Testout PC Pro Chapter 13-14

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is an important aspect of evidence gathering in response to a security incident? Restore damaged data from backup media. Back up all log files and audit trails. Monitor user access to compromised systems. Purge transaction logs.

Back up all log files and audit trails. When gathering evidence, it is important to make backup copies of all log files and audit trails. These files will help reconstruct the events leading up to the security violation. They often include important clues as to the identity of the attacker or intruder.

Which Windows feature can you use to encrypt a hard drive volume? NTFS EFS BitLocker to Go BitLocker

BitLocker BitLocker was introduced in Windows Vista and is used to encrypt an entire volume (not just individual files and folders). BitLocker is designed to protect all data on a volume, even if the hard drive is moved to another computer. BitLocker to Go is used to encrypt USB drives (not a hard drive volume). Encrypting File System (EFS) is a component of the NTFS file system that allows file encryption. EFS is not a Windows feature that is used to encrypt a hard drive volume. NTFS is the file system that is used in modern Windows operating systems. It is not a Windows feature that is used to encrypt a hard drive volume.

Which of the following would be a reason to outsource hard drive destruction? Required COD Against the law to do it internally Cost of special equipment Availability of low-level formatting

Cost of special equipment Purchasing the special equipment to destroy hard drives is often too cost-prohibitive for most organizations. You should contract with companies that specialize in the destruction and recycling of computer equipment and hard drives when possible.

Which of the following is a type of printer that is considered very noisy because it hits the printhead on the paper? Thermal Inkjet Dot matrix Laser

Dot matrix

One of the employees in your company calls and complains that text printed on the laser printer smudges easily and is staining hands and cloths. Which of the following printer components (if adjusted or replaced) would BEST fix the printer? Fuser unit Toner hopper Photoreceptor drum Laser OPC drum

Fuser unit After the toner has been applied to the paper, the paper passes through two heated rollers known as the fuser, or fuser unit. The heat and pressure from the rollers fuse the toner particles into the fibers on the paper. If the toner on the finished printed paper is smudging, the most likely issue is that the fuser unit is malfunctioning in some way.

Which of the following can be paired with a motion sensor to improve security? Magnetometer Cable lock Lights Door lock

Lights Motion sensors can be implemented to trigger spotlights or alarms when motion is detected. The motion sensors can be used both inside and outside of a building.

Which of the following must be included in a hard drive's Certificate of Destruction? Cost of destruction Name of security administrator Location of destruction Method of destruction

Method of destruction The COD should include the following information: Method of destruction Date of destruction Chain of Custody

Which component in a laser printer prepares the photosensitive drum for writing by causing the drum to receive a negative electrostatic charge? Transfer corona Primary corona Organic photoconductor (OPC) drum Fuser

Primary corona

You are working as a junior network technician at the local hospital. The security administrator has just finished rolling out a new security policy that requires users to log in to workstations using a fingerprint scanner. Which authentication category does this fall under? Something you are Something you have Something you know Soft token

Something you are Biometrics (fingerprint scanner) fall under the something you are authentication category. Something you have requires a user to have a physical device to authenticate. Something you know requires a user to demonstrate something that only they should know (username and password) to authenticate. A soft token is not an authentication category. A soft token is any digital key that is used to authenticate a user.

Which of the following BEST describes authorization? The process of giving users access to only the resources they need. The resources that a user can access. The policy of allowing employees to use their own devices for work purposes. The process of verifying a user's identity.

The resources that a user can access.

What do you call a system that has no anti-malware or firewall installed? Unprotected End-of-life Unpatched Compliant

Unprotected A system with no anti-malware or firewall is considered unprotected. An unpatched system is missing the latest updates and patches.

You have five salespeople who work out of your office and who frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection method to address your concerns? Require strong passwords in the Local Security Policy. Implement screen saver passwords. Use cable locks to chain the laptops to the desks. Encrypt all company data on the hard drives.

Use cable locks to chain the laptops to the desks.

You have connected your printer directly to your Windows workstation with a USB cable. Which type of printer have you set up? A network printer A shared printer A web-enabled printer A local printer

A local printer A local printer is connected directly to a specific computer.

Which of the following does Windows use to manage and enforce what a user is authorized to access? Soft token Multi-factor authentication Certificate Manager Access control list

Access control list

Which of the following is the ONLY type of printer that can print multi-part forms that use carbon paper? Laser printer Impact printer Thermal printer Inkjet printer

Impact printer The only printer that can handle multi-part forms using carbonless or carbon paper is an impact printer, as the printhead physically strikes the surface.

What is an advantage of using scan-to-email over scan-to-folder network document scanning? It is supported by the SMB protocol. It can transmit larger files. It can share scanned files to the network. It supports SSL encryption.

It supports SSL encryption. Scan-to-email network document scanning supports SSL encryption, which provides a more secure transmission than the scan-to-folder method.

