• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/100

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

100 Cards in this Set

  • Front
  • Back

Which version of Windows Vista does not include offline folder capabilities?


A. Business


B. Enterprise


C. Home Premium


D. Ultimate

C. Home Premium

What is the first file used in the boot process of Windows Vista?


A. NTOSKRNL.EXE


B. CONFIG.SYS


C. AUTOEXEC.BAT


D. BOOTMGR

D. BOOTMGR

What is the maximum amount of RAM supported in the 64-bit Home Premium edition ofWindows Vista?


A. 8GB


B. 16GB


C. 128GB


D. 256GB

B. 16GB

Which of the following is an Ethernet standard implemented via a card that allows a“sleeping” machine to awaken when it receives a wakeup signal?


A. Sleep timer


B. WEP


C. Wake on LAN


D. WPA

C. Wake on LAN

Which editions of Windows Vista include BitLocker support? (Choose two.)


A. Business


B. Enterprise


C. Home Premium


D. Ultimate

B. Enterprise


D. Ultimate

Which Windows Vista feature allows you to recover from an accidental deletion or overwrite?


A. BitLocker


B. User Ac


C. Security Center


D. Shadow Copycount Control

D. Shadow Copycount Control

You are migrating one stand-alone machine from Windows XP to Window Vista. Whichof the following tools should you consider for transferring user state data and applicationfiles?


A. Windows State Mover


B. UDMT


C. Windows Easy Transfer


D. USMT

C. Windows Easy Transfer

In Windows Vista, which of the following utilities can be used to see the edition and servicepack installed on a system?


A. info


B. spm


C. winver


D. msall

C. winver

Which utility is shown in Figure 17.24?
A. Windows Memory Diagnostics 
B. Print Management 
C. Data Sources 
D. Component Services

Which utility is shown in Figure 17.24?


A. Windows Memory Diagnostics


B. Print Management


C. Data Sources


D. Component Services



D. Component Services

Which of the following files is at the end of the boot process and presents the user with theLogon screen?


A. SMSS


B. WINLOGON


C. HAL


D. SIR

B. WINLOGON

Where is the Windows Memory Diagnostics utility found in Windows Vista?


A. In the Accessories folder


B. In the System folder, beneath Accessories


C. Beneath Administrative Tools


D. Not available in Windows Vista

C. Beneath Administrative Tools

Which editions of Windows Vista support Local Security Policy (secpol.msc)? (Choosethree.)


A. Windows Vista Home Basic


B. Windows Vista Home Premium


C. Windows Vista Business


D. Windows Vista Enterprise


E. Windows Vista Ultimate

C. Windows Vista Business


D. Windows Vista Enterprise


E. Windows Vista Ultimate

After installation of the Windows Vista operating system, what is required in order to curbsoftware piracy?


A. Certification


B. Confirmation


C. Activation


D. Substantiation

C. Activation

What is the maximum number of physical CPUs supported by Windows Vista Businessedition?


A. One


B. Two


C. Three


D. Four

B. Two

Which utility is the System Configuration tool in Windows Vista?


A. msinfo32.exe


B. msconfig.exe


C. sysconfig.cpl


D. config.cpl

B. msconfig.exe

Which feature allows you to use free space on a removable drive (usually USB) to speed up asystem?


A. USB Speed


B. Shadow Copy


C. ReadyBoost


D. Screamer

C. ReadyBoost

Spencer has dug out from the closet a legacy machine that is running Windows XPProfessional. Since it is no longer supported, he wants to upgrade it to Windows Vista.Which of the following upgrades are possible? (Choose two.)


A. Windows Vista Business


B. Windows Vista Enterprise


C. Windows Vista Home Premium


D. Windows Vista Ultimate

A. Windows Vista Business


D. Windows Vista Ultimate

Which of the following network locations disables network discovery in Windows Vista?


