Practice Exam #2 (220-1102)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the script use?

.ps1

What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system?

1 GB

What is the minimum processor required to install Windows 10 (x86) on a device?

1 GHz single-core processor

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)

1. Disable System Restore in Windows 2. Update the anti-malware software 3. Disconnect the laptop from the network

Samuel's computer is taking a very long time to boot up, and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense?

1. Remove unnecessary applications from startup 2. Defragment the hard drive

Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class A address?

10.5.34.15

What is the minimum amount of storage space required to install Windows 11 (x64) on a device?

64 GB

Which file system type is used by default when installing macOS on a modern workstation?

APFS

A network administrator has set up a firewall and set up only three allow rules so that traffic can be sent over ports 21, 110, and 25. Next, they added a final rule of "deny any any" to the end of the ACL to minimize the attack surface and better secure the network. Unfortunately, now the administrator is receiving complaints from users that they cannot access any web pages using their URLs, such as DionTraining.com. Which of the following should the administrator do to correct this issue?

Add a rule to the ACL to allow traffic on ports 80 and 53

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not Found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?

An incompatible partition is marked as active

You are working on upgrading the memory of a laptop. After removing the old memory chips from the laptop, where should you safely store them until you are ready to reuse them in another laptop?

Antistatic bag

You are working on a customer's computer when your cellphone begins to ring. What should you do?

Apologize to the customer and send the call tot he voicemail

Which mobile device strategy is most likely to introduce vulnerable devices to a corporate network?

BYOD

Which type of security measure is used to control access to an area by using a retina scan?

Biometric

Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room's contents?

Biometric lock & Badge reader

An employee at Dion Training complains that every time airplane mode is enabled on their laptop, their external mouse and headphones stop working. Which of the following technologies is being disabled by airplane mode and likely causing the issues experienced by this user?

Bluetooth

Which of the following physical security controls would be the most effective in preventing an attacker from driving a vehicle through the glass doors at the front of the organization's headquarters?

Bollards

A cybersecurity analyst notices that an attacker is trying to crack the WPS pin associated with a wireless printer. The device logs show that the attacker tried 00000000, 00000001, 00000002 and continued to increment by 1 number each time until they found the correct PIN of 13252342. Which of the following type of password cracking was being performed by the attacker?

Brute-force

Which of the following BEST describes how a DHCP reservation works?

By matching a MAC address to an IP address within the DHCP scope

A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

Clear the browser's cookies and history, enable pop-up blocker, and scan the system for malware

A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming wants to document his script so that other programmers can understand what his logic was when he wrote it. Which of the following should he use?

Comment

Your organization has recently suffered a data breach due to a server being exploited. As a part of the remediation efforts, the company wants to ensure that the default administrator password on each of the 1250 workstations on the network is changed. What is the easiest way to perform this password change requirement?

Deploy a new group policy

You are troubleshooting a computer that is not producing any sounds through its speakers. Which of the following tools should you use to troubleshoot this workstation?

Device Manager

Which of the following Control Panel sections would allow a technician to add or remove an external scanner from a Windows 10 computer?

Devices & Printers

An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this?

Dictionary

Which of the following types of backups only copies data modified since the last full backup?

Differential

A computer has been performing slowly. During your troubleshooting, you notice that the Task Manager shows the processor is utilizing 90-100% of the system resources immediately after completing the boot-up process. Which of the following actions should you take?

Disable any unneeded applications configure to automatically startup

You have been asked to replace a computer's hard drive. Which of the following steps should you take FIRST to prevent an electrical hazard while working on the computer?

Disconnect the power before servicing the computer

Which of the following tools should you utilize to ensure you don't damage a laptop's SSD while replacing it?

ESD strap

Two weeks ago, David's computer was infected with a virus. A technician performed the malware removal process on the machine, removed the infection from the system, update the system's software, and closed the trouble ticket. Now, many of the symptoms have returned on David's computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation?

Educate the end-user about how to avoid malware in the future

What does the command "shutdown /h" do on a Windows workstation?

Enter hibernation mode

Dion Training is building a new computer for its video editor to use. The new computer will use an octa-core Intel processor, 3 TB of DDR4 memory, and a RAID 0 with two 4 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer's memory properly?

Enterprise

Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 laptops. When connected to a public network, the firewall has been configured to allow only inbound connections that match an existing rule and to only allow outbound connections that do match an existing rule to achieve the highest level of security. What type of security posture has Dion Training implemented?

