ITC 191 Exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

You are running a web server app in Ubuntu Server. Users complain that their browsers are loading webpages with errors. Where are you likely to find the log file where the web server reports its errors?

/var/log

Which of the following best describes a variable when implemented in a script?

A container for storing data values that can be assigned, referenced, and manipulated.

What tool is best to use when destroying data on an SSD?

ATA Secure Erase

What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?

Accelerometer

Derek's supervisor is concerned that the company's security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network.What does the computer or server use to verify the access to a specific resource on the network?

Access control list

James travels for business and is always worried that his laptop will be taken from his room.Which type of device will ensure that James's laptop will not be stolen while he travels?

Cable lock

Among the following, which is the best protection against ransomware?

Carbonite

You work in the Accounting department and have been using a network drive to post Excel workbook files to your file server as you complete them. When you attempt to save a workbook file to the drive, you see the error message: "You do not have access to the folder 'J:\'. See your administrator for access to this folder." What should you do first? Second? Explain the reasoning behind your choices.

Check File Explorer to verify that you can connect to the network. Save the workbook file to your hard drive.

What is the best way to determine if an email message warning about a virus is a hoax?

Check websites that track virus hoaxes.

Which of the following mobile device OSs are open source? Choose all that apply.

Chrome OS Android

A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?

Click the Advanced button to open Advanced Security Settings for the file.

Where in Group Policy can you locate the policy that requires a smart card to be used to authenticate a user to Windows?

Computer Configuration, Windows Settings, Security Settings, Local Policies, Security Options

Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows.How can the settings be configured with the least effort by the admin?

Configure Group Policy to run a logon script.

You have set up a user group named Accounting and have put all employees in the Accounting department in this group, which has been given permission to use the Financial folder on a file server. You are now asked to create a subfolder under Financial named Payroll. Megan, the payroll officer, is the only employee in the Accounting department allowed to access this folder. What is the best way to configure the new share?

Create a new user group named Payroll, put Megan in the group, and assign the group read/write permissions to the Payroll folder.

A user is experiencing problems connecting to a SOHO Wi-Fi network via her mobile device.Which of the following is the first step a technician should take in resolving this issue?

Determine if any other devices are experiencing the same issue.

Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?

Disable AutoRun.

You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks.What is best practice for the remaining unused account?

Disable the account until the employee is ready to use it.

A scanner connected to your Mac is giving problems and you suspect corrupted device drivers. What should you do first? Second?

Download and install drivers from the scanner manufacturer. Update macOS

Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled several browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point.What should Jackson do to complete the malware removal process?

Educate the end user.

Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet.What can Dennis do that will allow the children to watch a video on the Internet while in the car?

Enable a hotspot on his smartphone.

Your company's email server has been filling up employee's email boxes with advertisements for things they did not request. You have been asked to research how to stop these types of messages from getting to your coworker's email client software.What will you recommend to your supervisor?

Enable the spam filter.

An app that cost you $4.99 is missing from your Android. What is the best way to restore the missing app?

Go to the Play Store where you bought the app and install it again.

Jackson is setting up an IoT thermostat in his home. He has set up the IoT controller on his phone to control the device.What else does Jackson need in order for the thermostat to be considered an IoT?

IP address App to control it over the Internet

Which encryption protocols might be used to secure a VPN connection? Choose all that apply.

L2TP PPTP IPsec

You're at the store to buy a car charger for your dad's iPhone. There are several options with many different types of connectors. Which of these connectors should you choose?

Lightning

You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.)1- ECHO This batch file deletes the temp files2-DEL %TEMP%\*.* /Q3-REM The temp files were deleted4-PAUSEWhich of the lines is a comment?

Line 3

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements.Which of the following operating systems will be the best choice for the users?

Linux

A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text message with a unique PIN that must be entered before she is granted access to the account.Which of the following describes the security method being used?

Multifactor authentication

You sign in to your personal computer with your Microsoft account and then you want to set up your computer as a trusted device to make changes to the account settings. Microsoft sends a code to your cell phone in a text message. You enter the code on a Windows screen. This type of authentication is called:

Multifactor authentication

Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for payments made at a retail checkout counter. The technology also allows the marketing team to share data quickly.What technology is set up on the marketing team's phones?