Which of the following should be installed inside the entrance to the building to prevent weapons or unauthorized equipment being brought into the building? Cable lock Access control vestibule Magnetometer Badge reader

Magnetometer A magnetometer is a metal detector that users walk through to detect whether they are bringing any weapons or unauthorized equipment into the building. This should be installed just inside the entrance to the building.

You are working at the local hospital in the IT department. You have just received a promotion to junior network technician. Part of your new role involves troubleshooting network communication issues. Which of the following user groups should your account be added to? Administrator Network Configuration Operator Remote Desktop Users Cryptographic Operator

Network Configuration Operator In this scenario, your user account should be added to the Network Configuration Operator user group. Members of this group can manage a system's IP configuration, which would allow you to troubleshoot network communication issues.

During an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information. Which of the following would make it difficult for other passengers to view this information on the laptop display? Smart card Mantrap Cable lock Privacy filter

Privacy filter

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge. Which of the following security measures would you MOST likely implement to keep this from happening in the future? Cable locks Access control vestibule Lo-jack recovery service Door locks with card readers

Access control vestibule You could implement an access control vestibule (ACV) at each entrance to the facility. An ACV is a specialized entrance with two doors that creates a security buffer zone between two areas. Once a person enters into the space between the doors, both doors are locked. To enter the facility, authentication must be provided. If authentication is not provided, the intruder is kept in the access control vestibule until authorities arrive.

Which type of DoS attack exhausts the target's resources by overloading a specific program or service? Amplification Distributed Protocol Application layer

Application layer The goal of an Application layer DoS is to exhaust the target's resources by overloading a specific program or service. A distributed DoS attack uses multiple computers to generate the necessary traffic.

Which of the following processes is used to prove a user's identity? Authorization Certificate Manager Authentication Logical security

Authentication

Which of the following is an example of a soft token? Authentication app USB security device Key fob Smart card

Authentication app A soft token is any digital authentication key that is used to authenticate a user. Of these options, only the authentication app is a soft token, since an authentication app is a digital app on a phone or tablet.

In order to edit print server properties in Windows 11, which section do you need to select from the Settings menu? Bluetooth Bluetooth & devices Network & internet Accessibility

Bluetooth & devices You need to select the Bluetooth & devices section in order to access the Printers and servers option, which gives you access to print server properties

A public library has purchased new laptop computers to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should they use to physically secure the new laptops? A multi-factor password policy An external encryption device Biometric authentication Cable locks

Cable locks

Inkjet printers are popular for small businesses because they provide good quality printouts. However, fuzzy lines can appear in artwork, or colored areas in images can sometimes start and stop before they should. Which of the following should you do when this happens? Clear the paper jam Calibrate the printer Replace the ink supply Clean the printhead

Calibrate the printer Calibration ensures that the printhead and paper are properly aligned so that printouts are aligned and clear, avoiding fuzzy lines or colored areas that sometimes start and stop before they should.

Inkjet printers spray microscopic dots of ink with precise, controlled movement. Which of the following components carries the printhead back and forth during a print job? Stepper motor Duplexing assembly Carriage assembly Rubber rollers

Carriage assembly

Which of the following identifies who had possession of a hard drive and for how long before it was actually destroyed? Outsourcing Record Chain of Custody Certificate of Destruction Record of Format

Chain of Custody

As part of the response to a security incident on your company network, you have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up to the time of presentation in court. Which document have been asked to draft? CPS (Certificate Practice Statement) Rules of evidence FIPS-140 Chain of custody

Chain of custody The chain of custody is a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up to the time of presentation in court.

Which hard drive destruction method uses a strong magnetic pulse to destroy data? Disk shredder Degaussing Incineration Drilling

Degaussing Degaussing is a special tool that uses strong magnetic pulses to destroy all the data on the platters and drive motors. A disk shredder is a specialized machine that shreds a hard drive into tiny pieces.

One of the Windows workstations you manage has three user accounts defined on it. Two of the users are Limited users, while the third (your account) is an Administrative user. Each Limited and Administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likely increase this system's security? (Select two.) Disable Autorun on the system. Assign each user a simple password so that they won't be tempted to write it down. Set a screen saver password. Change the two Limited user accounts to Restricted users. Enable the Guest account.

Disable Autorun on the system. Set a screen saver password. You could increase this system's overall security by disabling Autorun and setting a screen saver password.

One of the Windows workstations you manage has four user accounts defined on it. Two of the users are Limited users, while the third (your account) is an Administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each Limited and Administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has also been disabled on the system. Which of the following actions is MOST likely to increase this system's security? Enable Autorun on the system. Change the two Limited user accounts to Administrative users. Change your user account to a Limited user. Disable the Guest account.

Disable the Guest account. The Guest user account has no password and provides too much access to the system. Unless its use is absolutely required, the Guest user account should remain disabled.

