A+ 1002 (Dion 2)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Location is prone to power outages. Additionally, she would like the computer to maintain power for up to an hour of uptime to allow for a graceful shutdown of her programs and computer. Which of the following should you recommend?

UPS

Which command is used to create a new disk partition for Windows systems?

diskpart. Explanation: DiskPart is a command-line disk-partitioning utility available for Microsoft operating systems. You can use it to view, create, delete, and modify a computer's disk partitions.

A small business network was recently infected by a piece of malware from a USB drive that copied sensitive data from a computer, infected the system, and then spread across the network by infecting other systems. Which of the following actions could have prevented this type of attack from occurring?

Disable AutoRun. The Windows AutoRun feature is turned on by default on most Windows versions, allowing programs to run from an external device as soon as it is attached to a computer. Malware can exploit the AutoRun feature and allow it to spread its payload from your external USB device to a computer. For this reason, users should disable the AutoRun feature.

Your company is concerned about the possibility of power fluctuations that may occur and cause a large increase in the input power to their server room. What condition is this known as?

Power spikes. Explanation: A power spike is a very short pulse of energy on a power line. Power spikes can contain very high voltages - up to and beyond 6000 volts - but usually last only a few milliseconds, as opposed to longer, but lower voltage power surges.

If a user wants to allow another computer to connect to their system using a Remote Desktop Connection, which of the following should be configured?

Remote Settings.

Which command is used on a macOS or Linux system to change their password?

passwd Explanation: The passwd command changes passwords for user accounts. A normal user may only change the password for their own account, while the superuser may change the password for any user. The pwd command is used to display the present working directory (current directory) path to the terminal or display.

Which TWO of the following would provide the BEST security for both computers and smartphones?

- enable multifactor auth - enforcing trusted software sources Explanation: The use of multifactor authentication is considered an industry best practice for both computers and smartphones. Additionally, any software being installed should come from a trusted source to prevent malware infections.

Sam and Mary both work in the accounting department and use a web-based software as part of their job. Sam is unable to login to the website using his credentials from his computer, but Mary is able to login with her credentials on her computer. Sam asks Mary to login to her account from his computer to see if the problem is with his account or his computer. When Mary attempts to login on Sam's computer, she receives an error. Mary notices a pop-up notification about a new piece of software on Sam's computer when she attempted to login to the website. Which TWO of the following steps should Mary take to resolve the issue with logging in from Sam's computer?

-Verify that sams computer has the correct web browser settings and configs -ask Sam about the pop ups and about programs he recently installed Explanation: Since Mary was able to log in to the website from her computer but not from Sam's, this indicates an issue with Sam's computer and/or web browser. The pop-up notification about the new program being installed is a clue that something exists on Sam's computer that doesn't on Mary's computer, therefore it could be the cause and should be investigated further. Additionally, the browser's configuration should be checked to ensure the correct settings are being used.

A cybersecurity analyst is auditing your company's network logs and identifies that a USB mass storage device was previously inserted into many of the company's servers. The logs also showed that there were dozens of failed login attempts prior to a successful login occurring on the servers. Which TWO of the following actions are recommended to eliminate the vulnerabilities identified by the cybersecurity analyst?

-auto lock after 3 failed login attempts - modify the AutoRun feature Explanation: Since the USB mass storage device was used to connect to the servers, it is recommended to modify the AutoRun settings. To prevent the password guessing attacks used, the servers should be configured to lockout any account after 3 failed login attempts.

You are setting up the Remote Desktop Services on a Windows 2019 server. In order to increase the security of the server, which TWO of the following actions should you take?

-block unused ports -logically place server in DMZ Explanation: To best secure the server, you should logically place the Windows 2019 server into the network's DMZ and block all unused ports on the switch, router, and firewall. Since the server will be used to allow remote connections from across the internet to access the server directly, the server must be placed into the De-Militarized Zone (DMZ) of the network and not in the internal trusted portion of the network. Additionally, any server or services that is going to be "forward facing" to the internet (like a Remote Desktop Services server) should have all of the unused ports blocked on the switch, router, and firewall to minimize the footprint of the network. By blocking unused ports, there are less ways for an attacker to get into the network and to attack the server.

A co-worker is creating a file containing a script. You look over their shoulder and see "net use s:\\fileserver\videos" in the file. Based on this, what type of file extension should this script use?

.bat Explanation: A .bat file is used for a batch script. Batch scripts run on the Windows operating system and in their simplest form contain a list of several commands that are executed in a sequence. Since "net use" is a Windows command, this is a simple batch (.bat) script.

