What is a home folder?
• A user’s private folder for storing personal files.
• Path to home folder, C:\users\username
What is Permission Inheritance?
Permission inheritance is the passing of permissions (Share or NTFS) from the parent folder to the child or children folder.
Explain what a browser add-on is.
Part of an internet browser that add features to it. Example Grammarly.
What should you do before working on any internal computer component?
Disconnect power and use an anti-static wrist strap.
You are analyzing connections issues of an employee’s computer. What command and syntax could you use to see a complete listing of IP and gateway IP address?
ipconfig /all
What is the main function of an operating system?
Manages hardware and software resources, and provides a user interface.
How would you contrast physical security vs. logical security?
Physical security – locks, gates, security tokens
Logical security – authentication (login/password) & authorization
Your company supplies employees with smart phones What type of app might you use to manage the phones?
Mobile device management (MDM) – Enrollment, App/feature control, Profile of security requirements
What is the purpose of documentation in IT support?
Helps track changes, support troubleshooting, and maintain consistent procedures.
What command can you use to get a listing of port connections and current port state or status?
netstat
What is the difference between a clean installation and an upgrade installation?
A clean install erases all data and installs the OS fresh; an upgrade keeps files and settings.
You need to create a local policy regarding password properties (password length, complexity, max password age, etc). What tool would you use to configure this?
Local Group Policy Editor
A co-worker’s cell phone shows updates available, but won’t install. What can you suggest?
Check compatibility, network, power, and SSD storage and try restart
What is an MSDS and why is it important?
Material Safety Data Sheet – provides safety information about hazardous materials.
You need to find the IP addresses for Netflix servers. What is the command and syntax can you can use?
nslookup netflix.com
What is the purpose of virtualization in IT?
To run multiple operating systems (OS) on a single physical machine.
A new hire is unsure about how to resolve effective user permissions and is confused by the terms implicit deny and least privilege. Can you sort this out for your new trainee?
Implicit deny - If no permission is explicitly allowed, access is automatically denied. Deny is the default.
Least privilege – Only give users the minimum access they need to do their job
A new app on your cell phone won’t launch. What two things can you try, and in what order could you try them in?
1) reboot
2)uninstall/reinstall app
What type of backup only saves files changed since the last full backup?
Incremental backup.
You are troubleshooting an employee’s computer network connection. What command and syntax can you use to determine if the NIC (Network Interface Circuit) within the computer is working?
ping 127.0.0.1 (loopback address)
Name the three Windows file systems in use today.
• NTFS
• FAT32
• exFAT
How would you contrast a Workgroup network vs. a Domain network?
• A Workgroup network is a peer-to-peer environment where sharing and security is set on each computer.
• A Domain network has a domain controller (server) that controls sharing and security of those objects within the Active Directory database.
What concerns are there about Shadow IT in larger businesses?
Refers to IT systems deployed by departments other than central IT department, to work around the perceived or actual shortcomings of the central information systems. Shadow IT often introduces security and compliance concerns
What is chain of custody in the context of computer forensics?
Documentation that shows the control, transfer, and analysis of evidence.
You want to check certain connection issues you suspect somewhere between your PC and Netflix’s server whose IP address is 52.0.131.132. What command and syntax can you use to verify connectivity?
tracert 52.0.131.132