comptia a+ 1002 most wrong

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Chris just downloaded a new third-party email client for his smartphone. When Chris attempts to log in to his email with his username and password, the email client generates an error messaging stating that "Invalid credentials" were entered. Chris assumes he must have forgotten his password, so he resets his email username and password and then reenters them into the email client. Again, Chris receives an "Invalid credentials" error. What is MOST likely causing the "Invalid credentials" error regarding Chris's email client?

If a user or system has configured their email accounts to require two-factor authentication (2FA) or multifactor authentication, then even if they enter their username and password correctly in the third-party email client, they will receive the "Invalid credentials" error message. Some email servers will allow the user to create an Application Specific Password to bypass the multifactor authentication requirement to overcome this. The user will have to use an email client that supports multifactor authentication.

Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won't open. What should you do?

If an encrypted email does not open in your mail app, you most likely need to verify that your digital certificates are properly installed on the device as these are used to decrypt encrypted emails.

A network administrator needs to set some immediate policies on several systems. Upon completion of an update from the command line of the first system, what is the next step that should be completed before moving to a new system? (Select TWO).

The command-line prompt should be closed, not minimized, upon completion of the update command.

Tyrion discovers a computer on his network has been infected with a Zero-day virus. Which of the following is the first thing that should be done to the workstation?

A Zero-day virus is a virus that is so new and unheard of that no virus scanner has the definitions to be able to protect against it. The best thing to do when you have a computer that you suspect has a 0-day virus is unplugging it from the wall and wait for your favorite antivirus company to come up with a fix.

Joe has a firewall and up-to-date antivirus software on his company computer. He has asked what else he can do to improve his security. Which of the following will have the most impact on network security? (Select two.)

According to CompTIA's best practices, two of the best ways to secure a workstation are to configure a complex password and to restrict user permissions. You can restrict user permissions by assigning security rights based on whatever job roles exist.

Which of the following is not a file attribute?

Administrator is not a file attribute.

After you have completed a Windows installation and verified that the system starts and runs, what should you do next?

After a successful Windows installation, install the latest service pack or updates along with any updated drivers.

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue?

Captive portals usually rely on 802.1x, and 802.1x uses RADIUS for authentication.

Which of the following programs would be LEAST useful in removing malware?

Chkdsk cannot clear malware.

What does Windows 7 's User Account Control (UAC) do?

Prevents programs from running with escalated privileges without your knowledge by opening a dialog box warning you and asking for you to either allow or deny that program.

Highland Network Management Services has been hired to handle the Bayland Widget switches and routers. The only problem is that Highland is across town from the Bayland network devices. Which tool should Highland use to connect securely to the Bayland devices to manage them properly?

SSH, or Secure Shell, enables secure access to remote devices, such as switches and routers.

Which of the following is a legitimate way to update your anti-malware program?

See if the anti-malware program has an automatic update feature.

Ken's company requires all users to change their password every month. A user shows Ken a trick the uses to help him remember this month's password. He uses the password "friendly" and then adds the third letter of the month to the end of the password. For example, in March, his password is "friendlyr." What should Ken remark about this user's idea?

Simply changing one letter is not enough. Tell him to try to add at least one more number or letter

A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?

Slow data speeds can be caused by too much interference or a weak signal. Try changing the channel on Wi-Fi routers to less-used channels or boost the signal being transmitted, and the performance should increase. Alternatively, if the cellular signal is too low, you can install a signal booster or microcell in the home or office.

Where are software firewalls usually located?

Software firewalls typically reside on the client systems.

What does the System Information utility do?

System Information provides you with a report about the hardware resources, components, and software environment in your computer.

Eleanor, a user, contacts the help desk to report that her workstation will not boot up this morning. The help desk technician verifies that the workstation's memory, power supply, and monitor function properly. The technician believes that the hard drive is not recognized by the system based on an error message displayed on the screen. Which of the following error messages was being displayed?

"No boot device available" is an error message that indicates the workstation is not recognizing the hard drive. If the error message were "Operating system not found" or "NTLDR not found," this would indicate that the hard drive was recognized but that the Windows OS was not installed properly. The "BIOS ROM checksum error" would indicate an issue with the BIOS, not the hard drive.

