Windows has "Create a Restore Point". What does Mac use instead?
Time Machine
What is called when the human body and its characteristics/features are used for identification?
Biometrics
What command in command prompt would you use in order to lookup the IP Address of your computer?
IPConfig
What must you first do before fixing/working on a computer?
Back up the data.
What cable/connector is used for landlines?
RJ-11
Which version of Windows allows easier access to the multiple desktop feature?
Windows 11
What cyber attack involves sending an email that looks legitimate, but is actually trying to hijack your computer or attempting to gain Personal Information?
Phishing
You try to connect to the Wifi with your laptop, but notice that it is slow. You now try connecting to the Wifi with your phone but there now it is even slower. What should you try doing to get better Wifi?
Move closer to the Access Point.
What should you do with a client after you are done resolving an issue for them, but you think they may have more concerns?
Follow up/Call them back/Check on them.
You are an IT administrator that wants to install updates remotely at night to many computers. What method would you use to turn on the computers?
Wake-On-Lan
Which edition of Windows does not support Group Domain Policy?
Windows Home Edition
What is a vulnerability that can be exploited before developers even know about it?
Zero-day
You are having software issues on your phone. What is the first thing you should do?
Perform a power cycle/turn it off and on/reboot it
You are fixing a laptop and require the use of a new tool. When you receive it, you notice a vibrant, silver substance in a bag when you open up the package and are unsure what to do with it. What would you check to know what to do with it if there is no manual?
Material Safety Data Sheet (MSDS)
What replaced TKIP?
AES
What is an update with zero downtime called?
Rolling Update
Which biometric identification method is the most accurate?
Retina Scan
After verifying that the computer you are working on has malware, what is the first thing you should do towards getting rid of the malware?
Quarantine the files.
You are new to a company and need to ask your supervisor for the best practices for the job. What will the the supervisor refer you to?
Standard Operating Procedure
A server administrator for a corporation with an enterprise network was tasked with setting up a website hosted on-premise. How should the administrator set it up?
A screened subnet can also be referred to by the deprecated terminology demilitarized zone (DMZ). The idea of a screened subnet is that some hosts are placed in a separate network segment with a different IP subnet address range than the rest of the LAN.
Which Linux Command elevates privileges?
Su,Sudo
What type of virus hides in the ram and is nearly undetectable?
Fileless Malware
You are reviewing a script and come across this:
#until ping -c1 "$1" &>/dev/null
What will this execute/do?
Nothing will execute because it is a comment.
What do the numbers in the 3-2-1 rule represent?
3 copies, 2 different medias, 1 stored off-site
You are pinging a host at 192.168.0.99 from a host at 192.168.0.200. The response is “Reply from 192.168.0.200: Destination host unreachable.” The hosts use the subnet mask 255.255.255.0. What could be the problem?
The host unreachable message indicates that there was no response, but the problem will be an issue such as the host being disconnected from the network or configured to block discovery rather than a gateway issue.
The hosts are on the same IP network (192.168.0.0/24). This means that 192.168.0.200 does not try to use a router (the gateway) to send the probes. 192.168.0.200 uses address resolution protocol (ARP) to find the host with the IP 192.168.0.99.