CompTia A+ Practice Test (1002) Skillsoft

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You create a shell script and attempt to run it. You are prompted with the permission denied error. Before executing a shell script, which permission must you assign it with the chmod command?

+x

Which of the following values can be considered as examples of integers?

-5, 2, 7

For installing Windows 10 32-bit, what are the minimum and maximum amount of RAM should you have?

1 GB and 4 GB

Identify the components that should be part of a document business process: Who interacts with the business process? How do the stakeholders interact with the process? When do the stakeholders interact with the process?

1, 2, & 3

You have been tasked to configure the maximum security on the network. You also need to ensure that there is no weak security configuration. Identify the configuration that you must configure: Access control lists Complex passwords policy Strong encryption protocol for data transmission Content filtering

1, 2, 3, 4

You have the following requirements: User authentication must be done using a password or certificate that is stored on a mobile device. It should always be available for the user without the need of any special hardware. It must use two-factor authentication. To be able to meet these goals, you decide to use a software token. If you do this, which of the mentioned goals are met?

1, 2, and 3

You want to install the Windows 8 32-bit version on a Solid-State Drive (SSD) on your system. What is the minimum SSD size that you should opt for?

16GB

After facing a system-security incident, you need to work on the post-incident response. Identify the tasks that you must perform as part of the post-incident response: Perform a structural review Assess damage caused by the incident Isolate the impacted network segment Find source of the incident Prepare a detailed report and submit to the stakeholders

2, 3, 4, 5

You have a system with 2 GB RAM, and it has Windows 8 32-bit operating system installed. You need to upgrade the RAM in this system to its full capacity that the operating system can utilize. How much more RAM will you be able to add in this system?

2GB

You need to install Windows 10 64-bit on a system that has 100 GB hard drive. You want to create partitions in the hard drive for operating system and data. What should be the recommended size?

40 GB for OS and 60 GB for data

You are working on your Linux system's home directory, which contains the following files:plabdocumentpractice-labspilincorporatedYou want to open the pilincorporated files. What is the minimum number of keystrokes that you would use to open this file?

6

A computer is configured with a subnet mask of 255.255.255.192. How many IP addresses, including the network and broadcast addresses, are available to the subnet hosting the computer?

64

You have recently configured several new servers in the DMZ zone. A firewall is configured between the internal network and the DMZ zone. When you attempt to ping them from the internal network, you are not able to get any response. You have verified that the servers are up and running. What could be the possible reason?

A firewall is blocking the ICMP packets.

What is the outcome when you have activated the Encrypting File System (EFS)?

A user certificate is installed on each system

You are not able to open a set of files and get the access denied message. You are the creator of these files. Which of the following could have caused this issue?

A virus

You have multiple Mac and Windows systems on the network. If you use the Remote Disc feature, which of the following will you accomplish?

Access files on a remote Mac CD

A user has been complaining about strange folders being created on his system. The user has been installing various applications from the Internet. You need to ensure that you are able to clean the user's system without impacting the data. What should you do?

Access the pre-installation environment

While using a dial-up modem in a hotel that requires dial out using 0, you get the following error:Dialup error 680: There is no dial tone.How should you resolve this?

Add a pause to the modem's dialing sequence

You run the following command on a CentOS system: grep swap /etc/fstabHowever, there is no output. You need to enable swap on boot permanently. Which are steps that you must perform?

Add a swap partition in the /etc/fstab file & Run the mkswap /swap.dat command

You configure a system with a static IP address to host an application. A user on the network is unable to browse the Website using the domain name of the website internally. The user can browse the Website with the IP addresses only. What should you do to correct this problem?

Add the DNS server IP address to the network settings

You manage a workgroup of 10 computers and an Active Directory named PLAB.com. The workgroup systems require a set of network drives to be mapped persistently when they boot up. If there is a change in the network shares, its network drives should be updated on the systems automatically. You decide to use a login script to do this. What else should you do?

Add the systems to the PLAB.com domain

If you are accessing the following share:\\DESKTOP \c$Which of the following is being accessed?

Administrative share

In Internet Explorer, you want to enable script debugging. Which tab of Internet Options will allow you to do this?

Advanced

You have gone to a warehouse where you need to repair a system. The warehouse is located in the outskirts of the city and is quite dusty. You need to ensure that you follow the personal safety standards. Which of the following must you use to ensure personal safety?[Choose all that apply.]

Air filter mask & Safety goggles

You have been tasked to configure the maximum security on the network. You also need to ensure that there is no weak security configuration. Identify the configuration that you must configure:

All

If you are using Key Chain on a Mac machine, which type of information would you be able to store in it?

All answers

If you have configured your phone to use a PIN, which of the following attacks are possible?[Choose all that apply]

All answers

On a Windows 10 system, a service is failing to start. Identify the probable reasons this service could have failed.[Choose all that apply]

All answers

Which of the following can be considered as the correct method of declaring strings?[Choose all that apply.]

