Operating Systems
Security
Software Troubleshooting
Operational Procedures
Commands
100

What is a home folder?

• A user’s private folder for storing personal files. 

• Path to home folder, C:\users\username

100

What is Permission Inheritance?

Permission inheritance is the passing of permissions (Share or NTFS) from the parent folder to the child or children folder.

100

Explain what a browser add-on is.

Part of an internet browser that add features to it. Example Grammarly.

100

What should you do before working on any internal computer component?

Disconnect power and use an anti-static wrist strap.

100

You are analyzing connections issues of an employee’s computer. What command and syntax could you use to see a complete listing of IP and gateway IP address?

ipconfig /all

200

What is the main function of an operating system?

Manages hardware and software resources, and provides a user interface.

200

How would you contrast physical security vs. logical security?

Physical security – locks, gates, security tokens 

Logical security – authentication (login/password) & authorization

200

Your company supplies employees with smart phones What type of app might you use to manage the phones?

Mobile device management (MDM) – Enrollment, App/feature control, Profile of security requirements

200

What is the purpose of documentation in IT support?

Helps track changes, support troubleshooting, and maintain consistent procedures.


200

What command can you use to get a listing of port connections and current port state or status?

netstat

300

What is the difference between a clean installation and an upgrade installation?

A clean install erases all data and installs the OS fresh; an upgrade keeps files and settings.

300

You need to create a local policy regarding password properties (password length, complexity, max password age, etc). What tool would you use to configure this?

Local Group Policy Editor

300

A co-worker’s cell phone shows updates available, but won’t install. What can you suggest?

Check compatibility, network, power, and SSD storage and try restart

300

What is an MSDS and why is it important?

Material Safety Data Sheet – provides safety information about hazardous materials.


300

You need to find the IP addresses for Netflix servers. What is the command and syntax can you can use?

nslookup netflix.com

400

What is the purpose of virtualization in IT?

To run multiple operating systems (OS) on a single physical machine.

400

A new hire is unsure about how to resolve effective user permissions and is confused by the terms implicit deny and least privilege. Can you sort this out for your new trainee?

Implicit deny - If no permission is explicitly allowed, access is automatically denied. Deny is the default.

Least privilege – Only give users the minimum access they need to do their job

400

A new app on your cell phone won’t launch. What two things can you try, and in what order could you try them in?

1) reboot 

2)uninstall/reinstall app

400

What type of backup only saves files changed since the last full backup?

Incremental backup.


400

You are troubleshooting an employee’s computer network connection. What command and syntax can you use to determine if the NIC (Network Interface Circuit) within the computer is working?

ping 127.0.0.1 (loopback address)

500

Name the three Windows file systems in use today.

• NTFS 

• FAT32 

• exFAT

500

How would you contrast a Workgroup network vs. a Domain network?

• A Workgroup network is a peer-to-peer environment where sharing and security is set on each computer. 

• A Domain network has a domain controller (server) that controls sharing and security of those objects within the Active Directory database.

500

What concerns are there about Shadow IT in larger businesses?

Refers to IT systems deployed by departments other than central IT department, to work around the perceived or actual shortcomings of the central information systems. Shadow IT often introduces security and compliance concerns

500

What is chain of custody in the context of computer forensics?

Documentation that shows the control, transfer, and analysis of evidence.


500

You want to check certain connection issues you suspect somewhere between your PC and Netflix’s server whose IP address is 52.0.131.132. What command and syntax can you use to verify connectivity?

tracert 52.0.131.132

M
e
n
u