CH-9 TO CH 13 all

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

You need to install a 32bit application on a 32bit version of Windows 10. In which default directory will the application be installed?

%systemdrive%\Program Files

You are configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following IP ports should you open on the firewall? (Select TWO).

-110 -25

Which of the following features is supplied by WPA2 on a wireless network? (Select TWO).

-Authentication -Encryption

Which of the following functions are performed by proxy servers? (Select TWO).

-Block employees from accessing certain websites -Cache web pages

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware corrupted the boot block. Based on your suspicious, which of the following actions would you most likely take to correct the problem? (Select TWO.)

-Boot from the windows installation DVD and use the recovery environment to run a startup repair. -Reimage the machine

Which of the following are likely symptoms of malware infection? (Select two).

-Changed file permissions -Renamed system files

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using wi-fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public wi-fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take when implementing this configuration? (Select TWO. Each option is part of the complete solution.)

-Configure the browser to send HTTPS requests through the VPN connection -Configure the VPN connection to use IPsec

Joe, a bookkeeper, works in a cubicle enviroment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. Which of the following are the best solutions for securing Joe's workstation? (Select TWO).

-Configure the screen lock to be applied after short period of nonuse. -Configure the screen saver to require a password

A small company hires a technician to review their wireless security. The technician discovers that the wireless signal is available outside of the building. Which of the following could the technician recommend to correct this problem? (Select TWO).

-Decrease radio power levels -Implement a directional antennae

You provide desktop support at the branch office of a bank. One of the windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. A cable lock has been installed to prevent it from being stolen. Which of the following steps could be completed to BEST increase the security of this system? (Select TWO).

-Disable all USB ports in the BIOS/UEFI firmware configuration -Remove the optical drive

One of the windows workstations you manage has three user accounts defined on it. Two of the users are limited users while the third (Your account) is an administrative user. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would most likely increase the security of this system? (Select TWO).

-Disable autorun on the system -Set a screensaver password

A small business named Widgets, INC has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following:using a wireless network locator device: -They user an 802.11n wireless network -The wireless network is broadcasting the SID Linksys -The wireless network uses WPA2 with AES security -Directional access points are positioned around the periphery of the building. Which of the following would you most likely recommend your client do to increase their wireless network security? (Select TWO).

-Disable the SSID broadcast -Change the SSID to something other than the default

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass though a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations are you most likely to make to this organization to increase their security? (Select TWO).

-Disable the network jacks in the reception area -Train the receptionist to keep her iPad in a locked drawer when not in use.

Which of the following are examples of social engineering? (Select TWO).

-Dumpster diving -Shoulder surfing

What are the most common means of virus distribution? (Select TWO).

-Email -Malicious websites

You are configuring the local security policy of a windows system. You want to prevent users from reusing old password. You also want to force them to use a new password for at least five days before changing it again. Which of the following policies are best to configure? (Select TWO).

-Enforce password history -Minimum password age

Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select TWO).

-Exploiting DHCP servers to deliver the IP address of poisoned DNS servers -Changing the hosts file of a user's computer

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select THREE).

-IPSec -PPTP -L2TP

You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would most likely increase the security of this system? (Select TWO. Each option is a complete solution.)

-Install a privacy filter on the monitor -Secure the computer system to the desk with a cable lock

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select TWO).

-L2TP -PPTP

You are configuring the local security policy of a windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which of the following policies are best to configure? (Select TWO).

-Minimum password legnth -Account lockout threshold

Match each security policy on the left with the appropriate description on the right. Each security policy may be used once, more than once, or not at all. Provides a high-level overview of the organization's security program -Defines an employee's rights to use company property. -Identifies the requirements for credentials used to authenticate to company-owned systems. -Identifies a set of rules or standards that define personal behaviors. Sets expectations for user privacy when using company resources. -Specifies that user accounts should be locked after a certain number of failed login attempts.

-Organizational security policy -Acceptable use policy -Password policy -Code of ethics -Acceptable use policy -Password policy

Anna, a home user, employs a technician to check the security on a computer that was hacked. The technician discovers that the user's password is the name of Ann's dog and hasn't been changed over a year. Which of the following security best practices should the technician recommend? (Select TWO).

-Require a strong password -Set a password expiration period

Which are examples of strong passwords? (Select TWO).

-TuxP3nguinsRn0v3l -il0ve2eaticecr3am

While browsing the internet, a pop-up browser window is displayed warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the best actions to take? (Select TWO).

-Update the virus definitions for your locally-installed-anti-malware software -Run a full system scan using the anti-malware software installed on your system.

You have just installed a wireless access point (WAP) for your organization's network. You know that the radio signals used by the WAP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. Which of the following steps will best protect the wireless network> (Select TWO. Each option is a complete solution.)

-Use the WAP's configuration utility to reduce the radio signal strength. -Configure the WAP to filter out unauthorized MAC addresses.

Which of the following statements about a SSL VPN are true? (Select TWO).

-Uses port 443 -Encrypts the entire communication session

Which of the following file extensions indicates a Windows system file? (Select TWO).

.dll .vxd

Which of the following file extension types can be run from the command prompt? (Select THREE).

.exe .bat .com

Which of the following extensions identifies a program packaged for use by Windows Installer?

.msi

You need to use the runas command to run the Zip.exe executable on your windows system as the admin user on your system, which is a member of the administrators group.

/user:Admin

Which option, used with the copy command, makes sure that all copied files are written correctly after they have been copied?

/v

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?

/y

The monitor supports screen refresh rates up to 75 hz and a resolution of up to 1280 x 1024. The video adapter in your system is plugged (choose 2)

1. 1280 x 1024 2. 75 hz

You need to view a list of all valid display modes that are compatible with the video card installed in your windows system. (click 2)

1. Adjust resolution 2. Change display settings

You recently installed a device that you only need temporarily. After you are finished using the device, you remove... (choose 2)

1. At the command prompt, run pnputil -d followed by the driver package. 2. In device manager, right-click the device and click Uninstall

You have a windows 10 system with several standard users. You want all standard users to be able to install devices and the necessary drivers.

1. Enable allow non-administrators to install drivers for these device setup classes group policy 2. Run pnputil -i -a to add the drivers to the driver store

Two devices connected to your computer are not working properly. You suspect the devices are using the same system resources (select two)

1. In device manager, open the device properties and click the resources tab 2. Run System Information (msinfo32)

You installed a new hard disk in your computer and need to prepare it to be formatted with a file system. There are four steps you must complete on the new disk in order to do this. (ordered list)

1. Initialize it. 2. Partition it as MBR or GPT. 3. Create at least one volume 4. Assign a drive letter to the new volume.

NTFS: amount of files (matching)

1. Over 4 billion 2. 4 gigabytes 3. 16 terabytes 4. 256 terabytes 5. 2 terabytes

A logical division of the storage space on a storage device (Matching)

1. Partition 2. Volume 3. Folder 4. File

After upgrading a video driver on a windows system, the screen becomes unresponsive. You need to get the system working properly with the least amount of effort and time (Choose two)

1. Reboot the computer into safe mode and use device manager to roll back the driver. 2. Reboot the computer with the windows installation disk and select repair your computer to launch the system restore utility.

Your system has four disks with no unallocated space. You want to create a new volume where you can store confidential personnel and financial data, which you plan to protect with strict permissions at the volume level. (Select 2)

1. Shrink the reports (F:) volume on disk 3 by 20 GB 2. Create the Secure volume on disk 3 using the unallocated space.

Your windows system has a single disk hard configured with a single partition formatted with NTFS. The disk has run out of space.... (Select three.)

1. on the new hard disk, create a new partition without a drive letter. 2. Mount the partition on the new hard disk to the empty folder on the C: drive. 3. On the C: drive, create an empty folder.

You've just connected a new LCD monitor to your windows system. your LCD monitor has a native resolution of 1440 x 900 at 64 hz. The video adapter is plugged into a PCI express slot

1440 x 900

Which block of addresses is defined for use with automatic private IP addressing (APIPA)?

169.254.0.0/16

Your Windows system has an IP address of 172.17.8.3 assigned to it with a subnet mask of 255.255.0.0

172.17.0.0

You are implementing a Network Address Translation (NAT) router on your network to translate private IP addresses into a single registered IP address, allowing Internet access.

172.17.8.1 to 172.17.9.254 & 10.0.0.1 to 10.0.100.254

Which feature makes it possible to close some notebook computers and still use the touchscreen?

180 degree rotating touchscreen

You need to replace the hard disk in your laptop computer. Which of these hard drive sizes would you likely choose for the laptop?

2.5"

To access your company's internal network from home, you use Secure Shell (SSH). The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home?

22

To access your company's internal network from home, you use Secure Shell (SSH). The administrator has recently implemented a new firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home?

22

Which port does Telnet use?

23

You are configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following IP ports should you open on the firewall? (Select TWO).

25 110

Consider the following IP address that uses CIDR notation: 172.17.8.5/22 Which subnet mask corresponds to the CIDR notation used in this address?

255.255.252.0

You have been asked to implement a RAID 5 solution for an engineer's desktop workstation. You want to use the minimum number of hard disks that are necessary to configure a RAID 5 array. How many hard disks will you need to use?

3

Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?

3389

You have been asked to implement a RAID 10 solution for a video editor's desktop workstation using the minimum number of hard disks. How many hard disks will you need to configure the RAID 10?

4

To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the internet, but you are unable to perform secure credit card transactions when making purchases from e-commerce websites. Which port needs to be enabled to allow secure transactions?

443

To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the internet, but you are unable to perform secure credit card transactions when making purchases from e-commerce websites. Which port needs to be enabled to allow secure transactions?

443

Drivers for a small trucking company rely on a smartphone navigation application. When the smartphone loses internet connectivity, the maps don't update properly. Also, the company pays extra for a premium data service plan to support the application. Which of the following mobile devices could replace the smartphone navigation application, could provide map coverage when internet connectivity is lost, and does not require a data plan?

A GPSenabled personal navigation device

A public library has purchased a new laptop computer to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should be used to physically secure the laptop?

A cable lock

A public library has purchased a new laptop computer to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should be used to physically secure the laptop?

A cable lock

What is a cookie?

A file saved on your hard drive that tracks website preferences and use.

What is a cookie?

A file saved on your hard drive that tracks websites preferences and use

A sales person typically carries a laptop computer to several offsite customer me each day, but needs the flexibility to quickly attach other peripherals and charge battery while at their office desk. Which of the following laptop feature would BEST meet these requirements?

A laptop docking station

A technician is tasked with installing a network-enabled camera that runs on power that is supplied through its network connection. The network device that connects to the camera does not have the capability to supply this power. There is a power outlet close to the camera. Which of the following device can be used to supply power?

A power over Ethernet injector

You connect your computer to a wireless network available at the local library. You find that you can't access several websites you need to on the internet. Which of the following is the MOST likely cause of this problem?

A proxy server is filtering access to websites.

A manufacturing company has customized a computer application that supervisor to track line worker efficiency. Supervisors will interact with the application while within and between work areas and will also use the laptop while sitting at their Which of the following laptop features would BEST minimize the awkward move carrying a bulky laptop with a hinged display while providing the flexibility to use device at a desk?

A rotating or removable screen

When assisting users, a technician often uses the Mac OS Force Quit functions and the Linux kill command. Which of the following situations would require their use?

A runaway application does not respond to user input.

Domain Controller

A server that holds a copy of the Active Directory database that can be written to.

You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing, internet access, printers, and other local network resources. Which of the following would be the BEST implementation for your business?

A workgroup

You are currently managing a few Apple iPad devices that run the iOS operating system. Which of the following BEST describes the architecture used by this device?

ARM

When a user rotates a mobile device, the operating system changes the screen orientation so that the display remains upright to the user. Which of the following technologies is uses to detect this device movement? (Select TWO).

Accelerometer Gyroscope

In preparation to use your laptop on the airplane as you travel to a conference, you disconnected the USB mouse. The cursor drifts consistently to the left side of the screen while using the builtin trackpad and mouse buttons. Which of the following actions would MOST likely stop the mouse from drifting?