A. Home


B. Work


C. Public


D. Personal

C. Public

Which directory on a standard Windows Vista installation holds the boot fileconfiguration?


A. \boot


B. \start


C. \system32


D. \windows

A. \boot

What is the maximum amount of RAM supported in the 64-bit Ultimate edition ofWindows Vista?


A. 8GB


B. 16GB


C. 128GB


D. 256GB

C. 128GB

Within a Linux terminal, you want to see all of the files on your system in long format(using the –l option), including any hidden files (which requires the –a option). Which commandshould you use?


A. ls –a | ls -l


B. ls –s; ls -l


C. ls -la


D. ls –a\ls -l

C. ls -la

Which of the following allows you to install Windows on a Mac machine and choosebetween operating systems upon bootup?


A. Keychain


B. Mission Control


C. Clicker


D. Boot Camp

D. Boot Camp

As part of your training program, you’re trying to convince users to make backups on aregular basis. Which Apple app can be used to make backups of various types on a regularbasis?


A. Time Machine


B. Trailer Horn


C. Insurance Policy


D. Father Time

A. Time Machine

Which of the following Linux commands/utilities can be used to edit a file?


A. ps


B. vi


C. rm


D. ls

B. vi

Which of the following Linux commands/utilities can be used to edit a wireless connection’sconfiguration settings?


A. dd


B. apt-get


C. iwconfig


D. pwd

C. iwconfig

Which of the following is a Mac OS X feature for password management?


A. Spotlight


B. Keychain


C. Dock


D. Gestures

B. Keychain

The interpreter in Linux between the operating system and the user is known as the_____________________ ________________________ .


A. Shell


B. Translator


C. Player


D. Promoter

A. Shell

What type of backups are kept on site at the computer center for immediate recoverypurposes?


A. Man-in-the-middle


B. Judicious copies


C. Journal copies


D. Working copies

D. Working copies

Which of the following can be used in Linux to download patches for installation on aworkstation?


A. patchmaster


B. shell/terminal


C. apt-get


D. hijack

C. apt-get

Which of the following commands can be used to change the owner of a file to a newowner in Linux?


A. chdir


B. chmgr


C. chown


D. pwd

C. chown

Which Linux utility can be used to check and repair disks?


A. fsck


B. chkdsk


C. du


D. dumgr

A. fsck

Your iPad has an application that will not stop running. What feature/tool can you use tostop it?


A. Kill


B. Force Quit


C. Task Manager


D. Treason

B. Force Quit

Which of the following is the most common shell used with Linux?


A. Dash


B. Cash


C. Bash


D. Sash

C. Bash

What is the name of the area at the bottom of a Mac OS X screen where, by default, a barof crucial icons appears?


A. Foot


B. Shield


C. Taskbar


D. Dock

D. Dock

What key combination can you use to bring up Spotlight from within an app?


A. Control+Shift


B. Option+Tab


C. Command+space


D. Alt+Home

C. Command+space

Which Linux command can be used to let you run a single command as another user?


A. sudo


B. su


C. passwd


D. ifconfig

A. sudo

Which of the following Linux commands will show you a list of running processes?


A. pr


B. pt


C. ps


D. pk

C. ps

You are currently in a Linux terminal session and in directory /home/edulaney/documents/mail. Which command will take you to /home/edulaney/documents?


A. cd .


B. cd ..


C. cd . . .


D. cd ∼

B. cd ..

If the permissions for a file are rwxrw-r--, what permissions apply for a user who is amember of the group to which the owner belongs?


A. Read, write, and execute


B. Read and write


C. Read only


D. No access

B. Read and write

What does the –p option with mkdir do?


A. Prompts the user before creating files


B. Prompts the user before creating subfolders


C. Creates subfolders as well as folders


D. None of the above

C. Creates subfolders as well as folders

Which component of physical security addresses outer-level access control?