Explicit allow for inbound, explicit allow for outbound

You have just installed a second monitor for a bookkeeper's workstation so they can stretch their spreadsheets across both monitors. This would essentially let them use the two monitors as one combined larger monitor. Which of the following settings should you configure?

Extended mode

Which of the following types of mobile device screen locks uses biometrics to securely unlock the device?

FaceID & TouchID

Madison is trying to open up her anti-malware solution to run a full system scan because she suspects her computer has become infected. When she attempts to run the tool, an error of "Access denied" is received. What security issue is MOST likely occurring?

File permission change

Which of the following types of software CANNOT be updated via the Windows Update program?

Firmware updates

Jason is building a new workstation for his son to utilize when writing reports for school. The new computer will have an Intel x86 processor, 3 GB of memory, and a 256 GB SSD. Which of the following editions of Windows 10 would support this workstation at the lowest cost?

Home

A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?

Increase the Wi-Fi signal being transmitted by their WAP

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?

Install an anti-virus or anti-malware solution that uses heuristic analysis

Which of the following data types would be used to store the number 21?

Integers

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. Which of the following actions should you perform FIRST?

Investigate malware symptoms

A new corporate policy dictates that all access to network resources will be controlled based on the user's job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy?

Least priviledge

A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?

Loop

What type of structure is a "Do While" in scripting?

Loop

An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?

Mark each email as spam or junk

Which of the following MacOS features allows you to use multiple desktops or spaces on a single system?

Mission Control

Which type of antivirus scan provides the best protection for a typical home user?

On-access scans

A user has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. The user states they do not want to pay for the software. Which of the following would MOST likely be the best option for them?

Open-source

You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through their database. Which of the following types of data should this be classified?

PHI

You are troubleshooting a computer that is operating slowly. Which of the following tools should you use to troubleshoot this workstation?

Performance monitor

Jack has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. Jack states he wants to get a copy of Microsoft Word so their son can create reports for school. Which of the following would MOST likely be the best option for them?

Personal

You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window?

Plan

Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as?

Power surge

When using an MBR, which of the following types of partitions can only have up to four partitions?

Primary

Which mitigation provides the best return on investment by mitigating the most vulnerable attack vector in an enterprise network?

Provide end-user awareness training for office staff

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

Proximity card

You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST?

Remove any jewelry you are wearing

The video editor at Dion Training is having issues with her workstation. The workstation is running Windows 10 and is failing to boot up properly. A technician wants to replace the existing operating system files with a new copy of the same version. The technician has been told to ensure the user's data and applications are not modified or deleted during the upgrade or installation. Which types of upgrades or installations should the technician use?

Repair installation

You recently built a new gaming PC for a customer. The system has an octa-core 64-bit processor, 32 GB of DDR4 RAM, 1 TB SSD, a PCI x16 video card with 8 GB of RAM, and Windows 10 Pro (x86) installed. When you turn on the system, you notice that Windows only recognizes 3.5 GB of RAM. Which component should be upgraded to correct this issue?

Replace the OS with Windows 10 Pro (x64) edition

Susan is installing several updates on a Windows computer. Nine of the updates were installed without any issues, but one update produced an error and failed to install. Susan restarts the computer as part of the troubleshooting process, and the computer automatically attempts to install the failed update again. Again, the update fails to install. What should Susan do NEXT?

Research the error number for the failed update and determine if there is a known issue with this update

Your boss has asked you to write a script that will copy all of the files from one hard drive to another each evening. This script should mirror the directories from one drive to the other and ensure they are synchronized each evening. Which command-line tool should you use in your script?

Robocopy

Dion Training wants to implement a new wireless network using WPA3 in their offices. Which of the following features of WPA3 is used to provide a password-based authentication using the dragonfly handshake instead of the older WPA 4-way handshake?

SAE

Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?

SOP

Which of the following remote access protocols should you use to connect to a Linux server securely over the internet?

SSH

Jason's company issued him an old 2018 laptop with an internal hardware security key that he uses to connect to his office network over a VPN while traveling. Without this laptop, Jason cannot access his company's internal servers, email, or share drive files. The Windows 10 laptop is extremely slow, and the screen recently cracked and needs to be replaced. When Jason returns to the company's headquarters, the company will provide him with a new laptop due to the broken screen. Until then, he is working out of his hotel room during a 45-day business trip and needs to continue using this laptop. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?

