Comptia 2
If the system files were renamed or the files disappeared, an error
"file not found"
COPE
(company-owned/personally enabled) means that the company provides the users with a smartphone primarily for work use, but basic functions such as voice calls, messaging, and personal applications are allowed, with some controls on usage and flexibility.
With CYOD
, the user can choose which device they wish to use from a small selection of devices approved by the company.
What port is RDP
3389
what port is DHCP
67
Security Groups
An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives?
DOS
An increased amount of web traffic to an e-commerce server is observed by a network administrator but without increasing the number of financial transactions. Which kind of attack might the company be experiencing?
steps of the malware removal process
Identify and research malware symptoms. ... Quarantine the infected systems. ... Disable System Restore (in Windows). ... Remediate the infected systems. ... Schedule scans and run updates. ... Enable System Restore and create a restore point (in Windows). ... Educate the end user.
Mac Filtering
Dion Training has an open wireless network called "InstructorDemos" for its instructors to use during class, but they do not want any students connecting to this wireless network. The instructors need the "InstructorDemos" network to remain open since some of their IoT devices used during course demonstrations do not support encryption. Based on the requirements provided, which of the following configuration settings should you use to satisfy the instructor's requirements and prevent students from using the "InstructorDemos" network?
Phising
Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to "click here" to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack?
You are troubleshooting a computer that plays a loud chime noise every day at 3 pm. Which of the following tools should you use to troubleshoot this workstation?
Task scheduler (Correct)
If you have an APIPA IP it means you cannot reach
The DHCP server
Radius
The corporate network uses a centralized server to manage credentials for all of its network devices. What type of server is MOST likely being used in this configuration?
53
The server administrators have asked you to open the default port on the firewall for their new DNS server. Which of the following ports should you set as ALLOW in the ACL?
Defragment the hard drive
Whenever you reboot your domain controller, you notice it takes a very long time to boot up. As the server is booting, you hear noises that sound like a steady series of clicks coming from the hard drive. Which of the following is the BEST action to help speed up the boot time of the server?
Server Rack and UPS
Which TWO of the following devices should have a grounding wire attached to them when installed per the manufacturer's recommendations?
iwconfig
Which command would be used to display the IP address and subnet mask for the wireless network connection on a macOS or Linux system?
format /fs:NTSF
Which command-line tool is used on a Windows system to erase all the data on a hard disk and ensure it is ready to accept new Windows files?
nfs
Which file system type is used to mount remote storage devices on a Linux system?
Shutdown +11
Which of the following Linux command-line options would shutdown a Linux server in 11 minutes from now?
spotlight
Which of the following MacOS features allows the user to search all of the hard drives, network shares, and files for a keyword or phrase?
Dxdiag
Which of the following Windows 10 system utilities would be used to test the functionality of the DirectX subsystem for video and sound-related problems? It is a diagnostic tool used to test video-related or sound-related hardware problems.
Hibernate mode
Which of the following allows users to save their current session to disk and before powering down the computer?
dd
Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?
rm -rf /
Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system's filesystem?
Visual (Vi)
Which of the following commands is used on a Linux system to edit a text file on a server?
PS
Which of the following commands is used on a Linux system to list the system's currently running processes?
CRT Monitor
Which of the following components presents the largest risk of electrical shock to a technician?
Swap Partition
Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?
character
Which of the following data types would be used to store the user's middle initial?
Boolean
Which of the following data types would be used to store the value of TRUE?
.py
Which of the following file types are commonly used to create applications that can be run on Linux, macOS, and Windows?
Environmental Variables
Which of the following is used to communicate data and preferences to child processes within a script or batch file?
VNC
Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?
Notepad
Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?
Spear phishing
Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?
Incremental
Which of the following types of backup requires the LEAST time to complete a backup?
Image instillation
Which of the following types of installations would require the use of an XML text file containing the instructions that the Windows Setup program would need to complete the installation?mag
firmware updates
Which of the following types of software cannot be updated via the Windows Update program? The Windows Update program cannot download and install firmware updates because the firmware must be updated before the Windows operating system begins running during the boot process.
WEP
Which of the following types of wireless encryption uses a 40-bit encryption key and a 24-bit initialization?
Proximity Cards
Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?