A. Perimeter security


B. Mantraps


C. Security zones


D. Strong passwords

A. Perimeter security

You have a very small network in a home-based office, and you want to limit networkaccess to only those hosts that you physically own. What should you utilize to make thispossible?


A. Static IP addresses


B. Disabled DNS


C. Default subnet mask


D. Empty default gateway

A. Static IP addresses

As part of your training program, you’re trying to educate users on the importance of security.You explain to them that not every attack depends on implementing advanced technologicalmethods. Some attacks, you explain, take advantage of human shortcomings to gainaccess that should otherwise be denied. What term do you use to describe attacks of thistype?


A. Social engineering


B. IDS system


C. Perimeter security


D. Biometrics

A. Social engineering

You’re in the process of securing the IT infrastructure by adding fingerprint scanners toyour existing authentication methods. This type of security is an example of which of thefollowing?


A. Access control


B. Physical barriers


C. Biometrics


D. Softening

C. Biometrics

Which type of attack denies authorized users access to network resources?


A. DoS


B. Worm


C. Logic bomb


D. Social engineering

A. DoS

As the security administrator for your organization, you must be aware of all types ofattacks that can occur and plan for them. Which type of attack uses more than one computerto attack the victim?


A. DoS


B. DDoS


C. Worm


D. UDP attack

B. DDoS

A server in your network has a program running on it that bypasses authentication. Whichtype of attack has occurred?


A. DoS


B. DDoS


C. Back door


D. Social engineering

C. Back door

You’ve discovered that an expired certificate is being used repeatedly to gain logon privileges.Which type of attack is this most likely to be?


A. Man-in-the-middle attack


B. Back door attack


C. Replay attack


D. TCP/IP hijacking

C. Replay attack

A junior administrator comes to you in a panic. After looking at the log files, he hasbecome convinced that an attacker is attempting to use a duplicate IP address to replaceanother system in the network to gain access. Which type of attack is this?


A. Spoof


B. Back door attack


C. Worm


D. TCP/IP hijacking

D. TCP/IP hijacking

Which of the following is different from a virus in that it can reproduce itself, it’s selfcontained,and it doesn’t need a host application to be transported?


A. Worm


B. Smurf


C. Phish


D. Trojan

A. Worm

A smurf attack attempts to use a broadcast ping on a network; the return address of theping may be that of a valid system in your network. Which protocol does a smurf attack useto conduct the attack?


A. TCP


B. IP


C. UDP


D. ICMP

D. ICMP

Your system log files report an ongoing attempt to gain access to a single account. Thisattempt has been unsuccessful to this point. What type of attack are you most likely experiencing?


A. Password-guessing attack


B. Back door attack


C. Worm attack


D. TCP/IP hijacking

A. Password-guessing attack

One of the vice presidents of the company calls a meeting with the information technologydepartment after a recent trip to competitors’ sites. She reports that many of the companiesshe visited granted access to their buildings only after fingerprint scans, and she wants similartechnology employed at this company. Of the following, which technology relies on aphysical attribute of the user for authentication?


A. Smart card


B. Biometrics


C. Mutual authentication


D. Tokens

B. Biometrics

Your company provides medical data to doctors from a worldwide database. Because of thesensitive nature of the data you work with, it’s imperative that authentication be establishedon each session and be valid only for that session. Which of the following authenticationmethods provides credentials that are valid only during a single session?


A. Token


B. Certificate


C. Smart card


D. License

A. Token

Your help desk has informed you that they received an urgent call from the vice presidentlast night requesting his logon ID and password. When talking with the VP today, he sayshe never made that call. What type of attack is this?


A. Spoofing


B. Replay attack


C. Social engineering


D. Trojan horse

C. Social engineering

Internal users suspect repeated attempts to infect their systems as reported to them by popupmessages from their virus-scanning software. According to the pop-up messages, thevirus seems to be the same in every case. What is the most likely culprit?


