comptia A+ core 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

An administrator automates the creation of folders during a Windows install process. Which command should they use in their script? dir rmdir cd md

To create a directory, use the MD command. For example, to create a directory called Data in the current directory, type MD Data.

What is ACL?

Access control list (ACL) allows each access control entry (ACE) to identify a subject and its permissions for the resource. A subject could be a human user, a computer, or a software service.

Which of the following uses the file-copy tool as Windows using "robocopy"? Installation applications Restating machines Remapping network devices Automated backups

Automated backups are a simple type of backup that can be performed using standard file-copy tools, or the script could call functions of a proper backup utility. The script can be set to run automatically using Windows Task Scheduler or via cron in Linux.

What uses a 4-way handshake to allow a station to associate with an access point, authenticate its credential, and exchange a key to use for data encryption? WPA2 WPA3 MFA TKIP

Wi-Fi protected access 2 (WPA2) was designed to fix critical vulnerabilities in the earlier WEP standard. WPA2 used the AES cipher deployed within the counter mode, blocking the changing message CCMP.

A helpdesk manager assesses older Windows 7 computers their company owns and tries to determine available upgrade paths. Which of the following can NOT be upgraded? Windows 7 Pro to Windows 10 Home Windows 7 Home Premium to Windows 10 Pro Windows 7 Home to Windows 10 Enterprise Windows 10 Home to Windows 10 Pro

Windows 7 Home to Windows 10 Enterprise. Users cannot upgrade from a Home to an Enterprise edition. If users consider an in-place upgrade, they must check that the current OS version is supported as an upgrade path to the intended version. Users can upgrade from Windows 7 Home Premium to Windows 10 Home or Pro. With Windows, users have to consider the edition when upgrading. Users can upgrade from Windows 10 Home to Windows 10 Pro. Downgrading the edition is supported in some circumstances (Windows 7 Professional to Windows 10 Home, for instance), but this only retains documents and other data, not apps and settings.

A helpdesk operator looks at build numbers for Windows as they plan upgrade timelines. The operator investigates the significance of the build numbers. Which of the following are the build numbers based on? (Select all that apply.) Windows version Year Time of year 32 bit vs 64 bit

Year Time of year The number 16 in build 1607 corresponds to the year (2016) of release. The 07 portion of build 1607 represents the month (07/July) of release. The current version of Windows 10 at the time of writing is 21H2, released in the second half of 2021. Versioning is not part of it. Windows 10 and Windows 11 represent the currently supported versions of the Windows client OS. The architecture is not part of it either. Each version and edition of Windows 10 was originally available as 32-bit (x86) or 64-bit (x64) software. A 32-bit CPU can only run the 32-bit editions. A 64-bit CPU can run either.

A software development team is unaware of a developing vulnerability in the system. What is this type of vulnerability? BYOD Zero-day attack Impersonation EOL

Zero-day attack

What does cp command do?

cp is used to create a copy of files either in the same or different directory with the same or different name.

An IT specialist removes malware from a computer system and then re-enables System Restore. Then a new restore point is created, all security-critical services and settings are validated, and the DNS configuration is verified. However, when the specialist runs a final antivirus scan, it detects malware. Considering all the steps taken, which would explain why there was still malware on the system? Port forwarding was detected. Cross-site scripting was detected. C&C network connection was detected. DNS spoofing was detected.

C&C network connection was detected. The IT specialist did not inspect the firewall configuration and therefore failed to find the changes that allowed a command and control (C&C) network to establish a connection.

What is AES

Advanced encryption standard (AES) is the standard encryption used by WPA2 and the strongest encryption standard to use by Wi-Fi.

What is NTFS?

An OS must be installed to a partition formatted using a compatible file system. For Windows, this means using the New Technology File System (NTFS).

A company's IT support specialist is ready to start recommissioning a system as part of the malware removal process. What is the last step before removing the computer from quarantine? Create a fresh restore point. Antivirus scan Re-enable System Restore. Verify DNS configuration.

Antivirus scan

A server administrator tests connectivity between two statically assigned servers in a forest with different domains. What should they check first in this case? Subnet mask IP addressing scheme DNS settings Gateway

DNS settings, Because the servers are on different domains, DNS should be checked first. The administrator probably uses the hostname instead of the fully qualified domain name (FQDN). If not specified, the host will likely try to resolve to the same domain.

