CompTia A+ Core 2 Pt 4
Dion Training is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this small company to purchase? A) Enterprise B) Business C) Personal D) Open-source
B) Business
Which of the following components presents the largest risk of electrical shock to a technician? A) Laptop battery B) CRT monitor C) LCD monitor D) Hard drive
B) CRT monitor
A user's Android smartphone is becoming sluggish and slow to load applications. Which of the following should you perform FIRST to fix this problem? A) Conduct a factory restore of the smartphone B) Close all of the running applications C) Turn off the smartphone's Bluetooth and WiFi D) Update the smartphone's firmware
B) Close all of the running applications
Which of the following network configurations is used to identify your computer's individual host identifier and your computer's network identifier? A) DNS B) WINS C) Subnet mask D) Gateway
C) Subnet mask
You are installing a new firewall for Dion Training's corporate network. Which of the following documents should you update FIRST? A) Network topology diagrams B) Knowledge base articles C) Password policy D) Incident database
A) Network topology diagrams
Dion Consulting Group has been hired by a small real estate office to build its network. The office has 4 computers running Windows 10 Professional edition configured in a workgroup to access a shared file server. Which of the following types of network models is being used by this real estate office? A) Peer-to-peer B) Mesh C) Client/server D) Hub-and-spoke
A) Peer-to-peer
Your company is concerned about the possibility of power fluctuations that may occur and cause a large increase in the input power to their server room. What condition is this known as? A) Power spikes B) Power surge C) Power failure D) Under-voltage event
A) Power spikes
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have directly observed symptoms that indicate the system is infected with malware. Which of the following actions should you perform NEXT? A) Quarantine the affected system B) Remediate the infected system C) Enable System Restore D) Disable System Restore
A) Quarantine the affected system
A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT? A) Quarantine the machine and report it as infected to your company's cybersecurity department for investigation B) Reinstall or reimage the operating system C) Clear the browser's cookies, history, and enable the pop-up blocker D) Document the pop-ups displayed and take a screenshot
A) Quarantine the machine and report it as infected to your company's cybersecurity department for investigation
A user receives the following error message: "Windows Update cannot currently check for updates because the service is not running." The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT? A) Reboot the computer B) Register the Windows Update service's DLL files C) Rollback the device drivers D) Restart the network services
A) Reboot the computer
The customer service manager at Dion Training is having issues with her Windows 10 laptop. A technician believes that the operating system may have been corrupted by a piece of malware. The technician has removed the malware and wants to perform an installation or upgrade that will recopy the system files and revert most of the system settings to their default configurations while still preserving the user's personalization settings, data files, and any applications installed through the Windows store. The technician has been told that they may delete any applications installed by the user, though, since they may have been infected by the malware. Which of the following types of upgrades or installations should the technician use? A) Refresh installation B) In-place upgrade C) Clean install D) Repair installation
A) Refresh installation
Which attack method is MOST likely to be used by a malicious employee or insider trying to obtain another user's passwords? A) Shoulder surfing B) Phishing C) On-path attack D) Tailgating
A) Shoulder surfing
Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization? A) Spear phishing B) Phishing C) Vishing D) Whaling
A) Spear phishing
An ethical hacker has been hired to conduct a physical penetration test of a company. During the first day of the test, the ethical hacker dresses up like a plumber and waits in the building's main lobby until an employee goes through the main turnstile. As soon as the employee enters his access number and proceeds to go through the turnstile, the ethical hacker follows them through the access gate. What type of attack did the ethical hacker utilize to access the restricted area of the building? A) Tailgating B) Shoulder surfing C) Social engineering D) Spoofing
A) Tailgating
What is the minimum amount of memory required to install Windows 10 (x64) on a device? A) 1 GB B) 2 GB C) 4 GB D) 8 GB
B) 2 GB