Access the BIOS/UEFI configuration and disable the USB pointer option.

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which of the following policies are BEST to configure? (Select TWO).

Account lockout threshold Minimum password length

You recently installed a Windows 10 system. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead. Click the Settings app option you would use to do this.

Accounts

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information?

Active Directory

What is the name of the service included with the windows server operating system that manages a centralized database containing user account and security information

Active directory

Your computer has a single hard disk with a single partition. Windows is installed on this partition. You decide that you would like to add fault tolerance to the existing volume by making it a raid 1, so you add a new hard disk to the computer.

Add a mirror to the existing volume

Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 GB of system RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance?

Add paging files to the E: and F: volumes.

You create the D:\Drivers folder on your windows system fro third party drivers for special devices to that folder.

Add the driver folder to the DevicePath registry key

Your windows system has a single hard disk with a single volume that takes up the entire hard disk. You want to create a new volume named videos for storing digital video files...

Add two hard disks. convert both disks to dynamic. Create a new striped volume using both disks.

You plan to use a newly installed windows system with an LCD monitor. You want to ensure that the text displayed on the screen is as clear, sharp, and easy to read as possible.

Adjust cleartype text

Which visual effects option disables all visual effects when it is selected? (click)

Adjust for best performance

A technician is assisting Ann, who reports that the display on her companyissued smartphone is too dim to read in a dark room, even after she adjusts the brightness setting. Which of the following actions should the technician perform FIRST? (Choose TWO).

Adjust the battery saver setting Adjust the adaptive or automatic brightness control

Which tool would you use to configure the paging file location and size on a Windows system?

Advanced System Settings in Control Panel

You need to configure File History to automatically delete any stored snapshots that are older than one month. Click the Control Panel option you would use to do this.

Advanced settings

While browsing the Internet, you notice that the browser displays pop-ups containing advertisements that are related to recent keyword searches you have performed. What is this an example of?

Adware

Joe, a frequent visitor to a branch office, attempts to connect his tablet to the office wireless network, but is unable to connect to the internet, even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot, but is still unable to connect to the internet. Which of the following is the MOST likely cause of this issue?

Airplane mode has been set on the tablet

Alice has received several calls from her friends informing her that they are receiving strange emails containing content that seems odd coming from her. Which of the following MOST likely happened on Alice's computer?

Alice's email account was hijacked.

Alice has received several calls from her friends informing her that they are receiving strange emails containing content that seems odd coming from her. Which of the following most likely happened on Alice's computer?

Alicie's email account was hijacked

A technician is tasked with increasing the RAM memory on a laptop by adding a SODIMM module to an empty memory slot. Which of the following processes will seat the module in the slot.

Align the notch on the long side of the memory module with the rise in the memory slot. Insert the module pins into the slot at the 45-degree angle. Rotate the module by pressing down until the slide hold-down clips snap into place

Which of the following security practices are the BEST example of the principle of least privilege?

All users on a Windows workstation are limited users except for one user, who is responsible for maintaining the system.

Which of the following security practices are the best example of least privilege?

All users on a windows workstation are limited users except for one user, who is responsible for maintaining the system.

You manage two folders in your computer as follows: • C:\Confidential • D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: • Move Reports.doc from C:\Confidential to D:\PublicReports. • Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?

Allow Full Control to both.

Your computer has a single NTFS partition used for the C: drive with the following folders: • C:\Confidential • C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: • Move Reports.doc from C:\Confidential to C:\PublicReports. • Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Allow Full Control to both.

You have removed the bezel from a notebook display that has stopped functioning. You see a DCtoAC power inverter at the base of the screen. Which of the following BEST describes the type of display you are working with?

An LCD display that uses CCFL backlighting.

Which of the following describes a man-in-the-middle attack?

An attacker intercepts communication between the two network hosts be impersonating each hosts

Which of the following describes a man-in-the-middle attack?

An attacker intercepts communications between two network hosts by impersonating each host.

Device manufacturers are countless.

Android

Open source and most popular mobile device operating system.

Android

Bob calls and complains that he has suddenly started getting a lot of unwanted email. Which of the following is the BEST type of software to install to help solve Bob's problem?

Anti-spam

Bob calls and complains that he has suddenly started getting a lot of unwanted email. Which of the following is the best type of software to install to help solve Bob's problem?

Anti-spam

A company executive has just bought a new Android mobile device. She wants you to help her make sure it is protected from malware threats. What options are available and important to use to protect Android devices? (Select TWO.)

Anti-virus apps are available for purchase from android app stores App reviews and ratings will help you choose an effective anti-virus app

A technician suspects that data is being leaked from a tablet. Which of the following is the BEST tool to troubleshoot this issue?

App scanner

Which file attribute identifies the file as having been modified since the last backup?

Archive

A technician is tasked with replacing a Wi-fi antenna in a laptop computer. Which of the following places would the antenna most likely be located?

Around the laptop's bezel

You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network ID for one of the subnets is 172.17.0.0. You are installing the first host (a server) on this subnet and want to assign the lowest numbered IP address possible to this system.

Assign the system an IP address of 172.17.0.1

You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network ID for one of the subnets is 172.17.128.0. You are installing a DNS/DHCP server on this subnet and want to assign the highest numbered host IP address possible to this system.

Assign the system an IP address of 172.17.191.254

A mobile device has poor performance and is slow to respond to screen inputs. After troubleshooting, a technician decides to perform a factory reset. Which of the following actions should a technician take before doing so?

Back up all data to an attached computer or a cloud backup service.

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidently delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would BEST protect Lily's files?

Back up her files using File History.

You have a computer with a removable disk drive that has been formatted with NTFS. You want the drive to use FAT32 to be compatible with older operating systems.....

Back up the data on the D: drive, reformat the D: drive using FAT32, and then restore the data.

Which of the following is an important aspect of evidence gathering?

Backing up all log files and audit trails

Which of the following is an important aspect of evidence gathering?

Backing up all log files and audit trails.

What do biometrics use to authenticate identity?

Biological attributes

A user has configured his mobile device to unlock using facial recognition. Which of the following methods for securing a mobile device is being used?

Biometric authentication

Employees currently access a data center using RFID badges. The company is concerned that an unauthorized person could gain access using a lost or stolen badge. Which of the following could be implemented to increase the physical security?

Biometric locks

Employees currently access a data center using RFID badges. The company is concerned that an unauthorized person could gain access using a lost or stolen badge. Which of the following could be implemented to increase the physical security?

Biometric locks

You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which of the following is the BEST method for achieving your goals?

BitLocker

You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which of the following is the best method for achieving your goals?

Bitlocker

A user stores sensitive data on a USB flash drive. Which of the following can be used to encrypt that data on this drive?

Bitlocker to go

A user stores sensitive data on a USB flash drive. Which of the following can be used to encrypt the data on this drive?

Bitlocket to go

A wireless technology standard for exchanging data over short distances.

Bluetooth

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission to the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file.

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware corrupted the boot block. Based on your suspicions, which of the following actions would you MOST likely take to correct the problem? (Select TWO.)

Boot from the Windows installation DVD and use the Recovery Environment to run a startup repair. reimage the machine

Your anti-malware software has detected a virus on your Windows 10 system. However, the anti-malware software is unable to remove it. When you try to delete the files, you can't because they are in use. Which of the following actions would be BEST to try first?

Boot into Safe Mode and try removing the malware.

Your anti-malware software has detected a virus on your Windows 10 system. However, the anti-malware software is unable to remove it. When you try to delete the files, you can't because they are in use. Which of the following actions would be best to try first?

Boot into safe mode and try removing the malware

One day, while trying to start your Windows 10 computer, the system displays the following error: Windows could not start. Could not read from the selected boot disk. Check boot path and disk hardware. Which of the following will most likely fix the problem?

Boot into the recovery environment and run the bootrec /rebuildbcd command.

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?

Boot the computer from the Windows installation disc and run Startup Repair.

Rodney, a user in the research department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot. Now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent Rodney from using the TV until you can install an updated driver. What should you do?

Boot the system into Safe Mode. Disable the TV tuner driver in Device Manager.

While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double- click speed setting. Click the tab you would use in the Mouse Properties window to do this.

Buttons

The integrated mouse, the small monitor, and the compact nature of the keyboard are impeding your work when you use a notebook, but you still need a system that is portable if necessary. What is your best option?

Buy a docking station for your notebook

Which of the following statements are true regarding administrative shares? (Select TWO).

By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path.

Where system root is the C: drive, what is the path to the directories that hold user profiles in Windows 10?

C:\Users\username

Which file system path is the default location for system files in Windows 10?

C:\Windows

Where system root is the C: drive, where are fonts stored on a Windows 10 system?

C:\Windows\Fonts\

Which of the following functions are performed by proxy servers? (Select TWO).

Cache web pages Block employees from accessing certain websites

A technician installs a new touch screen on a laptop. Directly touching on an onscreen button doesn't depress or activate the button, but touching near the button does. Which of the following actions will correct the misalignment?

Calibrate the touchscreen

You manage group of 20 What advantages would there be to switching to active directory ? (select two)

Centralized Authentication Centralized configuration control

You manage a group of 20 Windows workstations that are currently configured as a workgroup. You have been thinking about switching to an Active Directory configuration. Which advantages would you gain by switching to Active Directory? (Select TWO.)

Centralized authentication Centralized configuration control

You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type of document is this?

Chain of custody

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device: • They use an 802.11n wireless network. • The wireless network is broadcasting the SID Linksys. • The wireless network uses WPA2 with AES security. • Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select TWO).

Change the SSID to something other than the default. Disable SSID broadcast.

You've just finished installing a wireless access point for a client. Which action best predicts the access point from unauthorized tampering with its configuration settings?

Changing the default administrative password

You've just finished installing a wireless access point for a client. Which action best protects the access point from unauthorized tampering with its configuration settings?

Changing the default administrative password

Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select TWO).

Changing the hosts file of a user's computer Exploiting DHCP servers to deliver the IP address of poisoned DNS servers

Which of the following indicates that a system case cover has been removed?

Chassis intrusion detection

`Which of the following indicates that a system case cover has been removed?

Chassis intrusion detection

Vera has brought her notebook computer to you for repair. After listening to her describe its symptoms, you hypothesize that the notebook may have a malfunctioning keyboard. Which of the following steps can you take to BEST determine whether the keyboard needs to be replaced? (Select TWO).

Check for special keyboard features that could be enabled that may cause some keys to perform alternate tasks. Connect an external keyboard.

Joe has been issued a companyowned tablet. He finds that the performance decreases after a few hours of use. After he powercycles the tablet, performance returns, but the tablet begins to slow again after an hour of use. Which of the following is the BEST action to troubleshoot the problem?

Check the number apps that are running

A technician is tasked with configuring a user's personal tablet to connect to the corporate network. Which of the following should be performed before configuring access?

Check the tablet for unauthorized root access.

You want to configure your Windows 10 workstation so that it can get Windows updates directly from other Windows 10 systems on the network that have already downloaded them from Microsoft. Click the Settings app option you would use to do this.

Choose how updates are delivered

You need to set the refresh rate for your monitor. Click the option in the screen resolution...

Click "advanced settings"

Click the system properties options you can use to configure each computers work-group association

Click two buttons Network ID Change

Which of the following are networking models that can be used with the windows operating system (select three.)

Client-server Standalone Workgroup

you are Consulting a small startup - triple size within 12 months which networking model should they implement?

Client-sever

Which category can you use in Control Panel to control how times, dates, numbers, and currency are formatted and displayed for your computer?

Clock and Region

Sysem Restore is currently disabled for all volumes on a Windows 10 system. You need to enable System Protection for the C: volume. Click the option you would select to do this.

Configure

Following your Windows installation, you enabled the built-in Administrator account. You remove the password for this account. You enable Remote Desktop on your computer using the default settings. From home, you try to access your computer using Remote Desktop using the Administrator account, but you are unable to log on. Which of the following MUST be completed before you can access your computer using Remote Desktop?