A developer, working at Microsoft, is helping to develop the latest and greatest user interface for Windows. The developer is assigned to the team that works on the user interface's top level. What will the developer be working on? Desktop File Explorer Device Manager Shortcut icons

Desktop

A software company hires a new app developer. The corporate network denies access when the developer tries to connect their phone. Why would the network deny access from the developer's mobile phone? Developer mode High network traffic App spoofing Sluggish response time

Developer mode. The developer's phone is in developer mode. The company's Mobile Device Management (MDM) system blocks access to the network because developer mode can be used to install bootleg apps.

To ensure the authenticity and authorization of a mobile app, a service provider issues a certificate to valid developers. Developers can use this certificate to sign their app, and to establish trust. Which of the following attributes of an app would likely disqualify as trustworthy? Duplicates the function of IoT. Duplicates the function of MDM. Duplicates the function of a VPN. Duplicates the function of core OS apps.

Duplicates the function of core OS apps. A mobile app that duplicates the function of core operating system (OS) apps would be at risk of not receiving trusted app status.

What type of data breach can be associated with a specific person or use an anonymized or de-identified data set for analysis and research? Personal government-issued information Healthcare data Open-source license PII

Healthcare data, Healthcare data refers to medical and insurance records plus associated hospital and laboratory test results.

An .exe file is initiated on a Windows system and is running in silent mode. What technique is being performed in this instance? Introducing malware Installation of applications Initiating updates Gathering of information

Installation of applications

What is Keberos?

Kerberos allows a user account to authenticate to a domain controller (DC) over a trusted local cabled segment. Kerberos facilitates single sign-on (SSO).

An attacker can access a computer by executing a lunchtime attack. Which of the following principles were NOT followed that led to this attack? Secure PII and passwords. Secure/protect critical hardware. Log off when not using the computer. Disable guest accounts.

Log off when not using the computer.

An administrator reviews a series of instructions that the workstation follows every time a user logs on. What is this called? MDM Home folder Group policy Login script

Login script performs configuration or process activity when the user signs in. A login script can be defined via the user profile or assigned to an account via group policy.

An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option? MSRA RDP VPN RMM

MSRA

An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option? VPN RDP MSRA RMM

MSRA, Microsoft Remote Assistance (MSRA) allows a user to ask for help from a technician or co-worker by an invitation file protected by a passcode. The helper opens the invitation file to connect to the remote system.

The operating system update on a user's phone fails. The user verifies the phone's connection to a wall outlet that leads to the office Wi-Fi. Which of the following could be responsible for the update failure? RADIUS WLAN NFC Metered network

Metered network, Updates may be blocked if a device is connected to a metered network. Additionally, if the operating system update is incompatible with the device model, it may cause the update to fail.

What is Mobile device management(MDM)

Mobile device management (MDM) is a class of software designed to apply security policies to mobile devices in the enterprise.

What does ls command do?

ls lists the contents of a directory similar to dir at the Windows command prompt. Popular parameters include -l to display a detailed (long) list and -a to display all files, including hidden or system files.

An administrator in charge of user endpoint images wants to slipstream and use image deployment. Which boot method would best support this? Optical Network Internal hard drive Internet

Network, Network boot setup means connecting to a shared folder containing the installation files, which could be slipstreamed or use image deployment

What is this called when antivirus software scans a file before allowing or preventing it from opening? Smart scanning On-access scanning Quick scanning Scheduled scanning

On-access scanning

What is The Services console (services.msc)?

The Services console (services.msc) starts, stops, and pauses processes running in the background. In order to make configuration changes, regedit.exe in this group of options would be used.

What is taskschd.msc?

The Task Scheduler (taskschd.msc) runs software and scripts according to calendar or event triggers which would not help diagnose and troubleshoot internet connectivity issues.

What does the command cd do?

The cd command sets the focus to a different working directory. Users can change to any directory by entering the full path.

What is Chmod

The chmod command can be used to secure files and directories, using either symbolic or octal notation. Only the owner can change permissions.

What is Chown

The command chown allows the superuser to change the owner of a file or directory. Note that this right is reserved to superuser or sudoer.

What is MBR?

The master boot record (MBR) partition style stores a partition table in the first 512-byte sector on the disk.

what does mv command do?

The mv command is used to move files from one directory to another or rename a file.