You co-worker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the file be in?

.ps1 Explanation: If you want to save a series of PowerShell commands in a file so you can run them again later then you effectively creating a PowerShell script. This is simply a text file with a .ps1 extension. The file contains a series of PowerShell commands, with each command appearing on a separate line.

What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system?

1GB. Explanation: For the Windows 10 (32-bit) operating system, the minimum requirements are a 1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space.

What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system?

20GB. Explanation: For the Windows 10 (64-bit) operating system, the minimum requirements are a 1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space.

Privacy screen

A privacy screen is filter placed on a monitor to decrease the viewing angle of a monitor. This prevents the monitor from being viewed from the side and can help prevent shoulder surfing. The standard type of anti-glare filter consists of a coating that reduces the reflection from a glass or plastic surface.

Every new employee at Dion Training must sign a document to show they understand the proper rules for using the company's computers. This document states that the new employee has read the policy which dictates what can and cannot be done from the corporate workstations. Which of the following documents BEST describes this policy?

AUP

You are working on a customer's computer when you cellphone begins to ring. What should you do?

Apologize to the customer and send the call to voicemail.

A user's computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do?

Ask another tier 2 help desk tech to answer the call. Explanation: Since the Tier 2 technician already knows that this will take some time to resolve, it would be best to ask another technician to help the user since they are scheduled for their break. It would be improper to either ask the user to call back later or to put them on a long hold. While the technician may opt to troubleshoot the issue for the user right now, depending on the organization's break structure that may not be possible. Often in large organizations, break times are scheduled and if the technician postpones their break it could have a cascading effect across numerous other technician's schedules.

Janice called the help desk to report that her computer will not boot up. The technician begins troubleshooting the issue, but after 20 minutes the computer is still not booting up. Janice is getting frustrated with the technician and she tells the technician that she feels that they are wasting her time since the issue isn't resolved yet. How should the technician respond to Janice's frustration?

Ask open ended questions.

Your Windows 10 machine has just crashed. Where should you look to identify the cause of the system crash and how to fix it?

BSOD. Explanation: A stop error, commonly called the blue screen of death, blue screen, or BSoD, is an error screen displayed on a Windows computer system following a fatal system error. It indicates a system crash, in which the operating system has reached a condition where it can no longer operate safely. Each BSOD displays a "stop code" that can be used to research the cause of the error and how to solve it.

A workstation was patched last night with the latest operating system security update. This morning, the workstation only displays a black screen. You restart the computer, but the operating system fails to load. What is the NEXT step you should attempt to boot this workstation?

Boot into safe mode and roll back recent security update. .

Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as?

Brownouts

Brute force

Brute-force attack when an attacker uses a set of predefined values to attack a target and analyze the response until he succeeds. Success depends on the set of predefined values. If it is larger, it will take more time, but there is a better probability of success. In a traditional brute-force attack, the passcode or password is incrementally increased by one letter/number each time until the right passcode/password is found.

You are working on a Windows 10 workstation that is operating much too slowly. Which TWO of the following commands should you use to speed up the system?

Chkdsk and dism. Explanation: The Deployment Image Servicing and Management (DISM) is a command-line tool that is used to mount and service Windows images before deployment. The dism command with the /RestoreHealth option can be used to run a scan to identify and repair an corruption on a image or virtual hard drive. If you have a physical hard drive that is operating slowly, then the chkdsk command could be used instead.

Your company recently suffered a small data breach that was caused by an employee emailing themselves a copy of the current customer's names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which of the following logical security concepts should you implement to prevent a trusted insider from stealing your corporate data?

DLP. Explanation: Data loss prevention software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint actions), in motion (network traffic), and at rest (data storage). Since the user was an authorized user (employee), changing your password policy, reconfiguring the firewall, or setting up a MDM solution would not solve this problem. Instead, a DLP solution must be implemented.

Your company works as a contractor to the military and has just finished replacing about 500 workstations across their secure network. You have been asked to properly dispose of the workstations and to destroy the data on their hard disk drives. Which of the following methods would be the MOST effective?

Degaussing is the process of erasing/wiping a hard disk drive or magnetic tape. When exposed to the powerful magnetic field of a degausser, the magnetic data on a hard disk is neutralized or erased. Degaussing is the guaranteed form of hard drive erasure and is considered fast and efficient, especially with large numbers of hard drives. While the other options will erase or delete the data, they are much more time consuming since each drive must be formatted or destroyed individually. With an industrial degausser, multiple hard drives can be destroyed at once and they take less than a minute to degauss the hard drives.