Configure a password for the Administrator account.

Following your windows installation, you enabled the built-in administrator account. You remove the password for this account. You enable remote desktop on your computer using the default settings. From home, you try to access your computer using remote desktop using the administrator account, but you are unable to login. Which of the following must be completed before you can access your computer using remote desktop?

Configure a password for the administrator account

You want to configure your computer so that a password is required before the operating system will load. What should you do?

Configure a user password in the BIOS/UEFI

You want to configure your computer so that a password is required before the operating system will load. What should you do?

Configure a user password in the BIOS/UEFI.

You have a Windows system shared by three shift workers. Files that are used by all users are stored on the D:\ drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do?

Configure indexing to include the D:\ drive.

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take when implementing this configuration? (Select TWO. Each option is part of the complete solution.)

Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.

You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by DataComLink corporation. What should you do? (Select TWO.)

Configure the application to automatically download and install updates as they are released. Check the DataComLink Website regularly for patches and updates to the software.

Jose, a medical doctor, has a mobile device that contains sensitive patient information. He is concerned about unauthorized access to the data if the device is lost or stolen. Which of the following is the best option to prevent this from happening?

Configure the device to remote wipe as soon as it is reported lost

Jose, a medical doctor, has a mobile device that contains sensitive patient information. He is concerned about unauthorized access to the data if the device is lost or stolen. Which of the following is the BEST option to prevent this from happening?

Configure the device to remote wipe as soon as it reported lost.

Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. Which of the following are the BEST solutions for securing Joe's workstation? (Select TWO).

Configure the screen saver to require a password. Configure the screen lock to be applied after short period of nonuse.

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to remotely back up important data to the cloud

You need to configure a windows workstation with the IP address of the proxy server for your network. Click the tab in the internet properties window that you would use to do this.

Connections

You work for a company that offers their services through the internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial of service attack. As a first responder, which of the following is the next best step to perform?

Contain the issue

You work for a company that offers their services through the internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial of service attack. As a first responder, which of the following is the next BEST step to perform?

Contain the issue.

You are working on your computer when a person from the shipping department delivers a new external solid state drive (SSD) you ordered. When you plug the drive into your USB port, Windows cannot find a suitable device driver for the drive. To BEST resolve this issue, from which of the following Windows consoles would you access Device Manager?

Control Panel

Your system disk has no unallocated free space available. This is becoming a concern because the Data (E:) volume is quickly running out of space. You add two new hard disks to your windows system to remedy the situation.

Convert Disk 0 to dynamic

Your company has started the transistion to IPv6. You need to configure records on the DNS server so that clients can submit a host name query and recieve back an IPv6 address for the specified host.

Create AAAA records

Your company has started the transition to IPv6. You need to configure records on the DNS server so that clients can submit an IPv6 address and receive the host name for that computer.

Create PTR records

Which of the following functions are performed by the TPM?

Create a hash based on installed computer components.

Which of the following functions are performed by the TPM?

Create a hash based on installed system components.

Your windows system has a single hard disk with a single volume used by the C: drive. You previously upgraded disk to a dynamic disk. The disk has run out of disk space

Create a mount using space on the second disk.

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application? (Select TWO)

Create a virtual computer that runs Windows 7. Run the virtual computer each time the application runs. Run the application in Compatibility Mode.

What is the technology that protects the intellectual property rights of publishers and restricts the use of copyrighted works to those who have paid the necessary licensing fees?

DRM

You have a computer with three hard disks. A RAID 0 volume uses space on Disk 1 and Disk 2. A RAID 1 volume uses space on Disk 2 and Disk 3. Last night, Disk 2 failed. Which of the following is true?

Data on the RAID 1 volume is accessible; data on the RAID 0 volume is not.

A small company hires a technician to review their wireless security. The technician discovers that the wireless signal is available outside of the building. Which of the following could the technician recommend to correct this problem? (Select TWO).

Decrease radio power levels. Implement a directional antennae.

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?

Default Domain Policy

You manage a large number of workstations that belong to a windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?

Default Domain Policy

The second hard disk in your system has been assigned D: as the drive letter. The volume is formatted with NTFS. You decide you would like to modify....

Delete the existing volume. Create a new striped volume. Restore data to the volume from a backup.

Which of the following describes the role of a DHCP server? (Select two.)

Delivers DNS server addresses and other configuration information to hosts & Automates the process of assigning IP addresses, subnet masks, and default gateway addresses to network hosts

The D:\ drive in your computer has been formatted with NTFS. The Rachel user account has been assigned the following permissions: • Allow Full Control to the D:\Reports folder. • Deny Full Control to the D:\Sales folder. • Deny Full Control to the D:\Reports\2010reports.doc file. • Allow Full Control to the D:\Sales\2010sales.doc file. Which of the following BEST describes the effective permissions Rachel will have for both files?

Deny Full Control to D:\Reports\2010reports.doc; Allow Full Control to D:\Sales\2010sales.doc.

Your computer has a single NTFS partition used for the C: drive with the following folders: • C:\Confidential • C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: • Move Reports.doc from C:\Confidential to C:\PublicReports. • Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny Read to Reports.doc; Allow Full Control to Costs.doc.

Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's website, you find that a hotfix is available to address the issue. What should you do next?

Deploy the hotfix on a test computer.

On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program?

Details

A technician is troubleshooting a company cell phone that is over heating. Which of the following is the first action the technician should perform?

Determine whether the battery is warped or swollen

Which of the following input devices uses a stylus?

Digitizer

Your W'ndows workstation has an IP address of 192.168.1.35 with a subnet mask of 255.255.255.0. It also has a DNS server address of 192.168.1.1 and a default gateway router address of 192.168.1.254. Your workstation is a member of the westsim.com domain. The domain controller's address is 192.168.1.3.

Directly to the web server.

Ted, an employee in the sales department, has asked a coworker, Ann, to update the product descriptions contained in a sales document. Ann can open the file, can't save her changes to it. Which of the following digital security methods is MOST likely preventing her from saving the file?

Directory permissions

Which of the following measures will make your wireless network less visible to the casual attacker?

Disable SSID broadcast

Which of the following measures will make your wireless network less visible to the causal attacker?

Disable SSID broadcast

You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?

Disable Secure Desktop

You just bought a new notebook. This system uses UEFI firmware and came with Windows 10 preinstalled. However, you want to use Linux on this system. You download your favorite distribution and install it on the system, removing all Windows partitions on the hard disk in the process. When the installation is complete, you find that the operating system won't load when the system is rebooted. Which of the following would allow your computer to boot to Linux?

Disable SecureBoot in the UEFI configuration.

You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. A cable lock has been installed to prevent it from being stolen. Which of the following steps could be completed to BEST increase the security of this system? (Select TWO).

Disable all USB ports in the BIOS/UEFI firmware configuration Remove the optical drive

Employees in a small business have a habit of transferring files between computers using a USB flash drive and often bring in files from outside the company. Recently, a computer was infected with malware from a USB flash drive even though the employee did not access any files. Which of the following options would prevent this issue in the future?

Disable autorun

Employees in a small business have a habit of transferring files between computers using a USB flash drive and often bring in files from outside the company. Recently, a computer was infected with malware from a USB flash drive even though the employee did not access any files. Which of the following options would prevent this issue in the future?

Disable autorun.

You just bough a new notebook. The system uses UEFI firmware and came with windows 10 preinstalled. However, you want to use Linux on this system. You download your favorite distribution and install it on the system, removing all windows partitions on the hard disk in the process. When the installation is complete, you find that the operating system won't load when the system is rebooted. Which of the following would allow your computer to boot to Linux?

Disable secureboot in the UEFI configuration

One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has been disabled on the system. Which of the following actions is MOST likely to increase the security of this system?

Disable the Guest account.

Your client has hired you to evaluate their wired network security posture. As you tour their facility, you note the following: * Server systems are kept in a locked server room * User accounts on desktop systems have strong passwords assigned * A locked door is used to control access to the work area. Users must use ID badges to enter the area * Users connect their personal mobile devices to their computers using USB cables * Users work in three 8-hour shifts per day. Each computer is shared by three users. Each user has a limited account on the computer they use Based on this information, what should you recommend your client do to increase security?

Disable the USB ports on user's workstations

Your client has hired you to evaluate their wired network security posture. As you tour their facility, you note the following: • Server systems are kept in a locked server room. • User accounts on desktop systems have strong passwords assigned. • A locked door is used to control access to the work area. Users must use ID badges to enter the area. • Users connect their personal mobile devices to their computers using USB cables. • Users work in three 8-hour shifts per day. Each computer is shared by three users. Each user has a limited account on the computer they use. Based on this information, which of the following would you MOST likely recommend your client do to increase security?

Disable the USB ports on user's workstations.

One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allows management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been disabled on the system. Autorun has been disabled on the system. Which of the following actions is most likely to increase the security of this system?

Disable the guest account

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations would you most likely make to this organization to increase their security?

Disable the switch ports connected to the network jacks in the reception area

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations would you MOST likely make to this organization to increase their security?

Disable the switch ports connected to the network jacks in the reception area.

You have physically installed a new hard disk drive in your computer and configured the disk in the BIOS. You try to access the hard disk drive in windows explorer, but the drive is not displayed.

Disk Management

You have a windows system with a new hard drive. You want to create and format volumes on the hard drive. Which command should you use at the command prompt?

DiskPart

A user wants to use a laptop to display a presentation on a large TV monitor that has an HDMI connection. Which of the following laptop ports or connections can be used to add this display device?

DisplayPort using a DisplayPort-to-HDMI cable USB port using a USB-to-HDMI adapter

Nathan, a long-time Mac user, has been using his Mac computer for some time now with no issues. Recently, however, he reported that his Mac will unexpectedly tell him that his computer must be restarted by holding down the Power button for several seconds or by pressing the Restart button. Assuming that this is a symptom of kernel panic, which of the following steps would be the BEST first step for troubleshooting this issue?

Do a safe boot.

You need to use your windows 10 computer to access the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want to read the flash drive on your computer as quickly...

Do nothing. Windows 10 can be natively access exFAT file systems

Which component lets you use a notebook system as a desktop system by making it possible to connect a normal-sized external mouse, keyboard monitor, and speakers?

Docking Station

A technician was able to stop a security attack on a user's computer. When conducting a forensic investigation, which of the following actions should be performed FIRST?

Document what's on the screen

A technician was able to stop a security attack on a user's computer. When conducting a forensic investigation, which of the following actions should be performed first?

Document what's on the screen

Collection of network resources

Domain

Match the active directory definition on the left with its corresponding term on the right (some definitions do not have an associated term o the right)

Domain controller - a server that holds a copy of the active directory represents a group of networks that are connected represents a physical network segment Forest root domain- the first domain created in an active directory forest the highest-level domain in a tree

A technician upgrades the hard drive on a computer in the accounting department and decides to donate the old drive to a local trade school. Which of the following is the BEST method to ensure that the accounting data can't be recovered?

Drive wipe

A technician upgrades the hard drive on a computer in the accounting department and decides to donate the old drive to a local trade school. Which of the following is the best method to ensure that the accounting data can't be recovered?

Drive wipe

A technician wants to destroy the data on a hard drive and repurpose it as a spare drive. Which of the following data destruction methods allow the reuse of the hard drive?

Drive wipe

Your company has asked you to look at strategies for migrating from IPv4 to IPv6. Instead of using IPv6 only, you decided you want to allow hosts to use both IPv4 and IPv6 addresses. Which of the following technologies should you implement to allow hosts to use both IPv4 and IPv6 at the same time?

Dual stack

A user has a file that contains sensitive data. Which of the following can be used to encrypt a single file?

EFS

A user has a file that contains sensitive data. Which of the following can be used to encrypt a single file?

EFS

Which of the following security solutions would prevent a user from reading a file which she did not create?

EFS

Which of the following are true of libraries? (Select TWO.)