What does RM command do

The rm command can be used to delete files. It can also be used with the -r option to delete directories.

A security administrator for Linux systems in their demilitarized zone wants to ensure only some administrators can perform certain commands. Which of the following is best used to lock down certain commands? chown sudo rm chmod

The sudo (superuser do) command allows any account listed in the /etc/sudoers file user to run specified commands with superuser privilege level.

what is a synthetic backup?

The synthetic full backup is not generated directly from the original data but instead assembled from other backup jobs.

Malware encyclopedias are a resource that antivirus vendors often make available to IT professionals. What is their value for IT practitioners? (Select all that apply.) They troubleshoot unknown malware based on the behavior of known malware. They are documentation of known malware. They provide a pricing model for remediation based on the malware found. They provide information about the type, symptoms, purpose, and removal of malware.

They provide information about the type, symptoms, purpose, and removal of malware. They are documentation of known malware.

What is lusrmgr.msc?

The Local Users and Groups (lusrmgr.msc) console provides an advanced interface for creating, modifying, disabling, and deleting user accounts.

What is the 3-2-1 backup rule?

3-2-1 backup rule is a best-practice maxim that users can apply to their backup procedures to verify that they are implementing a solution to mitigate the widest possible range of disaster scenarios.

A server administrator has not used the command line in quite some time and is trying to remember what will help them with commands and how to use them. Which of the following should the administrator use? winver ipconfig /? ping

/?

An IT professional is preparing a presentation to the organization's Windows users on the differences between Windows 10 Pro, Enterprise, Education, and Home editions. Which statement is accurate? 1. RDP is not a workable feature when using Windows Home edition and enables the user to connect to the machine and operate it over the network. 2. Windows Home, Pro, and Enterprise can join a domain network, whereas Education does not. 3. BitLocker is not available when using the Windows Home edition and enables the user to decrypt all the information on a disk drive. 4. Group policy editor is available when using the Windows Home edition and is used to create and apply OS and software application settings.

1. RDP is not a workable feature when using Windows Home edition and enables the user to connect to the machine and operate it over the network. Remote Desktop Protocol (RDP) allows a user to connect to the machine and operate it over a network. While the Home edition has the RDP client software, it does not support an RDP server, thus unavailable to users.

A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files? (Select all that apply.) 1. Additional files with names similar to authentic system files, such as scvhost.docx or ta5kmgr.xlsx 2. Known-good files with expired certificates 3. Files with date stamps and file sizes that are different from known-good versions 4. Files that are missing or renamed

3. Files with date stamps and file sizes that are different from known-good versions 4. Files that are missing or renamed System files are an attractive target for malware because renaming or deleting them can wreak havoc on the operating system. Hackers will alter the size of system files to hide malware or change the date stamp to cover their tracks. While malware will add additional files with names almost the same as authentic system files, the extensions .docx and.xlsx represent Word and Excel files, respectively. These are data files, not system files. System files have extensions such as .dll and .sys.

An endpoint machine administrator configures specific Apple computers designated for users with disability. Where should the administrator look to configure these settings? Mission Control Accessibility Security & Privacy Time Machine

Accessibility. The Accessibility preference pane is used to configure assistive vision and sound options, such as VoiceOver narration of screen elements, cursor size and motion settings, zoom tools, display contrast, font sizes, and captioning.

What is a home folder?

A home folder is a private drive mapped to a network share to store personal files. The home folder location is configured via the account properties on the Profile tab using the connect to box.

Users are curious about what is run on startup, so they dig into the startup script. The users find the command "net use M: \\sharedrive\data /persistent:yes". What is the startup script invoking?

A mapped drive is a share that has been assigned to a drive letter on a client device. To map a share as a drive, right-click it and select Map Network Drive.

What is Smart Scanning?

A smart scan scans a computer's critical areas, like system memory, hidden services, boot sectors, auto-run entries, registry keys, and important operating system files and folders.

A user has owned the same personal computer for a while and thinks it might be time for an upgrade. Which of the following are upgrade considerations? (Select all that apply.) SELECT ALL THAT APPLY Application support Backup files PXE support Hardware compatibility

Application support Backup files Hardware compatibility Hardware compatibility is a consideration. The user must make sure that the central processing unit (CPU), chipset, and RAM components are sufficient to run the OS. Application and driver support and backward compatibility are other considerations. Most version upgrades try to maintain support for applications and device drivers developed for older versions. Backup files and user preferences are a consideration. If the user is installing a new operating system or doing a clean install, the user should back up any necessary data and settings. Most computers now come with a Preboot eXecution Environment (PXE)-compliant firmware and network adapter to support this boot option and is not necessarily a consideration.