Windows 10
Which version of Windows supports Virtual Desktops?
Purpose
You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe why the change will be installed during this maintenance window?
Lift with your legs and not your back
You need to move a new desktop to another desk. Which of the following actions should you take?
BSOD
Your Windows 10 machine has just crashed. Where should you look to identify the cause of the system crash and how to fix it? A stop error, commonly called the blue screen of death
Bootrec
Your Windows 10 workstation is attempting to boot up when it receives the following error, "BOOTMGR is missing; Press Ctrl+Alt+Del to restart." To fix this, you insert your Windows installation disc and reboot into the Command Prompt under the System Recovery Options. Which of the following commands should you enter in the command prompt?
Robocopy
Your boss has asked you to write a script that will copy all of the files from one hard drive to another each evening. This script should mirror the directories from one drive to the other and ensure they are synchronized each evening. Which command-line tool should you use in your script?
Chain of custody (CoC)
in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. The chain of custody must be maintained from when you arrived at the laptop until you turn it over to law enforcement officials.
MDM
is a class of management software designed to apply security policies to the use of mobile devices in the enterprise.
TracerT
is a command-line utility used to trace an IP packet's path as it moves from its source to its destination. diagnostic utility determines the route to a destination by sending Internet Control Message Protocol (ICMP)
Low-level formatting
is a hard disk operation that should make recovering data from your storage devices impossible once the operation is complete.
hosts.ini
is a local file that allows a user to specify specific domain names to map to particular addresses.
BYOD
is a security framework used to facilitate the use of personally-owned devices to access corporate networks and data.
Task Manager
is an advanced Windows tool that provides several tabs that allow users to monitor the applications, processes, services, and CPU utilization on a computer.
"View hidden files"
is located under the folder options utility
Boot Camp
is used to allow dual booting on a Macintosh computer. It allows the user to boot into either macOS (OS X) or Windows as the computer is rebooted.
PWD
is used to display the current working directory to the screen. The pwd command is the short name for "print working directory" on a Unix, Linux, or Mac operating system
#!/bin/bash
it is a bash script for a Linux, macOS (OS X), or Unix system.
A branch is
used to control the flow within a computer program or script, usually based on some logic condition. Often, these are implemented with IF THEN ELSE statements.
How would you represent rwxr-xr-- in octal notation?
you can convert letter permissions to octal by giving 4 for each R, 2 for each W, and 1 for each X. So, RWX is 7, R-X is 5, and R-- is 4. 754
For the Windows 10 (64-bit) operating system,
—either Windows 7 SP1 or Windows 8.1 Update. ... Processor: 1 gigahertz (GHz) or faster processor or SoC. RAM: 2 GB for 64-bit. Hard disk space: 20 GB for 64-bit OS.
The -f option
means that even read-only files will be removed without asking the user. The use of / indicates that the remove command should begin at the root directory (/) and recursively force all files and folders to be deleted under the root. This would delete everything on the system.
NTFS
modern day file system for windows
NSlookup
network administration command-line tool for querying the Domain Name System to obtain domain name or IP address mapping, or other DNS
GPT
newer way to partition disks that allows for OVER 2TB limit
Standard formatting
of the drives could allow the data to be restored and make the data vulnerable to exposure.
FAT32
older file system pre-NTFS
Which type of antivirus scan provides the best protection for a typical home user?
on access scans
The *.* would
only begin deleting from the current working directory and then delete all files and folders further down the directory structure, not the entire file system.
"set type=ns" tells nslookup
only reports information on name servers. If you used "set type=mx" instead, you would receive information only about mail exchange servers.
MBR extended
over 4 and to be used when primary cannot be
PCI
payment card industry
pwd
print working directory
sfc system file checker
provides a manual interface for verifying system files and restoring them from the cache if they are corrupt or damaged.
zero-day vulnerability
refers to a hole in software that is unknown to the vendor. Hackers then exploit this security hole before the vendor becomes aware and hurries to fix it. firewall is properly configured and the anti-malware solution is up-to-date,
ping
send a message from one computer to another to check whether it is reachable and active
Data loss prevention (DLP)
software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in-use, in-motion, and at-rest. This can be configured to detect and alert on future occurrences of this issue.