A cybersecurity analyst is applying for a new job with a penetration testing firm. He received the job application as a secured Adobe PDF file, but unfortunately, the firm locked the file with a password so the potential employee cannot fill in the application. Instead of asking for an unlocked copy of the document, the analyst decides to write a script in Python to attempt to unlock the PDF file by using passwords from a list of commonly used passwords until he can find the correct password or attempts every password in his list. Based on this description, what kind of cryptographic attack did the analyst perform?

A dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary. The key to answering this question is that they were using passwords from a list. In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. A dictionary attack is a specific form of a brute-force attack that uses a list. A session hijacking attack compromises the session token by stealing or predicting a valid session token to gain unauthorized access to the webserver. A man-in-the-middle attack (MITM), also known as a hijack attack, is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.

Which of the following types of backups only copies data modified since the last full backup?

A differential backup only creates a copy of the selected data that has been modified since the last full backup. It is a good compromise in speed between a full backup (which takes the longest to backup and the least to restore) and an incremental backup (which takes the least to backup and the longest to restore).

Which of the following devices would you configure an ACL to implement a security policy within your network?

A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and an untrusted external network, such as the internet.

Dion Training wants to provide governance for the length, complexity, and expiration requirements for its user's knowledge-based authentication factors. Which of the following policies should this be documented within?

A password is an example of a commonly used knowledge-based authentication factor in security. A password policy defines standards for creating password complexity. It also defines what an organization considers weak passwords and the guidelines for protecting password safety. It specifies standards such as avoiding common passwords, creating strong passwords, and rules for not using work-related passwords for other sites or services.

Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as?

A power surge is basically an increase in your electrical current. A power surge often has levels of 10-30% above the normal line voltage and last from 15 milliseconds up to several minutes.

Which of the following types of backup requires the LEAST time to complete a backup?

An incremental backup only creates a copy of new files and files modified since the last full, incremental, or differential backup. Therefore, it takes the least amount of time to complete a backup. Unfortunately, it also takes the most time to restore since you have to first restore the full backup, then any differential and incremental backups until all your data is restored.

Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. What can she do to make the games work properly in Windows?

By right-clicking on the game, selecting Properties, and then clicking on the Compatibility tab, Missy can change several settings including running in 640 x 480 mode.

Running CHKDSK by itself only inspects the partition for problems. To get CHKDSK to fix anything, you must run it with the _______ switch.

CHKDSK /F fixes errors on the disk.

A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information?

DNS server (Domain Name System) is a computer hardware or software server on a network that responds to queries about its domain directory. In essence, it is a phone book to translate the IP addresses to the device.

Wearing an anti-static wrist strap while installing a CPU protects ________ from ESD.

ESD will not hurt humans, only components, including the CPU.

You have just installed a new photo-sharing social media app on your smartphone. When you try to take a photo with the app, you hear the picture taking sound. Unfortunately, when you check the app and your photo album, you cannot find any new pictures. Which of the following actions should you take to fix this issue?

Each app has to have the proper permissions to use the smartphone's various components, such as the microphone, camera, and storage. If the app has the correct permissions for the camera but not the storage, it will not store the photos being taken. This issue can be quickly corrected by checking the permissions under the app's settings and the smartphone's settings. Retake testContinue

What utility displays Application, Security, and System log files?

Event Viewer uses these three log files to record tracked events.

A user's computer keeps producing a "low virtual memory" alert, after which the speed of the system degrades. Which of the following Control Panel applets can provide information to review and correct this issue?

Going to System > Advanced enables you to change settings like the amount of virtual memory your computer uses.

When dealing with a difficult customer, which of the following is the BEST way to handle the situation?

Good technicians must appreciate the customer's feelings. Nothing upsets people more than a broken computer. So if you are helping someone, they are likely already frustrated. Never speak rudely to a customer, and be sure to maintain a positive attitude.

When Jason needs to log in to his bank, he must use a key fob to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to login?

Hardware tokens are a generic category of security devices that require a physical device to log in to a computer. A key fob, PIV card, and smart card are all examples of a hardware token. A key fob generates a random number code synchronized to a code on the server. The code changes every 60 seconds or so. This is an example of a one-time password. A SecureID token is an example of a key fob that is produced by RSA.