A. A server is acting as a carrier for a virus.


B. You have a caterpillar virus.


C. Your antivirus software has malfunctioned.


D. A DoS attack is under way.

A. A server is acting as a carrier for a virus.

You’re working late one night, and you notice that the hard drive on your new computer isvery active even though you aren’t doing anything on the computer and it isn’t connected tothe Internet. What is the most likely suspect?


A. A disk failure is imminent.


B. A virus is spreading in your system.


C. Your system is under a DoS attack.


D. TCP/IP hijacking is being attempted.

B. A virus is spreading in your system.

You’re the administrator for a large bottling company. At the end of each month, youroutinely view all logs and look for discrepancies. This month, your email system errorlog reports a large number of unsuccessful attempts to log on. It’s apparent that the emailserver is being targeted. Which type of attack is most likely occurring?


A. Software exploitation attack


B. Backdoor attack


C. Worm


D. TCP/IP hijacking

A. Software exploitation attack

Upper management has decreed that a firewall must be put in place immediately, beforeyour site suffers an attack similar to one that struck a sister company. Responding to thisorder, your boss instructs you to implement a packet filter by the end of the week. A packetfilter performs which function?


A. Prevents unauthorized packets from entering the network


B. Allows all packets to leave the network


C. Allows all packets to enter the network


D. Eliminates collisions in the network

A. Prevents unauthorized packets from entering the network

Which media is susceptible to viruses?


A. Tape


B. Memory stick


C. CD-R


D. All of the above

D. All of the above

Your company hosts its own web server, and it allows consumers to make purchases via theserver. The help line has been getting complaints that users are unable to access the secureportion of the website. You open the site and it seems fine, although the secure portionwhere transactions are completed is inaccessible. What is the most likely cause?


A. The firewall is blocking TCP port 80.


B. The firewall is blocking TCP port 443.


C. The security module of the web server is malfunctioning.


D. The web server is down.

B. The firewall is blocking TCP port 443.

Your manager wants you to install a networked Internet appliance that that preventsnetwork traffic–based attacks and includes anti-malware and anti-spam software. Whatshould you install?


A. NIPS


B. NIDS


C. UTM


D. Proxy server

C. UTM

You are installing a file server for the accounting department. Where should this file serverbe located on the network?


A. Outside of the firewall


B. In the DMZ


C. In the secure network


D. On the router

C. In the secure network

You have been asked to identify the right type of cloud service to help the team of developersto provide programming elements such as runtime environments. Which service do yourecommend?


A. PaaS


B. IaaS


C. SaaS


D. DaaS

A. PaaS

Which of the following are services that a print server should provide? (Choose two.)


A. Accepting print jobs from clients


B. Turning off printers on demand


C. Providing clients with the appropriate printer driver during installation


D. Notifying users when the print job is complete

A. Accepting print jobs from clients


C. Providing clients with the appropriate printer driver during installation

You are setting up a cloud contract with a provider. Your team needs the ability to increasecapacity without intervention from the provider. What do you request?


A. Rapid elasticity


B. On-demand self-service


C. Resource pooling


D. Measured service

B. On-demand self-service

What type of server is responsible for preventing users from accessing websites with objectionablecontent?


A. Proxy


B. Web


C. DHCP


D. DNS

A. Proxy

Your company wants to move to a cloud provider to be able to scale resources quickly, butit is concerned about the security of confidential information. Which of the following typesof cloud models might be the most appropriate for your company?


A. Public


B. Private


C. Community


D. Hybrid

D. Hybrid

What does a DHCP server need to be configured with to operate properly?


A. DNS server


B. Scope


C. Range


D. DHCP relay agent

B. Scope

You have been asked to advise a group of several universities who want to combineresearch efforts and store data in the cloud. Which type of cloud solution might be bestfor them?


A. Public


B. Private


C. Community


D. Hybrid

C. Community

When configuring a DNS server, which of the following must be created by the administrator?