Employees must go through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to a locked door in the reception area. They use an iPad app to log security events that may occur. They use their iPad to complete work tasks assigned by the org's CEO. Network jacks are in the reception area so that employees and vendors can use the company network for work purposes. Users in the secure area have been trained to lock their workstations if they leave for a time. Which of the following recommendations are you MOST likely to make to this organization to increase their security? (Select two.) move receptionist to secure area Disable the network jacks in the reception area. Train the receptionist to keep their iPad in a locked drawer when not in use. Require users to use screen saver passwords. Replace biometric locks with smart cards.

Disable the network jacks in the reception area. Train the receptionist to keep their iPad in a locked drawer when not in use. The receptionist's desk should remain where it is currently located because it allows them to visually verify each employee as they access the secured area. Biometric locks are generally considered more secure than smart cards because cards can be easily stolen. Training users to lock their workstations is more secure than using screen saver passwords, although this may be a good idea as a safeguard in case a user forgets.

You have just set up a color laser printer on a customer's Windows workstation. You have connected the printer to the workstation using a USB cable and have loaded the appropriate drivers. Which of the following are the BEST steps to take next? (Select two.) Set the print driver to print grayscale by default to reduce color toner consumption. Use Driver Rollback to make a backup copy of the new printer driver. Edit the printer's properties to configure paper tray and other device-specific settings. Use the USBTEST utility in Windows to verify that the USB connection is working properly. Verify that the printer is working correctly by printing a test page.

Edit the printer's properties to configure paper tray and other device-specific settings. Verify that the printer is working correctly by printing a test page. After you install a new printer for a customer, client, or user, the next steps to take are to configure device-specific settings and then print a test page to verify that the printer is working properly.

Which of the following dot matrix printer components converts impulses into physical movements that cause small hammers to strike the printhead? Logic board Electromagnet Tractor feed Daisy wheel

Electromagnet

Which of the following are printer languages? (Select three.) PostScript PrintDef Pascal Capture Escape codes PCL

Escape codes PCL PostScript

You are establishing a new security policy for user authentication and want to implement multi-factor authentication. Which of the following would BEST accomplish this? Fingerprint and one-time code text message Username and password Smart card and one-time code text message Fingerprint and iris scan

Fingerprint and one-time code text message Multi-factor authentication requires that a user demonstrate two of the following: Something you are Something you know Something you have The only answer that satisfies this requirement is a fingerprint (something you are) and a one-time code text message (something you have, as the user must have their cell phone to receive the text message).

Which of the following statements is true regarding hard tokens? Hard tokens are easy to replace if they are lost or stolen. Hard tokens are inexpensive to implement. Hard tokens provide a higher level of security. Hard tokens provide protection even if they are lost or stolen.

Hard tokens provide a higher level of security. Hard tokens provide a higher level of security, but if the token is lost or stolen, the security breach can be quite severe. Implementing hard tokens can also be expensive and time-consuming. They are generally reserved for highly sensitive data.

Which of the following are risks of implementing a BYOD policy? (Select three.) Work flexibility Improper disposal Data leakage Number of different devices Increased productivity Lower costs Employee satisfaction

Improper disposal Data leakage Number of different devices BYOD risks include: Data leakage Confidential data exposure Improper disposal Variety of devices Mixing of personal and corporate data Bypassing of security policies BYOD benefits include: Increased productivity Employee satisfaction Work flexibility Lower costs

Which of the following hard drive destruction methods runs the risk of releasing toxic by-products? Drilling Incineration Shredding Degaussing

Incineration Incinerating a hard drive can lead to the release of toxic by-products. This is why you should only use a licensed incinerator

A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older network laser printer that is shared by everyone in her department. When she picks up the print job, only the top half of each page is printed, and the bottom half is blank. Which of the following will MOST likely rectify this issue? Install additional memory in her workstation. Update the printer driver on her workstation. Instruct her to avoid sending complex print jobs to the printer. Ask the network administrator to increase the speed of the network link in her department. Install additional memory in the printer.

Install additional memory in the printer. If only part of a page is printed on a laser printer (and the rest of the page is blank), you most likely need to add memory in the printer. This is especially true if it happens when complex graphical documents are printed, but printing works correctly with text-only documents.

You have been hired to evaluate a client's building security. In your walkthrough, you notice the following: All pieces of equipment have cable locks installed. Server racks are locked and have alarms. The WAP for the guest Wi-Fi is located on the receptionist's desk. Biometric locks are installed on high security rooms. Which of the following would you MOST likely recommend that your client do to increase security based on this information? Replace the biometric locks with standard locks. Install the WAP on the ceiling or inside of a special locked box. Upgrade the equipment cable locks. Install biometric locks on the server racks.

Install the WAP on the ceiling or inside of a special locked box. In this scenario, the WAP should be installed on the ceiling or in a special locked box to prevent unauthorized access.

Which type of printer uses a drum, plastic toner, and fuser to create a printed page? Ink jet Laser Dye sublimation Dot matrix

Laser Laser printers use a laser to charge a metal drum. The drum picks up plastic toner, and the toner is then fused onto the paper (using rollers and heat). Dot matrix printers use an inked ribbon. The printing mechanism strikes the ribbon to put ink onto the paper. A dye sublimation printer is a non-impact printer that uses film-embedded dye. Inkjet printers are quiet non-impact printers that store ink in a reservoir.