Which low power mode is used with laptops to save power, but it takes longer to turn back on and resume where the user left off?

Hibernate mode uses less power than sleep mode and is usually available for laptops. It takes a bit longer to resume than sleep mode does, but it will resume everything where you left off once the laptop is powered back on. Hibernate mode should be used when you won't be using your laptop for an extended period of time.

Lenny has just learned that laptops can share memory for video, and he is curious to find out how much RAM his laptop reserves for video. He is surprised to discover that all of his 1 GB of memory is shown being used by Windows. What's happening?

Higher-end laptops have dedicated video cards with their own RAM, just like many desktops (although some desktops do use shared memory for video!).

A user receives the following error message: "Windows Update cannot currently check for updates because the service is not running." The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT?

If any of the .DLL files involved with Windows Update are not correctly registered, you may also encounter this problem. To solve it, open services.msc and stop the Windows Update service. Then, open a Command Prompt as the administrator and use regsvr32 for each of the 6 Windows Update DLL files (wuapi.dll, wuaueng.dll, wups.dll, wups2.dll, wuwebv.dll, and wucltux.dll). Then, open services.msc and restart the Windows Update service. Finally, restart your computer for these changes to take effect.

What permissions would be represented by the octal 517?

In Linux, you can convert letter permissions to an octal by giving 4 for each R, 2 for each W, and 1 for each X. So, R-X is 5, --X is 1, and RWX is 7.

How would you represent r-xrw-r-- in octal notation?

In Linux, you can convert letter permissions to an octal by giving 4 for each R, 2 for each W, and 1 for each X. So, R-X is 5, RW- is 6, and R-- is 4.

Louis is using the Web interface to configure his SOHO home router/access point. At this exact moment, none of his computers are on the wireless network. He goes into a screen called "active clients" only to see that a computer he doesn't recognize is on his network. What should he do?

In the vast majority of these cases, the person using your wireless connection doesn't even realize they are doing so. Louis needs to assess and apply better security.

Jason has an old 2015 Dell Laptop that he uses to connect to his office network while traveling. The computer is slow and is running Windows 7. The laptop's screen was recently cracked and needs replacement. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?

In this scenario, you should recommend that he purchase a new laptop. Since the laptop is 5-7 years old, it is unlikely to be worth the cost of repair since he could buy a new laptop for $200 to $500. This new laptop would be faster, more secure, and last longer than repairing this older Dell laptop

Jim sees a Windows error saying the "error log is full." Where can he go to fix this?

Jim can use the Event viewer to delete error log files when they become full - or to have the files delete themselves when they reach a certain size.

Kevin gets a call from a user who is trying to install a new piece of software. The user doesn't have administrative rights, so she's unable to install the software. What tool can Kevin use to install the software for the user without giving the user the local administrator password?

Kevin can use Remote Desktop to login to the computer with administrative rights and perform the install for the user.

You have been asked to recycle 20 of your company's old laptops. The laptops will be donated to a local community center for underprivileged children. Which of the following data destruction and disposal methods is MOST appropriate to allow the data on the drives to be fully destroyed and the drives to be reused by the community center?

Low-level formatting is a hard disk operation that should make recovering data from your storage devices impossible once the operation is complete. It sounds like something you might want to do if giving away a hard disk or perhaps discarding an old computer that may have contained useful and important private information. Standard formatting of the drives could allow the data to be restored and make the data vulnerable to exposure. Drilling or hammers the HDD platters would physically destroy the drives and the data, making the laptops useful for the community center. Degaussing the drives would also render the drives useless to the community center. Therefore, the safest method is a low-level format since it fully destroys the data and allows the drives to be reused by the community center.

A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

Malware often targets the web browser. Malware such as adware and spyware is designed with commercial or criminal intent rather than to vandalize the computer system. Common infection symptoms of spyware or adware are pop-ups or additional toolbars, the home page or search provider changing suddenly, searches returning results that are different to other computers, slow performance, and excessive crashing. Viruses and Trojans may spawn pop-ups without the user opening the browser. Since this is a home user's laptop, you should remediate the issue and return the system to them. Since this is not a system owned by your company, there is no reason to report it to your company's cybersecurity department.