All answers

Which of the following solutions can help resolve a battery drain issue on an Android mobile device?

All answers

You have recently formatted your system after detecting a remote access trojan (RAT). You want to ensure that the RAT is no longer able to get into your system. Which of the following methods should you use?[Choose all that apply]

All answers

You have updated the data storage policy of your organization. You do not want the mobile devices to store data to any uncontrolled storage that you are not able to manage. In the policy, you need to include a few examples of such storage. Which of the following should you include?[Choose all that apply]

All answers

You want to perform a search using Spot Light. Which of the following information should you be able to search?[Choose all that apply]

All answers

Your system is infected with malware and your system's performance is largely impacted. Which of the following can cause to slow system performance due to a malware infection?[Choose all that apply]

All answers

Which of the following advantages does Linux offer over Windows?

All but better usability

Which of the following solutions can help increase a mobile phone's battery life?[Choose all that apply]

All but reboot mobile on a regular basis

If a mobile device is providing inaccurate touch screen responses, which of the solutions can help you resolve this issue?[Choose all that apply]

All but remove battery

Which of the following can be the possible causes for Windows Update failure?[Choose all that apply]

All but running antivirus program on the system

You manage a network that consists of 100s of applications that use single-sign-on from Active Directory. You want to implement the standard naming convention for user account creation. Moreover, you need to ensure that these users are able to continue using the applications with the single-sign-on. Which of the following considerations should you keep in mind in this case?

All of the mentioned choices

You have a new junior team member who needs to be trained on electrical fire safety. You need to ensure that the team member takes all the necessary precautions while working with the equipment. Which of the following points must you highlight?[Choose all that apply.]

Always keep the electrical fire extinguisher nearby, Always use a three-pronged electrical cord, & Power cords and outlets should not be damaged.

You have captured one virus for reverse engineering. However, when you decompile the virus, you find it difficult to understand its logic. You also find the code to be confusing during the review. Which type of virus are you dealing with?

Armored

Several users in your organization use pirated applications that they require for their projects. Since the procurement time is long and costs are not budgeted, the users download and use the pirated applications. Which of the following can be a suitable method to prevent this?

Ask each user to sign Acceptable Usage Policy (AUP)

You have taken a junior support team member to a customer location. You need to provide on the job training. However, you need to also be professional in handling the customer problem. What should you do?

Ask the team member to observe the steps silently

Which of the following will be implemented in a trusted operating system?[Choose all that apply]

Authentication & Authorization

You were asked to lift an old computer from the ground. When you were about to lift it, you were stopped by your supervisor who stated that you are not following the proper lifting method. You must follow the proper lifting method. What should you do in this scenario?[Choose all that apply.]

Avoid twisting your body & Bend your knees and pick up the computer

You have recently purchased a new mobile device and need to transfer the old device's data to the new device. Which option can be used to transfer the data quickly and securely to the new device with the least human interaction?

Back-up the old device's data to a cloud account and then synchronize the new device to the cloud account

Which of the following can slow down the data speed on a mobile device?

Background app data sharing

In which of the following plans should you use to restore backups that were taken before a change was implemented?[Choose all that apply]

Backout plan & Change the rollback plan

You need to configure a pre-defined power plan on a laptop that should optimize the CPU usage. It should also optimize the display as and when required. Which of the following power plan would fit the need?

Balanced

Which of the following two methods are valid for running a shell script named plab.sh?

Bash plab.sh & ./plab.sh

Which of the following advantages does Windows offer over Linux?

Better usability

You have updated the display drivers on your laptop. After you restart the laptop, Windows does not boot. Which of the following should you use to roll back the installed display drivers?

Boot the laptop into the Safe Mode

You need to repair a system that has a hard drive issue. Due to Group Policy, you cannot run a tool inside Windows. You need to perform full diagnostic and fix any error that may come up. Which of the following tool would be most appropriate to help you fix the hard drive issues in this case?

Boot the system, open Recovery Console, and run the chkdsk /F command

You want to protect your system from sudden electric surges. To do this, if you install a surge protector, which of the following can still cause damage to the system?[Choose all that apply]

Brownouts, Blackouts, Noise

At home, you have implemented a wireless network that uses the WPA2-PSK encryption protocol. With the use of this protocol, which of the following attack is likely to occur?

Brute force

You are heading to a customer's office but you are stuck in traffic. You are about 30 minutes away from the customer's office. The customer has requested urgent help. What should you do in this situation?

Call the customer and inform you that you will be slightly late

You have connected to the wireless router at home and are getting limited connectivity. What should be the first thing that you should do?

Check if the wireless router DHCP service is working

You have received a security alert from an unknown user stating a virus is infecting all documents. The E-mail had a URL to update the antivirus immediately. What should you do first?

Check the authenticity of email

You have installed an application on your laptop, but when you start the application, it continues to crash and does not work as expected. What should be the first step to troubleshoot this problem?