Dion Training's offices are frequently experiencing brownouts and sags. Which of the following solutions would protect all of their workstations and servers from these under-voltage events? A) Line conditioner B) Diesel generator C) Surge suppressor D) Uninterruptible power supply
A) Line conditioner
You are configuring a SOHO network that will contain 7 devices, but you only have a single public IP address. Which of the following concepts should be configured to allow the 7 devices to share that single IP when connecting to the internet? A) NAT B) DHCP C) UPnP D) Perimeter network
A) NAT
How would you represent the Linux permissions rwxr-xr-- in octal notation? A) 754 B) 742 C) 624 D) 724
A) 754
Jason checks the Dion Training server room and finds that it currently has only 10% humidity. Which of the following risks to the servers could occur due to this low humidity level? A) Accidental static discharge B) Corrosion of the servers C) An under-voltage event D) An over-voltage event
A) Accidental static discharge
You are installing a new file server at the offices of Dion Training. The entire building has a diesel generator installed to protect it from power outages. The file server must have zero downtime once placed into production. Which of the following power sources should the file server utilize? A) An uninterruptible power supply (UPS) B) A line conditioner C) A surge protector connected to a UPS D) A surge protector
A) An uninterruptible power supply (UPS)
John is setting up 100 Windows 10 computers for a new corporate office. He wants to ensure that no one can change the boot order and boot from an unauthorized operating system. What feature should he ensure is enabled? A) BIOS password required B) Secure Boot C) Full disk encryption D) RAM integrity checking
A) BIOS password required
Sally just purchased a new iPhone and AirPods to listen to her music. After setting up the new iPhone, she can get online and watch YouTube, but her wireless headphones aren't working. Which of the following is MOST likely the problem? A) Bluetooth is not enabled B) Cellular is not enabled C) WiFi is not enabled D) The phone is in airplane mode
A) Bluetooth is not enabled
A programmer is writing a script to calculate the temperature in Fahrenheit when it receives input in celsius. The conversion factor used is 5/9. Which of the following would be used to store this fixed conversion factor in the script? A) Constant B) Loop C) Variable D) Comment
A) Constant
You have connected your laptop to the network using a CAT 5e cable but received an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is most likely the cause of this issue? A) DHCP failure B) Poisoned ARP cache C) Failed DNS resolution D) Duplicate IP address
A) DHCP failure
You recently moved 1.5 TB of data from your office's file server to a new 16 TB NAS and decommissioned the old file server. You verified all users had been given the same permissions to the new file shares on the NAS as they had on the old server. The users are receiving an error stating, "Windows cannot access \\server10\shared\" every time they click the Share drive icon on their desktop. What is MOST likely the source of this error? A) The users are still mapped to the old share drive B) The users need administrative permission to access the new NAS C) The users are using the incorrect password for the new server D) The users are outside the authorized hours set in the GPO
A) The users are still mapped to the old share drive
You are installing a new wireless network in your office building and want to ensure it is secure. Which of the following configurations would create the MOST secure wireless network? A) WPA2 and AES B) WPA2 and RC4 C) WEP and TKIP D) WPA and MAC filtering
A) WPA2 and AES
Which of the following commands is used on a Linux system to copy a file from one directory to another directory? A) cp B) ls C) mv D) rm
A) cp
Which command-line entry would be used on a Windows system to test if your system can reach diontraining.com? A) ping diontraining.com B) sfc diontraining.com C) ipconfig diontraining.com D) net use diontraining.com
A) ping diontraining.com
Which of the following commands is used on a Linux system to display the current working directory's full pathname to the screen? A) pwd B) chmod C) passwd D) chown
A) pwd
David is troubleshooting a new Android application his company is creating. He has installed the app on an Android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. Which of the following should David enable on the device? A) Sideloading B) Developer mode C) Jailbreak D) Rooting
B) Developer mode
A Windows 2019 server is crashing every evening at 2:35 am, but you are not sure why. Which of the following tools should you use to identify the cause of the system crash? A) Registry editor B) Event viewer C) System information D) Performance monitor
B) Event viewer
Which edition of Windows 10 does not have the group policy editor enabled? A) Enterprise B) Home C) Pro D) Pro for Workstations
B) Home