-r option means
that the command will recursively delete the folder and its subfolders.
For the Windows 10 (32-bit) operating system,
the minimum requirements are a 1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space.
Brownouts, sags and blackouts
uninterruptable power supply
traceroute
used for linux and unix- can find hops (paths) between desitnations
chown command
used on Unix-like systems to change the owner of file system files, directories
apt-get
used on linux systems to perform instillations of new software packages
schedule scans and run updates
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have finished remediating the infected system. Which of the following steps should you NEXT?
netstat
A TCP/IP utility that shows the status of each active connection.
Patch Management
A company has had several virus infections over the past few months. The cause was vulnerabilities in the software applications in use. What should an administrator implement to prevent future outbreaks?
Install an anti-virus or anti-malware solution that uses heuristic
A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?
.sh
A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?
.bat
A coworker is creating a file containing a script. You look over their shoulder and see "net use s:\\fileserver\videos" in the file. Based on this, what type of file extension should this script use?
Dictionary Attack
A cybersecurity analyst is applying for a new job with a penetration testing firm. He received the job application as a secured Adobe PDF file, but unfortunately, the firm locked the file with a password so the potential employee cannot fill in the application. Instead of asking for an unlocked copy of the document, the analyst decides to write a script in Python to attempt to unlock the PDF file by using passwords from a list of commonly used passwords until he can find the correct password or attempts every password in his list. Based on this description, what kind of cryptographic attack did the analyst perform?
Clear the browsers cookies and history, enable the pop-up blocker and scan the system for malware
A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?
ipconfig/release| ipconfig / renew
A network technician determines that two dynamically-assigned workstations have duplicate IP addresses. What command should the technician use to correct this issue?
Loop
A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?
Disabling Autorun
A small business network was recently infected by a piece of malware from a USB drive that copied sensitive data from a computer, infected the system, and then spread across the network by infecting other systems. Which of the following actions could have prevented this type of attack from occurring?
The smartphone is infected with malware that is using a lot of processing power
A smartphone user notices that their phone gets very hot, and their battery is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem?
Disable the users account
A system administrator has noticed that an employee's account has been attempting to login to multiple workstations and servers across the network. This employee does not have access to these systems, and the login attempts are unsuccessful. Which of the following actions should the administrator do to this employee's account in Active Directory?
WAP placement
A technician is troubleshooting a newly-installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST during troubleshooting?
Install a new battery back up
A user cannot open some files on a file server and contacts the help desk for support. The help desk technician troubleshoots the server and notices that all of the server's data backups are operational, but large portions of time are missing within the event log. The technician remembers that there have been several bad thunderstorms recently during those missing time periods. What might the technician do to prevent these server issues in the future?
You need to use MacOS to open DMG files
A user contacts the help desk and complains they are getting an error when they attempt to open a 4 GB .DMG file on their Windows 10 workstation. Which of the following should you tell them?
set up
A user contacts the service desk after they just finished attempted to upgrade their laptop to Windows 10. The upgrade failed, and the user asks you to explain why. Which of the following log files should you review to determine the cause of the upgrade failure? Security log
Application log
A user contacts the service desk and states that Microsoft Excel crashed while they were in the middle of updating their spreadsheet. Which of the following log files should you review to determine the cause of the crash?
Rebuild your windows profile
A user is complaining that their profile is taking too long to load on their Windows 10 system. Which of the following is the BEST solution to this problem?
Remove any proxy servers configured in their web browser
A user is complaining that when they attempt to access Google's homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT?
Clear the application cache
A user is having an issue with a specific application on their Android devices. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue?
Ask another Tier 2 technician to take the call
A user's computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do?
Verify the boot order in BIOS/UEFI
A user's computer was running out of storage space, so they decided to install a new second 1 TB hard disk drive (HDD) into their Windows 10 computer. Whenever they attempt to boot up the computer, an error of "No Operating System Found" is displayed on their screen. You unplugged the new 1 TB HDD, and then the computer boots up without any errors. You have just reconnected the 1 TB HDD. What step should you attempt NEXT to fix this issue?
Increase the page file size
A user's workstation is running slowly and cannot open some larger program files. The user complains that they often get a warning that states memory is running low on their Windows 10 workstation. Which of the following should you configure until more memory can be installed to help alleviate this problem?