Your company needs to print a lot of high-quality black-and-white text documents. These documents need to be printed as quickly and inexpensively as possible. The printer must also have the capacity to perform duplex printing. Which of the following printers BEST meets your company's printing requirements? Thermal Inkjet Laser Dot matrix

Laser Although laser printers might cost more to purchase, in the long run, the cost to print black-and-white text (with occasional graphics) is less per page than with an Inkjet printer.

Which of the following is an advantage of connecting a printer to a network? Troubleshooting costs are decreased. Printing speed is increased. Multiple users can print to the same printer. You can use a less costly printer.

Multiple users can print to the same printer.

Which of the following authentication combinations is an example of multi-factor authentication? PIN and authentication app Smart card and one-time code Username and password Fingerprint and retinal scan

PIN and authentication app Multi-factor authentication means that at least two categories of authentication methods are utilized. Of these options, having the user input a PIN (something you know) and use an authentication app (something you have) is the only example of multi-factor authentication.

You have been hired to assess a client's security. During your testing, you discover that users have access to other departments' files. Which of the following should you recommend that the company implement? Bring Your Own Device Principle of least privilege Certificate Manager Mobile device management

Principle of least privilege The principle of least privilege states that a user should be given access to only the resources needed to perform their job. In this scenario, users have access to more than what they need. The company should implement the principle of least privilege to secure their networks.

A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him Administrator privileges. Later, Joe discovers that he has access to the salaries in the payroll database. Which of the following security practices was violated? Entry control roster Multi-factor authentication Principle of least privilege Strong password policy

Principle of least privilege The technician violated the principle of least privilege, which is the practice of limiting user access rights to be the bare minimum that a user needs to perform their work.

Which term refers to the portion of the hard drive where print jobs are stored before going to the print device? Print driver Print device Print queue Printer port

Print queue

When an application (such as Microsoft Word) sends a print job to the printer, which of the following manages the printing process? Print spooler Print driver Print queue Printer port

Print spooler The print spooler is an executable file that runs as a service on Windows to manage the printing process.

Which of the following should you perform when disposing of a computer? Reformat the hard drive. Lock the hard drive in storage. Run the motherboard through a shredder. Document the Chain of Custody.

Reformat the hard drive. You should always reformat (or destroy) the hard drive when you dispose of a computer. The motherboard does not need to be shredded when disposing of a computer.

You are assisting the security administrator and discover that a user was logged in to their workstation after hours. After further investigation, you discover that the user's account was compromised, and someone used the account to steal sensitive data. Which of the following could have BEST prevented this from happening? Implement a password reset policy. Restrict the user's login times to work hours only. Require a stronger password. Implement a screen saver lock.

Restrict the user's login times to work hours only. Because the user account was accessed after work hours, the best solution would have been to restrict the user's login times to work hours only. If this policy were in place, the account could not have been used after hours

You work for a company that offers their services through the internet. It is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next step you need to perform in response to the security incident? Eradicate the issue. Identify the issue further. Secure the affected system. Investigate how the attack occurred.

Secure the affected system. You have already identified the issue, so the next step is to take actions to stop the attack by securing the system. Although it is important to preserve as much information as possible to assist in later investigations, it is critical to stop the attack, even if doing so alerts the attacker or results in the loss of evidence regarding the attack.

A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence? Copying the contents of memory to removable media Restricting physical access to the system Shutting down the system Disconnecting the system from the network

Shutting down the system Shutting down or rebooting a compromised system will erase the memory contents. An attacker may load and run a memory-resident program and immediately erase it from the disk. Shutting down or rebooting the system will destroy all evidence of the malicious program.

Which of the following is an example of personal, government-issued information? Credit score Student records Healthcare records Social security number

Social security number Personal government-issued information is anything that is assigned by the government, such as a driver's license and a social security number. The other options are all examples of personally identifiable information (PII).

Which authentication category does a username and password fall under? Something you are Something you have Soft token Something you know

Something you know A username and password falls under the something you know authentication category. A soft token is not an authentication category. A soft token is any digital key that is used to authenticate a user.

A security incident is currently occurring on your company's network. You discover that the attack involves a computer system that is attached to the network. You are unsure what kind of damage is being done to the network systems or data. Which of the following actions should you take FIRST? Examine the active computer system to analyze the live network connection, memory contents, and running programs. Determine whether you have the expertise to conduct an investigation or whether you need to call in additional help. Document and photograph the entire crime scene, including the current state of the attached computer system. Stop the attack and contain the damage by disconnecting the system from the network.

Stop the attack and contain the damage by disconnecting the system from the network. The first step in responding to an incident should be to take actions to stop the attack and contain the damage. If the attack involves a computer system attached to the network, the first step would mostly likely be to disconnect the computer from the network. Although you want to preserve as much information as possible to assist in later investigations, it is better to stop the attack, even if doing so alerts the attacker or results in the loss of evidence regarding the attack.