Each library can contain multiple folders from different file system locations. A single folder can be added to multiple libraries.

You want to configure User Account Control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do?

Edit settings in the Local Security Policy.

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file (1 without affecting her ability to access any other files in that folder and (2 without affecting the abilities of any other users?

Edit the properties for the file; assign Rachel the Deny Full Control permission.

A company has chosen a UTM instead of an IDS or IPS appliance to protect their network. Which of the following UTM security features is not available with an IDS or IPS?

Email and anitspam filtering

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?

Email filtering

You have just purchased a new laptop with builtin 802.11 wireless and Bluetooth capabilities. When you boot into Windows, you do not see a Bluetooth adapter listed in Device Manager. Which of the following would be BEST to perform first?

Enable Bluetooth in the BIOS/UEFI configuration.

You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4digit PIN number for a passcode. You want to use a more complex alphanumeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do? (Select TWO. Each option is part of the complete solution.)

Enable the Erase Data option. Disable the Simple Passcode option.

You are trying to listen to Audio Cds on a window system, but no audio is coming from the speakers

Enable the Sound-max integrated digital HD audio driver device

Drag the group policy setting on the left to the appropriate description of how the setting is enforced on the right.

Enabled-causes the policy to be enforced Not configured-does not change Disabled-prevents

Which of the following features is supplied by WPA2 on a wireless network? (Select TWO).

Encryption Authentification

You want to use Hibernation on your Windows notebook. What does it need to have?

Enough free hard drive space

What is the recommended size of the paging file under normal circumstances on a Windows 10 system with 8 GB of RAM installed?

Equal to the amount of physical RAM.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?

Establish a Remote Assistance connection and watch what the user is doing.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?

Establish a Remote Desktop connection and update the driver.

You find that you underestimated how much space users would need for their data. The data (E:) volume is on disk 1, which is almost out of free space. You want to increase the size of the Data (E:) volume from 10 GB to 120 GB by extending it to disk 2, which has over 300 GB of free space.

Extend size=110000 disk=2

You need to replace the video card in a laptop. What is the first step?

Find a service manual with correct disassembly procedures.

Which type of biometric authentication uses the ridges of your skin?

Fingerprint

Which of the following security measures is a form of biometrics?

Fingerprint scanner

A user can't make an RDP connection from outside the network to a server inside the network. Which network device will a network administrator most likely configure to allow this connection?

Firewall

Which of the following is the best device to deploy to protect your private network from a public, untrusted network?

Firewall

For some time now, you have been using an application on your windows 10 computer at home and while in the office. This application communicates with the internet. Today, your team lead decided to have a special team meeting at a local hotel. During this meeting, you obtained access to the internet using the hotel's network, but when you tried to run your application, it could not communicate with the internet. Which of the following control panel settings is most likely causing this behavior?

Firewall settings

Which of the following is the process of preparing a partition to store data?

Formatting

You have just purchased a used laptop, and you want to configure it to hibernate when you press the power button. You edit the Power Options settings and enable hibernation, then you configure the power button to trigger hibernation. Everything works fine for several weeks. However, one day when you press the power button, the laptop does not hibernate. Which of the following will BEST resolve this issue?

Free up disk space

You have a computer that runs Windows 7, and you want to install Windows 10. You are not concerned about keeping any of the existing data currently on the drive, and you want to do a clean install. After placing the Windows 10 installation DVD in the optical drive, you restart the computer, but it does not boot to the DVD, and you are unable to install Windows. Which of the following are the BEST methods for installing Windows from the DVD? (Select TWO. Each choice is a complete solution.)

From the UEFI or BIOS firmware, change the boot order. While the computer is rebooting, press the boot menu function key.

If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder?

Full Control

A mobile device user is comparing methods for securing the device. Which of the following methods for securing a mobile device can affect the device's performance?

Full device encryption

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. To determine whether the policy is enabled, where should you look next?

GPOs linked to organizational units that contain this user's object.

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs and Features page is not available in Control Panel. You suspect that a policy is enabled that hides this page from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs and Features is not configured. You know that other users in this domain can access the Programs and Features page. To determine whether the policy is enabled, where should you look next?

GPOs linked to organizational units that contain this users object

Which of the following is a partition format that was created as a replacement for the legacy MBR partition format?

GUID Partition Table (GPT)

You want to configure Power Plans on your Windows 7 laptop computer. Which of the following can do this? (select two)

Go to settings > System > Power & Sleep In the notification area, double-click the battery icon. Click Power Options.

On a Windows system, which of the following is true of groups?

Group members have the access rights assigned to the group.

Which component within a tablet device measures acceleration horizontally and vertically at the same time?

Gyroscope

After arriving in a new city today, a traveling sales team member calls you stating that his wireless connection no longer works. He has checked the wireless configuration, and he knows it to be correct because it was working yesterday. What should you do first?

Have him verify that the wireless card's hardware switch is in the On position.

A user calls to report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue?

Her group membership does not allow her to install new software.

Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff working in the same building. Due to the sensitive nature of these document, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically told. Which of the following would MOST likely fulfil Ben's needs?

Hidden share

The TCP/IP session state between two computers on a network is being manipulated by an attacker such that she is able to insert tampered packets into the communication stream. Which of the following best describes the type of attack which as occurred in this scenario?

Hijacking

A technician is assisting a user with rebooting a frozen laptop that does not respond to keystrokes or mouse clicks. Which of the following is the SIMPLEST way to power down the laptop?

Hold down the power button for several seconds.

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis?

Hotfix

A physical location where you can obtain wireless internet access using a WLAN.

Hotspot

While traveling in a car, a user who has an unlimited data plan on a smartphone opens a wireless connection to share the internet with other passengers. Which of the following connection types is MOST likely being used?

Hotspot

You mange a small network that is connected to the internet as shown in the diagram above. You add HostA to the network. HostA needs to use a static TCP/IP configuration. The subnet where HostA resides uses a 28-bit subnet mask.

IP address 10.0.0.97 Subnet Mask 255.255.255.240 Default Gateway 10.0.0.110

Which of the following protocols provides authentication and encryption services for VPN traffic?

IP sec

Which of the following protocols provides authentication and encryption services for VPN traffic?

IPSec

Page file usage

Identifies the amount or percentage of the page file that is being used.

Two employees are unable to access any websites on the internet, but can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. Which of the following actions would BEST resolve this issue?

Identify the proxy server name and port number in Internet Options.

Two employees are unable to access any websites on the internet, but can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. Which of the following would best resolve this issue?

Identify the proxy server name and port number in internet options

Why is it important to have your mobile device charger plugged in while it is receiving an operating system update?

If the battery dies during the update, the operating system could become corrupted

You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update. Which of the following BEST describes what would happen to your iPad if you disconnect it before the operating system update is complete?

If you disconnect during the update, the operating system could become corrupted

Your organization is frequently visited by sales reps. While on-site, they frequently plug their notebook systems into any available wall jack, hoping to get internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. Which of the following would best protect you from guest malware infection> (Select TWO).

Implement MAC address filtering -Implement static IP addressing

A local dentist has contracted you to implement a network in her new office. *No one from the Internet should be able to access her internal network. *Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. *Employees should be blocked from accessing non-work related web sites, especially sites that contain inappropriate content. *A system should be put in place to detect and prevent external attacks on her network. Which of the following would best meet your client's criteria

Implement an all-in-one security appliance

A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria: • No one from the internet should be able to access her internal network. • Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. • Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. • A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria?

Implement an all-in-one security appliance.

A small business named BigBikes, INC has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following: -They use an 802.11a wireless network -The wireless network SSID is set to BWLAN -The wireless network is not broadcasting the network SSID -The wireless network uses WPA2 with AES security -Omnidirectional access points are positioned around the periphery of the building. Which of the following would you most likely recommend your client do to increase their wireless network security?

Implement directional access points

A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following: • They use an 802.11a wireless network. • The wireless network SSID is set to BWLAN. • The wireless network is not broadcasting the network SSID. • The wireless network uses WPA2 with AES security. • Omnidirectional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security?

Implement directional access points.

Your organization is frequently visited by sales reps. While on-site, they frequently plug their notebook systems into any available wall jack, hoping to get internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. Which of the following would BEST protect you from guest malware infection? (Select TWO).

Implement static IP addressing. Implement MAC address filtering.

You have two computers that run windows. One computer has two hard disks. The secondary disk is a dynamic disk formatted with fat32....

Import the disk.

You need to boot a (Windows 10 )system into Safe Mode. Which steps will accomplish this task? (Select TWO. Each choice is a complete solution.)

In Safe Mode, Press [Shift ]key on keyboard while you click Restart In Safe Mode, select Start > Settings > Update & Security > Recovery > Advanced startup > Restart now.

You have implemented a regular backup schedule for a windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe.

You are only a standard user on a windows computer that you use at work. you connect your mp3 player....

In control panel, click Devices and Printers

The audio card in your windows system is working, but you learn about an updated driver that adds new features. you download and install the new driver.

In device manager, roll back the driver.

You use a windows computer that is shared by multiple users. Sharp AL -2040

In devices and printers, right click the sharp AL-2040 icon and click troubleshoot.

You have a laptop running Windows 10. User Account Control (UAC) has been disabled. How would you re-enable UAC on the laptop? (Select TWO. Each choice is complete solution.)

In the Control Panel, select System and Security and then Security and Maintenance. In the Control Panel, select User Accounts and then User Accounts.

You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. Which of the following steps would BEST meet your requirements?

Include the D:\Reports folder in the library.

You have a notebook computer with a builtin wireless network card. One day, it stops working. Because the network card is integrated onto the motherboard, you do not want to replace the entire motherboard. What can you use to connect to the wireless network? (Select TWO.)

Insert an ExpressCard wireless network card Insert a wireless USB network card.

You want to create a RAID 5 array on an existing Windows system using three newly installed SATA disks. When you go to Disk Management, the option to create the RAID 5 array is not available. What should you do?

Install a dedicated RAID controller.

You would like to control Internet access based on users, time of day, and Web sites visited. Which of the following actions would best meet your criteria?

Install a proxy server. Allow internet access only through the proxy server

You would like to control internet access based on users, time of day, and websites visited. Which of the following actions would BEST meet your criteria?

Install a proxy server. Allow internet access only through the proxy server.

You have recently had an issue where a user's windows computer was infected with a virus. After removing the virus from the computer, which of the following is the next step you should take?

Install all OS updates

You need to install an updated driver for a hardware device on your system. You need to use a driver file that has been tested by Microsoft and is from a legitimate source. What should you do?

Install an updated driver with a digital signature

You want to configure a RAID 1 array on an existing Windows system. You install two new SATA drives, then use the RAID controller integrated in the motherboard to define a RAID 1 array using the two new drives. When you boot the computer, Windows does not show the logical RAID drive. What should you do?

Install the drivers for the RAID controller

Which of the following actions directly improves system security on a Windows workstation?

Install the latest updates.

Don is an accountant in the Finance department. For the last several months, he has been testing an online accounting program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. Don downloads the application and tries to install it, but the operating system will not allow him to. Out of frustration, he calls the help desk. The help desk sends a technician to Don's machine while Don is out to lunch. The technician installs the application without issue. Which of the following is the most likely reason Don could not install the application?

Insufficient permissions

You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. Which of the following best describes what happened to the file?

It has been moved to a folder on your computer

You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. Which of the following BEST describes what happened to the file?

It has been moved to a folder on your computer.

Which of the following best describes spyware?

It monitors the actions you take on your machine and sends the information back to its originating source.

An employee working from home accesses the company network using a VPN connection. When connecting, the employee is prompted for a PIN that changes at predetermined intervals. Which of the following will the employee most likely use to obtain the PIN?

Key fob

Which of the following are characteristics of the ExpressCard /54 form factor.

L shape 34mm wide at the connector

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select TWO).

L2TP PPTP

A landscaping company's employees receive payment for their services using a credit card reader that physically attaches to an Apple mobile device. Which of the following connection types is being used?

Lightning

Which of the following battery types offers the greatest storage capacity in the smallest amount of space?

