1102 Domain 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following file types are commonly used by network administrators to perform repetitive tasks using a Microsoft proprietary programming language?

.vbs

A customer is complaining that her laptop is too slow. You have thoroughly checked the device but cannot find anything wrong with it. Which of the following is the best thing to say NEXT?

"Can you tell me more about the problem? What do you mean by 'it is acting slow'?"

A coworker is creating a file containing a script. You look over their shoulder and see "net use s:\\fileserver\videos" in the file. Based on this, what type of file extension should this script use?

.bat

Which of the following file types are commonly used to create simple scripts in the Windows command-line environment?

.bat

Which of the following file types are commonly used by management and administrative tasks in Windows using the Integrated Scripting Environment?

.ps1

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the file be in?

.ps1

Which of the following file types are commonly used to create applications that can be run on Linux, macOS, and Windows?

.py (python)

A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?

.sh

During a disaster recovery, which of the following statements is true?

A virtual machine has less downtime than a physical server

Which of the following policies should be created to provide employees with the guidelines and limitations they must follow when using company-provided email, computers, and network access?

AUP (Acceptable use policy)

Every new employee at Dion Training must sign a document to show they understand the proper rules for using the company's computers. This document states that the new employee has read the policy that dictates what can and cannot be done from the corporate workstations. Which of the following documents BEST describes this policy?

AUP (acceptable use policy)

Dion Training wants to provide governance for how employees can utilize the corporate network, email, and laptops while working for the company. Within which of the following should this be documented?

Acceptable use policy

You are installing a new file server at the offices of Dion Training. The entire building has a diesel generator installed to protect it from power outages. The file server must have zero downtime once placed into production. Which of the following power sources should the file server utilize?

An uninterruptible power supply (UPS)

A customer has requested you install an external video card into their gaming PC. Which of the following tools should you utilize to protect the video card as you carry it from the storage room to your workbench?

Antistatic bag

You are working on upgrading the memory on your friend's laptop. After removing the old memory chips from the laptop, where should you safely store them?

Antistatic bag

What information should be recorded on a chain of custody form during a forensic investigation?

Any individual who worked with evidence during the investigation

You need to move a 75-pound box with a rack-mounted UPS in it. Which of the following actions should you take?

Ask a coworker to team lift it with you

A user's computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do?

Ask another Tier 2 technician to answer the call since it will take too long to solve

Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?

Asset ID

You are a member of a project team contracted to install twenty new wireless access points (WAPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is still finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the SOW and change request before its approval?

Backout plan

A small business recently experienced a catastrophic data loss due to flooding from a recent hurricane. The customer had no backups, and flooding destroyed all of the hardware associated with the small business. As part of the rebuilding process, the small business contracts with your company to help create a disaster recovery plan to ensure this never reoccurs again. Which of the following recommendations should you include as part of the disaster recovery plan?

Backups should be conducted to a cloud-based storage solution

You are concerned that your servers could be damaged during a blackout or brownout. Which TWO devices would protect against blackouts and brownouts?

Battery backup Line conditioner

You are setting up the Remote Desktop Services on a Windows 2019 server. To increase the security of the server, which TWO of the following actions should you take?

Block all unused ports on the switch, router, and firewall Logically place the Windows 2019 server into the network's DMZ

What type of structure is "IF THEN ELSE" in scripting?

Branch

Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as?

Brownouts

Which of the following components presents the largest risk of electrical shock to a technician?

CRT monitor

Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence?

Chain of custody

Which of the following is a document used in cyber forensics that lists everywhere evidence has been?

Chain of custody

Which of the following data types would be used to store the user's middle initial?

Character

A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming wants to document his script so that other programmers can understand what his logic was when he wrote it. Which of the following should he use?

Comment

A programmer is writing a script to calculate the temperature in Fahrenheit when it receives input in celsius. The conversion factor used is 5/9. Which of the following would be used to store this fixed conversion factor in the script?

Constant

You have submitted an RFC to install a security patch on some of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe which servers will receive the patch during this maintenance window?

Scope

You are applying for a job at a cybersecurity firm. The application requests you enter your social security number, date of birth, and email address to conduct a background check as part of the hiring process. Which of the following types of information has you been asked to provide?

PII (Personally Identifiable Information)

Which of the following types of backup requires the LEAST time to complete a backup?

Differential

You have been asked to replace a computer's hard drive. Which of the following steps should you take FIRST to prevent an electrical hazard while working on the computer?