Nicole's smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is at home. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue?

Most likely, Nicole's smartphone is connected to a neighbor's wireless network instead of her own. This network likely has a lower signal strength since it is outside her home, causing the limited or slow bandwidth. Therefore, you should first verify that Nicole is connected to the proper wireless network before conducting any additional troubleshooting.

The shared folder named C$ is an example of which of the following?

The $ symbol at the end of the share name marks this as a hidden administrative share, which enables system administrators to access systems remotely.

Windows provides several ready-made MMC Snap-ins stored in the _______ applet in the Control Panel.

The Administrative Tools applet contains many useful tools that can be added to the MMC as Snap-ins.

Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure?

The Connections tab in the Internet Options is used to set up the dial-up and VPN settings and the LAN settings. Under the LAN settings, you can configure the proxy server settings for the system.

You have been asked to replace a computer's hard drive. Which of the following steps should you take FIRST to prevent an electrical hazard while working on the computer?

The FIRST thing that you need to do is disconnect the power to the computer. This will eliminate many electrical hazards and prevent you from getting an electrical shock while working on the machine. After it is disconnected, it is a good idea to use an ESD strap, place the computer and its components on an ESD mat, and work on the computer on top of a grounded workbench.

The command-line interface command to delete a directory in Windows 7 Professional is ________.

The RD command removes directories if the directory is empty

A Windows 7 desktop PC has blue screened several times, indicating a possible RAM problem. Which of the following tools can be used to test this problem?

The Windows Memory Diagnostic tool diagnoses memory problems.

Which of the following is required for evidence to be admissible in a court of law?

The chain of custody is used to document the collection and preservation of evidence from its initial acquisition, throughout the handling leading up to a trial, and during its preservation in case of an appeal or retrial.

Which command prompt command will enable you to see all the files in the C:\FRED folder with the extension EXE?

The command DIR C:\FRED\*.EXE is the only command prompt command that will list only the files in the C:\FRED folder with the extension EXE.

Which command would be used to display the IP address and subnet mask for the wired network connection on a macOS or Linux system?

The ifconfig command is used to display information about the current wired network connection on a macOS or Linux system, including its IP address, subnet mask, and MAC address

John worked on his PowerPoint presentation yesterday, but today the program won't run. What Windows tool or option should he try to get PowerPoint working again?

The key fact here is that the application worked in the past but doesn't work now. Given the choices you have, it's safe to assume that John possibly installed another program that created a problem with PowerPoint and that his best fix to this problem would be to restore the system to a time that PowerPoint was working.

You are troubleshooting an issue with a Windows desktop and need to display the machine's active TCP connections. Which of the following commands should you use?

The netstat command is used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols) on a Windows machine. This is a useful command when determining if any malware has been installed on the system and maybe maintaining a remote connection with a command and control server.

You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend's Windows 10 desktop. Which file format should you use?

The only file system format that would work for this situation is exFAT. A macOS system can format a hard drive as APFS, HFS+, HFS, exFAT, or FAT32. The Windows system would only be able to read exFAT or FAT32. Unfortunately, FAT32 only supports drive sizes up to 32 GB, and file sizes up to 4 GB. Therefore exFAT should be used as it supports sizes up to 128 petabytes.

Which command-line entry would be used on a Windows system to test if your system can reach diontraining.com?

The ping command is used to test a host's reachability on an Internet Protocol network. For example, typing "ping diontraining.com" will cause a series of ICMP packets to be sent to the Dion Training server. If they are received successfully, your system will receive an echo reply. Your system will then report if the call and response were successful and how long it took in milliseconds.

Which of the following commands is used on a Linux system to list the system's currently running processes?

The ps command is used to list the currently running processes, and their PIDs and some other information depend on different options. It reads the process information from the virtual files in the /proc file system. The /proc directory contains virtual files and is known as a virtual file system.

A user contacts the service desk after they just finished attempted to upgrade their laptop to Windows 10. The upgrade failed, and the user asks you to explain why. Which of the following log files should you review to determine the cause of the upgrade failure?