Faulty Ambient light sensor
An Android user recently cracked their screen and had it replaced. If they are in a dark room, the phone works fine. If the user enters a room with normal lights on, then the phone's display is dim and hard to read. What is MOST likely the problem?
RW-R--R
What is the symbolic representation of the octal numeric permission 644?
r-x--xrwx
What permissions would be represented by the octal 517?
looping
What type of structure is "For Next" in scripting?
RADIUS
Captive portals usually rely on 802.1x, and 802.1x uses for authentication
His email account has two factor authentication enabled
Chris just downloaded a new third-party email client for his smartphone. When Chris attempts to log in to his email with his username and password, the email client generates an error messaging stating that "Invalid credentials" were entered. Chris assumes he must have forgotten his password, so he resets his email username and password and then reenters them into the email client. Again, Chris receives an "Invalid credentials" error. What is MOST likely causing the "Invalid credentials" error regarding Chris's email client?
xcopy
Command in the command-line interface used to copy multiple directories at once, which the copy command could not do.
Signal Strength or power level
Dion Training has an open wireless network so that their students can connect to the network during class without logging in. The Dion Training security team is worried that the customers from the coffee shop next door may be connecting to the wireless network without permission. If Dion Training wants to keep the wireless network open for students but prevents the coffee shop's customers from using it, which of the following should be changed or modified? Default SSID
Configure the ability to perform remote wipe Enable full device encryption
Dion Training is worried about the security of the data on their corporate smartphones if lost or stolen. The Chief Security Officer has instructed that the devices be configured so that unauthorized users cannot access the data. Which TWO of the following settings would provide the BEST security and protection for the corporate smartphones' data? Disable the installation of application from untrusted sources
UDF (Universal Disk Format) file system
File system used with DVD
GDPR
General Data Protection Regulation
GPT
Gina just installed a 4 TB HDD into her Windows 10 computer and wants to assign the drive letter "M" to store her media files. Which type of partition should Gina use if she wants to use all of the drives for a single partition?
asked open ended questions to properly identify the issue by narrowing down the possible symptoms
Janice called the help desk to report that her computer will not boot up. The technician begins troubleshooting the issue, but after 20 minutes, the computer is still not booting up. Janice is getting frustrated with the technician, and she tells the technician that she feels that they are wasting her time since the issue isn't resolved yet. How should the technician respond to Janice's frustration? The technician should "accidentally" hang up the call so that Janice gets a different technician when she calls the help desk again
Amount of hard drive space
Judith is installing Windows 10 (64-bit) on a virtual machine on her Mac OS X laptop. The installation is continually failing and producing an error. You look at the virtual machine's specifications and see that Judith has configured a VM with a dual-core 1 GHz processor, 2 GBs of memory, a 15 GB hard drive, and a 1024x768 screen resolution. What would you recommend increasing to fix the installation issues being experienced?
File permission change
Madison is trying to open up her anti-malware solution to run a full system scan because she suspects her computer has become infected. When she attempts to run the tool, an error of "Access denied" is received. What security issue is MOST likely occurring?
verify the smartphone is connected to the correct SSID
Nicole's smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is at home. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue?
Reboot into safe mode and see if the service starts
One of your Windows services is failing to start when you boot up your laptop. You have checked the service in the Windows Services tool and verified it is set to Automatic. What should you attempt to do NEXT to get the service to startup?
MBR primary
Only up to 4 partitions
PII
Personally Identifiable Information. Information about individuals that can be used to trace a person's identity, such as a full name, birthdate, biometric data, and identifying numbers such as a Social Security number (SSN). Organizations have an obligation to protect PII and often identify procedures for handling and retaining PII in data policies.
Check the status of the print server queue
Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue?
PHI
Protected Health Information
A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, and the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?
Quarantine the machine and report it as infected to your companies cybersecurity department for investigation
2GB
What is the minimum amount of RAM needed to install Windows 8.1 on a 64-bit system?
MBR
Way to partition disk with a MAX of 2TB
Backout plan
You are a member of a project team contracted to install twenty new wireless access points (WAPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is still finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the SOW and change request before its approval?
ext4
You are currently building a Linux server. Which of the following file system formats should you use for the server?