Disconnect the power prior to serving the computer

You are replacing a swollen battery in a customer's smartphone. Which of the following should you use? (Select TWO)

Gloves Safety goggles

You are assisting a network administrator with updating the firmware of a Cisco iOS-based router. This router is the only border router for your organization, and it connects them to the internet. The request for change is being written and contains the purpose, plan, scope, and risk analysis of the proposed change. Which of the following should be added to the RFC before its approval?

Document a backout plan if the update is not successful

Which of the following tools should you utilize to ensure you don't damage a laptop's SSD while replacing it?

ESD strap

After installation or change has been implemented, which of the following is necessary before closing the change request?

End-user acceptance

You are working as a defense contractor for the U.S. Army. The Army is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this sized organization to purchase?

Enterprise

Which of the following is used to communicate data and preferences to child processes within a script or batch file?

Environmental variables

Which of the following data types would be used to store the number 3.14?

Floating-point

Which of the following types of backup would require the MOST time to complete?

Full

Your company is expanding its operations in the European Union and is concerned about additional governmental regulations that may apply. Which of the following regulations applies when processing personal data within the European Union?

GDPR (General Data Protection Regulation) is a regulation that applies to companies that do business in the European Union.

You are the first help desk technician on the scene of a potential data breach. What is the FIRST thing you need to do as part of the incident response?

Identify the issue

Your company has just installed 50 new LCD monitors to replace some ancient CRT monitors. How should you properly dispose of the old CRT monitors?

In accordance with local government regulations and handling procedures

You are working at the service desk when you receive a call from an upset user because their workstation cannot receive any emails. Which of the following should you use to document this phone call?

Incident database

You are working at the Dion Training headquarters in Puerto Rico. The island just suffered a power outage due to a hurricane. The server room in the headquarters has power, but the rest of the office does not. You verify that the diesel generator is running at full electrical load capacity. Which of the following solutions should you recommend to Dion Training to allow them to continue working during a long-term power outage?

Increase the capacity of their backup generator to support a larger load

Which of the following types of backups only copies data modified since the last full backup?

Incremental

Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues are occurring and remember that each time it occurs that the lights also become dimmer momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router's power cycling. What should you (a network technician) do to solve this problem?

Install a UPS

Which of the following data types would be used to store the number 21?

Integers

Dion Training is creating troubleshooting guides and frequently asked questions for its new customer service technicians. Which of the following would MOST likely contain these documents?

Knowledge base articles

You need to move a new desktop to another desk. Which of the following actions should you take?

Lift with your legs and not your back

Dion Training's offices are frequently experiencing brownouts and sags. Which of the following solutions would protect all of their workstations and servers from these brownouts?

Line conditioner

A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?

Loop

What type of structure is "For Next" in scripting?

Loop

What type of structure is a "Do While" in scripting?

Loop

Which of the following is the BEST thing to use to uniquely identify the different workstations in use on the local area network?

MAC address

You have discovered that an employee has been conducting illegal activities using his workplace computer. You have taken possession of the employee's laptop according to your company's procedures and are waiting to give it to law enforcement authorities. What should you do when turning over the laptop to the police?

Maintain the chain of custody

Dion Training wants to provide governance for the length, complexity, and expiration requirements for its user's knowledge-based authentication factors. Which of the following policies should this be documented within?

Password policy

Which of the following would NOT be included in a company's password policy?

Password style

You are installing a new firewall for Dion Training's corporate network. Which of the following documents should you update FIRST?

Network topology diagrams

You are working as a file server administrator. You are backing up the files on the server when you observe numerous inappropriate photos and videos stored on the corporate share drive by the user jsmith. These files are clearly in violation of the company's AUP. What should you do FIRST?

Notify your immediate supervisor

A customer runs frantically into your computer repair store. He says that his smartphone fell into a puddle, and now it won't turn on. He excitedly tells you that he needs the smartphone working again "right now" and cannot wait. What should you do?

Offer the customer the option to replace his phone

A user has asked you for a recommendation for a word processing program for their home computer. The user doesn't want to pay for a license to be able to use the word processor. Based on this, what type of license would you recommend to the user?

Open license

A user has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. The user states they do not want to pay for the software. Which of the following would MOST likely be the best option for them?

Open-source

Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards?

PCI-DSS

You have been asked to classify a hospital's medical records as a form of regulated data. Which of the following would BEST classify this type of data?

PHI (Protected Health Information)

Which of the following is considered a form of regulated data?

PII (Personally Identifiable Information)

Jack has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. Jack states he wants to get a copy of Microsoft Word so their son can create reports for school. Which of the following would MOST likely be the best option for them?