Check the log file for errors

Identify the operating system that cannot be used without an internet connection?

Chrome OS

To secure the systems in the human resources department, which of the following security policies must be applied? Notice that these policies may apply only to the human resources department and may not be applicable to the remaining users?

Clean desk policy & Screensaver policy

An inkjet printer is connected to your laptop. When you print a document, you notice that the text is smearing. You try to print another document and get the same result. How should you correct this issue?

Clean the print head

You are attempting to download and install an update from Windows Update. However, the update installation fails even after multiple attempts. Which of the following solutions will resolve the problem?

Clear the Windows Update download cache

The security policy of your organization dictates that you need to issue smart cards to all employees. In case of a delay, you want to issue hardware tokens to the employees. Which control are you using in this scenario?

Compensation Access Control

You have a network that is divided into multiple subnets. You need to configure the servers in a particular subnet to allow access only from the administrator's system using SSH. Everything else must be blocked on all servers. To be able to meet this goal, what should you do?

Configure a host-based firewall on all servers and allow the only SSH

After facing several malware attacks on a network system, you want to configure a method to reduce the administrative overhead in tracking the malware. Which of the following methods should you use?[Choose all that apply.]

Configure an internal Windows Update server and configure systems to get updates from it & Configure each system with automatic anti-malware updates and scans

You have recently set up a wireless router in your organization. You will use this router for testing purposes. You, however, do not want the employees to connect to this router even if they know the password. Access is limited to you and your team. Since this router is setup only for the testing purposes, you do not want to configure it with 802.1X (EAP). To be able to achieve this, what should you do?

Configure the wireless router with MAC address filtering.

On a Mac system, you need to use the Time Machine application. After you start the Time Machine application, what is the first step you perform to create a backup?

Connect an external disk

Your user profile is causing a lot of issues after you log in to Windows. You need to fix this issue by resetting the profile. Which of the following should you perform as the first step?

Copy the profile to another location

You have installed an antimalware application on to a system to clean malware affecting the system. Which control mechanism is implemented in this scenario?

Corrective

You need to move from a workgroup environment to the Active Directory environment. You configure a new domain named PLAB.com. There are more than 100 users who have recently joined in various teams. You want to have granular control of these groups privileges using Group Policies. What should you do?

Create an OU structure and add users in their respective OU

You are the network administrator for an organization. You would like to delegate the permission to create user accounts to a junior administrator in your team. You, however, do not want the junior administrator to perform any other administrative task. What should you do?

Create and assign a privileged user account to the junior administrator

Several users complain that accessing even the internal Websites using their URL takes a long time. You realize that even for the internal Websites, the traffic is being routed through the proxy server. You need the users to browse the Websites directly. What should you do?

Create exceptions in the Web browser's settings

You have several contractors who work at your office. Each one of them uses domain computers running Windows 10. You need to ensure that they work within office hours only. You want to protect the systems after office hours. What should you do?

Create individual accounts and apply login time restrictions

You need to create a master Windows 10 installation from which you want to install multiple systems with similar hardware. Which method would be most appropriate to create the master Windows 10 installation?

DVD

The sales team in your office is always on the move with their laptops. You are concerned about the sensitive information that they carry. You want to protect the sensitive information even if the laptop is stolen. Which of the following will be the most suitable solution?

Data encryption

You have to dispose of several hard drives. Before disposing of, you want to ensure that the information on the hard drives cannot be retrieved. You decide to use a method to wipe off the data and make the media useless. However, you do not want to damage the physical drives. What should you do to meet this goal?

Degauss the hard drives

In which of the following service attacks, a system overloads the targeted system such as a server or website and prevents legitimate users from accessing resources from that server or website?

Denial of Service (DoS)

The newly joined security administrator at PLAB Inc. has decided to bring in a secure authentication protocol that works in both local and roaming AAA situations. The security administrator also wants to remove RADIUS and use the new security protocol that can utilize EAP. What should the administrator implement to meet the desired goals?

Diameter

You plug in a USB drive into your laptop and malware infects the laptop. You had not opened any files on the USB drive. How should you prevent this in the future?

Disable autorun on the system

PLAB Inc. uses a wireless network that has recently been breached. An attacker has connected to the wireless network after gaining access to its password. The security administrator wants to ensure that the wireless network is secured with the possibilities of available methods. Which of the following methods should the security administrator implement?[Choose all that apply.]

Disable the SSID broadcast, Use MAC filtering, Lower the radio transmission strength, & Use WPA2-Enterprise

You have recently joined an organization as their IT Administrator. While reviewing the Active Directory configuration, you notice that there are several user accounts that are active, but the users are no longer with the company. Most of them have left the company recently. This also included the account of the previous IT Administrator. What should you do?

Disable the user accounts

Which are two methods that you should use to ensure passcode is hard to break on a mobile?

Disable the visible passcode option & Use a longer passcode

You need to repair a desktop at a friend's place. He informs you that there is a slight grounding problem. You need to ensure that no ESD damage is caused to the components. What should be your first step to prevent this?