Which of the following workstation operating systems are Ubuntu and Red Hat considered? A) Windows B) Linux C) Android D) macOS
B) Linux
Which of the following types of encryption should be selected on a SOHO access point if you are running a coffee shop and want all of your customers to be able to join it by default? A) WEP B) Open C) WPA2 D) WPA
B) Open
Dion Training is building a new computer for its video editor to use. The new computer will use four physical Intel Xeon processors, 128 GB of DDR4 memory, and a RAID 0 with two 2 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer's resources properly? A) Home B) Pro for Workstations C) Education D) Pro
B) Pro for Workstations
Which of the following Control Panel sections would allow a technician to turn on Hyper-V on a Windows 10 Pro workstation? A) Devices and Printers B) Programs and Features C) Device Manager D) System
B) Programs and Features
On your lunch break, you walked down to the coffee shop on the corner. You open your laptop and connect to their wireless network. After a few minutes of surfing the Internet, a pop-up is displayed on your screen. You close the pop-up, finish your lunch break, shut down the laptop, and put it back into your backpack. When you get back to the office, you take out the laptop and turn it on, but instead of your normal desktop background, you are greeted by a full-screen image with a padlock and a message stating you have to pay 0.1 BTC to regain access to your personal files. What type of malware has infected your laptop? A) Trojan B) Ransomware C) Rootkit D) Spyware
B) Ransomware
A user is complaining that when they attempt to access Google's homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT? A) Disable the Windows Firewall B) Remove any proxy servers configured in their web browser C) Verify the user's date and timezone are correctly listed in Windows D) Download the latest security updates for Windows
B) Remove any proxy servers configured in their web browser
A user's smartphone has become unresponsive since installing the latest iOS update. Which of the following should a technician do to restore the smartphone's performance? A) Perform a factory reset B) Rollback the iOS update C) Reimage the device D) Update the applications
B) Rollback the iOS update
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have finished remediating the infected system. Which of the following steps should you NEXT? A) Quarantine infected systems B) Schedule scans and run updates C) Educate the end user D) Identify and research malware symptoms
B) Schedule scans and run updates
Which of the following techniques would be the most appropriate solution to implementing a multi-factor authentication system? A )Fingerprint and retinal scan B) Smartcard and PIN C) Password and security question D) Username and password
B) Smartcard and PIN
Which of the following data types would be used to store a user's name? A) Boolean B) String C) Floating point D) Integers
B) String
Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as challenge/response and password encryption? A) Multi-factor authentication B) TACACS+ C) ISAKMP D) Network access control
B) TACACS+
Which of the following types of screen locks uses a biometric authentication system to prevent access to a mobile device? A) Passcode B) TouchID C) Pattern lock D) Swipe
B) TouchID
Jennifer decided that the licensing cost for a piece of video editing software was too expensive. Instead, she decided to download a keygen program to generate a license key and install a pirated version of the editing software. After she runs the keygen, a license key is created, but her system performance becomes very sluggish, and her antimalware suite begins to display numerous alerts. Which type of malware might her computer be infected with? A) Worm B) Trojan C) Logic bomb D) Adware
B) Trojan
What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card's hardware address? A) WEP B) Disable SSID broadcast C) MAC filtering D) WPS
C) MAC filtering
A user's Android smartphone is sluggish in responding when the user tries to open any of its apps. The smartphone has 2 GB of memory and a 16 GB internal storage device. The technician saw that the smartphone currently has 1.7 GB of memory in use and 412 MB of free storage space on the internal storage device. Which of the following should the technician perform to improve the device's performance? A) Replace the device's battery B) Uninstall any unneeded apps C) Upgrade the internal storage device D) Replace the device's screen
B) Uninstall any unneeded apps