Personal

You are working as a forensic investigator for the police. The police have a search warrant to capture a suspect's workstation as evidence for an ongoing criminal investigation. As you enter the room with the policeman, he arrests the suspect and handcuffs him. What should you do FIRST?

Secure the area

You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window?

Plan

Your company is concerned about the possibility of power fluctuations that may occur and cause a large increase in the input power to their server room. What condition is this known as?

Power spikes

Which of the following components presents the largest risk of electrical shock to a technician?

Power supply

Which of the following devices should you NEVER disassemble during troubleshooting due to the risk of electrocution?

Power supply

Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as?

Power surge

You have just completed a repair for a customer's smartphone that took you three days. The customer complained that the repair took too long and began to question you about the steps you took to repair the device. What should you do NEXT?

Provide documentation of the repair to the customer and thank them for their patience

Jason has an old 2015 Dell Laptop that he uses to connect to his office network while traveling. The computer is slow and is running Windows 7. The laptop's screen was recently cracked and needs replacement. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?

Purchase a new laptop as the cost to repair might be more than a new laptop

Which RAID solution will provide the BEST speed and redundancy for a backup and disaster recovery server?

RAID 10

You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST?

Remove any jewelry

A system administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The server manager decides to initiate a rollback. Which describes what the system administrator should do next?

Return the system back to the original state before the change

You have submitted an RFC to install a security patch on all of your company's Windows 2019 server on Friday at 11 pm using an automated patch installation process. Which of the following change request documents would describe any uncertainty or adverse effects that may occur during the installation process?

Risk analysis

Which of the following remote access protocols should you use to connect to a Linux server securely over the internet?

SSH

Which of the following technologies would you use to securely access the command line interface of a network's switches and routers remotely for configuration?

SSH

You need to connect to a Linux server to conduct some maintenance. The server is located in a remote office about 50 miles from your own. You decide to connect the server remotely instead of driving to the location to save some time, but you want to ensure you do this securely. The Linux server has VNC installed, but it isn't configured to provide an encrypted connection. Which of the following should you use to secure the VNC connection to the remote server?

SSH in tunnel mode

Which of the following should you use when attempting to dislodge dirt in a keyboard with compressed air?

Safety goggles

You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe why the change will be installed during this maintenance window?

Scope

Which of the following remote access tools is a command-line terminal emulation program operating on port 23?

Telnet

Which of the following types of remote access technologies should NOT be used in a network due to its lack of security?

Telnet

You are writing a script that will take an employee's name as the input. Which of the following data types would the employee's name be store in?

String

You just installed a flat panel television in a conference room in your office building. The facilities manager is concerned that a lightning strike could damage it. The company is not worried about the threat of power outages because the conference room is only used a few times per week. Which of the following should be installed to BEST mitigate the facilities manager's concerns without spending too much money?

Surge protector

You are troubleshooting a network printer when a document is printed with sensitive employee data on it. Which of the following actions should you take?

Take the document to the office manager

Janice called the help desk to report that her computer will not boot up. The technician begins troubleshooting the issue, but after 20 minutes, the computer is still not booting up. Janice is getting frustrated with the technician, and she tells the technician that she feels that they are wasting her time since the issue isn't resolved yet. How should the technician respond to Janice's frustration?

The technician should ask open-ended questions to properly identify the issue by narrowing down the possible symptoms or causes

Which TWO of the following devices should have a grounding wire attached to them when installed per the manufacturer's recommendations?

UPS Server rack

Dion Training's offices are frequently experiencing brownouts, sags, and blackouts. Which of the following solutions would protect their servers from these issues?

Uninterruptible power supply

Karen lives in an area that is prone to hurricanes and other extreme weather conditions. She asks you to recommend an electrical conditioning device that will prevent her files from being corrupted if the building's power is unstable or lost. Additionally, she would like the computer to maintain power for up to an hour of uptime to allow for a graceful shutdown of her programs and computer. Which of the following should you recommend?

Uninterruptible power supply

Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?

VNC (Virtual Network Computing)

A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming needs to store the amount of disk space in a temporary place holder within the program that can be updated and changed during the script's execution. Which of the following would be used to store the value of the disk space needed?

Variable

In which conditions is ESD the highest threat?

When humidity is low

An offsite backup service is involved in an investigation currently. Because of this, they are not recycling outdated tapes. Which of the following is the MOST likely reason for this?

notice of a legal hold - preserve relevant info when litigation is anticipated


Ensembles d'études connexes

FIU Embedded Systems Final Review

View Set

Org Behavior Test Bank Chapter 1

View Set