Hannah has been working for your company for several years. Recently, she moved to a new department, which is located on a different floor. After the move, Hannah informs you that when she tries to print a Microsoft Word document (the same program she has always used), the printer on her new floor prints page after page of seemingly random characters. Which of the following is the MOST likely cause of Hannah's print problems? The cable connecting the printer to the network is failing. The program used to create the document has a bug. The hard drive on the print server is corrupt. The wrong printer driver has been selected.

The wrong printer driver has been selected. In most cases, the issue described in this question is the result of a bad or incorrect printer driver. When Hannah moved and created a connection to her new printer, she selected the wrong printer driver.

Which database encryption method can you use to encrypt data at rest? Transparent data encryption Column-level encryption Application-level encryption Trusted Platform Module

Transparent data encryption Transparent data encryption (TDE) encrypts the entire database and all backups. TDE encrypts data at rest, which is data that is not currently being used.

Jeremy has just purchased an entry-level filament 3D printer to create three-dimensional game accessories. He has just printed his first game piece, but there are problems with adhesion between the filament layers, and the final piece is slightly warped. Which of the following BEST provides the solution to Jeremy's issues? Calibrate the extruder Use a heated bed Calibrate the stepper motors Calibrate the build platform

Use a heated bed The best solution for Jeremy's issues is to use a heated build bed. Using a heated bed helps control the cooling process and prevents issues like poor adhesion to the bed, poor adhesion between layers, and warping from uneven or early cooling.

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following BEST describes the type of attack that just occurred? Phishing Vishing Eavesdropping Tailgating

Vishing A vishing attack has occurred. Vishing involves an attacker convincing authorized personnel over the phone to grant them access to protected information by pretending to be someone who is authorized and/or requires that access. Often, the attacker poses as a member of senior management. A sense of urgency is typically fabricated to motivate the user to act quickly.

You are testing a printer that you just installed by using the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the MOST likely cause of the problem? Wrong printer driver Wrong toner cartridge A problem with the printer power supply or power cable Bad printer memory

Wrong printer driver When you print a test page from your computer and it does not work properly, you most likely have an incorrect printer driver or a printer cable that is not fastened properly.

Your system administrator shared a USB laser printer connected to your Windows 11 system so other users on the network could send jobs to it. A network user has sent a large job to the printer, but the print job has stalled. You try to delete the print job, but can't. Which of the following BEST describes the reason you cannot delete the print job? You do not have the Manage network printers permission. You do not have the Manage this printer permission. You do not have the Print permission. You do not have the Manage documents permission.

You do not have the Manage documents permission. In this case, you can't delete the print job because you don't have the Manage documents permission. Users who have the Manage documents permission can manage all documents in the queue (pause, resume, delete, or rearrange the order).

Which of the following attacks exploits a vulnerability in software that has not been discovered by the developer? XSS attack Brute force attack Insider threat Zero-day attack

Zero-day attack A zero-day attack exploits a vulnerability in software that has not been discovered by the developer. These attacks are referred to as zero-day attacks because that is how many days the developer has known about the vulnerability. An insider threat is an ex-employee that still has access to the network and wants to cause damage or steal data. This is not exploiting a vulnerability in software that has not yet been discovered.

What should be created when you destroy a hard drive? Chain of Custody Certificate of Destruction Record of Format Outsourcing Record

Certificate of Destruction No matter the method used to destroy a hard drive, a Certificate of Destruction (COD) should be obtained and kept with the organization's records. A COD is usually necessary to satisfy internal security reporting requirements and may be required for legal reporting.

Sarah, a tech support specialist, receives a call from a client complaining about "ghosting" on their laser printer. The client explains that faint, double, echo-images from previous printouts are showing up on subsequent pages. What should Sarah suggest as the MOST likely solution? Replace the printer cable. Check the fluorescent lamp and rubber scraper. Reinstall the printer driver. Increase the printer's memory.

Check the fluorescent lamp and rubber scraper. Check the fluorescent lamp and rubber scraper is the correct answer. Ghosting is often caused when the fluorescent lamp and rubber scraper do not remove all toner from the drum prior to starting a new print job. Checking and possibly replacing these components would likely solve the problem.

As an IT network administrator for your financial company, you have decided to set up document scanning services to digitize, store, and share the large number paper-based documents used in financial transactions. You want to be able to store these digitized documents offsite and make them available to all authorized employees from a centralized storage location for mobility and collaboration in real time. Which of the following document scanning solutions MOST closely matches your requirements? Scan-to-email Scan-to-folder OCR Cloud services

Cloud services Cloud services most closely match your requirements, as the digitized documents will be stored offsite will be available from a centralized storage location and will provide for mobility and collaboration in real time.

Which of the following methods can be used to connect a printer to a network? (Select two.) Plug an Ethernet cable into the printer's network port. Plug a network cable into your printer's serial port. Connect your printer to an external print server device that is connected to the network. Plug a network cable into your printer's USB port. Plug a USB-to-Ethernet adapter into your printer's USB port.