The setup log contains a record of the events generated during the Windows installation or upgrade process. The file (setup.evtx) is stored in the %System Root%\System32\Winevt\Logs\ folder and can be opened using the Event Viewer.

Which of the following commands is used on a Linux system to safely turn off a server?

The shutdown command brings the system down in a secure way. When the shutdown is initiated, all logged-in users and processes are notified that the system is going down, and no further logins are allowed. You can shut down your system immediately or at the specified time.

You are working as a desktop repair technician for a large corporation. The company uses the exact same desktop hardware for all of its user's workstations. Today, you have received multiple calls from users complaining that their screen becomes filled with static when moving their mouse. You believe the video card driver may be at fault. Which log would you review to determine if the video card driver has been updated recently?

The system log contains information about service load failures, hardware conflicts, driver load failures, and other common issues. If the driver was recently updated and is now causing issues, it will most likely be documented in the system log.

Your company wants to get rid of some old paper files. The files contain PII from previous customers, including their names, birth dates, and social security numbers. Which of the following are the appropriate data destruction and disposal techniques that should be utilized for these papers?

The three most common types are; strip-cut, cross-cut, and micro-cut. The strip-cut machines shred long vertical pieces, as cross-cut adds horizontal cuts to make the shred pieces even smaller. Micro-cut machines shred to an even higher level of security, essentially converting your documents into tiny particles.

Which TWO of the following would provide the BEST security for both computers and smartphones?

The use of multifactor authentication is considered an industry best practice for both computers and smartphones. Additionally, any software being installed should come from a trusted source to prevent malware infections.

A user types http://23.62.99.75 to access the Barney the Dinosaur website, but cannot access it by entering www.barney.com. What Internet service needs to be checked?

This is a classic symptom of a problem with the Domain Name Service (DNS).

A printing company uses an isolated Windows XP workstation to print out large format banners for its customers on a custom printer. Unfortunately, the printer does not support newer versions of Windows and would cost $50,000 to replace it. To mitigate this risk, the workstation is not connected to the internet or a local area network. When a customer needs a banner printer, the technician takes a copy of their PDF file and moves it to the Windows XP workstation using a USB thumb drive. The workstation recently became infected with malware when printing a customer's file. The technician remediated the issue, but the workstation became infected again three weeks later. Which of the following actions did the technician forget to perform?

This is a legacy workstation since it is running Windows XP. Since Windows XP is considered end-of-life, there are no security patches or updates available for it. To mitigate this risk, the workstation should be run only as an isolated workstation. Since the workstation is not connected to a network and receives files through the connection of a USB thumb drive, this would be the only way a piece of malware could enter the system. The technician most likely neglected to update the antivirus/antimalware software on this workstation during the remediation. The technician should manually update the antivirus/antimalware definitions weekly. The workstation should also be configured to conduct on-access/on-demand scanning, as well.

You are working at the service desk and just received the following email from an end-user who believes it is suspicious: ***********************From: [email protected]: [email protected]: You won a free iPhone! You have won a brand new iPhone!Just click the following link to provide your address so we can ship it out to you this afternoon: (http://www.freephone.io:8080/winner.php) *********************** How should you classify this email?

This is an example of a phishing campaign. Phishing refers to obtaining user authentication or financial information through a fraudulent request for information. Phishing is specifically associated with emailing users with a link to a faked site (or some other malware that steals the information they use to try to authenticate). Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization, or business. In this example, the specific user wasn't clearly targeted by their name or by their association with a particular store, company, or website.

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not Found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?

This issue may occur if one or more of the following conditions are true: (1) the basic input/output system (BIOS) does not detect the hard disk, (2) the hard disk is damaged, (3) sector 0 of the physical hard disk drive has an incorrect or malformed master boot record (MBR), (4) an incompatible partition is marked as Active, or (5) a partition that contains the MBR is no longer active. The only option provided in this list is that an incompatible partition is marked as active.

Tom installs a Telnet application on his Windows system. When he first starts the program, Windows Firewall pops up with a message telling him the Telnet application is trying to access the Internet. If he clicks on the Allow button, what has he created?

Windows Firewall's term for applications allowed to pass to the Internet is exceptions.

Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com." What should Michelle do to fix this problem?