Remove any jewelry
You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST?
Server lock
You are renting space in another company's datacenter. To protect your server from being physically accessed when you are not in the building, what device should you use?
Disk Management
You are troubleshooting a workstation and want to check if any S.M.A.R.T. errors are being reported. Which of the following tools should you use to troubleshoot this workstation?
netstat
You are troubleshooting an issue with a Windows desktop and need to display the machine's active TCP connections. Which of the following commands should you use? is used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols) on a Windows machine. This is a useful command when determining if any malware has been installed on the system and maybe maintaining a remote connection with a command and control server.
net use
You are trying to open your company's internal shared drive from your Windows 10 laptop but cannot reach it. You open your web browser and can connect to DionTraining.com without any issues. Which of the following commands should you use to determine if the internal shared drive is mapped to your computer properly?
Secure the scene
You are working as a forensic investigator for the police. The police have a search warrant to capture a suspect's workstation as evidence for an ongoing criminal investigation. As you enter the room with the policeman, he arrests the suspect and handcuffs him. What should you do FIRST?
Update the smartphone's OS
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. Which of the following should you do FIRST to attempt to solve this problem?
Reinstall the App
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. Which of the following should you do FIRST to attempt to solve this problem?
Smart card
You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented?
DISM & CHKDSK (physical)
You are working on a Windows 10 workstation that is operating much too slowly. Which TWO of the following commands should you use to speed up the system?
DMZ
You have been asked to configure your neighbor's SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server?
require authentication on wake-up
You have been asked to install a computer in a public workspace. Only an authorized user should use the computer. Which of the following security requirements should you implement to prevent unauthorized users from accessing the network with this computer?
The Disk Management tool
You have been asked to install a new hard drive in a Windows 10 system. You have already installed the hard drive and booted the system up. Which tool should you use to create the new partitions on the hard drive?
Resolution
You have just installed a second monitor for a salesperson's workstation. The user wants to clone the display so that both monitors show the exact same image. This will allow them to see one of the displays while their customer sees the other across their desk. When you connect the second monitor and clone the display, the second monitor displays text twice as large as the other monitor. Which of the following settings should you configure?
These requirements can be met by enabling BitLocker to encrypt the hard drive, enable a UEFI password to require a password to be entered before booting an operating system, and enabling a screen lock that turns on after 2 minutes of inactivity.
Your company failed a recent security audit. The IT Directory has issued a new policy dictating that all workstations must be locked when not in use for more than 2 minutes. A password must be entered before booting up the operating system, and that the hard drive is fully encrypted. You have been asked to configure the corporate workstations to enforce these new security measures. Which THREE of the following should you configure FIRST?
Connections
Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure?
Power surge
Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as?
Radius
Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?
.PS1
Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the file be in?
WPS was created to ease the setup and configuration of new wireless devices by allowing the router to automatically configure them after a short eight-digit PIN was entered. Unfortunately, WPS is vulnerable to a brute-force attack and is easily compromised. Therefore, WPS should be disabled on all wireless networks. If Bob could enter your apartment and press the WPS button, he could have configured his laptop to use your wireless network without your WPA2 password.
Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the WPA2 password?
install the latest security updates and patches to the server
Your supervisor has requested remote access to a particular server to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do before granting remote access to the server to your supervisor?
CDFS
a type of file system used to burn data onto CDs
A co-worker just sent you a macro-enabled Microsoft Word document. After you opened the file, your computer began to delete the photos stored in your c:\photos directory. What type of malware did you MOST likely receive?
a virus
Device manager
allows you to view and edit installed hardware properties. You can change device settings, update drivers, and resolve any known conflicts. If there is no audio being played, it could be an issue with the audio card or its drivers.
UTM unified threat management
appliance is one that enforces a variety of security-related measures, combining the work of a firewall, malware scanner, and intrusion detection/prevention.
Line conditioners
are used to protect an entire power circuit from brownouts and sags
The system log
contains information about service load failures, hardware conflicts, driver load failures, and other common issues.
anytime you cannot find a file it is most likely
folder options
Boolean variable
has only two possible values: true or false. It is common to use Booleans with control statements to determine the flow of a program.