Sell him an external 15" tablet/monitor to connect to the laptop as a workaround

Which of the following allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state?

Sleep

Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem?

The data speeds are insufficient with only one bar of signal

Jason took home a company-issued Windows 10 laptop home to do some work. He successfully connected it to his home's wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network's shared files from his home network's media server. Which of the following may be why Jason cannot access the network shares in his home network?

The laptop must join the network as private

Sarah is installing Windows 10 (64-bit) in a virtual machine. The installation is continually failing and producing an error. She has configured the virtual machine with a dual-core 950 MHz processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

The processor is insufficient

Which of the following pairs of authentication factors should you choose to meet the requirements associated with MFA?

Thumbprint and password

Which type of installation would require an answer file to install the operating system?

Unattended

You are configuring a Windows 10 Professional workstation to connect to the Dion Training domain. To provide additional security to its users, Dion Training requires that all uses route their internet traffic through a server located at 10.0.0.15 for inspection before it is sent to the internet. Once inspected, the server will route the traffic to the WAN router whose IP is 10.0.0.1. Which of the following settings should be configured on the workstation to achieve this?

Under Internet Options, configure the proxy server address as 10.0.0.15

Which of the following is the BEST way to regularly prevent different security threats from occurring within your network?

User training and awareness

Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?

VNC

Jason is out of town on a business trip and needs to access the share drive on his company's corporate network. Which of the following types of network connections should he use to access the share drive from his hotel room?

VPN

You have just installed a new photo-sharing social media app on your smartphone. When you try to take a photo with the app, you hear the picture-taking sound. Unfortunately, when you check the app and your photo album, you cannot find any new pictures. Which of the following actions should you take to fix this issue?

Verify the app has the correct permissions

Upon booting up a Windows 10 machine, you see an error message stating, "One or more services failed to start." Which of the following actions should you take?

Verifying that disabling one service has not affected others

Dion Training wants to implement a new wireless network in their offices. Which of the following types would support encryption for traffic being sent and received over the network while still allowing users to connect to the open network without a password, passphrase, or digital certificate?

WPA3

Which of the following types of encryption is considered the most secure to utilize in a SOHO network?

WPA3

A user with an older laptop running Windows 7 that has only 2 GB of RAM, 32 GB of SSD, and a 1.7 GHz 64-bit processor. The user would like to upgrade to a newer OS since Windows 7 is now considered end-of-life. Which of the following operating systems should the technician recommend to ensure the BEST performance on this computer?

Windows 10

Jason is building an inexpensive workstation for one of the employees at Dion Training. The workstation will utilize an Intel x86 processor. Which of the following editions of Windows will support installation on this workstation?

Windows 10 Pro & Windows 10 Enterprise

You are working as a penetration tester and have discovered a new method of exploiting a vulnerability within the Windows 10 operating system. You conduct some research online and discover that a security patch against this particular vulnerability doesn't exist yet. Which type of threat would this BEST be categorized as?

Zero-day

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk?

bootrec /fixboot

You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend's Windows 10 desktop. Which file format should you use?

exFAT

Which command-line tool on a Windows system is used to display the resulting set of policy settings that were enforced on a computer for a specified user when they logged on?

gpresult

Which command-line tool and option on a Windows system is used to force a background refresh of all group policy settings on a system?

gpupdate /force

Which of the following commands is used on a Linux system to search for lines that match a pattern within a file?

grep

What umask should be set for a directory to have 700 as its octal permissions?

rwx------

You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. This tool tests the end-to-end connection and reports on each hop found in the connection. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP?

tracert


Conjuntos de estudio relacionados

NUTR Exam #1 Digestion and Absorption

View Set

virtual - fundamentals - basic care and comfort quiz

View Set

The Characteristics of Nonverbal Communication

View Set

ch 6: childhood- socioemotional dev.

View Set

NURS 2207- Oncology Evolve EAQ (Graded)

View Set

Unit 1: Points, Lines and Planes Vocabulary

View Set

Economics: Chapter 10 Pure Competition

View Set

MKT 210 Homework: Chapter 2 Video : Konica Minolta

View Set

Unit 1 US History Reconstruction Test

View Set

Demand Planning & Fulfillment: Exam 1

View Set