Disconnect the power supply

Which of the following is the main cause of black screens in Windows?

Display resolution

In which of the following service attacks an army of botnets is programmed to take down a website?

Distributed Denial of Service (DDoS)

You have managed to resolve a complicated technical issue at the customer's site. You tested the solution multiple times and got positive results. You inform the customer that the problem has been resolved. How should you proceed beyond this point?

Document the case and share with the customer and internal team

During a vulnerability assessment, you are able to locate a potential vulnerability. After reporting it to the security team and with their further investigation, it is concluded that it is not a vulnerability. What should you do now?

Document the results and create a report as per the company's incident response plan

The domain access feature is useful for corporate users. Which among the following is the correct reason?

Domain access provides resource sharing feature within the domain

Using a Windows 10 system, you need to read a drive formatted with HFS+. Which of the following methods should you use?

Download and install HFS Explorer & Install Apple HFS+ Drivers

You have created holes with nails in a hard drive to prevent from spinning. You have also damaged the read/write head. Which method have you used to destroy the hard drive?

Drilling

Using elevated privileges, you create three mapped drives with the net use command in the command prompt window. However, when you close the command prompt window, File Explorer does not show the mapped drives. What could be the possible problem?

Drives mapped with elevated privileges will not be shown to the non-elevated user.

You are the IT administrator for your organization. One day while collecting a print out from the printer, you notice that the dustbin is full of old printed papers. When you go through the papers, you find that several papers included user accounts, E-mail address, and their banking information. What would have happened if these papers were thrown away without being properly shredded?

Dumpster diving

You are facing an issue with the audio that is not playing on your laptop. You need to correct this urgently. Which tool should you use in this scenario?

DxDiag

One of the users in the organization complains that he is not receiving E-mail messages from a specific external user. When you inquire, the user states that all other external E-mails are being received. You inspect the user's messaging client and do not find the traces of missing E-mail messages. What could be the possible cause?

E-mail filter is blocking the messages.

You have a wireless network. Recently, you implemented an internal certificate authority (CA) and want to integrate the wireless network to use it. You want to ensure that the network is protected against brute-force and dictionary attacks that can take place. Which of the following protocols should you use with the wireless network?

EAP-TLS

You need to edit a PHP file on your system. you do not have administrative permissions on the system. What should you do?

Edit the file in Notepad

You are using a Windows 7 system. You need to open the Computer Management console. From the Start menu, you right-click Computer and select Manage. However, nothing gets displayed. Computer Management does not open. What should you do?

Edit the relevant key in the registry

Several users in your organization use the anonymous search engine with encrypted VPN capabilities. You need to ensure that if they use such a method, then they should not be able to authenticate themselves using the corporate account. The authentication request must be rejected even though the user credentials are correct. What should you do?

Enable Somewhere you are authentication

PLAB Inc. had a recent security breach of their accounting data. After the breach, a new security administrator has been hired to implement appropriate security controls to protect the accounting data, which is now stored on a server that offers restricted access to the accounts team.What should the security administrator do to ensure maximum security for the accounting data?[Choose all that apply.]

Enable an auditing mechanism, Segregate the accounting subnet, & Encrypt the data

You have received a new laptop without Windows. When you install Windows 8.1, you notice that the network card is not present in Device Manager. What should you do?

Enable it in the BIOS settings

Which of the following can be a defense mechanism against IP spoofing?[Choose three]

Encryption, Packet filtering, & Authentication

When you attempt to connect to the wireless access point (WAP) in your company, you see two WAPs with the same name. Your mobile connects to one of them, and you are prompted for the password. Which of the following attack is in progress?

Evil twin

You receive an encrypted E-mail on your mobile device which you are unable to decrypt. What could be the possible cause?

Expired certificate

If you install CentOS 7 on a system, which of the default filesystem are you likely to have?

Ext4

Which of the following file system should be used for formatting a USB drive that needs to be used as a boot device?

FAT32

Refer to the exhibit. What does the Green color in the exhibit indicate?

Files are encrypted

Which of the following is considered to be filesystem navigation and search tool?

Finder

You have bought a mobile device with the latest security features. You want to put a lock on the phone so that only you can open it. No one other than you should be able to open the phone. Which method should you use?

Fingerprint lock

You have resolved a complicated problem in a customer's system. You have documented the problem and shared it with the customer and internal team. What should you do next?

Follow-up with the customer for the next few days to check on the problem

Recently, a server in your organization was compromised. This was acting as a file server and contained sensitive data. The server has two partitions - one partition holds the operating system and the other partition holds data. You regularly make a backup on a weekly basis.After investigation, you discover that the server was infected with a rootkit. Which method would be most appropriate to restore the infected server?

Format the data and operating system partitions, then re-install the operating system and restore all data from last clean backup

You have been experiencing slow performance on your desktop running Windows 10. It takes a long time to open documents and save them. You check the Task Manager and find all components are working well below the threshold level. What else could be a possibility for the slow performance?