NFC

Which security features are available on Windows 10 Home?

NTFS permissions Internet Options

Which of the following is true about NTFS permissions and share permissions? Select all that apply.

NTFS permissions work only on an NTFS volume.

A technician needs to boot macOS over the network using an image stored on a server.What Apple technology will best assist the technician?

NetBoot

Becky has been assigned to help with a major change to her company's accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor causes the change to fail.What is Becky's mistake called?

Out of scope modification

At a restaurant, you overhear people discussing an interesting case they treated while working in a dental office that day. Which type of regulated data policies are most likely to have been violated?

PHI

Alexandria works for a non-for-profit company that asks for donations to help the homeless people in her community. Recently the database that holds all the contact information about the donners was hacked, and all the data was copied.What type of data was taken?

PII

When setting up OUs in a new domain, why might it be useful to put all computers in one OU and all users in another?

Policies generally apply to either computers or users.

Which type of server can function as a firewall?

Proxy server

As a bank employee, you often work from home and remotely access a file server on the bank's network to correct errors in financial data. Which of the following services is most likely the one you are using to authenticate to the network and track what you do on the network?

RADIUS

What type of employee badge does not have to be swiped by a card reader in order to allow the employee through a door?

RFID badge

The computer that you are working on is not able to complete a Windows update. The update process begins to download the file, but then you receive an error message saying that the Windows update was unable to download. You have checked your Internet connection, and it is working. You have tried the update on your other computer, and it worked.What should you do first to fix the problem with the Windows update?

Remove malware.

A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes and you see a blue screen of death. You have important document files on the drive that are not backed up and you cannot afford to lose. What do you do first? Explain why this is your first choice.

Remove the hard drive from the computer case and install it in another computer.

A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability.Which of the following should be included in securing the user accounts? (Select THREE.)

Require user account passwords. Require strong passwords. Set failed logon restrictions.

Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode.What solution does Apple provide that will help Jennifer recover the passcode for her iOS device?

Reset the device and restore the data from iCloud or iTunes.

You're trying to cast a video presentation from your tablet to a projector for a training session with some new hires. Although you tested it successfully yesterday, today the connection is not cooperating. You've closed apps you're not using, and you've checked that the projector and the tablet are working otherwise. Of the following troubleshooting steps, which should you try first? Second?

Restart the projector. Restart the tablet

Your boss asks you to work through the weekend to install new software on the applications server that serves up applications to 20 users. The following Monday, all users report they cannot open their data files. After speaking with technical support for the new application, you discover it is not compatible with the old data files. Which type of documentation should you refer to first to address this problem?

Risk analysis documents

Recently, Frank's computer has slowed down dramatically. He has also noticed that the time on the computer is not accurate. Frank has run several antivirus scans, but has not found an issue. Today while surfing the web, he was redirected several times to a website that he did not request. Then a BSOD error occurred on his computer, and when he turned on his computer, the antivirus software was disabled.What kind of malware could be causing the issues on Frank's computer?

Rootkit

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use.Which of the following tabs will you suggest to the coworker?

Security tab

You have set up your Android phone using one Google account and your Android tablet using a second Google account. Now you would like to download the apps you purchased on your phone to your tablet. What is the best way to do this?

Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps.

James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files.How can James select what to synchronize from his phone to Google storage?

Settings app

Of the 10 devices shown earlier in Figure 9-46, how many of them are assigned IP addresses?

Seven: a thermostat, a router, two phones, two bridges, and a web server

The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016.Which of the following is the first step in implementing this data share?

Share the folder or volume on the file server that will store the shared data files

While visiting a coffee shop, you see a poster advertising a concert for a music group you'd love to see. You notice there's an NFC tag at the bottom with additional information about the concert. Which of the following devices would likely be able to read the NFC tag?

Smartphone

Which of the following are natively supported by the Windows, Mac, and Linux operating systems?

Support for reading and writing to FAT32 partitions

Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?