A home user contacts the help desk and states that their desktop applications are running very slowly. The user also says that they have not received any emails all morning, but they normally get at least 5-10 emails each day. The help desk technician gets permission from the home user to remotely access their computer and runs some diagnostic scripts. The technician determines that the CPU performance is normal, the system can ping the local router/gateway, and the system can load websites slowly, or they fail to load completely. During the diagnosis, the technician also observes the remote connection dropping and reconnecting intermittently. Which of the following should the technician attempt to perform NEXT to resolve the user's issue? A) Boot into the BIOS setup, enable TPM, reboot into safe mode, and perform a System Restore B) Update the anti-virus software, run a full scan of the system, and verify the web browser's and email client's settings C) Empty the web browser's cache, send a test email to the technician's personal account, and open the Explorer to check the file system D) Reboot into safe mode, uninstall the last OS update, and run a CHKDSK against the hard
B) Update the anti-virus software, run a full scan of the system, and verify the web browser's and email client's settings
Nicole's smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is in her apartment building. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue? A) Reset the data usage statistics on the smartphone B) Verify the smartphone has adequate signal strength C) Update the smartphone's applications or OS D) Reset the smartphone's wireless network settings
B) Verify the smartphone has adequate signal strength
A network technician determines that two dynamically assigned workstations have duplicate IP addresses. What command should the technician use to correct this issue? A) ipconfig /renew B) ipconfig /release | ipconfig /renew C) ipconfig /dhcp D) ipconfig /all
B) ipconfig /release | ipconfig /renew
Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory? A) ls B) mv C) rm D) cp
B) mv
During a penetration test of your company's network, the assessor came across a spreadsheet with the passwords being used for several servers. Four of the passwords recovered are listed below. Which one is the weakest password and should be changed FIRST to increase the password's complexity? A) Pa55w0rd B) pa55word C) P@$$w0rd D) P@$$W0RD
B) pa55word
Which of the following commands is used on a Linux system to switch to another user's account? A) ps B) su C) passwd D) chown
B) su
The Chief Financial Officer has asked Maria for a recommendation on how the company could reduce its software licensing costs while still maintaining the ability to access its application server remotely. Which of the following should Maria recommend? A) Use a Virtual Network Client (VNC) on a Windows 2019 server B) Use a Remote Desktop Protocol (RDP) application on a Windows 10 desktop C) Install and deploy thin clients without an operating system for each user D) Install and deploy Windows 10 Home edition on each user's thick client
C) Install and deploy thin clients without an operating system for each user
You are writing a script that will take an employee's name as the input. Which of the following data types would the employee's name be stored in? A) Integer B) Boolean C) String D) Float
C) String
What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system? A) 20 GB B) 16 GB C) 64 GB D) 32 GB
D) 32 GB
You want to ensure that only one person can enter or leave the server room at a time. Which of the following physical security devices would BEST help you meet this requirement? A) Thumbprint reader B) Video monitoring C) Access control vestibule D) Cipher lock
C) Access control vestibule
A user attempted to go to their favorite social media website this morning from their laptop. When they typed in Facebook.com, their browser redirected them to MalwareInfect.com instead. You asked the user to clear their cache, history, and cookies, but the problem remains. What should you do NEXT to solve this problem? A) Disable System Restore B) Conduct an antivirus scan C) Check the host.ini file D) Upgrade their web browser
C) Check the host.ini file
Your company recently suffered a small data breach caused by an employee emailing themselves a copy of the current customer's names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which of the following logical security concepts should you implement to prevent a trusted insider from stealing your corporate data? A) Firewall B) Strong passwords C) DLP D) MDM
C) DLP
An increased amount of web traffic to an e-commerce server is observed by a network administrator but without increasing the number of financial transactions. Which kind of attack might the company be experiencing? A) Bluejacking B) ARP spoofing C) DoS D) Phishing
C) DoS
You are assisting a network administrator with updating the firmware of a Cisco iOS-based router. This router is the only border router for your organization, and it connects them to the internet. A request for change (RFC) is being written and contains the purpose, plan, scope, and risk analysis of the proposed change. Which of the following should be added to the RFC before its approval? A) Configure a secondary route during the maintenance window B) Extend the maintenance windows from 1 hour to 8 hours C) Document a backout plan if the update is not successful D) Update the asset management database with the new router's asset ID