Fragmented disk

You have planned for a major IT change within the organization. You prepare the documents and get them approved from the Change Advisory Board (CAB). However, during the implementation, you need to deviate from the approved change slightly. What should you do in this scenario?

Get the change deviation approved from CAB

You open Task Manager and notice that the Users tab is no longer present. You need to view the processes that are running under the current user context. What should you do?

Go to the Details tab

You need to dispose of several batteries. You need to ensure that you adhere to the company's disposal regulations that are compliant to the government laws. What should you do?

Hand them over to the recycling agency

You want to configure your laptop in a manner that if it is idle for 15 minutes, it should power down, but it should maintain its previous state. You should be able to use the laptop for an extended period. Which mode should you choose for this purpose?

Hibernate

If you hold sensitive data on a hard drive that needs to be disposed of, which of the two methods should you NEVER use to delete data?

High-level format & Data overwrite

Which question should be most appropriate when planning for an IT change?

How should the change be implemented?

You have a room that has a server with critical and confidential data. The room is protected with a door lock. You need to add security so that you can track who has entered the room. Which of the following method should you use?[Choose all that apply]

ID badges & Biometrics

Your company has a domain and uses DHCP to provide IP addresses to the systems on the network. One user with a static IP is unable to browse the Internet. No other users are facing this issue. What could be the probable cause?

IP address configuration

You connect a set of wired speakers to your mobile device. When you play a song on mobile device, there is no sound coming from the external speakers, though the built-in speakers on the mobile are playing the song. You need to play the song on the wired speakers. Which of the following things should you check?[Choose all that apply]

If the 3.5 mm jack is connected correctly & If speaker volume is turned on

You recently notice that a user has applied for new hardware on an intranet helpdesk Website. However, the user has been on leave for the last 10 days. Which of the following is being performed in this scenario?

Impersonation

You have implemented a wireless network and need to ensure optimal security for it. You also need to ensure that the security protocol that you use is compatible with the older versions of wireless adapters. What should you do?

Implement WPA on the wireless network

You have two-factor authentication in your organization that uses a smart card and a password. The Chief Technology Officer (CTO) wants to upgrade this setup to multi-factor authentication. Which of the following can help achieve this?

Implement a fingerprint scanner

PLAB Inc. is implementing a new wireless network, which needs to be secure. The data transmission over the wireless network must be encrypted with 128-bit per-packet key. Which method would ensure secure wireless implementation?

Implementation of Wi-Fi Protected Access (WPA)

Your organization network is protected by a firewall. You notice a large amount of traffic coming from two different IP addresses and want to block the to and from communication on these IP addresses. However, communication from other IP addresses should be allowed.Which ACL rule should you add in the firewall?

Implicit deny as the first rule

You have opened File Explorer and are in the c:\PLAB directory. You want to open the command prompt and navigate to the same directory. You need to do this with minimum administrative effort. What should you do?

In the address bar of the File Explorer window, type cmd and press Enter.

You have given a hard drive to an organization to physical burn it. Which method have you used in this scenario for data destruction?

Incineration

In a recent breach on your network, an attacker was able to crack several user passwords using a brute-force attack. You need to prevent such attacks. What should you do?[Choose all that apply]

Increase the password complexity & increase the password lenth

You manage an Active Directory domain with 200 users. Most of the users keep simple and easy to guess password. You want these passwords to be protected from the dictionary attacks. What should you do?

Increase the password length & Increase the password complexity

Which of the following steps can help prevent password cracking attacks?[Choose all that apply]

Increase the password length & complexity

When restoring a backup, which of the following is likely to be the most time consuming to restore?

Incremental

You are servicing a desktop at a customer's residence. The PCI-based graphics adapter is faulty. When you verify the graphics adapter with your company, you find that it is still under warranty. You inform the customer, but he needs to do video editing on an urgent basis. What should be your immediate solution to the customer in this scenario?

Inform the customer that you will provide a standby graphic adapter

You have been sent to attend a service ticket of an irate customer. After meeting the customer, you find him to be using a loud voice and using bad language. You manage to close the ticket successfully. After returning to your office, how should you react to this situation?

Inform your manager about the customer

You have a fresh system with no operating system. You need to install Windows 7, Windows 8.1, and Windows 10 on this system. The system has one hard drive. Which of the following would be the correct method to install these operating systems?

Install Windows 7 first, then Windows 8.1, and then Windows 10 each on an individual primary partition

You manage a large enterprise network. Almost 50 percent of the users are mobile who are either at a client site or working from home. Recently, one user connected to the network that infected the system. You want to be able to prevent this from reoccurring. You also want to ensure that host health checks are performed for the latest antivirus and security patches. The systems should be updated if they are non-compliant, and should then be allowed access to the network only if they are found to be compliant. What should you do?