Connect your printer to an external print server device that is connected to the network. Plug an Ethernet cable into the printer's network port. There are two common ways to make a printer a network printer. Most printers come with an integrated network card or have a slot for adding a network card. Otherwise, it is possible to connect to the network using an external printer server. The external print server functions as a gateway between the printer's parallel interface and the network topology.

A technician was able to stop a security attack on a user's computer. Which of the following actions should be performed FIRST when conducting the subsequent forensic investigation? Stop all running processes. Remove the hard drive. Turn off the system. Document what is on the screen.

Document what is on the screen. Preserving evidence while conducting a forensic investigation is a trade-off. Any attempt to collect evidence may actually destroy the very data needed to identify an attack or attacker. Of the choices given, documenting what is on the screen is the least intrusive and the least likely to destroy critical evidence.

A customer who uses a Windows computer purchased an Inkjet printer from your store. He recently called to complain that the colors in the photos he prints on his new printer do not match the colors in the original photos. Which of the following actions will MOST likely resolve the issue? (Select two.) Use the Color Management tab of the printer driver to calibrate the driver's color settings. Use Driver Rollback to restore an earlier version of the printer driver. Educate the customer on the limitations of Inkjet printers. Download and install the latest printer drivers. Run the Windows FIXCOLR utility to automatically calibrate the driver's color settings. Instruct the customer to upgrade to a color laser printer.

Download and install the latest printer drivers. Use the Color Management tab of the printer driver to calibrate the driver's color settings. You should download and install the latest printer driver and then use the Color Management tab to adjust the driver's color settings. Many times, installing the latest driver alone will fix color issues. If not, you can manually adjust the color settings until they match the original settings.

Which of the following hard drive destruction methods only works with mechanical hard drives? Low-level format Disk shredder Drilling Incineration

Drilling Drilling only works with mechanical hard drives since this method involves drilling holes through the platters. Disk shredding and incineration work with both mechanical and solid-state drives.

At company headquarters, several employees are having issues with their Wi-Fi access suddenly dropping and then reconnecting to the same wireless network. You decide to investigate and determine that someone has set up a rogue access point near company headquarters and is using it to capture sensitive data from the company network. Which type of social engineering attack is being used? Eavesdropping Evil twin Phishing Impersonation

Evil twin An evil twin attack involves an attacker setting up a rogue Wi-Fi access point, using a jamming or disassociation attack to knock users off the legitimate network, and then having users reconnect to the rogue access point in order to gain access to sensitive data.

You have been hired to help assess the security of your client's organization. During your assessment, you have found a rogue wireless access point that is configured to look identical to the legitimate wireless network. Which of the following attacks was MOST likely being carried out? HTTPS spoofing Evil twin attack Session hijacking DNS spoofing

Evil twin attack In this scenario, a evil twin attack (also called Wi-Fi eavesdropping) is the most likely attack being carried out. In an evil twin attack, the hacker tricks users into connecting to a malicious wireless network so they can monitor and manipulate the data packets flowing across the network.

As the principal of a private school, you have discovered that an office assistant has shared a student's home address with an unauthorized individual. Which of the following regulations is your school in violation of? HIPAA CCPA FERPA SOX

FERPA In this situation, your school would be in violation of the Family Educational Rights and Privacy Act (FERPA). FERPA defines who student records can be shared with, and the office assistant would be in violation for sharing these records with an unauthorized individual.

Which of the following functions are enabled by Server Message Block (SMB) protocol when using the scan-to-folder network document scanning method? (Select two.) Secure transmission through SSL encryption File, print, scan, and device sharing Targeting of individuals or groups Client-server network communication Ability to use the Windows Fax and Scan utility to enable transmission

File, print, scan, and device sharing Client-server network communication Server Message Block (SMB) provides the following functionality with the scan-to-folder method. SMB: Enables file, print, scan, and device sharing. Provides client-server network communication.

You want to scan a variety of family history documents and photos, many of which are very large. There are also some family history books that you need to scan. Which of the follow scanners will MOST likely meet your scanning needs? Network scanner Multi-function printer (MFP) scanner Stand-alone scanner Flatbed scanner

Flatbed scanner A flatbed scanner is specifically designed to manually scan bulky items, such as pages in a book or large-sized documents.

After removing the printed paper from your laser printer, the toner smudges and can be wiped off in places. Which of the following printer components is MOST likely causing the problem? Secondary corona Primary corona Fuser rollers Print drum

Fuser rollers Because the fuser rollers heat and press the entire paper, dirty fuser rollers are the most likely problem.

You have accepted a position working in a local hospital's IT department. Which of the following government regulations would be the most important for the hospital to be in compliance with? GDPR HIPAA PCI DSS FERPA

HIPAA In this scenario, you would most likely need to make sure that the company is in compliance with the Health Insurance Portability and Accounting Act (HIPAA). HIPAA defines and regulates how healthcare information must be secured.