C) Document a backout plan if the update is not successful
Your company has just installed 50 new LCD monitors to replace some older CRT monitors. How should you properly dispose of the old CRT monitors? A) Haul them to the landfill B) Recycle them C) Follow local government regulations and handling procedures D) Give them to charity
C) Follow local government regulations and handling procedures
Your company is expanding its operations in the European Union and is concerned about additional governmental regulations that may apply. Which of the following regulations applies when processing personal data within the European Union? A) PHI B) PII C) GDPR D) PCI
C) GDPR
Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as? A) Power spikes B) Power failure C) Under-voltage event D) Power surge
C) Under-voltage event
A factory worker suspects that a legacy workstation is infected with malware. The workstation runs Windows XP and is used as part of an ICS/SCADA system to control industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation. After its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent reinfection? A) Disable System Restore in Windows B) Quarantine the infected system C) Update the anti-malware solution D) Remediate the infected systems E) Enable System Restore and create a restore point in Windows F) Investigate and verify malware symptoms
C) Update the anti-malware solution
Susan, an executive at Dion Training, will be traveling to Italy for a conference next week. She is worried about remaining connected to the internet while overseas and plans to use the WiFi in her hotel room and the local coffee shop with her laptop. Which of the following should she purchase and configure before leaving for Italy to ensure her communications remain secure regardless of where she is connecting from? A) Local mobile hotspot B) Local SIM card for her smartphone C) VPN D) International data roaming plan on her cellphone
C) VPN
You are working on a Windows 10 workstation with a 1 TB HDD and 16 GB of memory that is operating slowly when reading large files from its storage device. Which of the following commands should you use to speed up this workstation? A) format B) diskpart C) chkdsk D) ipconfig
C) chkdsk
Which of the following commands would you use to duplicate the file c:\Users\Jason\Downloads\newfile.docx to c:\Users\Jason\Desktop\newfile.docx from the command line? A) diskpart B) net user C) copy D) chkdsk
C) copy
Which file system type should you format a 4 TB USB flash drive to use with both Windows and macOS laptops? A) FAT32 B) NTFS C) exFAT D) APFS
C) exFAT
Which of the following commands can be used to install software on a Linux system? A) grep B) nano C) yum D) cat
C) yum
Dion Training uses DHCP to assign private Class B IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class B address? A) 169.254.125.154 B) 192.168.2.14 C) 10.5.34.15 D) 172.16.13.12
D) 172.16.13.12
Christina is attempting to install Windows 10 (32-bit) on an older netbook-style laptop. The installation is continually failing and producing an error. The device has a 1.1 GHz processor, 1 GB of memory, an 8 GB hard drive, and a 720p display. Which component would need to be fixed to allow Windows 10 (32-bit) to be installed on this device? A) Number of CPU cores B) The screen resolution C) Amount of memory D) Amount of hard drive space
D) Amount of hard drive space
Bradley has been authorized to work from home every Friday. Normally, he can use his work laptop home from home while still accessing the company's internal network shares, but for some reason, it isn't working today. What is MOST likely the cause of Bradley's issue today? A) Outdated anti-malware software B) Missing OS security patches C) The corporate MDM policy D) An inactive VPN connection
D) An inactive VPN connection
Fail to Pass Solutions has requested that its employees have a mobile device so that they can respond to questions when they are out of the office. Each employee is responsible for buying their Android smartphone and cellular plan service. To access the corporate network and its data, the employees need to install a company-provided APK on their device. This app contains access to their company-provided email, cloud storage, and customer relationship management (CRM) database. Which of the following policies BEST describes Fail to Pass's mobile device deployment model? A) CYOD B) COBO C) COPE D) BYOD
D) BYOD
Last week, a technician remediated a malware infection on Karen's laptop. Today, she shows up at the service desk, frustrated because her laptop appears to have been infected again. What step of the malware remediation process did the technician MOST likely forget to complete? A) Quarantining the infected laptop B) Enabling System Restore C) Investigate and verify malware symptoms D) Educating the end user