A technician is talking to a customer about an issue, but the customer is not sure how to locate the issue on their computer, so the technician has the customer tell them step by step to figure out the issue. What type of technique is this? Ask a closed question. Ask an open-ended question. Be judgemental. Hang up.

Ask an open-ended question.

An employee uses a cryptographic contactless technique that allows access to a building. What is this technique? Magnetometer Badge reader Alarm system Palmprint scanner

Badge reader

What can use a trusted platform module chip in the computer to tie the use of a fixed disk to a particular motherboard? BitLocker Inheritance Port security Application security

BitLocker

An employee enters the web address of their local newspaper to check for news on the company, and a site pops up with many click-bait celebrity stories. The employee re-enters the address assuming a misspelling but returns to the same page. When the help desk technician arrives, which of the following troubleshooting steps would be appropriate? Check HOSTS files for malicious entries. Check to see if the newspaper website's certificate is expired. Check to see if the DNS browser is configured correctly. Check the System Configuration Utility.

Check HOSTS files for malicious entries., This scenario describes a redirection when a user tries to open one page but is sent to another. Here, it appears adware is driving traffic to another site to increase clicks. Since HOSTS maps domain names to IP addresses, the HOSTS file in the registry would show malicious entries to re-route IP addresses.

A new employee calls the help desk because their phone will not connect to the office Wi-Fi. When the technician asks about the phone model, the employee says it is an iPhone 5. The technician immediately knows the problem. Which of the following could be the problem? 1.Interference 2.Configuration 3.Throttling 4.Signal strength

Configuration, Since the technician knew the problem based on the phone model, the most likely cause would involve configuration issues between the device and the wireless access point related to the 802.11 standard or the GHz band. Signal strength can be affected by distance but not likely by the phone model. The phone model would not impact interference from other devices or thick walls or metal. Concerning smartphones, throttling refers to a purposeful reduction in phone performance by a manufacturer's update to the device that instructs it not to perform at its maximum capabilities.

A user is about to join a Zoom call and plugs in USB-C headphones with a built-in microphone to the computer's USB 3 port. A message appears that there are "not enough USB controller resources." Evaluate the situation and select the best fix for the problem. Connect the headphones to a USB 2 port. Close all running programs to free up memory. Run the SFC to locate and update the USB controller drivers. Open the Resource Monitor to verify the headphone's operating system and hardware requirements are compatible with the computer's existing resources.

Connect the headphones to a USB 2 port. "Not enough USB controller resources" is a common warning with USB 3 ports and is generally caused by connecting too many devices. It also occurs when one device exceeds the controller's allocated endpoints. A USB 2 port has more endpoints, so switching often solves the problem.

After starting the computer and signing in, a user notices the desktop takes a long time to load. Evaluate the following Windows operating system problems to determine the one that best diagnoses what could be causing the slowness. Corrupted user profile Corrupted registry Invalid boot disk Time drift

Corrupted user profile

A local jewelry maker sets up a booth at a craft fair. When the first customer makes a purchase, the vendor's contactless card reader will not recognize the customer's wallet app. Which of the following could solve the problem? Turn on airplane mode. Enable RFID. Hold the mobile device closer to the reader and wait. Use biometric authentication.

Enable RFID. Contactless card readers use near-field communication (NFC). NFC normally works at up to two inches (6 cm), so moving the device closer to the reader could solve the problem.

A user logs into a computer and uses a camera that records a 3-D image with its infrared sensor to mitigate attempts to use a photo to spoof the authentication mechanism. What is this called? Fingerprint SSO Facial recognition Gpupdate

Facial recognition is the bio gesture that uses a webcam to scan the unique features of the user's face.

A user just installed a new application on their workstation, but the application has issues even starting up. The user has been working on the machine regularly up to this point without any prior issues. Which of the following is most likely the issue?

Firewall. In this scenario, one place to troubleshoot is the host-based firewall. Select "Allow an app through the firewall" to allow or block programs (configure exceptions) from the Windows Firewall status page. While proxy settings could be an issue, if the user is working fine beforehand, proxy settings are not likely to be an issue. If the user has been using the machine without any previous problems it is unlikely that the domain name system (DNS) is the issue. The Personalization settings allow the users to select and customize themes, which set the appearance of the desktop environment.