Lithium ion (LIB)

You are configuring a new system and want to use a RAID 0 array for the operating system using SATA disks and the RAID functionality built into the motherboard. Which of the following actions will you take as part of the configuration?

Load the RAID drivers during operating system installation.

You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor

You are managing a workstation that is not part of a windows domain. Users on this computer should not be permitted to download applications from the windows store. Which administration tool can you use to enable a policy that turns off the store application for all users on this computer?

Local Group policy editor

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).

Lock the screen with some form of authentication. Keep the operating system up to date.

Match each active directory

Logical organization of resources 1. organizational unit 2. domain 3. forest 4. object 5. tree

You work in the IT department. To perform your daily tasks, you often use many of the Windows consoles, such as the Device Manager, Hyper-V Manager, and the Performance Monitor. Although each of these can be accessed from various locations in Windows, you want one location from which these common tools can be accessed. Which of the following system utilities would BEST provide this capability?

MMC

Susan has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will MOST likely correct the problem?

Make Manuel the owner of the file.

You manage a small office network with a single subnet. The network is connected to the Internet. All client computers run Windows. A single server runs Windows Sewer 2016. The client computers are not joined to a domain. All hosts use IPv6 addresses on the private network. All computers on the private network are assigned host names (e.g., Computerl, Computer2, etc.). All hosts use the DNS server provided by the Internet Service Provider (ISP) to resolve host names for Internet hosts. You need to implement a solution so that hosts on your private network can resolve host names for other hosts on the private network. You want to implement the solution with the least amount of effort.

Make sure that LLMNR is enabled on all computers.

A user complains that his notebook display has started to go dim intermittently. You suspect the backlight might need to be replaced, but you want verify that the backlight is failing before you replace it. Which of the following would be BEST to check before replacing the backlight?

Make sure that the dimming isn't being caused by a power saving method that has been configured to conserve notebook power.

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggy backing to gain access to your building. The individual in question did not have a security badge. Which of the following would you most likely implement to keep this from happening in the future?

Mantraps

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following best describes the type of attack that just occurred?

Masquerading

Which aspects of virtual memory can you configure on a Windows workstation? (Select TWO).

Maximum size of the paging file Location of the paging file

You turn on your desktop computer. You can hear the fans start up, but the monitor remains blank. You wait a while, but it doesn't appear that anything else is happening. The hard drive activity light doesn't show activity, and you never hear the sound that plays when Windows loads. Which of the following are the most likely cause of the problem? (Select THREE).

Memory processor video card

Which of the following is a 172-pin DIMM often used in laptops?

MicroDIMM

As an IT technician, you are often asked to work on laptop computers that include wireless network cards. Which of the following is the most commonly used type of card for these internal wireless adapters?

Mini-PCI

Which type of interface is typically used for internal wireless networking cards in the laptops?

Mini-PCI

You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least five days before changing it again. Which of the following policies are BEST to configure? (Select TWO).

Minimum password age enforce password history

Provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.

Mobile VPN

You have an executive user who keeps sensitive information about the company on a companyowned mobile device. You want to be prepared to keep company information secure if he loses this device or if it gets stolen. Which of the following solutions should you use? (Select TWO.)

Mobile device management software that performs remote wipes. Mobile device management software that performs full device encryption.

You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next?

Modify the NTFS permissions on the folder.

Mary and Pablo share a customer support workstation. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. Which of the following will MOST likely allow Pablo to open the file?

Modify the permissions on the document.

Which utility allows you to choose Selective Startup in Windows?

Msconfig (System Configuration)

Which tool can you use to view (but not modify) hardware and configuration information for your computer?

Msinfo32

After entering a user id and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used?

Multifactor authentication

Recently, your laptop won't power on, and the battery is not charging. You suspect the block on the power cord (also known as a brick) no longer works. Which tool will help you troubleshoot this problem?

Multimeter

Which feature allows a tablet to recognize multiple finger touches at the same time?

Multitouch

You have subscribed to a cloudbased service to synchronize data between your mobile device and your PC. Before allowing the data to be synchronized, this service uses a process where the cloud service and the client on the mobile device verify each other's security certificates. What is this process called?

Mutual authentication

Which of the following network devices or services is least likely to be compatible with VPN connections?

NAT

Which of the following networking devices or services is LEAST likely to be compatible with VPN connections?

NAT

A connector used to emulate cryptographic smart card functionalities.

NFC

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following technologies is being used in these phones?

NFC chips

What is the least secure place to locate an omnidirectional access point when creating a wireless network?

Near a window

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs?

Network Share

Which of the following battery types has the greatest need to be completely drained before being recharged?

Nickel cadmium (NiCad)

A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small middle eastern nation. The user has offered a 25% share of this account if she would help the sender transfer it to a bank in the united states. The user responded and was instructed to wire $5,000 to the sender to facilitate the transfer. She complied, but has not heard from the sender once. Which of the following best describes the type of attack which occurred in this scenario?

Nigerian 419 scam

A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small middle eastern nation. The user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States. The user responded and was instructed to wire $5,000 to the sender to facilitate the transfer. She complied, but has not heard from the sender since. Which of the following BEST describes the type of attack which as occurred in this scenario?

Nigerian 419 scam

Your Class C network currently has IP addresses 192.168.1.1 through 192.168.1.254 statically assigned to various workstations and servers using the default Class C subnet mask (255.255.255.0

No addresses are available for this system on this network.

To protect a Windows 10 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No, you need to enable File History.

You need to back up user data on a Windows 10 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: • Use Backup and Restore to backup user data. • Run the backup automatically every night at 11:00 p.m. • Store the backups in the C:\Backups folder. • Include a system image in each backup. Will this configuration work?

No. Backups created with Backup and Restore can't be stored on the drive that contains the information being backed up.

To protect user data on a Windows 10 system, you've configured System Restore to automatically create restore points for the C: volume. Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your users' data? (Select TWO).

No. You need to create a backup of your user data as well. No. You need to enable File History.

You have booted your Windows workstation into Safe Mode and enabled Boot Logging. To which log file is the boot logging information now being written?

Ntbtlog.txt

Network resource in the directory

Object

You recently set up a DHCP sewer and need to configure your computer to start using it. Click the IPv4 properties option that you would select to use the DHCP server to receive IP configuration information.

Obtain an IP address automatically

Which screen saver option can be used to increase security by requiring the user to enter a password... (click)

On resume, display logon screen

You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file?

On the system volume

You have several personal mobile devices Which type of user account must you create?

Online user account

You install a new internal sound card in your windows system. After rebooting and installing the driver, the device does not appear to be working. you need to view information

Open Device Manager to view the status of the sound card.

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model?

Open source

You want to be able to access your home computer using remote desktop while traveling. You enable remote desktop, but you find that you cannont access your computer outside of your home network. Which of the following is the best solution to your problem?

Open the firewall port for the remote desktop protocol

Logical organization of resources

Organizational Unit

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select THREE).

PPTP L2TP IPSec

Which of the following is a firewall function?

Packet filtering

You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Click on the tab in Task Manager that you would use to do this.

Performance

You are an IT technician for your company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctioning application. To help troubleshoot Rachel's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how her computer is running? (Select TWO).

Performance Processes

Which tool can you use to gather and display statistics that help you monitor the operation of a Windows system?

Performance Monitor

You manage two folders in your computer as follows: • C:\Confidential • D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc You then take the following actions: • Move Reports.doc from C:\Confidential to D:\PublicReports. • Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files

Which of the following is true of online software activation? (Select THREE.)

Persistent activation may require the license to be continuously re-activated online at a preconfigured interval. Before running a newly installed application, the user must activate their license online on the software vendor's website. With personal software licenses, the limit is usually one to three online activations.

A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small Middle Eastern nation. The user was offered a 25 percent share of this account if she would help the sender transfer it to a bank in the United States. The user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used that information to drain her bank account. What type of attack occurred in this scenario?

Phishing

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL. Which of the following security threats does this describe?

Phishing

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL. Which of the following security threats does this describe?

Phishing

Several users have forwarded you an email stating that your company's health insurance provider has just launched a new website for all employees. To access the site, they are told to click a link in the email and provide their personal information. Upon investigation, you discover that your company's health insurance provider did not send this email. Which of the following BEST describes the type of attack that just occurred?

Phishing

Several users have forwarded you an email stating that your company's health insurance provider has just launched a new website for all employees. To access the site, they are told to click a link in the email and provide their personal information. Upon investigation, you discover that your company's health insurance provider did not send this email. Which of the following best describes the type of attack that just occurred?

Phishing

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

Phishing

You have purchased new computers and will be disposing of your old computers. These computers were previously used for storing highly-sensitive customer order information, including credit card numbers. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Physically destroy the hard drives with a hammer

You have purchased new computers and will be disposing of your old computers. These computers were previously used for storing highly-sensitive customer order information, including credit card numbers. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Physically destroy the hard drives with a hammer.

You manage a Windows network environment. As part of your IPv6 migration strategy, you have implemented Teredo on your network. You would like to test the communication of a client computer using Teredo.

Ping the address beginning with 2001:

You manage a Windows network environment. As part of your IPv6 migration strategy, you have implemented ISATAP on your network. You would like to test the communication of a client computer using ISATAP.

Ping the address beginning with FE80:.

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions to take next? (Select TWO).

Place the files on an NTFS partition. Configure both share and NTFS permissions.

You are troubleshooting a malfunctioning laptop computer. Nothing appears on the LED display when the system is powered on. Which of the following is the BEST step to try first?

Plug in an external monitor.

While using a new Windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed. Click the tab you would use in the Mouse Properties window to do this.

Pointer Options

Which of the following is an extra button or knob on a laptop keyboard that moves the mouse cursor?

Pointing Stick

A user needs to use her laptop to give a presentation using a video projector. Sh asking you how to switch the display to the external monitor port on her laptop. should you tell her?

Press and hold the Fn key; then press the monitor function key (image of a monitor on it).

A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?

Principle of least privilege

A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?

Principle of least privilege

During an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information. Which of the following would make it difficult for other passengers to view this information on the laptop display?

Privacy filter

During an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information. Which of the following would make it difficult for other passengers to view this information on the laptop display?

Privacy filter

You are an IT technician for your company. Jodie, a receptionist, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how Jodie's computer is running? (Select TWO).

Processes Performance

What is the purpose of the Microsoft Management Console (MMC)? (Select TWO).

Provide a shell for running snap-ins. Provide a common user interface for performing system administration tasks.

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would most likely provide this service?

Proxy server

You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the windows system file checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the best step that should be taken?

Quarantine Vivian's computer

You have a file which you would like other users to see, but not modify. Which file attribute should you use?

R

Which RAID level provides increased performance using only two disks?

RAID 0

Which of the following RAID levels uses striping without fault tolerance?

RAID 0

Which of the following drive configurations uses striping with parity for fault tolerance?

RAID 5

Which item is an advantage RAID 5 has over RAID 1?

RAID 5 improves performance better than RAID 1.

An employee in your organization has a new computer and needs the increased performance and fault tolerance provided by RAID 5. You have just performed the following steps in preparation for installing Windows on the RAID 5 array: • Installed three SATA drives and a RAID controller card. • Edited the CMOS settings to identify the SATA drive type as RAID. • Used the RAID configuration utility to define a RAID 5 array using the SATA drives. Select the four steps on the left that you need to follow to complete the installation of the Windows operating system on the RAID 5 array and arrange them in the correct order on the right.

Reboot from the Windows installation disk Manually load the RAID controller driver Format the array and install the OS on it Set the BIOS/UEFI to boot from the RAID array

You're troubleshooting a notebook system that uses a digitizer pad and stylus for user input. The user has complained that the digitizer pad registers stylus registers taps about one inch to the right of where the taps actually occur. Which of the following actions would MOST likely fix this issue?

Recalibrate the digitizer pad.

Which tool lets you view and directly edit the registry?