What is the term for a piece of software which no longer has technical support, software updates, or security updates?

EOL

What is the SEVENTH step of the seven step malware removal process?

Educate the end user

Two weeks ago, David's computer was infected with a virus. A technician performed the malware removal process on the machine and removed the infection from the system. Now, many of the symptoms have returned on David's computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation?

Educate the end user on how to prevent malware in the future.

A Windows 2019 server is crashing every evening at 2:35 am, but you are not sure why. Which of the following tools should you use to identify the cause of the system crash?

Event Viewer. Explanation: The Windows Event Viewer shows a log of application and system messages, including errors, information messages, and warnings. It's a useful tool for troubleshooting all kinds of different Windows problems. If you use the Event Viewer, you can identify what was occurring at or around 2:35 am each day before the server crashed and use this to troubleshoot the problem.

After installation or change has been implemented, which of the following is necessary prior to closing out the change request?

Explanation After the installation or implementation of the change, the end-user acceptance must be received. If the end-user hasn't approved the installation or change, then the project or ticket cannot be closed out.

A home user contacts the help desk and states that their desktop applications are running very slowly. The user also says that they have not received any emails all morning, but they normally get at least 5-10 emails each day. The help desk technician gets permission from the home user to remotely access their computer and runs some diagnostic scripts. The technician determines that the CPU performance is normal, the system can ping the local router/gateway, and the system is able to load websites slowly or they fail to load completely. During the diagnosis, the technician also observes the remote connection dropping and reconnecting intermittently. Which of the following should the technician attempt to perform NEXT to resolve the user's issue?

Explanation Based on the symptoms, it appears that the system may be infected with malware. Therefore, it would be best to attempt to: -remediate the system by updating the antivirus, -performing a full system scan, and then -verifying that the web browser and email client's settings are correct.

GPT vs. MBR storage

Explanation GPT is a newer way to partition disks that allows for partition sizes over the 2 TB limit that was imposed by MBR

What is PCI

Explanation The Payment Card Industry Data Security Standard (PCI DSS) applies to companies of any size that accept credit card payments. If your company intends to accept card payment, and store, process and transmit cardholder data, you need to host your data securely and follow PCI compliance requirements.

What is a backout plan?

Explanation: A backout plan is an IT governance integration approach that specifies the processes required to restore a system to its original or earlier state, in the event of failed or aborted implementation. Any installation or upgrade should include a backout plan as part of the change request and change plan. That way, if something goes wrong with the installation then the team can "backout" and restore service on the legacy/previous system.

Worm

Explanation: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. A worm can spread on its own, whereas a virus needs a host program or user interaction to propagate itself.

Zero day attack

Explanation: A zero-day attack happens once that flaw, or software/hardware vulnerability, is exploited and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability—hence "zero-day."

Nicole has slow WiFi speed ONLY at her home.

Explanation: Most likely, Nicole's smartphone is connecting to a neighbor's wireless network instead of her own. This network likely has a lower signal strength since it is outside her home and this is causing the limited or slow bandwidth. Therefore, you should first verify that Nicole is connected to the proper wireless network before conducting any additional troubleshooting.

Ransomware

Explanation: Ransomware is a type of malware designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website. Once infected, a system or its files are then encrypted and the decryption key is withheld from the victim unless payment is received.

Madison is trying to open up her anti-malware solution to run a full system scan because she suspects her computer has become infected. When she attempts to run the tool, she receives an error of "Access denied". What security issue is MOST likely occurring?

File permission change. Explanation: If the user receives an "access denied" error message, it indicates that the file permissions have been changed. If the system files were renamed or the files disappeared, an error of "file not found" would be seen instead.

You are trying to locate a protected .dll file to edit, but you are unable to see it under the System32 folder. Which Control Panel utility should you use to find the file?

Folder Options. Explanation: The "View hidden files" option is located under the Folder Options utility in the Windows Control Panel.

Minimum requirements: 32bit and 64bit

For a 32-bit operating system, the minimum requirements are a 1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space. For a 64-bit operating system, the minimum requirements are a 1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space.

You are working in a doctor's office and have been asked to setup a kiosk to allow customers to check in for their appointments. The kiosk should be secured and only customers to access a single application used for the check in process. You must also ensure that the computer will automatically log itself in whenever the system is powered on or rebooted. Which of the following types of accounts should you configure for this kiosk?