What allows a user to download from a vendor's website and select the correct patch for their device's make and model? Encryption setting Firmware updates Change default password Physical placement

Firmware updates are important because it allows the user to fix security holes and support the latest security standards.

An administrator uses a backup rotations scheme that labels the backup tapes in generations. What is this called? GFS Frequency 3-2-1 backup rule Synthetic

GFS, Grandfather-father-son (GFS) is a backup rotation scheme that uses son tapes to store the most recent data and have the shortest retention period. Grandfather tapes are the oldest and have the longest retention period.

A client administrator for a video game development company wants to upgrade machines to support five primary partitions. The developers work with a lot of large files and might even need partitions larger than 2 TB. Which of the following should the administrator use? GPT NTFS APFS MBR

GPT, One of the features of GPT is support for more than four primary partitions. Windows allows up to 128 partitions with GPT. GPT also supports larger partitions (2 TB+) and a backup copy of the partition entries.

What is group policy?

Group policy configures computer settings and user profile settings. A group policy can also be used to deploy software automatically.

A technician is working with a customer who is becoming abusing and unreasonable on a phone call. Which of the following skills should the technician use in this instance? (Select all that apply.) Hang up. Identify early that the customer is angry. Be judgemental. Do not take complaints personally.

Hang up. Identify early that the customer is angry. Do not take complaints personally. Identifying early that the customer is angry and trying to calm the situation down by using a low voice and soothing language and focusing on positive actions. Do not take complaints personally and do not express any anger toward the customer. Hang up and be guided by whatever policy an organization has in place, but in general, if a customer is abusive or threatening, issue a caution to warn them about this behavior. Being judgmental is not one that will help in this situation. Do not assume that the customer lacks knowledge about the system.

A Windows administrator wants to learn how to use Linux by installing the Linux subsystem for Windows. What should their version of Windows have on the New Technology File System (NTFS) to support case-sensitive naming and hard links required by Linux? 32-bit allocation table Journaling POSIX Indexing

POSIX

what is phishing?

Phishing uses social engineering techniques to make spoofed electronic communications seem authentic to the victim. A phishing message might convince the user to perform actions, such as installing malware disguised as an antivirus program.

What kind of software is often inadvertently installed by users, leading to recommendations for its removal due to potential security risks?

Potentially Unwanted Application (PUA) is a program that, while not necessarily malicious, may perform unwanted actions on a system. These can range from displaying intrusive advertising, tracking the user's internet usage for sale to advertisers, or using premium SMS services. For these reasons, PUAs are often recommended for removal from computers.

A video game development company is purchasing upgraded laptops to develop cutting-edge graphics for a new story they have been marketing. They want to be able to integrate persistent system RAM. What type of operating system should they use for support? Home Enterprise Pro for Workstations Pro

Pro for Workstations, Windows Pro for Workstations has many of the same features as Pro but supports more maximum RAM and advanced hardware technologies, such as persistent system RAM (NVDIMM).

A technician helps a customer with a ticket request and needs to record that the customer has accepted that the ticket can be closed. Which of the following fields reflect this part of the ticket life cycle? Escalation levels Progress notes Problem description Problem resolution

Problem resolution sets out the plan of action and documents the successful implementation and testing of the plan and full system functionality.

A technician uses filesystem-level encryption on some files that need to be encrypted on their device. What is this called? Inheritance Application security EFS Port security

The Encrypting File System (EFS) feature of the New Technology File System (NTFS) supports file and folder encryption. EFS is not available in the Home edition of Windows. The encryption key used by EFS is associated with the username and password.

An IT professional is preparing a presentation to the organization's Windows users on the differences between Windows 10 Pro, Enterprise, Education, and Home editions. Which statement is accurate? RDP is not a workable feature when using Windows Home edition and enables the user to connect to the machine and operate it over the network. Group policy editor is available when using the Windows Home edition and is used to create and apply OS and software application settings. Windows Home, Pro, and Enterprise can join a domain network, whereas Education does not. BitLocker is not available when using the Windows Home edition and enables the user to decrypt all the information on a disk drive.

RDP is not a workable feature when using Windows Home edition and enables the user to connect to the machine and operate it over the network.