TPM

You are helping your friend troubleshoot a problem with his Linux server. You enter a common Linux command and discover it doesn't work exactly as you expected. What might be the problem and what do you do next?

The Linux shell is not the one you expected; use the echo $0 command.

A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed.What is the most likely reason for this message?

The command needs to be preceded by sudo.

Your mobile device has gone over its subscribed data limit the past two months. During this time, you have noticed that the device runs hotter than normal and data speeds seem slower than usual.Which of the following should you consider as a cause for these issues?

The device is infected with malware.

You work at an IT help desk and have been asked to set up 25 new user accounts in Active Directory. Your boss tells you to save time by using a PowerShell script that's available on a network share. You look at several script files named CreateNewUsers that are stored on the drive. Which one is likely to be the one you want?

The file with a .ps1 file extension

You are preparing to give a presentation at a client's location using your mobile device and a large screen TV. You have successfully connected to the company's guest Wi-Fi network, and you tap the screen mirroring option on your device but cannot locate an available TV, monitor, or projector. The previous presenter finished her presentation a few minutes earlier and had no issues using the TV.Which of the following is the most likely reason for this behavior?

The mobile device is on a different Wi-Fi network than the TV.

You work for a company that provides dozens of the same smartphone model for its employees. While troubleshooting one smartphone that won't connect to the cellular network, you call the provider's tech support number for some assistance. The technician asks for the device's IMEI. What is she trying to determine?

The specific device you're calling about

A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results.Which of the following is the most likely reason the technician is having difficulties?

The technician should be setting NTFS permissions instead of using Group Policy.

A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD.Which of the following describes the most likely reason for the lost data files?

The user had previously encrypted her data files and folders using EFS.

Suppose you and your friend want to exchange lecture notes taken during class. She has an iPhone and you have an iPad. What is the easiest way to do the exchange?

Transfer the files through an AirDrop connection.

What is the first thing you should do when you discover a computer is infected with malware? The second thing?

Update installed anti-malware software. Quarantine the computer.

Based on her research of the symptoms, Sara believes her computer is infected with a virus. Sara has an anti-malware program on the computer.What should she do before she runs the anti-malware program?

Update malware signatures.

How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers?

Use a third-party remote access app that uses a browser.

Which Chromebook security feature ensures that malware can't change the OS's system files?

Verified boot

You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs.What type of malware is on your computer?

Virus

Which of these network connections would allow your smartphone to sync your photos to your online account? Choose all that apply.

Wi-Fi Cellular

You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dimmed. What is the most likely problem?

You are not using an edition of Windows that supports encryption.

Your company has recently been hired to install a smart security system for a large office building. The system will include security cameras, voice-controlled lights, smart locks, and smart thermostats. Some of the security cameras will be installed outdoors throughout the parking lot. Which wireless IoT protocol should your company use for the installation?

Zigbee because it is always encrypted

A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory.Which of the following commands will perform this function?

chown

A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac.Which of the following tools will the technician use to perform this task?

macOS Recovery

Your macOS installation is corrupted and you want to boot from an external Thunderbolt hard drive to repair the installation. Which key(s) do you hold down at startup to boot from the external hard drive?

option key

In Linux, when logged in as a normal user with root privileges, which command must precede the aptget command in the command line in order to install a program?

sudo

You have set up an FTP server in Ubuntu Server. Jason, a user, calls to say he gets an error when trying to put a file in his /home/jason/files directory. You look at the directory structure and see that you forgot to give the user ownership of the directory. Which command can fix the problem?

sudo chown jason:jason /home/jason/files

You are managing an FTP server installed in Ubuntu Server. The server has created a very large log file, vsftpd.log. Which command is appropriate to search the log file for activity of the user charlie?

sudo grep "charlie" /var/log/vsftpd.log


Conjuntos de estudio relacionados

Principles of Marketing Ch.4 Book/Vocab Notes

View Set

chapter 35 Animal nervous system

View Set

World History B Semester Study Guide

View Set

AP Biology Chapter 1 Review Questions

View Set

Accounting Principles 241 Final Exam Study Guide

View Set