Which formatting method leaves data on a drive in a state that can be recovered using special software? Deep format High-level formatting Full format Low-level formatting

High-level formatting A high-level format is performed using the tools in the operating system. This method removes the pointers to files, but the data remains on the drive itself and can be recovered using special software.

Which of the following are examples of a strong password? (Select two.) Morganstern I love the Linux P3ngu!n Tux il0ve2EatIceCr3am! NewYorkCity skippy

I love the Linux P3ngu!n Tux il0ve2EatIceCr3am! A strong password is one that: Is at least eight characters long (longer is better). Is not based on a word found in a dictionary. Contains both uppercase and lowercase characters. Contains numbers. Contains special characters. Does not contain words that could be associated with you personally. Could be considered a passphrase. The passwords il0ve2EatIceCr3am! and I love the Linux P3ngu!n Tux both meet the above criteria.

What is the best way to set up a Wi-Fi-incompatible printer to provide the most reliable wireless printing? If the printer is Bonjour-enabled, use workstation discovery with the Bonjour service. If the printer is Ethernet-capable, connect it to the network through a wireless router. Share the printer from a computer that has a wireless network connection. If the printer has a USB port, plug in a USB wireless adapter.

If the printer is Ethernet-capable, connect it to the network through a wireless router. If a printer is not Wi-Fi-capable but it has an Ethernet port, connect the printer to a wireless router with an Ethernet cable. Users on the same network as the wireless router will be able to send jobs to the printer as if the printer had a wired connection. (All users will have to install that printer's driver on their workstations.)

You have been hired to evaluate a client's building security. In your walkthrough, you notice the following: A high fence is installed around the property. Security cameras are installed on all buildings. The parking lot has light poles installed in all areas. Vehicles are able to drive straight to the building entrance itself. Which of the following would you MOST likely recommend that your client do to increase security based on this information? Install bollards. Upgrade the light poles to LED lights. Install barbed wire on the fence. Upgrade the security cameras to a better quality option.

Install bollards. Bollards should be installed to prevent vehicles from driving straight to the building entrance. Bollards are metal poles that are secured into the ground to prevent vehicle access. Bollards should be placed near the front of any building to prevent vehicles from getting too close.

As an IT technician, you added a printer for a client. When you did this, you were prompted to select and install the drivers. Which of the following can you do to avoid repeating this step for subsequent clients? Configure the computer for each client to act as a print server. Configure a wireless print server to be accessible on the network. Reconfigure the printer as a wireless printer so that the printer drivers are not necessary. Install the printer drivers on the print server.

Install the printer drivers on the print server. When you install the proper printer drivers on the print server, they are automatically downloaded and configured for the client whenever you add a printer.

Which of the following door locks provides authentication to a specific lock over a Bluetooth connection? Biometric Smart card Standard lock Key fob

Key fob A key fob provides a keyless authentication to a specific lock. The key fob may use a wireless radio signal, NFC, or Bluetooth to communicate with the lock.

Which formatting method is done by the manufacturer to write new sectors and tracks to a hard drive? Low-level formatting Deep format High-level formatting Full format

Low-level formatting A low-level format writes new sectors and tracks to the drive and is typically done by the manufacturer when the drive is first assembled. When performing a low-level format, the sectors and tracks are recreated, and all empty space is filled with zeroes. A high-level format is performed using the tools in the operating system. This method removes the pointers to files, but the data remains on the drive itself and can be recovered using special software. Full or deep formats are not valid format types.

Which printer permission would you assign to a user so that they can pause the printer? Manage documents Manage this printer Pause printers Print

Manage this printer Users with the Manage this printer permission can pause the printer and edit the printer properties, but cannot manage any documents waiting to be printed.

Which of the following should you implement to monitor and manage the risks of a BYOD policy? Mobile application management Bring Your Own Device Mobile device management Security management

Mobile device management The term mobile device management (MDM) generally describes the policies and procedures used by an organization to maintain security and permissions on mobile devices. More specifically, MDM software is used by administrators to secure mobile devices and to enforce enterprise policies on the devices. MDM software usually offers a suite of features, including: Policy management Security management Inventory management Telecom service management Mobile application management

Your company has recently implemented a BYOD policy. To protect the network, users must install an app on their devices that allows the security administrator to enforce the security policies. Which of the following is this an example of? Access control list Mobile device management Soft token Certificate Manager

Mobile device management This is an example of mobile device management (MDM). MDM software is used by administrators to secure mobile devices and to enforce enterprise policies on the devices. MDM software is often used alongside a bring your own device(BYOD) policy and is typically deployed as a combination of an on-device application or agent that communicates with a backend server. The application receives policies and settings from the server to configure and control the mobile device.

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site? Evil twin attack Social engineering Impersonation Phishing

Phishing Phishing tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well known e-commerce site. Phishing is a specific form of social engineering.