A user's phone begins to act strangely, with apps responding slowly and pop-up ads appearing frequently. When the user calls the help desk and explains the issues, the technician says it sounds like malware. What other symptoms would be common to a malware infection on a mobile phone? (Select all that apply.) Fake security warnings APK sideloading Increased Response Times Redirection

Redirection Fake security warnings

A server administrator was called in to help a VIP whose computer was accidentally infected with a virus. The administrator wants to revert the computer but still preserve user personalization settings. What should the administrator use? Factory partition Refresh Third-party drivers Reset

Refresh, Windows supports refresh and reset options to try to repair the installation. Using refresh recopies the system files and reverts most system settings to the default but can preserve user personalization settings, data files, and more.

What is RADIUS?

Remote authentication dial-up user service (RADIUS) is implementing the AAA server when configuring enterprise authentication. Rather than storing and validating user credentials directly, it forwards data between the RADIUS server and the supplicant without reading it.

What is RDP?

Remote desktop protocol (RDP) implement terminal server and client functionality. RDP authentication and session data are always encrypted.

A security analyst notices a critical incident that has a widespread effect on customers that can eventually involve a potential data breach. The analyst creates a ticket with the vendor and sets the importance in order to trigger a faster response time. What describes what attribute of the ticket the analyst set? Categories Problem resolution Severity levels Escalation levels

Severity levels, The severity level is a way of classifying tickets into priority order. Severity levels are not over-complex. There are three severity levels based on impact: critical incidents, major incidents, and minor incidents.

A user calls the help desk complaining that Windows freezes to a blue screen every time it tries to boot. When the technician arrives, they boot the computer in Safe Mode. After evaluating this situation, what is the BEST reason the technician wants to enter Safe Mode to begin troubleshooting? Safe Mode is necessary for troubleshooting. Antivirus scans can be run in Safe Mode. Safe Mode loads only the minimum amount of drivers and services to start the system. CHKDSK can be run in Safe Mode.

Safe Mode loads only the minimum amount of drivers and services to start the system.

When a project team is constructing a change request document, a part that needs to be included is the number of devices, users, or customers that will be affected by the change. What is this part of the document? End-user acceptance Purpose of the change Scope of the change Rollback plan

Scope of the change, Scope of the change may include cost, timescales, and amount of devices involved. The scope should also include the factors by which the success or failure of the change can be judged.

A client uses this software that allows access to a given computer. What is this software? Videoconferencing Desktop management File transfer Screen-sharing

Screen-sharing is software that is designed to work over HTTPS across the internet. This is secure because the connection is encrypted but also easier to implement as it does not require special firewall rules.

A technician uses a method where each server is configured with a public/private encryption key pair and identified by a host key fingerprint. What is this method? RDP VNC SSH VPN

Secure shell (SSH) is also a remote access protocol, but it connects to a command interpreter rather than a desktop window manager.

An administrator uses a method that assigns permissions and rights to a collection of user accounts. What is this called? MFA Least privilege Security group ACL

Security Group, A security group is a collection of user accounts, as it is more efficient to assign permissions to a group than to assign them individually to each user.

A technician sets up a company's network and uses a method that lets employees know which network is the company's network. What is this called?

Service set ID (SSID) is a simple, case-sensitive name that users identify the WLAN. The factory configuration uses a default SSID that is typically based on the device brand or model, which should be changed so users will recognize the network.

What is Service set ID (SSID)?

Service set ID (SSID) is a simple, case-sensitive name that users identify the WLAN. The factory configuration uses a default SSID that is typically based on the device brand or model, which should be changed so users will recognize the network.

A user implements a method that requires a one-time code within a given time frame to get access to their email account. What is this method?

Soft token

A user downloads a dating app from the Apple store and then gets requests for permission to access their camera; which of the following is the most likely cause of the permission requests? Locator app Spoofed app Enterprise app Sideloaded app

Spoofed app, A spoofed app is a malicious app that spoofs a legitimate app by using a similar name and fake reviews, and automated downloads to boost its apparent popularity. Once downloaded, it will act as spyware and may request permissions unrelated to its function.