D) Educating the end user
What is the SIXTH step of the seven-step malware removal process? A) Update the applications and the operating system B) Quarantine the infected system C) Educate the end user D) Enable System Restore and create a restore point in Windows
D) Enable System Restore and create a restore point in Windows
During the reconnaissance phase of a penetration test, you have determined that your client's employees all use iPhones that connect back to the corporate network over a secure VPN connection. Which of the following methods would MOST likely be the best method for exploiting these? A) Use a tool like ICSSPLOIT to target specific vulnerabilities B) Use web-based exploits against the devices web interfaces C) Use social engineering to trick a user into opening a malicious APK D) Identify a jailbroken device for easy exploitation
D) Identify a jailbroken device for easy exploitation
Which of the following installation types would allow a single technician to quickly install Windows 10 Enterprise on 50 workstations simultaneously? A) Repair installation B) Refresh install C) In-place upgrade D) Image deployment
D) Image deployment
When Jason needs to log in to his bank, he must use a hardware token to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to log in? A) Biometric lock B) Smart card C) PIV card D) Key fob
D) Key fob
A printing company uses an isolated Windows XP workstation to print out large format banners for its customers on a custom printer. Unfortunately, the printer does not support newer versions of Windows and would cost $50,000 to replace it. To mitigate this risk, the workstation is not connected to the internet or a local area network. When a customer needs a banner printer, the technician takes a copy of their PDF file and moves it to the Windows XP workstation using a USB thumb drive. The workstation recently became infected with malware when printing a customer's file. The technician remediated the issue, but the workstation became infected again three weeks later. Which of the following actions did the technician forget to perform? A) Perform a data wipe operation on the USB thumb drive before its next use B) Disable System Restore and remove the previous restore points C) Connect the workstation to the Internet to receive the latest Windows XP patches D) Manually update the antivirus on the workstation and set it to perform on-access scans
D) Manually update the antivirus on the workstation and set it to perform on-access scans
Eduardo is installing Windows 11 (64-bit) in a virtual machine on his macOS desktop. The installation is continually failing and producing an error. Eduardo has configured the virtual machine with a 2.2 GHz processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced? A) Amount of hard drive space B) Amount of memory C) The screen resolution D) Number of CPU cores
D) Number of CPU cores
Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards? A) PII B) PHI C) GDPR D) PCI-DSS
D) PCI-DSS
You need to connect to a Linux server to conduct some maintenance. The server is located in a remote office about 50 miles away. You decide to connect the server remotely instead of driving to the location to save some time, but you want to ensure you do this securely. The Linux server has VNC installed, but it isn't configured to provide an encrypted connection. Which of the following should you use to secure the VNC connection to the remote server? A) RDP B) HTTPS C) WPA2 D) SSH in tunnel mode
D) SSH in tunnel mode
Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization? A) Zero-day B) Spoofing C) Phishing D) Spear phishing
D) Spear phishing
Which of the following is a connectionless protocol that utilizes on UDP? A) FTP B) HTTPS C) HTTP D) TFTP
D) TFTP
Which of the following remote access tools is a command-line terminal emulation program operating on port 23? A) VNC B) RDP C) SSH D) Telnet
D) Telnet
Jason is using a Windows 10 workstation in the Dion Training conference room. The workstation is acting extremely slow and he suspects there are other accounts logged on to the workstation. Which of the following features in the Task Manager should he use to identify if anyone else is currently logged on to the workstation? A) Processes B) Performance C) Services D) Users
D) Users
You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the first 512-byte sector on the hard disk? A) diskpart list B) bootrec /fixboot C) bootrec /rebuildbcd D) bootrec /fixmbr
D) bootrec /fixmbr
Which command is used in the Linux terminal to change the permissions of a file? A) pwd B) sudo C) chown D) chmod
D) chmod
A Windows laptop is malfunctioning, and you believe that some system files are missing or corrupted. Which of the following commands should you use to verify this and, if needed, repair the files? A) gpupdate B) chkdsk C) xcopy D) sfc
D) sfc