Regedit

You have configured your Windows systems to automatically back up user data every night at midnight. You also take a system image backup once per month. What else should you do to ensure that you are protected from data loss? (Select TWO.)

Regularly test restoration procedures. Store a copy of all backups off-site.

Which of the following is the process of fixing problems detected by anti-virus software so that the computer is restored to its original state?

Remediation

Which of the following remote access mechanisms on a Windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks?

Remote Assistance

A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production area to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration? (Select TWO.)

Remote Desktop Users Administrators

Which of the following will improve the security of sensitive information on your device if it is lost or stolen? (Select THREE.)

Remote wipe Locator applications A screen lock

You have purchased a used computer from a computer liquidator. When you boot the computer, you find that there has been a password set on the BIOS. You need to clear the password so that you can edit the CMOS settings. What should you do?

Remove the motherboard battery for a few seconds

You have purchased a used computer from a computer liquidator. When you boot the computer, you find that there has been a password set on the BIOS. You need to clear the password so that you can edit the CMOS settings. What should you do?

Remove the motherboard battery for a few seconds.

A home office user employs a technician to secure a Windows computer. To secure the local accounts, which of the following actions should the technician perform? (Select TWO).

Rename the Administrator account. Disable the Guest Account.

Which of the following are likely symptoms of malware infection? (Select TWO).

Renamed system files Changed file permissions

A user reports that an older laptop is having trouble connecting with newer wireless networks. Which of the following actions should a technician consider as an alternative to replacing the laptop?

Replace the internal wireless card

A technician is servicing a laptop that works properly when the power adapter is plugged in. Even though the battery icon shows that the battery is fully charged, when the laptop is unplugged, the laptop immediately shuts down. Which of the following actions should the technician perform?

Replace the laptop battery.

Site

Represents a group of networks that are connected with high-speed links.

Subnet

Represents a physical network segment.

Anna, a home office user, employs a technician to check the security on a computer that was hacked. The technician discovers that the user's password is the name of Anna's dog and hasn't been changed in over a year. Which of the following security best practices should the technician recommend? (Select TWO).

Require a strong password. Set a password expiration period.

For the past few days, a mobile phone has stopped functioning and will not respond to touchscreen input. A soft reset no longer returns functionality. Which of the following is the BEST step the user can take to fix this problem?

Reset to factory default

You find that the underestimated how much space users would need for their data. The data (E:) volume is on disk 1, which still has over 300 GB of un-allocated space.....

Resize-Partition -DriveLetter E -size 120gb

Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?

Resource Monitor

You are an IT technician for your company. Fred calls you complaining that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware?

Restore Fred's computer back to a previous restore point.

Micka, a tech-savvy employee, tried to upgrade her computer from Windows 7 to Windows 10 from the internet. Something went wrong during the upgrade, and Micka's computer will no longer boot to Windows. She has brought her computer to the IT department for you to repair. You have tried to repair the computer, but you are unable to get it to boot to Windows. Which of the following methods would be the QUICKEST way to get Micka's computer back to its original Windows 7 operating system?

Restore her system using the recovery partition.

The chain of custody is used for what purposes?

Retaining evidence integrity by identifying people coming into contact with evidence

The chain of custody is used for what purposes?

Retaining evidence integrity by identifying people coming into contact with evidence

A technician is replacing a hard drive in a laptop. Which of the following is the FIRST action the technician should perform before opening the laptop case?

Review the laptop manufacturer's documentation.

An internal laptop keyboard is generally connected to the laptop's system board using a:

Ribbon cable

After completing a clean install of Windows 10 you realize the computer is unable to connect to the network.

Right click the RealTek RTL8139C Fast Ethernet controller and click Update Driver Software.

Bryce's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on and to improve his computer's performance. You run Task Manager on Bryce's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following can be used from Task Manager to stop the application from running?

Right-Click > End Task

Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you can find out what is going on and to improve her computer's performance. You run Task Manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following actions can you take from Task Manager to stop the application from running?

Right-click > End task

Which of the following paths opens the Computer Management tool in Windows 10? (Select TWO).

Right-click the Windows icon and select Computer Management. In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon.

Some software on Rachel's computer is telling her that the computer is at risk and that she needs to purchase an upgrade for the software before the risk can be removed. Confused, Rachel calls you (The IT Specialists) for advice. After meeting with Rachel, you discover that the pop-up warnings only began after she installed a plug-in for her internet browser. Which of the following is the most likely cause of these warning messages?

Rogue antivirus

You have a windows system with a single hard drive. You want to add fault tolerance to the existing hard drive, so you install a new hard drive in the computer

Run DiskPart and use the Add command

A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue?

Run an antimalware scan.

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened. Which of the following email protocols is being used?

S/MIME

Which of the following can be used to create a secure connection to a remote server?

SSH

Which of the following network services or protocols uses TCP/IP port 22?

SSH

Which of the following protocols can be enabled so email is encrypted on a mobile device?

SSL

An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following?

Scheduled backups

Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her MAC?

Screen Sharing

A technician finds that after restoring the operating system on a mobile device, the touch screen operates unpredictably. This happens in both the default orientation or when the screen is rotated. Which of the following would BEST correct the problem?

Screen calibration

You're troubleshooting a computer that runs Windows 10. The operating system has halted. and a blue screen isdisplayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue?

Search for the error in Microsoft's knowledge base.

You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likely increase the security of this system? (Select TWO. Each option is a complete solution.)

Secure the computer system to the desk with a cable lock. Install a privacy filter on the monitor.

You have a computer that runs windows 10. Where would you go to verify that the system has recognized the anti-malware software installed on the system?

Security and maintenance

Marcus was attempting to tweak the way his Windows 10 workstation boots when he inadvertently corrupted his system boot files. It will now no longer boot to a logon prompt. He boots the system from the Windows installation disc and accesses the Recovery Environment. What should he do next?

Select Troubleshoot > Advanced Options > Startup Repair

Which of the following are common forms of social engineering attacks?

Sending hoax virus information emails

Which of the following are common forms of social engineering attacks?

Sending hoax virus information emails.

One of the Windows workstations you manage has three user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likely increase the security of this system? (Select TWO).

Set a screensaver password. Disable autorun on the system.

A small business hires an after-hours cleaning service that is known to have a high turnover of employees. They want to prevent unauthorized access to their computers, but do not want to spend money on new hardware. Which of the following is the BEST solution?

Set login time restrictions.

A user is trying to log into her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. Which of the following is MOST likely causing the problem?

She has enabled Num Lock, causing numbers to be sent from the keyboard instead of letters.

A user is trying to log into her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. Which of the following is most likely causing the problem?

She has enabled num lock, causing numbers to be sent from the keyboard instead of letters

A user is trying to log into Windows on her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. Which of the following is MOST likely causing this problem?

She has turned Num Lock on, causing the keyboard to register numbers instead of letters.

While organizing a storage cabinet, a technician discovers a box of hard drives that are incompatible with current hardware and may contain sensitive data. Which of the following is the best method for disposing of these drives?

Shredding

You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to best prevent extracting data from the discs?

Shredding

Your windows system has a single hard drive with a single disk partition. The 500 GB system (C:) volume currently has 200 GB free. You decide...

Shrink the C: volume. Create a new partition using free space on the disk.

A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence?

Shutting down the system

A security technician is conducting a forensic analysis. Which of the following actions is most likely to destroy critical evidence?

Shutting down the system

Travis, a longhaul truck driver, reports that when driving on remote highways, his smartphone battery drains faster than normal, and his phone calls often cut out. Which of the following is the MOST likely reason for the fast battery drain?

Signal drop or weak signal

Which of the following is not a form of biometrics?

Smart card

Which of the following security technologies stores identification in a magnetic strip, radio frequency transmitter, or hardware contact to authorize access to a computer?

Smart card

Joe, an executive, receives an email that appears to be from the financial institution that provides his company credit card. The text of the email includes Joe's name and the company name and states that there is a problem with Joe's credit card. The email provides a link to verify the credit card, but when Joe hovers over the link, he thinks the web address seems strange. Which of the following BEST describes this type of attack?

Social engineering

Joe, an executive, receives an email that appears to be from the financial institution that provides his company credit card. The text of the email includes Joe's name and the company name and states that there is a problem with Joe's credit card. The email provides a link to verify the credit card, but when Joe hovers over the link, he thinks the web address seems strange. Which of the following best describes this type of attack?

Social engineering

Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?

Spamming

Which of the following best describes the use of Libraries in Windows?

Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder.

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet. Which of the following best describes the type of attack which as occurred in this scenario?

Spoofing

A technician is tasked with repairing a laptop keyboard with sticking keys. Which of the following actions should the technician perform before replacing the keyboard?

Spray compressed air between the keys

You are a contract specialist managing Which of the following network models could this office be using? (Select two.)

Stand-alone workgroup

You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this.

Startup

You have just installed the latest Windows updates on your Windows 10 computer. After the computer has rebooted, you get the following error message: Error: Windows failed to start. A recent hardware or software change might have caused the issue after you installed Windows updates. Since your computer won't start, you have booted your computer into the Advanced Options section of the Windows 10 recovery environment (see image). While troubleshooting this issue, which of the advanced options would be the BEST to try first?

Startup Repair

A security incident is currently occurring on the company network. You discover that the attack involves a computer system that is attached to the network. You're unsure what kind of damage is being done to the network systems or data. Which of the following actions should you take FIRST?

Stop the attack and contain the damage by disconnecting the system from the network.

A security incident is currently occurring on the company network. You discover that the attack involves a computer system that is attached to the network. You're unsure what kind of damage is being done to the network systems or data. Which of the following actions should you take first?

Stop the attack and contain the damage by disconnecting the system from the network.

A VPN is primarily used for what purpose?

Support secured communications over an untrusted network

A VPN is used primary for what purpose?

Support secured communications over an untrusted network

A VPN is used primarily for what purpose?

Support secured communications over an untrusted network.

A VPN is used primarily for which purpose?

Support secured communications over an untrusted network.

Which ACPI power state retains the contents in RAM, but turns all other components off?

Suspend

A user is choosing a method to secure a mobile device. Which of the following types of screen locks is LEAST secure?

Swipe lock

A company is considering providing smartphones to their employees and is investigating the interaction of the phones with iTunes, iCloud, Google Drive, Dropbox, and OneDrive. Which of the following data synchronization methods is being considered?

Synchronization to the cloud

Your job functions have recently changed. As a result, you find that you are needing to work with more running programs on your Windows 10 computer at a time. Although you haven't seen these in the past, you are now starting to receive error messages warning you of low virtual memory. However, no additional RAM can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages?

System

A new computer has been added to the Sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings MUST be used to make the change?

System Properties > Computer Name

Sysem Restore has been enabled for all volumes on a Windows system. Recently, a new network driver was installed on the system. However, the driver code contained bugs, and now your network board no longer functions. You are unable to access the internet to download an older version of the driver. You need to revert the system to a prior restore point that was taken before the driver was installed. Click the option you would use to do this.

System Restore

You need to enable Remote Desktop on a user's Windows 10 system so that you can manage it over the network from your office. Click the Control Panel option you use to accomplish this task.

System and Security

You want to perform a Windows update on your Windows 10 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update. Which of the following Control Panel utilities is BEST to enable and use prior to the update?

System protection

An intruder waits near an organization's secured entrance until an employee approaches the entrance and unlocks it with a security badge. The intruder falls in line behind the employee, who assumes the intruder is another employee and holds the door open for her.Which of the following best describes the type of attack that just occured?

Tailgating

An unauthorized person gains access to a secured area by following an authorized person through a door controlled by a badge reader.

Tailgating

An unauthorized person gains access to a secured area by following an authorized person through a door controlled by a badge reader. Which of the following security threats does this sentence describe?

Tailgating

You manage a Windows system. You want to view information about all of the programs running on your system and sort each program by the amount of memory and CPU that the program uses. Which tool should you use?

Task Manager

You manage a Windows system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations. Which tools could you use to do this? (Select TWO.)