A manager for a Linux server team recently purchased new software which will help to streamline operations, but they are worried that in IT, there is a high turnover of personnel. The manager wants to ensure they can obtain updates, monitor and fix security issues, and are provided technical assistance. What impact is the manager trying to mitigate? Network Training Support Licensing

Support, Given the unpredictable state of IT staffing, the software might be available with paid-for support to obtain updates, monitor and fix security issues, and provide technical assistance.

An administrator uses an access control system to shuttle authentication and authorization traffic between the supplicant and the AAA that encrypts an entire authentication rather than just the password. What is this method? RADIUS TACACS+ Kerberos AES

Terminal access control system plus (TACACS+) is one way of implementing authentication, authorization, and accounting (AAA). TACACS+ is often used in authenticating administrative access to routers, switches, and access points.

what is certmgr.msc?

The Certificate Manager (certmgr.msc) console shows which certificates have been installed and provides a mechanism for requesting and importing new certificates.

What is diskmgmt.msc?

The Disk Management (diskmgmt.msc) console displays a summary of any fixed and removable disks, which includes hard disk drives (HDDs), solid-state drives (SSDs), and optical drives.

A user has a Mac computer but likes Windows better for functionality and compatibility purposes. The user wants to sell their computer on an online marketplace and wipe their presence from the computer. Which of the following will help them accomplish this? Remote Disc Dock Finder Disk Utility

The Disk Utility app can be used to verify or repair a disk or file system. It can also be used to erase a disk with security options if users are selling or passing on a Mac.

What is gpedit.msc?

The Group Policy Editor (gpedit.msc) provides a more robust means of configuring many Windows settings than editing the registry directly.

Which of the following uses a security shield icon for tasks that are protected under them? Fingerprint UAC SSO PIN

UAC, User account control (UAC) is a Windows security feature designed to protect the system against malicious scripts and attacks that could exploit the powerful privileges assigned to members of the Administrators group.

The Snapchat app on an iOS phone will not close. The user rebooted the device, but that was unsuccessful. Which of the following options would be the best for the user to try to fix the problem? System updates Factory Reset Uninstall then reinstall Wiping

Uninstall then reinstall

A company is conducting live meetings between two or more applicants at different sites. What is this called?

Videoconferencing

what is vishing?

Vishing is an attack through a voice channel like a telephone. It can be much more difficult for someone to refuse a request made in a phone call than one made in an email.

What uses a 4-way handshake to allow a station to associate with an access point, authenticate its credential, and exchange a key to use for data encryption? TKIP WPA2 MFA WPA3

WPA2

A low battery charge can cause several different problems to occur on a mobile device. Which of the following issues could stem from a low battery? (Select all that apply.) Lockout Weak Wi-Fi signal Weak Bluetooth signal Autorotation stops

Weak Wi-Fi signal Weak Bluetooth signal

A penetration tester targeted top-level executives during a test by sending out phishing emails. They received their first shell when the first executive opened the attachment in the phishing email. Once the penetration tester connects to the executive's computer, what command will tell them the location of where their shell landed? cp ls mv pwd

pwd "prints" the working directory, though "printing" will typically mean "display on the terminal," unless stdout is redirected. The working directory is important because commands will default to the working directory without specifying a path.

A server administrator locks down security on their golden client image but is concerned about potentially breaking things in the environment. They decided to set up a test image for test users in various departments before full implementation. What should the administrator use to make individual configuration changes to the image? gpedit.msc shell:startup services.msc regedit.exe

regedit.exe, The Windows registry provides a remotely accessible database for storing operating system, device, and software application configuration information. The administrator can use the Registry Editor (regedit.exe) to view or edit the registry.

A Linux server administrator meets with their Windows server administrator counterparts. A certain grouping of Linux and Windows servers is designated to run services that share files. What will the administrators need to enable sharing between the disparate systems? ip mv samba chmod

samba enables the integration of Linux and Windows systems. When added to a Linux workstation, that workstation can use the Windows file and print sharing protocol to access shared resources on a Windows host.


Kaugnay na mga set ng pag-aaral

Chronic Kidney Disease (Pearson)

View Set

WEEK 4 CHAPTER TEST REVIEW 20/22

View Set

1 tema. Literatūra. Romualdas Granauskas, Vanda Juknaitė, pastraipos struktūra...

View Set

Socio Errors in sociological inquiry

View Set

Dr Christie exam 3 Chapter 9 and 10

View Set

L5 Processing of Fruits & Vegetables

View Set

Plant Responses to the Environment Test 2

View Set