A. Zone file


B. Hosts file


C. Scope file


D. DNS proxy

A. Zone file

Your manager wants to use the cloud because everyone seems to be talking about it. Whatshould you include when you are listing the benefits of using the cloud? (Choose all that apply.)


A. Increased security


B. Increased scalability


C. Lower cost


D. Improved reliability

B. Increased scalability


C. Lower cost


D. Improved reliability

You are configuring two email servers on your company’s network. Which network protocoldo the servers use to transfer mail to each other?


A. POP3


B. IMAP4


C. SNMP


D. SMTP

D. SMTP

You have been asked to configure a client-side virtualization solution with three guest OSs.Each one needs Internet access. How should you configure the solution in the most costeffectiveway?


A. Three physical NICs


B. One physical NIC, three virtual NICs, and one virtual switch


C. One physical NIC, one virtual NIC, and three virtual switches


D. One physical NIC, three virtual NIC, and three virtual switches

B. One physical NIC, three virtual NICs, and one virtual switch

Which record type on a DNS server represents an IPv6 host?


A. A


B. MX


C. CNAME


D. AAAA

D. AAAA

You have been asked to install Linux in a VM on a Windows 8 client. The Windows 8 clientneeds 4GB RAM and Linux needs 2GB RAM. How much RAM does the system needat a minimum?
A. 4GB


B. 6GB


C. 8GB


D. Unable to determine from the question

B. 6GB

A computer using which of the following would be considered a legacy device? (Choose allthat apply.)


A. A 386 processor


B. The IPX/SPX protocol


C. An application developed in 1983


D. Only 1GB RAM

A. A 386 processor


B. The IPX/SPX protocol


C. An application developed in 1983

You have been asked to set up client-side virtualization on an office computer. The host OSis Windows 7, and there will be three Windows 7 guest OSs. Which of the following is trueabout the need for antivirus security?


A. The host OS needs an antivirus program, but virtual machines can’t be affected byviruses.


B. The host OS antivirus software will also protect the guest OSs on the VMs.


C. Installing antivirus software on the virtual switch will protect all guest OSs.


D. The host OS and each guest OS need their own antivirus software installed.

D. The host OS and each guest OS need their own antivirus software installed.

You have been asked by your manager to brief the group on security appliances. What isthe difference between IDS and IPS?


A. IDS is active, and IPS is passive.


B. IDS is passive, and IPS is active.


C. IDS monitors internal network traffic, and IPS monitors traffic coming in from theInternet.


D. IDS monitors traffic coming in from the Internet, and IPS monitors internal networktraffic.

B. IDS is passive, and IPS is active.

You have been asked to set up client-side virtualization on a computer at work. The managerasks for a Type 2 hypervisor. What is the disadvantage of using that type of hypervisor?


A. The guest OS will compete for resources with the host OS.


B. The guest OS will be forced to a lower priortity with the CPU than the host OS.


C. The guest OS will be forced to use less RAM than the host OS.


D. The virtual guest OS will not be able to get on the physical network.

A. The guest OS will compete for resources with the host OS.

Which of the following is not a difference between iOS and Android?


A. Android is not a proprietary operating system.


B. You can download iOS apps from only one place.


C. You can make a cellular phone call from all Android devices.


D. It costs more to be a developer of iOS apps.

C. You can make a cellular phone call from all Android devices.

You want to create an Android application. Which of the following do you need to downloadand use?


A. APK


B. IPA


C. SDK


D. SPK

C. SDK

Bob’s iPhone 4S cannot detect when he turns his device to the left and right like it’s a steeringwheel. Games and other apps that require this motion will not work correctly as aresult. Which component has failed in Bob’s phone?


A. Gyroscope


B. Accelerometer


C. Magnetometer


D. GPS

A. Gyroscope

Which of the following is more likely to be associated with a resistive touchscreen versus acapacitive one?