Guest. Explanation: Windows' guest account lets other people use your computer without being able to change PC settings, install apps or access your private files. The Guest account from Windows is a standard, local user account, with very limited permissions. The Guest account can only use applications that were already installed on the computer/kiosk before the Guest account was enabled.

Chris just downloaded a new third-party email client for his smartphone. When Chris attempts to login to his email with his username and password, the email client generates an error messaging stating that he entered "Invalid credentials". Chris assumes he must have forgotten his password, so he resets his email's username and password and then reenters them into the email client. Again, Chris receives an "Invalid credentials" error. What is MOST likely causing the "Invalid credentials" error in regard to Chris' email client?

His email account requires multifactor auth

What is the FIRST step of the seven step malware removal process?

Identify and research malware symptoms

You are the first help desk technician on the scene of a potential data breach. What is the FIRST thing you need to do as part of the incident response?

Identify the issue. Explanation: When conducting an incident response, you must (1) identify, (2) report, and (3) preserve the data/device.

Your company has just installed 50 new LCD monitors to replace some very old CRT monitors. How should you properly dispose of the old CRT monitors?

In accordance to local government regulations.

A user is unable to open some files on a file server and contacts the help desk for support. The help desk technician begins to troubleshoot the server and notices that all of the data backups for the server are operational, but there are large portions of time missing within the event log. The technician remembers that there have been several bad thunderstorms recently during those missing time periods. What might the technician do to prevent these server issues in the future?

Install a new battery backup.

Your supervisor has requested remote access to a particular server in order to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do prior to granting remote access to the server to your supervisor?

Install the latest security updates and patch the computer. Explanation: To prevent infection, it is important that all servers and workstations remain patched and up to date on their security updates. After that, the next best thing would be to setup the antivirus to automatically update itself daily and run a full scan nightly. Beyond that, educating your supervisor would be a good idea, as well.

Another technician tells you that they are PXE booting a computer. What is the technician MOST likely doing with the computer?

Installing an image to the computer over the network Explanation: The Preboot eXecution Environment (PXE) specification describes a standardized client-server environment that boots a software assembly, retrieved from a network, on PXE-enabled clients. It allows a workstation to boot from a server on a network prior to booting the operating system on the local hard drive. It is usually used to install an image to the computer over the network.

Your son just attempted to start up three programs at once on his Windows 10 Home laptop. The system appears to be unresponsive and a spinning circle has replaced his mouse cursor on the screen. What is the BEST solution to this problem?

Kill the unresponsive task. Explanation: When an application becomes unresponsive, it is best to either wait or kill the process. To kill a task or process, open the Task Manager and click More Details. Then, select the unresponsive task and click End Task.

Eleanor, a user, contacts the help desk to report that her workstation will not boot up this morning. The help desk technician verifies that the workstation's memory, power supply, and monitor are all functioning properly. The technician believes that the hard drive is not being recognized by the system based on an error message they see displayed on the screen. Which of the following error messages was being displayed?

No boot device available. Explanation: "No boot device available" is an error message that indicates the hard drive is not being recognized by the workstation. If the error message was "Operating system not found" or "NTLDR not found", this would indicate that the hard drive was recognized but that the Windows OS was not installed properly. The "BIOS ROM checksum error" would indicate an issue with the BIOS, not the hard drive.

Michael, a salesman, is on a business trip and is trying to access his corporate email over the hotel's WiFi network. Michael's laptop appears to be connected to the hotel's wireless network, but his email client is unable to download any new messages and states "Network Offline". Michael contacts the help desk for assistance. What action should the help desk technician tell Michael to perform to solve the issue?

Open wen browser, see if it redirects you (to login page for WiFi)

When using a MBR, which of the following types of partitions can only have a limit of four partitions?

Primary. Explanation: Primary partitions are limited to only four primary partitions on a system using MBR. To overcome this limitation, extended partitions can be used

Your mother just heard that you passed your certification exam and became CompTIA A+ certified. She is so proud of you and needs your help. There is something wrong with her computer, but unfortunately she doesn't know how to fix it. She asks if you can just remotely connect to her computer and see if you can fix it. Which of the following technologies would BEST allow you to remotely access her computer and interact with her Windows 10 laptop?

RDP

A user receives the following error message: "Windows Update cannot currently check for updates because the service is not running." The user calls the help desk to report the error they received. A support technician uses a remote connection tool to login to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT?