When a browser redirect occurs, it usually results from a malicious proxy server setting being added to the browser. Michelle should first check her web browser's configuration for any malicious proxies under the Connections tab. Next, she should check the hosts.ini file to ensure that no single sites are being redirected.

Which of the following allows a user to save their current session to memory and put the computer into a minimal power state?

When a user wishes to suspend their current session and have the computer enter a low power state, they can use the sleep mode. The sleep option saves the current session to disk before putting the computer into a low power state. This allows a laptop user to save battery life while not using the system.

Edward has just returned to his office after a two-week vacation. When he logs into his email client to access his company email, he notices that he cannot see the shared Customer Service inbox folder in his email client. He contacts the help desk, and they verify that his account is still connected to the domain controller and that it can still send and receive emails successfully. What is the MOST likely happened during Edward's vacation that caused the missing inbox folders in the email client?

While Edward was on vacation, the network file share's permissions have likely been modified. Based on the fact that Edward's account is connected to the domain and can send/receive emails, it cannot be his user account's permissions causing the issue. The internet security options would also prevent him from sending/receiving mail, so that can be eliminated. Even if the operating system were updated, that would not affect the shared inboxes since they reside on the network file shares and not Edward's computer.

A workstation was patched last night with the latest operating system security update. This morning, the workstation only displays a black screen. You restart the computer, but the operating system fails to load. What is the NEXT step you should attempt to boot this workstation?

While security updates are designed to make your system more secure, sometimes they can cause issues and make the system unable to boot up fully. If this occurs, the system should be rebooted into safe mode, and the most recent security update should be "rolled back." To roll back an update, hit Windows+I to open the Settings app and then click the "Update & security" option. Then, click "Recovery," "Get started," and "Go back to an earlier build" to uninstall the latest update.

Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router cannot get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router's configuration to ensure it is set up to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address?

Whitelisting specific MAC addresses is a security measure implemented by the administrator to only grant access to a specific user. It avoids a person with malicious intentions to access the corporate network. Since the router has a different MAC address, it is blocked from connecting to the wired network.

What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card's hardware address?

Wireless access points can utilize MAC filtering to ensure only known network interface cards are allowed to connect to the network. If the hacker changes their MAC address to a trusted MAC address, they can easily bypass this security mechanism. MAC filtering is considered a good security practice as part of a larger defense-in-depth strategy, but it won't stop a skilled hacker for long. MAC addresses are permanently burned into the network interface card by the manufacturer and serve as the device's physical address. WEP is the Wired Equivalent Privacy encryption standard, which is considered obsolete in modern wireless networks. WEP can be broken using a brute force attack within just a few minutes by an attacker. Another security technique is to disable the SSID broadcast of an access point. While this prevents the SSID broadcast, a skilled attacker can still find the SSID using discovery scanning techniques. WPS is the WiFi Protected Setup. WPS is used to connect and configure wireless devices to an access point easily

You need to move a new desktop to another desk. Which of the following actions should you take?

You should always lift with your legs and not your back. The leg muscles are much stronger than the back muscles. If you carry heavy objects with your back, you will injure yourself. If the object is greater than 50 pounds, you should ask another coworker to assist you in a team lift to carry the object to prevent injury.

Which Registry root key contains information about file types?

You'll find file information in HKEY_CLASSES_ROOT.

A user receives the following error message: "Windows Update cannot currently check for updates because the service is not running." The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT?

reboot the computer....If any of the .DLL files involved with Windows Update are not correctly registered, you may also encounter this problem. To solve it, open services.msc and stop the Windows Update service. Then, open a Command Prompt as the administrator and use regsvr32 for each of the 6 Windows Update DLL files (wuapi.dll, wuaueng.dll, wups.dll, wups2.dll, wuwebv.dll, and wucltux.dll). Then, open services.msc and restart the Windows Update service. Finally, restart your computer for these changes to take effect.


Ensembles d'études connexes

The Cardiovascular and Respiratory Systems

View Set

CH 15- AUDITING GOVERNMENTS AND NOT-FOR-PROFIT ORGANIZATIONS

View Set

Health Assessment PrepU Chapter 02

View Set

moral absolutism and moral relativism

View Set