Install a NAC device on the gateway of the network

You face an issue where your office's frequent loss of power is causing your desktop to turn off. You have already lost some data due to this. How will you prevent data loss?

Install a UPS along with the system

You are the security administrator for your organization. You have seen a few recent incidents of ransomware attacks in the organization and would want to prevent them. Which of the following possible methods should you deploy to prevent future ransomware attacks?[Choose two]

Install a web content filtering solution & Implement an E-mail content filtering solution

Over the years, several systems have corroded, and a few systems are victim of overheating. Even though there is an optimum air conditioning in the office, but overheating continues to increase in the many systems. Which of the following could prevent this from happening?

Install air filters in the office

You have been appointed as an IT Manager in an organization. You notice that there is absolutely no security on the laptops. You want to use a method to ensure that the laptops are working with the defined ruleset and are prevented from any external attack. Which of the following method should you use without many administrative efforts? [Choose two]

Install an antivirus on each laptop & Configure Windows Firewall on each laptop

You have recently joined a small organization as a security administrator. You notice that most of the desktops were prone to various security threats and do not have any application installed for protection. You want to ensure that these systems are always protected from the latest threats. Which of the following should be your first line of defense to protect the systems?

Install and configure an antivirus server on the network with the client on each system

You have an application that works on Windows XP without any issue. You want to migrate this app to Windows 10 system and ensure it works. What should you do?

Install the application and run it in compatibility mode

While working on MS Word, it seems to hang quite a lot. You want to terminate this application. When you open the Task Manager application, you notice that the Applications tab is missing. What could be the possible cause?

It has been combined with the Processes tab.

When you execute the locate command on your Linux system, it fails to work. Next, you run the updatedb command and you are prompted with the following error:bash: updatedb: command not foundWhat could be the probable cause?[Choose all that apply]

It is not included in the $PATH variable & The locate tool is not installed on the system.

You are the owner of a directory that contains various important files. You run the following command to change the directory permissions:chmod 1777 plabdirWhich of the following will be the outcome of this command?[Choose all that apply.]

It will set the stickly bit on the plabdir directory & The owner, group, and Others will get read, write, and execute permissions

What is the most appropriate method to set the USB as a primary boot device?

Keep the USB option at the top of the boot device list

To log on to your banking Website, you need to enter a six-digit number from a device. Which type of device is being used in this scenario?

Key fob

You have a Desktop computer, monitor, laser printer and an inkjet printer. Due to frequent power outages, you have been told to install an uninterruptable power supply (UPS) at home. You want to be able to save data if there is an outage. After installing the UPS, you have to connect the devices that the UPS can handle. Based on this condition, which device should you avoid connecting to the UPS?

Laser printer

While working on a customer problem, you have received an expected urgent text message. The customer at present is agitated because the previous engineer did not resolve this problem. The customer has been narrating the problem that has occurred. How should you handle the situation?

Let the customer finish his talk before you ask a question

You visit a customer location whose laptop is not working. The customer is worried as his data is on the laptop. The customer is talking continuously and trying to highlight the importance of his data. How should you handle this situation?

Let the customer finish talking and then ask open-ended questions

As part of the physical security, you want to have several deterrent controls. Which of the following should you implement?[Choose all that apply]

Lighting & Door lock

You have created a small JavaScript file with the .js extension. You need to refer it in an HTML document. What should you do?[Choose all that apply.]

Load the jquery library within the head tag, Download the jquery library, & Add the .js file within the head tag

You have an individual system that does not have connectivity with the other systems. You want to lock out a user account after a specific number of failed login attempts. Which of the following tools should you use for this purpose?

Local Security Policy

If you are deleting a logical partition, which type of partitioning style are you using?

MBR

You need to connect to a system remotely on your network. You want to invoke the Remote Desktop tool from the command prompt. Which of the following command should you use?

MSTSC

Which of the following is likely to cause a frozen system?

Malfunctioning app

After facing various issues with Windows components not working, you have been told by the IT support technician that several system files are either missing or have been renamed. Which of the following could cause this?

Malware

Your team has received a message from your end. When they confirm with you, you deny that you have not sent this message. Which of the following can be responsible for this?

Malware

Several colleagues received an Out of Office reply from your mailbox after they sent E-mails to you. Your automated E-mail contains a link to download an application as well. Which of the following is the reason for this?

Malware has sent the Out of Office replies

Which of the following team would create the newsletters and education material to support the incident response team?

Marketing

Which of the following is considered to be the main cause of blue screens in Windows?

Memory

You have several hard drives in your system. Each hard drive has multiple partitions that contains critical data. You add one more drive, but there are no drive letters left to assign to the newly added hard drive. You need to ensure that you are able to access the data on this hard drive. What should you do?