Reboot the computer. Explanation: If any of the .DLL files involved with Windows Update are not correctly registered, you may also encounter this problem. To solve it, open services.msc and stop the Windows Update service. Then, open a Command Prompt as the administrator and use regsvr32 for each of the 6 Windows Update DLL files (wuapi.dll, wuaueng.dll, wups.dll, wups2.dll, wuwebv.dll, and wucltux.dll). Then, open services.msc and restart the Windows Update service. Finally, restart your computer for these changes to take effect.

A user is complaining that their profile is taking too long to load on their Windows 10 system. Which of the following is the BEST solution to this problem?

Rebuild the Windows profile. Explanation: Sometimes, a Windows profile can be corrupted over time and this can make it slow (or even impossible) to load. If this happens, you should re-create or rebuild the user profile and migrate the user's personal data into the new profile.

Your company wants to ensure that users cannot access USB mass storage devices. You have conducted some research online and found that if you modify the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor key, it will prevent USB storage devices from being used. Which of the following tools should you use to modify this key?

Regedit. Explanation: The Registry Editor (regedit) allows you to view and make changes to system files and programs that you wouldn't be able to access otherwise. The registry is a database made up of hives and keys that control various settings on a Windows system. Incorrectly editing the Registry can permanently damage your computer, so it is important to be very careful when modifying the registry using regedit.

You have been asked to install a computer in a public workspace. The computer should only be used by the authorized user. Which of the following security requirements should you implement to prevent unauthorized users from accessing the network with this computer?

Require auth on wakeup. Therefore, if an authorized user walks away from the computer and it goes to sleep, when another person tries to use the computer it will ask for a username and password prior to granting them access to the network.

Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com". What should Michelle do to fix this problem?

Reset the web browsers proxy settings. Explanation: When a browser redirect occurs, it usually is the result of a malicious proxy server setting being added to the browser. Michelle should first check her web browser's configuration for any malicious proxies under the Connections tab. Next, she should check the hosts.ini file to ensure that no single sites are being redirected.

Dion Training has an open wireless network so that their students can connect to the network during class without logging in. The Dion Training security team is worried that the customers from the coffee shop next door may be connecting to the wireless network without permission. If Dion Training wants to keep the wireless network open for the students but prevents the coffee shop's customers from using it, which of the following should be changed or modified?

Signal strength or power level

Infected system become reinfected. Not connected to internet.

Since the workstation is isolated from the internet, the anti-malware solution will need to be manually updated to ensure it has the latest virus definitions. Without the latest virus definitions, the system can easily become reinfected

Which of the following types of attacks are usually used as part of a man-in-the-middle attack?

Spoofing. Explanation: A man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other. One example of a MITM attack is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. Spoofing is often used as a method of injecting the attacker into the conversation path between the two parties.

Which of the following network configurations is used to identify your computer's individual host identifier and your computer's network identifier?

Subnet mask

A flat panel television was just installed in a conference room in your office building. The facilities manager is concerned that it could be damaged during a lightning strike. The conference room is only used a few times a week, so the company is not concerned about the threat of power outages. Which of the following should be installed to BEST mitigate the facilities manager's concerns without spending too much money?

Surge protector

Which of the following tools can you use to check the CPU utilization and manage any high-resource processes?

Task Manager. Explanation: The Task Manager is an advanced tool in Windows that provides a number of tabs that allow a user to monitor the applications, processes, services, and CPU utilization on a computer. The Processes tab more than anything else, because it lets you quickly see how system resources are utilized, which can be very helpful when trying to troubleshoot applications or find out why the computer is suddenly performing slowly. The Task Manager can be used to identify and stop processes that use excessive system resources and to keep the computer operating at high speeds.

Ifconfig command

The ifconfig command is used to display information about the current wired network connection on a macOS or Linux system, including its IP address, subnet mask, and MAC address.

Jason took home a company-issued Windows 8.1 laptop home to do some work. He successfully connected it to his home's wireless network and verified he can access the Internet and browse his favorite websites. Unfortunately, Jason is unable to access any of the network's shared files from his home network's media server. Which of the following may be the reason that Jason is unable to access the network shares in his home network?

The laptop must join the HomeGroup. Explanation: The HomeGroup for the home network must be joined in order for the laptop to access the local network's shared files from the network's media server. The rest of the options can be dismissed since the laptop is able to access the internet successfully and browse the web.

Edward has just returned to his office after a two-week vacation. When he logs into his email client to access his company email, he notices that he cannot see the shared Customer Service inbox folder in his email client. He contacts the help desk and they verify that his account is still connected to the domain controller and it can still send and receive emails successfully. What is the MOST likely happened during Edward's vacation that is causing the missing inbox folders in the email client?