Task Manager Performance Monitor

Your computer has a quad-core processor that supports multithreading installed. Given that the system is running Windows, how can you verify whether multithreading has been enabled?

Task Manager can display CPU utilization graphs for eight processors.

Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?

Task Scheduler

You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?

Task Scheduler

You would like to run an application on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?

Task Scheduler

You are a security consultant. An organization has hired you to review their security measures. The organization is chiefly concerned that it could become the victim of a social engineering attack. Which of the following actions would you MOST likely recommend to mitigate the risk?

Teach users how to recognize and respond to social engineering attacks.

You are a security consultant. An organization has hired you to review their security measures. The organization is chiefly concerned that it could become the victim of a social engineering attack? Which of the following actions would you most likely recommend to mitigate the risk?

Teach users how to recognize and respond to social engineering attacks.

You have an IPv4 network that has two IPv6-only hosts that need to be able to communicate with each other. You want to implement a solution that only requires you to configure the two IPv6 hosts and that also works through NAT

Teredo tunneling

Allows you to share the internet connection of a phone with a laptop.

Tethering

You are using a web browser on your Windows notebook to access the http://www.westsim.com website. Your notebook has been configured to use a DNS server that has an IP address of 137.65.1.254 for name resolution.

The DNS server sends a request to a DNS server for the IP address of a DNS server that is authoritative for the westsim.com domain.

The Hide Programs option setting is configured for a specific user as follows: After logging in, the user is able to see the Programs option. Why does this happen?

The GPO linked to the user's organizational unit is applied last, so this setting takes precedence.

after logging in, the user is able to see the programs and features page. Why does this happen?

The GPO linked to the user's organizational unit is applied last, so this setting takes precedence.

Using the Windows OS, Joe transfers a file in his Documents folder to a folder that has been configured to give Ann full control of all files. Instead of copying the files, Joe uses a move operation. Ann can read the file, but can't save any changes to the file. Which of the following is MOST likely the reason that Ann can't update the file?

The Modify and Write permissions for Ann were set to Deny when the file was in Joe's Documents folder.

Commit charge

The amount of memory that has been assigned to running processes

Disk time

The amount of time that the disk subsystem is busy reading from and writing to disk.

Processor utilization

The amount of time the processor spends performing non-idle tasks.

After a user checks the volume settings and makes sure it not muted, sound still isn't coming from the internal speaker on a tablet device. Which of the following is MOST likely reason?

The audio output is being directed to a Bluetooth speaker

While working in device manager, you notice the display shown in the exhibit. What does the icon next to USB mass storage device indicate?

The driver for the device is unavailable.

forest root domain

The first domain created in an Active Directory forest.

A technician is tasked with replacing an internal hard drive. Which of the following hard drive standards would be of most concern when selecting a replacement?

The hard drive's form factor

tree root domain

The highest level domain in a tree

You're troubleshooting a malfunctioning notebook computer system. The user has indicated that the LCD screen suddenly became dark and difficult to read while he was downloading a large file through his wireless network card while the system was plugged in at his desk. You've checked the system and determined that the backlight has stopped working. Which of the following is the MOST likely cause? (Select TWO).

The inverter in the LCD assembly has malfunctioned. The cold cathode fluorescent lamp has burned out and needs to be replaced

Your iPad is configured to do remote backups everyday to iCloud. What conditions are required for the iCloud backup to take place. (Select three)

The ipad has to have an internet connection The ipad has to be plugged into a power source The ipad screen has to be locked

Memory pages per second

The number of hard faults that occur each second.

Disk queue length

The number of read and write requests that are waiting to be processed.

You connect your computer to a wireless network available at the local library. You find that you can't access several websites you need to on the internet. Which of the following is the most likely cause of this problem?

The proxy server is filtering access to websites

You just bought a new computer. The system uses UEFI firmware and comes with windows 10 preinstalled. You recently accessed the manufacturer's support website and saw that a UEFI firmware update has been released. You download the update. However, when you try to install the update, an error message is displayed that indicates the digital signature on the update file is invalid. Which of the following is most likely caused this to happen?

The update file has been tampered with

You just bought a new computer. This system uses UEFI firmware and comes with Windows 10 preinstalled. You recently accessed the manufacturer's support website and saw that a UEFI firmware update has been released. You download the update. However, when you try to install the update, an error message is displayed that indicates the digital signature on the update file is invalid. Which of the following is MOST likely caused this to happen?

The update file has been tampered with.

Which of the following is true of the way many large digital media vendors are using Digital Rights Management technology? (Select TWO.)

They are moving away from DRM because of several key shortcomings in the technology. They are adopting alternatives to DRM such as encouraging customers to not illegally share digital files.

Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access? (Select THREE.)

This PC File Explorer Network

You are an IT technician for your company. One of your employees calls and tells you that every time they turn their computer on, they hear three beeps. Which of the following BEST describes an accurate reply to this employee?

Three repeated beeps may mean different things. First, we need to check the motherboard documentation.

You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which Windows setting would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards?

Time & Language

Why should backup media be stored offsite?

To prevent the same disaster from affecting both the system and its associated backup media.

Your Windows workstation has an IP address of 192.168.1.25 assigned with a subnet mask of 255.255.255.0. It also has a DNS server address of 137.65.1.10 and a default gateway router address of 192.168.1.254.

To the default gateway router.

When a presenter at a conference connects a laptop to a projector, the projector mirrors the laptop's display. The presenter would like it to extend the laptop's desktop instead. Which of the following options is the quickest way to make the change?

Toggle the dual display function key on the laptop

A user hibernates a laptop after giving a video presentation. Now, when it resumes, the display flickers for a moment, but remains blank. A technician suspects a bad graphics processing unit (GPU). Which of the following troubleshooting steps should be completed? (Select TWO).

Toggle the dual display function key. Connect an external display device.

A user calls the help desk stating that the touchpad on a laptop does not work. Which of the following actions would BEST help the technician diagnose the problem?

Toggle the touchpad function key.

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations are you MOST likely to make to this organization to increase their security? (Select TWO).

Train the receptionist to keep her iPad in a locked drawer when not in use. Disable the network jacks in the reception area.

What is a program that appears to be a legitimate application, utility, game, or screensaver, but performs malicious activities surreptitiously?

Trojan

Applications for mobile devices fall into two categories. Some have been reviewed, approved, and signed with a certificate by the app service, and some have not. Which category do apps fall into if they have been signed with a certificate?

Trusted

Which of the following components is a special hardware chip included on the computer motherboard that contains software in firmware that generates and stores cryptographic keys?

Trusted Platform Module (TPM)

Which security measure can be used to generate and store cryptographic keys?

Trusted Platform Module (TPM)

Which of the following components is a special hardware chip included on the computer motherboard that contains software in firmware that generates and stores cryptographic keys?

Trusted platform module (TPM)

You manage two computers with the following user accounts: • Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set; the Admin account does. • Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not. You are working from Wrk2 and would like to access a shared folder on Wrk1. Which of the following credentials would BEST allow you to access the shared folder?

Type 'Admin' for the username and specify the password.

You manage two computers with the following user accounts: * Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set; the Admin account does. * Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not You are working from Wrk2 and would like to access a shared folder on Wrk1. Which of the following credentials would best allow you to access the shared folder?

Type 'admin' for the username and specify the password

You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 10 PC to the device. How can you connect the device to the PC? (Select TWO. Each option is a complete solution.)

USB cable Wi-fi wireless connection

Joe, a user, is walking through a shopping mall. His phone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of these messages?

Unintended WiFi connections

While trying to log on, a user accidentally typed the wrong password three times, and now the system is locked because he entered too many incorrect passwords. He still remembers his password, but he just typed it wrong. He needs access as quickly as possible. Which of the following would allow the user to log on?

Unlock the account

While trying to log on, a user accidentally typed the wrong password three times, and now the system is locked because he entered too many incorrect passwords. He still remembers his password, but he just typed it wrong. He needs access as quickly as possible. Which of the following would allow the user to log on?

Unlock the account

After replacing a laptop touchpad, a technician finds that the touchpad does not cursor. However, a USB mouse does. Before opening the laptop case to recheck the connection, which of the following should the technician perform?

Unplug the USB mouse and re-check touchpad movements

Applications for mobile devices fall into two categories. Some have been reviewed, approved, and signed with a certificate by the app service, and some have not. What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

Untrusted

While browsing the internet, a pop-up browser window is displayed warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the next BEST actions to take? (Select TWO).

Update the virus definitions for your locally-installed anti-malware software. Run a full system scan using the anti-malware software installed on your system.

Your windows system has an extra disk that has three primary partitions and an extended partition with two logical drives. All volumes are formatted with FAT32

Upgrade the disk to a dynamic disk

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? (Select two.)

Use Task Manager to monitor memory utilization. Use Resource Monitor to monitor memory utilization.

A user normally connects a laptop to a company's network using the laptop's inte wireless NIC. The laptop does not have an Ethernet port. The wireless network h and the replacement part will take two days to arrive. Which of the following solutions will connect the laptop to the company's wired network?

Use a USB-to-RJ45 dongle and connect to a wall jack with an ethernet cable

You have 5 sales persons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of those these laptops. Which of the following is the best protection to implement to address your concerns?

Use cable locks to chain the laptops to the desks

You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?

Use cable locks to chain the laptops to the desks.

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Use data wiping software to clear the hard drives

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps must be completed prior to getting rid of the computers?

Use data wiping software to clear the hard drives

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following is the FASTEST way to transfer a good file to the computer?

Use the C$ administrative share to copy the file.

How can you keep a Windows 10 system from automatically restarting after a critical system error occurs?

Use the Disable automatic restart after failure option on the Advanced Startup Options menu.

You have just installed a wireless access point (WAP) for your organization's network. You know that the radio signals used by the WAP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. Which of the following steps will BEST protect the wireless network? (Select TWO. Each option is a complete solution.)

Use the WAP's configuration utility to reduce the radio signal strength. Configure the WAP to filter out unauthorized MAC addresses.

A user opens a help desk ticket to replace a laptop keyboard. The user reports th cursor randomly moves when typing using the laptop keyboard, causing the user frequent typing corrections. The problem does not occur when the laptop is attac docking station and an external keyboard is used. You want to find a more affordable solution than replacing the keyboard. Which following actions would mitigate the problem?

Use the special function key to disable the touchpad when the laptop keyboard is used.

Which Windows component prompts the user for credentials or permission to protect against unauthorized activities, such as an unintended software installation?

User Account Control (UAC)

What is the best countermeasure against social engineering?

User awareness training

Which of the following is the most common form of authentication?

Username and password

Which of the following statements about an SSL VPN are true? (Select TWO).

Uses port 443. Encrypts the entire communication session.

A technician is tasked with configuring a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available. Which of the following should the technician configure?

VPN

While on a business trip, an employee accesses the company's internal network and transfer files using an encrypted connection. Which of the following digital security methods is being used?

VPN

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement?

VPN Concentrator

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be best to implement?

VPN connector

You have a Windows system with two SATA hard drives, one used for the operating system and the other used for storing data. You have traced recent problems to a fault in the system motherboard. You replaced the motherboard and reconnected all the hardware. When you started the computer, the system showed the startup information screen, but then returned an error that an operating system could not be found. What should you do? (Select TWO. Each option is part of the complete solution.)

Verify the operating system SATA drive is configured as the boot drive in the UEFI configuration. Change the boot order in the UEFI configuration.

What is the purpose of the Services snap-in?

View and manage software programs running in the background.

What is the purpose of the dxdiag tool?

View information related to DirectX operation.

Recently, a Windows 10 update was automatically downloaded and installed on your Windows 10 system. After you install the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again. Click the option you would use in the Settings app to do this.

View your update history

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

Virus

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

Which of the following is the most secure security protocol for wireless networks?

WPA2

Which of the following provides the BEST security for wireless networks?

WPA2

Which of the following provides the best security for wireless networks?

WPA2

The human resources department wants to give gifts away at the company's summer party. They would like to have an assortment of fitness tracker wristbands, smartwatches, smart glasses, and virtual reality headsets. They have been trying to locate these on the internet, but have been unsuccessful. Which of the following types of mobile devices should you tell them to search for?