Mount the newly added hard drive to a folder on one of the hard drives

You manage an Active Directory domain, which has the following OUs: North, South, East, and West. You want to ensure that the users in these OUs are not able to use any removable media on their systems or their laptops. The sales team, however, will require the use of removable media for carrying their Sales presentations. You must complete this task with minimum administrative efforts. What should you do?[Choose all that apply]

Move the Sales team to a separate OU & Create a separate GPO for each OU and block removable media

You have a Windows 10 system with multiple hard drives. The home folder, which contains a lot of data, updates on a daily basis, on your system, it is located in the c:\Users folder. You want to ensure that if Windows crashes and requires re-install, your home folder is not impacted. What should you do?

Move the home folder to another hard drive

You have a system with two hard drives. Of lately, the system has been low on physical memory. You need to correct this problem. What should you do?

Move the pagefile to the second hard drive

If you need to boot into Safe Boot, which of the following utilities will allow you to do this?[Choose all that apply]

Msconfig & Bcedit.exe

You want to invoke the Remote Desktop Connection from the Run dialog box. Which of the following command do you need to execute to achieve this?

Mstsc

While developing a new application, you have been asked to implement identity and authentication controls as per OWASP standards. Which of the following would you need to implement?[Choose all that apply.]

Multifactor Authentication, Secure Password Storage, & Session Handling

You are installing a new system and need to ensure that the filesystem is able to support file permissions and encryption. It should also support compression. Which of the following filesystem should you use?

NTFS

You need an operating system that you can modify and release it under a different brand. You want to make the operating system freely available to everyone but charge for the services if a customer acquires them. What type of license should you assign to the operating system?

Open source

You regularly get updates from Microsoft on Windows 10. Identify the reasons why Microsoft would be regularly updating Windows 10?[Choose all that apply]

Operating system stability, New system functionality, & Security

Your mobile device frequently gets into an unresponsive state. Which of the following can be the cause of this issue?[Choose all that apply]

Overutilization of CPU & Shortage of Memory

If you are using a remote network to install Windows, which of the following should be set as the first device in BIOS boot order?

PXE

You need to boot a system using a centralized server. Which of the following should be set as the first boot device in BIOS?

PXE

You have a small network that runs on Active Directory. A recent security audit revealed that several users are using the password as 'password.' You have been advised not to allow the users to use easy to guess passwords. Which of the following method would help you prevent the use of easy to guess passwords?

Password complexity

You have a small network that runs on Active Directory. You want the users in the domain to change their passwords every 50 days. If a user forgets to change the password, then the user should not be allowed to access network resources in the domain using the old password. Which of the following method would help you achieve this goal?

Password expiration

You need to dispose of a hard drive keeping in mind that the disk has sensitive data on it. You need to be sure that the data cannot be recovered by any means. Which method should you use before disposing of the hard drive?

Perform a low-level format

You need to deploy a new application that a vendor has recently developed. You need to assess the impact of the application implementation to identify any new security controls to implement accordingly. To achieve this goal, which task must you perform before the implementation?

Perform a risk assessment of the implementation

You have developed an application that you want to release in the market. The application is free for personal and educational purpose. You will not release the source code. However, the application should not be used for commercial purpose. Which type of license should you assign to the application?

Personal

One of the users is attempting to install an app on their mobile phone from a third-party app store. You ask the user not to do the installation and instead install an anti-malware application. Which of the following reasons would help the user understand the consequences of installing this app without installing the anti-malware app?[Choose all that apply]

Personal information theft & Malicious infected apps

Which social engineering attack sends emails, posing as a legitimate institution or source, and prompts the victim to give away sensitive data, such as credit card information?

Phishing

An audio clip is being played in the windows media center. The clip needs to be stopped for a short while and then it has to be played from the point where it was stopped. Based on the function, choose the button which should be used to stop the clip?

Play/Pause

A web server has been installed behind a NAT router. The administrator wants to configure the router such that users on the Internet will be able to access the web server. What must the administrator configure to make this function correctly?

Port Forwarding

Your organization has a lot of visitors who occasionally connect their systems to the network. You want to associate specific MAC addresses with the interfaces on the switch. This will enable you to enforce that only the assigned MAC addresses can connect to the network. Which of the following methodologies should you implement?

Port Security

You have recently been appointed as Chief Information Security Officer in an organization. You observe that except for an antivirus on the endpoints, there is no security implemented. These endpoints are part of an Active Directory domain. You want to ensure that the endpoints have maximum security. Which of the following methods should you immediately apply?[Choose all that apply]

Prevent software installation using Group Policies, Disable the USB drives on all endpoints, & Use the principle of lease privileges

You attempt to install a 64-bit Windows on a system that only support 32-bit Windows. With the obvious reasons, the installation fails. Which of the following statement justifies the failed installation?

Processor's data handling capacity becomes a limitation

You want to prevent tailgating and piggybacking to the production floor. You want this to be a foolproof method and operational all the time. The method that you implement must not require any manual intervention. What should you do?

Put a mantrap at the entry door

You have been asked to collate the asset inventory. You decide to use an inventory management solution. You want to be able to track how assets are acquired, used, maintained, and disposed of. You should be able to pull complete information about a particular asset with minimum administrative effort and ensure asset safety. What should you do?