The network file share's permission has been modified.

3 options for shredding docs

The three most common types are; strip-cut, cross-cut, and micro-cut. The strip-cut machines shred long vertical pieces, as cross-cut adds horizontal cuts to make the shred pieces even smaller. Micro-cut machines shred to an even higher level of security essentially rendering your documents to tiny particles.

Natalie's iMac has been infected with malware. The malware has caused numerous files to be deleted from the system and the operating system is now corrupted. Natalie need to access some of her files from the computer that have been deleted by the malware. Which of the following built-in utilities should be used to restore access to those files?

Time Machine.

Which THREE of the following actions should you perform to increase the security of the home user's wireless network?

To BEST secure this wireless network in a large apartment building, you should first reduce the transit power. This will ensure the network's radio frequency signals remain within the apartment itself. Then, you should disable the SSID broadcast, since this will prevent the home user's neighbor from seeing the network as available. Finally, the home user should use WPA2 encryption since it is the stronger method of encryption available for WiFi networks.

A user has reported that their workstation is running very slowly. A technician begins to investigate the issue and notices a lot of unknown processes running in the background. The technician determines that the user has recently downloading a new application from the Internet and may have become infected with malware. Which of the following types of infections does the workstation MOST likely have?

Trojan. Explanation: A trojan is a type of malware that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network. The most common form of a trojan is a Remote Access Trojan (RAT), which is used to allow an attacker to remotely control a workstation or steal information from it. To operate, a trojan will create numerous processes that run in the background of the system

A programmer is writing a script to calculate the amount of disk space needed to perform a daily backup. The programming needs to store the amount of disk space in a temporary place holder within the program that can be updated and changed during the script's execution. Which of the following would be used to store the value of the disk space needed?

Variable. Explanation: A variable is a placeholder in a script that can contain a number, character, or string or characters. Variables in scripts do not have to be declared (unlike in programming languages), but instead can simply be assigned a value. Then, the variable name is referenced throughout the script instead of the value itself.

A user's computer was running out of storage space, so they decided to install a new second 1 TB hard disk drive (HDD) into their Windows 10 computer. Now, whenever they attempt to boot up the computer, an error of "No Operating System Found" is displayed on their screen. You unplugged the new 1 TB HDD and then the computer boots up without any errors. You have just reconnected the 1 TB HDD, what NEXT step should you attempt to fix this issue?

Verify the boot order in BIOS/UEFI Explanation: If more than one hard drive is connected to the computer, it is important to verify the correct boot order is listed in the BIOS/UEFI. In this scenario, it sounds like the system is configured to boot first from the 1 TB HDD and then from the original HDD. If this order is switched in the boot order, then the system would boot without generating the error message.

Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won't open. What should you do?

Verify the digital certificate is installed on the device. Explanation: If an encrypted email will not open in your mail app, you most likely need to verify that your digital certificates are properly installed on the device as these are used to decrypt encrypted emails.

A small doctor's office has asked you to configure their network to use the highest levels of wireless security and desktop authentication. The office only uses cloud-based SaaS applications to store their patient's sensitive data. Which TWO of the following protocols or authentication methods should you implement for the BEST security?

WPA2 and multifactor Explanation: Since everything is being stored within a cloud-based SaaS application, the doctor's office needs to ensure their network connection is using the highest level of encryption (WPA2) and their desktop authentication should use a multifactor authentication system. Multifactor authentication relies on using at least 2 of the following factors: something you know (password or pin), something you have (smart card or key fob), something you are (fingerprint or retinal scan), or something you do (draw a pattern or how you sign your name).

WPA2

WPA2 is the most secure wireless security and encryption protocol. WPA2 uses a pre-shared key (PSK) for authentication and is designed to secure both home and enterprise wireless networks.

Windows version supports Virtual Desktops

Windows 10 added support for Virtual Desktops like those long seen on Linux and Mac OS X. These allow users without multi-monitor setups to create multiple virtual desktops which are handy for splitting usage between work and leisure, work into projects or whatever you require.


Conjuntos de estudio relacionados

Learning and Transfer of Training

View Set

6. Fyziologie oběhu krve a lymfy

View Set

12. Salesforce Platform Developer 1(450)

View Set

3.4, 3.5, & 3.6: Hybridization, Sigma/Pi Bonds, and delocalization

View Set

Exponential Functions - Assignment

View Set

Chapter 2: Property and Casualty Insurance Basics Quiz

View Set