A. You won’t have to apply as much pressure.


B. You will need to recalibrate it.


C. You will have to clean it more often for optimal functionality.


D. You can use the pad of your finger instead of your fingernail.

B. You will need to recalibrate it.

Which of the following are text-messaging services used with mobile devices? (Choose two.)


A. SMS


B. SIP


C. Androtext


D. iOS Messaging


E. MMS

A. SMS


E. MMS

Which of the following is not a valid reason to disable cellular data networking?


A. You have a limited amount of data in your monthly plan.


B. You have access to a reliable Wi-Fi signal.


C. You are about to download an update to your phone.


D. Your phone calls are going out over your carrier’s cellular network.

D. Your phone calls are going out over your carrier’s cellular network.

Which of the following is a characteristic of Bluetooth?


A. Bluetooth connections support wireless device control but not file transfers.


B. Bluetooth is not yet a fully standardized protocol.


C. Bluetooth connections do not reach as far as Wi-Fi connections.


D. You must reboot paired devices to complete connection establishment.

C. Bluetooth connections do not reach as far as Wi-Fi connections.

What is the default TCP port number for SMTP?


A. 25


B. 110


C. 143


D. 995

A. 25

Which mail protocol commonly uses TCP port 587?


A. SMTP with SSL


B. SMTP with TLS


C. IMAP4 with SSL/TLS


D. POP3 with SSL/TLS

B. SMTP with TLS

You have enabled Wi-Fi calling on your new mobile device. You are on a cellular callwithin your Wi-Fi network’s range and you lose the cellular signal. What happens toyour call?


A. It gets dropped.


B. It will seamlessly switch over to Wi-Fi.


C. The phone will beep at you and then switch to Wi-Fi.


D. The phone will beep at you, and you need to tap Confirm to switch to Wi-Fi.

B. It will seamlessly switch over to Wi-Fi.

Which technology built into some mobile phones allows for the user to pass the phone closeto a receiver to make an electronic payment, without the phone touching the receiver?


A. Bluetooth


B. APC


C. RPS


D. NFC

D. NFC

Which two communications technologies can you use to create a VPN connection?


A. Bluetooth


B. Wi-Fi


C. Cellular


D. NFC

B. Wi-Fi


C. Cellular

Which software component of a mobile phone is responsible for managing all wireless communications?


A. Either iOS or Android OS


B. SIM OS


C. Baseband OS


D. Wireless OS

C. Baseband OS

Which two of the following are examples of RTOSs?


A. SIM OS


B. Baseband OS


C. iOS


D. Android

A. SIM OS


B. Baseband OS

Which standard is used to encrypt and decrypt email messages on mobile devices?


A. SSL


B. TLS


C. MMS


D. S/MIME

D. S/MIME

Which of the following are universally common items that are synced between a mobiledevice and a larger computer? (Choose three.)


A. Office documents


B. Contacts


C. Operating system files


D. Email


E. Configuration settings


F. Apps

B. Contacts


D. Email


F. Apps

Which of the following is not a requirement for installing iTunes on a Windows machine?


A. A 1GHz processor or better


B. 1GB of RAM or higher


C. 400MB of available disk space


D. Broadband Internet connection

B. 1GB of RAM or higher

Which of the following statements about configuring email access on a mobile device istrue?


A. Most Internet mail services offer an Exchange option.


B. The TCP ports used for configuring access are usually standard port numbers.


C. Most ports used for access are UDP ports.


D. You must download third-party apps for connecting to email services.

B. The TCP ports used for configuring access are usually standard port numbers.

Which of the following are disabled when airplane mode is switched on? (Choose all thatapply.)


A. Cellular


B. Wi-Fi


C. Bluetooth


D. NFC


E. Settings app


F. Lock screen

A. Cellular


B. Wi-Fi


C. Bluetooth


D. NFC

You have a Verizon 4G mobile phone that you want to use as a mobile hotspot. How manyconnections are you allowed to support simultaneously on that device?


A. 3


B. 5


C. 10


D. 20

C. 10