Wearable devices

You are configuring a firewall to allow access to a server hosted in the demilitarized zone of your network. You open IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server?

Web server and email server

From your laptop, you have been working on a large project that has required you to open a lot of items (programs, files, etc.). It is time to leave the office and make the twohour journey home. You will be working on this project a bit more when you arrive at home. Your computer's battery is failing and only has a very short life span (about one hour) before your computer loses power. When you arrive home and open the lid of your laptop, nothing happens. After plugging in your computer and powering it on, you find that all of your programs and files have been closed. To troubleshoot this, you open Control Panel and navigate to the settings that control what your computer will do when the laptop lid is closed. Which of the following power settings MUST you choose to prevent the same problem in the future?

When I close the lid: Hibernate

Closed source and third most popular mobile device operating system.

Windows

Device manufacturers include Microsoft, Samsung, and HTC.

Windows

You need to protect the user data on a Windows 10 system. Which tools could you use to do this?

Windows 7 (Backup and Restore) file history

Which of the following is a fact you need to be aware of when implementing GPT partitioning?

Windows can only boot from a GPT partition on UEFI-based computers running 64-bit versions of windows.

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?

Windows updates

Which of the following forms of networking is highly susceptible to eavesdropping (Data interception) and must be secured accordingly?

Wireless

You have a small network with three subnets, as shown in the diagram below. IP addresses for each router interface are also indicated. You need to connect Wrk 1 to Subnet A

Wrk1 IP address 192.168.111.62 Wrk5 IP address 10.155.64.97

You currently use the Exchange email client on your desktop PC. You use it to connect to an email server provided by a service provider using the IMAP and SMTP protocols. You recently purchased an iPad, and you want to configure its Mail app to connect to your email server. Which of the following BEST describes whether this task can be accomplished?

You can configure the Mail app on an iPad to connect to an email server using the IMAP and SMTP protocols.

Your laptop has an ExpressCard /54 slot. Which of the following is true? (select two)

You can use an ExpressCard /34 card or an ExpressCard /54 in the laptop. Compatible ExpressCards for the laptop include cards that are rectangular shaped

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select TWO.)

You risk losing your job. You expose your company to litigation by violating the software license agreement.

You are responsible for disposing of several old workstations formerly used by accountant s in your organization's finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the hard drives is erased. TO do this, you use the windows XP installation CDs that came with these systems to delete all partitions from the hard drives. Which of the following best describes state of these systems?

You should use disk wiping software to fully erase the drives.

You are responsible for disposing of several old workstations formerly used by accountants in your organization's Finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the hard drives is erased. To do this, you use the Windows XP Installation CDs that came with these systems to delete all partitions from the hard drives. Which of the following BEST describes state of these systems?

You should use disk wiping software to fully erase the drives.

In which of the following situations should you install a firewall?

You want to restrict internet users from accessing private data on your network

In which of the following situations should you install a firewall?

You want to restrict internet users from accessing private data on your network.

While using a Windows 10 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to a point in time before the malware infection occurred. Given this information, which of the following are true? (Select TWO).

Your user files were not affected when the system was reverted to the restore point. You must reinstall any applications that were installed after the restore point was taken.

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?

Zombie/botnet

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?

Zombie/botnet

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format?

\\Home1\Pictures

A technician is tasked with installing a network-enabled camera that runs on power that is supplied through its network connection. The network device that connects to the camera does not have the capability to supply this power. There is a power outlet close to the camera. Which of the following devices can be used to supply power?

a power over ethernet injector

Which of the following is an example of a strong password?

a8bT11$yi

Which of the following is an example of strong password?

a8bT11$yi

Defines an employee's rights to use company property.

acceptable use policy

Sets expectations for user privacy when using company resources.

acceptable use policy

You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?

administrators

While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches you have performed. What is this an example of?

adware

You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

apt-get install httpd

You are working at the command line and want to add the Readonly attribute to a file and remove the Hidden attribute. Which command would you use?

attrib +r h

Which of the following are valid IPv6 addresses? (select two.)

bab3:b834:45a3:0000:0000:762e:0270:5554 & 35BC:FA77:4898:DAFC:200C:FBBC:A007:8973

What do biometrics use to authenticate identity?

biological attributes

Which type of authentication would require a user fingerprint or facial recognition for a user to get past the screen lock on a mobile device and gain access to the device?

biometric authentification

You have just received a call from one of your customers. He informs you that after turning his computer on, he received the following error: Error loading operating system BOOTMGR is missing Press Ctrl+Alt+Del to restart Every time he restarts his computer, the same error is shown. Which of the following tools is BEST for fixing this issue?

bootrec

You are troubleshooting a Windows 10 system that won't boot. The system appears to initialize just fine and post completes correctly. However, Windows doesn't load, and an error message is displayed on the screen, indicating the operating system couldn't be found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you do the following: 1. Boot the system from the Windows 10 installation DVD. 2. Access the Recovery Environment. 3. Open a Command window. Enter the command you can run at the command prompt to address this issue.

bootrec /fixmbr

Which command would you use to change the current directory to the immediate parent directory?

cd ..

You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type of document is this?

chain of custody

Identifies a set of rules or standards that define personal behaviors.

code of ethics

You need to configure a Windows workstation with the IP address of the proxy server for your network. Click the tab in the Internet Properties window that you would use to do this.

connections

Your user account is ADuser. You want to log in to the corpwest domain

corpwest\ADuser

Which Windows command displays a list of files and subdirectories in a directory?

dir

Prevents the policy from being enforced

disabled

A technician wants to destroy the data on a hard drive and repurpose it as a spare drive. Which of the following data destruction methods allow the reuse of the hard drive?

drive wipe

Which of the following are examples of social engineering? (Select TWO).

dumpster diving shoulder surfing

A company has chosen a UTM instead of an IDS or IPS appliance to protect their network. Which of the following UTM security features is not available with an IDS or IPS?

email and antispam filtering

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?

email filtering

Causes the policy to be enforced

enabled

Which type of biometric authentication uses the ridges of your skin?

fingerprint

Which of the following security measures is a form of biometrics?

fingerprint scanner

A user can't make an RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection?

firewall

Which of the following is the BEST device to deploy to protect your private network from a public, untrusted network?`

firewall

For some time now, you have been using an application on your Windows 10 computer at home and while in the office. This application communicates with the internet. Today, your team lead decided to have a special team meeting at a local hotel. During this meeting, you obtained access to the internet using the hotel's network, but when you tried to run your application, it could not communicate with the internet. Which of the following Control Panel settings is MOST likely causing this behavior?

firewall settings

Collection of related domain trees

forest

You have a hard disk that has a single primary partition and has been assigned D: as the drive letter. Which tool would you use to configure the drive to use the FAT32 file system?

format

You have installed a new hard disk drive in your computer, configured the disk in the BIOS, and partitioned the disk. You try to access the hard disk drive in windows explorer, but receive an error message.

format

You are an IT administrator troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed. Which of the following is the BEST command line tool to run to accomplish this task?

gpupdate

The TCP/IP session state between two computers on a network is being manipulated by an attacker such that she is able to insert tampered packets into the communication stream. Which of the following BEST describes the type of attack which as occurred in this scenario?

hijacking

Closed source and second most popular mobile device operating system.

iOS

Devices solely designed and developed by Apple.

iOS

Which are examples of a strong password? (Select TWO).

il0ve2EatIceCr3am TuxP3nguinsRn0v3l

You have recently had an issue where a user's Windows computer was infected with a virus. After removing the virus from the computer, which of the following is the NEXT step you should take?

install all OS updates

An employee working from home accesses the company network using a VPN connection. When connecting, the employee is prompted for a PIN that changes at predetermined intervals. Which of the following will the employee MOST likely use to obtain the PIN?

key fob

What are the most common means of virus distribution? (Select TWO).

malicious websites email

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggy-backing to gain access to your building. The individual in question did not have a security badge. Which of the following would you MOST likely implement to keep this from happening in the future?

mantraps

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following BEST describes the type of attack that just occurred?

masquerading

While troubleshooting a Windows computer, you open a command prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder?

md

Which commands can you use to create a new directory? (Select TWO).

mkdir md

What is the least secure place to locate an omnidirectional access point when creating a wireless network?

near a window

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?

net use

What command lets you see a list of valid command parameters for the net use command?

net use /?

Does not change the current setting for the policy

not configured

You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. Which of the following is the BEST solution to your problem?

open the firewall port for the remote protocol

Provides a high-level overview of the organization's security program.

organizational security policy

Identifies the requirements for credentials used to authenticate to company-owned systems.

password policy

Specifies that user accounts should be locked after a certain number of failed login attempts.

password policy

A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small African nation. The user was offered a 25 percent share of this account if she would help the sender transfer it to a bank in the United States. The user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used the information to drain her bank account. What type of attack occurred?

phishing

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

phishing

Which command would you enter at the command prompt to list all third party drivers on a windows system?

pnputil -e

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service?

proxy server

Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM or dpkg for package management?

ps -e

You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the next BEST step that should be taken?

quarantine vivian's computer

Which command lets you delete subdirectories in addition to files in the current directory?

rd /s

Which of the following is the process of fixing problems detected by anti-virus software so that the computer is restored to its original state?

remediation

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes?

robocopy

Some software on Rachel's computer is telling her that her computer is at risk and that she needs to purchase an upgrade for the software before the risk can be removed. Confused, Rachel calls you (the IT specialist) for advice. After meeting with Rachel, you discover that the pop-up warnings only began after she installed a plug-in for her internet browser. Which of the following is the MOST likely cause of these warning messages?

rogue antivirus

You have a computer that runs Windows 10. Where would you go to verify that the system has recognized the anti-malware software installed on the system?

security and maintenance

As you are working on your Windows 10 computer during a fierce thunder storm, lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools is MOST likely to rectify this issue?

sfc

You want to scan the integrity of all protected system files on your Windows 10 system, but not repair them. Which command should you use?

sfc /verifyonly

While organizing a storage cabinet, a technician discovers a box of hard drives that are incompatible with current hardware and may contain sensitive data. Which of the following is the BEST method for disposing of these drives?

shredding

You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to BEST prevent extracting data from the discs?

shredding

You need to find out if there are any device drivers on your system

sigverif.exe

Which of the following is not a form of biometrics?

smart card

Which of the following security technologies stores identification information in a magnetic strip, radio frequency transmitter, or hardware contact to authorize access to a computer?

smart card

Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?

spamming

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet. Which of the following BEST describes the type of attack which as occurred in this scenario?

spoofing

An intruder waits near an organization's secured entrance until an employee approaches the entrance and unlocks it with a security badge. The intruder falls in line behind the employee, who assumes the intruder is another employee and holds the door open for her. Which of the following BEST describes the type of attack that just occurred?

tailgating

Group of related domains

tree

What is a program that appears to be a legitimate application, utility, game, or screensaver, but performs malicious activities surreptitiously?

trojan

Which of the following is the most common form of authentication?

username and password

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of?

users

Which of the following is another name for the paging file?

virtual memory

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

virus

While on a business trip, an employee accesses the company's internal network and transfer files using an encrypted connection. Which of the following digital security methods is being used?

vpn

Which of the following forms of networking is highly susceptible to eavesdropping (data interception) and must be secured accordingly?

wireless

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

xcopy /e

You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

yum install httpd

You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on this system?

yum list available

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed?

yum list installed httpd


Kaugnay na mga set ng pag-aaral

CH 13 EXERCISES Q: How would each of the following items be reported on the balance sheet?

View Set

Nursing Fundamental - Chapter 28 Safety

View Set

SCM: Chapter 12 - Supply Chain Management in the Service Industry

View Set

Ch. 27 - Genitourinary Tract Infections and Sexually Transmitted Infections

View Set

Comemrcial General Liability Insurance, Part I

View Set

Fluid and electrolytes final review -scarlett

View Set