You have been hired to evaluate your client's building security. In your walkthrough, you notice the following:A high fence is installed around the property.Visitors are able to enter the building and are checked in by a receptionist.Security cameras are installed on all buildings.Server racks are locked and have alarms. Which of the following would you MOST likely recommend that your client do to increase security based on this information? Place a security guard at the entrance gate with an access list to control who comes on the property. Install barbed wire around the top of the fence. Upgrade the security cameras. Install biometric locks on all server racks.

Place a security guard at the entrance gate with an access list to control who comes on the property. Security guards can provide a high level of security inside and outside the property. They should be stationed at the entrance(s). The guards should have an access list that states who is allowed onto the property.

Several employees have called you to complain about the default configuration settings on the network printer. One has asked to change the page orientation, another has wanted to change the collating setting, and another asked about duplexing. Which of the following print features would allow the employees to make the requested changes to their print jobs? Print server Print spooling Print queue Printer Properties

Printer Properties The employees can use the Printer Properties feature to edit the printer properties and to configure custom settings for the specific print device.

Which printer management feature would you use to view the drivers that a printer uses? Print queue Print Server Properties Printer Properties Print spooling service

Printer Properties View Printer Properties to see all the drivers that a printer uses. You can also use Printer Properties to view the port that a printer uses, manage user permissions, and configure color management profiles.

Which printer management features would you use to view the port that a printer uses? (Select two.) Print queue Print Queue Properties Printer Properties Print Server Properties Print spooling service

Printer Properties Print Server Properties Use Print Server Properties or Printer Properties to view the port(s) that a printer uses. Print Server Properties displays the printer port(s) that a system uses. Printer Properties displays the port(s) for the individual printer as well as all printer ports for the system.

You work for a company based in Phoenix, Arizona, which is a very hot and dry area. Several people in the research department have reported that even though their files are printing to the laser printer correctly, a much lighter copy of the same text also prints within 2 to 3 cm of the original text. Which of the following would MOST likely fix this type of ghosting image? Replace the imaging drum, as it is probably at end of life. Vacuum the fuser assembly to clean off excessive ink toner. Use a heavier weight paper to avoid paper shift. Remove the toner container and gently shake it to remove clumps from the image toner.

Replace the imaging drum, as it is probably at end of life. Ghost images within 2 to 3 cm of the original image are an indication that the ghosting is caused by the imaging drum. When a drum unit comes to the end of its useable life cycle, it may not discharge properly, leaving behind faint traces of the previous print job. An imaging drum can also become defective and discharge incorrectly between print runs, causing ghosting to occur. In either case, the best solution it to replace the imaging drum.

Which of the following is the feed assembly on a thermal printer that is used to move the paper through the printer? Stepper motor Paper feeder Rubber platen Unwind spindle

Rubber platen Thermal printer technology is simple. The feed assembly is a rubber roller, or platen, that grabs the paper and passes it through the printer. A spring device applies pressure to the paper so that the paper always touches the printhead as it passes through.

You have been hired to investigate a recent cybersecurity attack. You have discovered that the attacker was able to send commands to the server using the login fields and steal user credentials from the database. Which of the following attacks was your client MOST likely the victim of? On-path SQL injection Brute force Cross-site scripting

SQL injection Your client is most likely the victim of an SQL injection attack. SQL is the most common database language and is used by most websites. All sorts of sensitive data, such as user credentials, are stored in these databases. If the SQL database is not properly configured, an attacker can input SQL commands into text fields on a website to gain access to the data. The attacker can steal, edit, or even destroy the data contained in the database.

Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does not go away. What is the MOST likely problem? The fuser assembly is damaged. The corona wire is dirty. The photosensitive drum is wearing out. The paper is poor quality.

The corona wire is dirty. If a corona wire is dirty, it might not create a uniform charge. As a result, the toner might not be attracted correctly to the photosensitive drum or paper. A vertical stripe is a typical symptom of this problem. Be careful when cleaning a corona wire because they are delicate.

You are a network administrator troubleshooting a network printer that is frequently experiencing paper jams. You have checked the paper tray and confirmed that the paper is not curled, wrinkled, dusty, wet, torn, or folded. The paper stack does not exceed the limit nor is above the arrow on the edge guide. However, the printer still jams when multiple pages are being fed. What should you check next? The printer's driver The feed rollers and the tray alignment guide The printer's IP address The printer's memory

The feed rollers and the tray alignment guide Checking the feed rollers and the tray alignment guide is the correct answer. If multiple pages are being fed through the printer overlapping or in a stack, the media is failing to separate. This can be caused by problems with the feed rollers or the tray alignment guide.


Conjuntos de estudio relacionados

Cost Accounting Chapter 17 Terms

View Set

Forensic Investigation Final Exam APRIL 19

View Set

Nursing Legal and Ethical Issues: Autonomy

View Set

APES: QA6 - Evolution and Biodiversity

View Set

Honan-Chapter 15: Nursing Management: Patients With Complications From Heart Disease

View Set

Capstone Chap.7 Implementing Strategies: Management, Operations, and Human Resource Issues

View Set

Chapter 19-The American Economy: Section 1

View Set

Social Studies Quiz Harriet Tubman and the causes of the Civil War

View Set