Remediate the infected systems. 5. Schedule scans and run updates. 6. Enable System Restore and create a restore point (in Windows). 7. Educate the end user. (IQDRSEE)
  944.  
  945. What is WindowsPE?
  946. Pre-installation environment. Use the OS without fully installing it.
  947.  
  948. In order to Broadcast to a TV, both devices need to be what?
  949. Connected to the same SSID.
  950.  
  951. What is the difference between an image level backup and a File level backup?
  952. An image level backup backs up the OS system and everything else (bare metal), and a File level backup only backs up important files (requires a OS to restore).
  953.  
  954. What does a UPS (Uninterruptible Power Supply) do?
  955. Provides short-term access to power during power loss.
  956.  
  957. What does a surge suppressor do?
  958. Controls the voltage being output to a device. In the case of a spike in voltage, a surge suppressor takes the additional voltage and sends it to ground.
  959.  
  960. What is electrostatic discharge?
  961. The discharge of static electricity.
  962.  
  963. What is one way to control ESD?
  964. Work in an environment that has humidity over 60%.
  965.  
  966. How can you know the proper disposal procedures?
  967. Refer to the MSDS (Material Safety Data Sheets).
  968.  
  969. Who mandates the MSDS (Material Safety Data Sheets)?
  970. OSHA (Occupational Safety and Health Administration).
  971.  
  972. High and low humidity promote what?
  973. High humidity promotes condensation, and low humidity promotes static discharges (50% is perfect).
  974.  
  975. What is PII?
  976. Personally Identifiable information.
  977.  
  978. What standard protects credit card information?
  979. PCI DSS (Payment Card Industry Data Security Standard).
  980.  
  981. What is the GDPR (General Data Protection Regulation)?
  982. Data protection and privacy for people in the EU.
  983.  
  984. What does PHI (Protected Health information) protect?
  985. The personal health records of people.
  986.  
  987. What are scripts used for?
  988. To automate tasks.
  989.  
  990. What are some Script file types?
  991. .bat= command prompt scripting, .ps1= advanced version of .bat used by admins, .vbs= Microsoft scripting used primarily with office suite, .sh= .bat scripting for MacOS and Linux (#! shebang), .py= general purpose scripting and programming (also uses #! but has.py), .js= browser scripting.
  992.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement