Practice Exam Review 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

What data type would be used to store the number 3.14?

Floating-point

ou recently read a news article about a new crypto-malware worm that is causing issues for corporate networks. Today, you noticed that four of your company's workstations had their files encrypted. You are worried about the rest of the network's workstations. What should you do FIRST?

Immediately quarantine the affected workstations

Which type of installations would you use on a system with slow performance or one that you cannot isolate a single cause of the system's issues?

Repair installation

Which type of screen locks uses a secret pattern drawn on the screen to prevent access to a mobile device?

Swipe

A smartphone user notices that their phone gets very hot, and their battery is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem? -The smartphone is infected with malware and is using a lot of processing power -The battery is depleted -The charging port is faulty -The touchscreen is faulty

The smartphone is infected with malware and is using a lot of processing power

Which command-line tool is used on a Unix/Linux system to move upward on a directory in the system's directory structure?

cd ..

Which of the following commands is used on a Linux system to display the current working directory's full pathname to the screen? -chmod -pwd -chown -passwd

pwd

A coworker is creating a file containing a script. You look over their shoulder and see "net use s:\\fileserver\videos" in the file. Based on this, what type of file extension should this script use?

.bat

Which file type is commonly used by management and administrative tasks in Windows using the Integrated Scripting Environment?

.ps1

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the script use? -.py -.bat -.sh -.ps1

.ps1

Which of the following is an APIPA or link-local address? -169.254.64.23 -127.0.0.1 -192.168.1.34 -33.52.7.83

169.254.64.23

The server administrators have asked you to open the default port on the firewall for a new DNS server. Which port should you set to ALLOW in the ACL?

53

During a disaster recovery, which of the following statements is true?-A virtual machine has less downtime than a physical server-A virtual machine has more downtime than a physical server-Both a virtual machine and a physical server has the same downtime-A virtual machine cannot be used for redundancy or load balancing

A virtual machine has less downtime than a physical server

A customer has requested you install an external video card into their gaming PC. Which of the following tools should you utilize to protect the video card as you carry it from the storage room to your workbench? -Latex gloves -ESD strap -Air filter mask -Antistatic bag

Antistatic bag

You are working on a customer's computer when your cellphone begins to ring. What should you do?

Apologize to the customer and send the call to voicemail

Which of the following commands is used on a Linux system to perform installations of new software packages?

Apt-get

Which of the following types of wireless connections requires a pin to be entered as part of the pairing process before it is utilized? -Radio frequency -Bluetooth -NFC -Infrared

Bluetooth

Sally just purchased a new iPhone and AirPods to listen to her music. After setting up the new iPhone, she can get online and watch YouTube, but her wireless headphones aren't working. Which of the following is MOST likely the problem?-WiFi is not enabled-The phone is in airplane mode-Bluetooth is not enabled-Cellular is not enabled

Bluetooth is not enabled

Which of the following devices should you NEVER disassemble during troubleshooting due to the risk of electrocution? -External hard drive enclosure -CRT display -Tablet -Printer

CRT display

Which of the following is required for evidence to be admissible in a court of law? -Legal hold -Right to audit -Chain of custody -Order of volatility

Chain of custody

A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of several settings: Email (never), Maps (always), Calender (while using), Messages (while using), Photos (never), App Store (while using), Bank (while using), and Weather (while using). Based on the information provided, what should be changed to resolve this client's problem?

Change the Map setting to while using

A user attempted to go to their favorite social media website this morning from their laptop. When they typed in Facebook.com, their browser redirected them to MalwareInfect.com instead. You asked the user to clear their cache, history, and cookies, but the problem remains. What should you do NEXT to solve this problem?

Check the host.ini file

A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT? -Reinstall or reimage the operating system -Document the pop-ups displayed and take a screenshot -Clear the browser's cookies and history, enable the pop-up blocker, and scan the system for malware -Quarantine the machine and report it as infected to your company's cybersecurity department for investigation

Clear the browser's cookies and history, enable the pop-up blocker, and scan the system for malware

Which of the command is used on a Linux system to copy a file from one directory to another directory?

Cp

Your company recently suffered a small data breach caused by an employee emailing themselves a copy of the current customer's names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which logical security concept should you implement to prevent a trusted insider from stealing your corporate data?

DLP

Your company works as a contractor to the military and has just finished replacing about 500 workstations across its secure network. You have been asked to properly dispose of the workstations and destroy the data on their hard disk drives. Which of the following methods would be the MOST effective? -Physically destroy the drives by drilling each HDD's platter -Conduct a low-level format of each hard drive -Fully format each hard drive with a series of 0s -Degauss each of the hard drives

Degauss each of the hard drives

An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this?

Dictionary

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE) -Update the anti-malware software -Enable System Restore in Windows -Educate the end user -Disconnect the laptop from the network -Schedule scans and run system updates -Disable System Restore in Windows

Disconnect the laptop from the network, disable System Restore in Windows, and update the anti-malware software

Which command is used to create a new disk partition on a Windows system?

Diskpart

What network device uses ACLs to prevent unauthorized access into company systems?

Firewall

Your company has just installed 50 new LCD monitors to replace some older CRT monitors. How should you properly dispose of the old CRT monitors?

Follow local government regulations and handling procedures

Which low power mode is used with Windows 10 laptops to save power, but it takes longer to turn back on and resume where the user left off? -Hibernate -Balanced -Power saver -Sleep

Hibernate

A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds? -Turn off Wi-Fi and rely on their cellular data plan -Upgrade to a new smartphone -Increase the Wi-Fi signal being transmitted by their WAP -Enable MAC filtering on their WAP

Increase the Wi-Fi signal being transmitted by their WAP

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?-Monitor all workstations for failed login attempts and forward them to a centralized SYSLOG server-Install a Unified Threat Management system on the network to monitor for suspicious traffic-Install a host-based intrusion detection system on all of the corporate workstations-Install an anti-virus or anti-malware solution that uses heuristic analysis

Install an anti-virus or anti-malware solution that uses heuristic analysis

When Jason needs to log in to his bank, he must use a hardware token to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to log in?

Key fob

A new corporate policy dictates that all access to network resources will be controlled based on the user's job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy? -Least privilege -Permission creep -Directory permissions -Blocklists

Least privilege

Your company wants to get rid of some old paper files. The files contain PII from previous customers, including their names, birth dates, and social security numbers. Which of the following are the appropriate data destruction and disposal techniques that should be utilized for these papers? -Micro-cut shredder -Strip-cut shredder -Cross-cut shredder -Recycling bin

Micro-cut shredder

Which file system type is used to mount remote storage devices on a Linux system?

NFS

You are installing a new firewall for Dion Training's corporate network. Which of the following documents should you update FIRST? -Network topology diagrams -Knowledge base articles -Password policy -Incident database

Network topology diagrams

Eleanor, a user, contacts the help desk to report that her workstation will not boot up this morning. The help desk technician verifies that the workstation's memory, power supply, and monitor function properly. The technician believes that the hard drive is not recognized by the system based on an error message displayed on the screen. What error message was being displayed?

No boot device available

Karen, a salesperson in your company, is currently on travel this week. She calls your company's help desk and is yelling because she cannot connect to her email using her hotel room's WiFi. Her laptop shows that it is connected to the "HotelWiFi" network, but Windows states it has "Limited or no connectivity." What action should Karen perform to fix this issue?

Open w web browser and agree to the hotel's capture page AUP

Which command-line entry would be used on a Windows system to test if your system can reach diontraining.com?

Ping diontraining.com

Which of the following components presents the largest risk of electrical shock to a technician? -Power supply -LCD monitor -Laptop battery -Solid-state device

Power supply

Which mitigation provides the best return on investment by mitigating the most vulnerable attack vector in an enterprise network?

Provide end-user awareness training for office staff

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

Proximity cards

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which technology should be used?

RADIUS

Which RAID solution will provide the BEST speed and redundancy for a backup and disaster recovery server?

RAID 1

What does the command "shutdown /r" do on a Windows workstation?

Reboot the workstation

Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com." What should Michelle do to fix this problem?

Reset the web browser's proxy setting

A system administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The server manager decides to initiate a rollback. Which describes what the system administrator should do next?

Return the system to the original state before the change

Which of the following remote access protocols should you use to connect to a Linux server securely over the internet? -RDP -FTP -SSH -Telnet

SSH

An administrator arrives at work and is told that network users are unable to access the shared drive on a Windows server. The administrator logs into the server and sees that some Windows Updates were automatically installed last night successfully, but now the network connection shows "limited" with no availability. What rollback action should the technician perform?

Server's NIC drivers

Which network configuration is used to identify your computer's individual host identifier and your computer's network identifier?

Subnet mask

Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?-ext4-NFS-Swap partition-ext3

Swap partition

You are troubleshooting a user's laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which log in Windows 10 would you review to determine if the print spooler service is causing this issue?

System log

Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem? -The data speeds are insufficient with only one bar of signal -The smartphone has been infected with a virus -The cellular radio cannot connect to the cellphone towers -The baseband firmware needs to be updated

The data speeds are insufficient with only one bar of signal

Which of the following pairs of authentication factors should you choose to meet the requirements associated with MFA? -Thumbprint and password -Username and password -Thumbprint and retina scan -Username and pin

Thumbprint and password

Which macOS feature is used to backup and restore files to an external hard disk?

Time machine

Which must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?

UPnP

Which of the following types of installations would require the use of an XML text file containing the instructions that the Windows Setup program would need to complete the installation? -In-place upgrade -Repair installation -Remote network installation -Unattended installation

Unattended installation

A customer's Android smartphone is only 6 months old but is becoming excessively slow. When questioned, the customer states it was acting fine until they recently installed a new stock market tracking app. What action should you take to troubleshoot the slow performance on this phone?

Uninstall the app, reboot the phone, and reinstall the app

Your smartphone just displayed a notification stating that a new pair of headphones has connected to your device. What threat is this an example of?

Unintended Bluetooth pairing

Upon booting up a Windows 10 machine, you see an error message stating, "One or more services failed to start." Which of the following actions should you take? -Uninstall and reinstall the service -Verify that disabling one service has not affected others -Check the configuration of antivirus software -Disable application startup

Verify that disabling one service has not affected others

Nicole's smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is in her apartment building. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue?

Verify the smart phone has adequate signal strength

Which of the following is the LEAST secure wireless security and encryption protocol? -WEP -WPA -WPA2 -WPA3

WEP

Which version of Windows supports Virtual Desktops? -Windows 7 -Windows 8.1 -Windows 8 -Windows 10

Windows 10

Which of the following commands is used on a Linux system to change the ownership of a file or directory on a system? -chown -chmod -passwd -pwd

chown

You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend's Windows 10 desktop. Which file format should you use?

exFAT

You are currently building a Linux server. Which of the following file system formats should you use for the server? -ext4 -exFAT -NTFS -APFS

ext4

You are trying to connect to another server on the network but are unable to ping it. You have determined that the other server is located on the 10.0.0.1/24 network, but your workstation is located on the 192.168.1.1/24 network. Which of the following tools should you use to begin troubleshooting the connection between your workstation and the server? -ifconfig -netstat -dig -traceroute

traceroute


Conjuntos de estudio relacionados

Anatomy and Physiology Exam Review

View Set

Further, Farther, Fewer, Less, Effect, Affect, Then, Than,

View Set

Art Appreciation TEST 1 (chp. 1-3)

View Set

Chapter 02: Texas in the Federal System

View Set

1.6 Algorithm efficiency - key terms and concepts

View Set

16. Vicarious Liability (31 2-341)

View Set

U.S. History 2 Kennedy and the Cold War Quiz

View Set

Midterm Business Ethics & Stakeholder Management CH 1-4

View Set

Experimental Psychology Chapter 2

View Set

Euro Unit 1 MC - Chapters 2, 3, & 4

View Set