Put an asset tag on the equipment

You need to repair a desktop. You want to ensure that you do not damage any components inside the desktop. After disconnecting the system from the power source, what should you do next?

Put the desktop on an ESD mat

You need to replace the motherboard of a desktop. You open the computer box and remove the motherboard. You need to ensure that the motherboard is safe from ESD damage. What should you do with the motherboard?

Put the motherboard in an antistatic bag

Which feature in MDM enables you to configure policies for device restrictions, layout, settings access, notifications which need to be assigned based on OS or ownership type (BYO or corporate-owned)?

Quickly add new devices and easily provision with apps and policies without IT involvement

Which of the following feature in MDM enables you to configure policies for device restrictions, layout, settings access, notifications which need to be assigned based on OS or ownership type (BYOD or corporate-owned)?

Quickly add new devices and easily provision with apps and policies without IT involvement

You need to repair an application on your laptop that is running Windows. This application is used on a daily basis. The application is failing to start. Which following methods can help you possibly repair this application?[Choose all that apply]

Re-install the application and select the Repair option whilst installing & Select the application in the programs section of the Control Panel and then use the Modify option

You configure a network share as an installation point that will hold Windows installation files. You need to share this folder with the users so that they can access and install Windows. You must assign the required permissions only. Which permissions should you assign to the users?

Read & Execute

You were working on a laptop that had a USB drive connected. After working for a while, you rebooted the laptop and got the no boot device error. How should you resolve this issue permanently?

Reboot the laptop and change the boot order

You have a critical application that is backed up every hour. One day, the application crashes, and you were able to retrieve the backup from the previous hour. Which of the following is this known as?

Recovery Point Objective (RPO)

Which of the following installation methods are most likely to use a Windows image for mass deployment?[Choose all that apply]

Remote network installation & Unattended installation

You need to open a system and replace a few components along with the power supply. You have shut down the system. Before replacing any component, which of the following should you do to ensure there is no shorts and accidental discharge?

Remove any jewerly

A user's mobile screen has become unresponsive. What should be your first step in troubleshooting this?

Remove the screen protector

A user's Windows system is highly infected with malware. The user's data is backed up on a central server. You need to quarantine the system to minimize the impact on the network. You also need to ensure the user's productivity is impacted to the minimal. What should you do?

Remove the system from the network & Image a new system and restore user's data

You want to control the use of specific applications by the users in the PLAB Active Directory domain. You even do not want your team to use any application that is not approved. You must apply a solution with minimum administrative effort. What should you do?[Choose all that apply]

Remove users' administrative permissions on their systems & Use Group Policy to prevent these applications

You are working on a CentOS system with the default installation. You notice that there is a system slowness. You suspect memory overutilization by a specific process. To verify this, you want to view the memory utilization over time. You decide to run the following command:ps ev -pid=2500What else should you ensure that you are able to gather the information over time?[Choose all that apply]

Repeat the command manually over time & Create a cron job to run this command

You are conducting a training for the new employees regarding the Occupational Safety and Health Administration (OSHA) compliance. Your organization follows the OSHA standards. You need to mention employee responsibilities. Which of the following responsibilities should you mention?[Choose all that apply.]

Report any hazardous incident to the respective entity, Always use the required protective equipment, & Report any hazardous conditions that the employer does not take care of to OSHA

You had updated Windows installation with Windows Update. One update seems to be causing trouble and has made Windows installation unstable. While keeping the data intact, you want Windows to return to a working state. Which of the following method would allow you to go back to the point before the update installation?

Restore

What is the best method to ensure that the backup you have taken is successful?

Restore the backup and verify the files

The Windows on your laptop has crashed, and you need to re-install it. You do not have the installation discs with you. What is the best way to restore the computer system to its factory settings?

Restore using the factory recovery partition

After installing an application, you reboot your laptop. However, after the Windows logo, there is no display. You have critical data on the laptop and need it to be restored with minimum effort and without the loss of data. What should you do?

Revert to the Last Known Good Configuration

You have a hard drive that needs to be repurposed in another system. The user does not have any confidential data on the hard drive. You need to ensure that you are able to use the hard drive in the quickest manner possible. What should you do?

Run the Quick format

You installed an application on a fresh Windows 10 system. However, the application continues to crash after you start it. The same installation is working on another system that is running Windows 7. How should you possibly resolve this issue?

Run the application in the compatibility mode

You are working on your laptop, and while trying to save a document, you are getting read and write failures. You are unable to save the file. What should you do?

Run the chkdsk command

You install Windows on a Solid-State Drive (SSD). You need to reduce the number of write operations to optimize Windows performance. What should you do?

Run the winsat command with the formal option

A Windows 10 system is infected with malware, and now Windows is failing to start. You need to use the same laptop and download the latest updates and anti-malware updates. Which of the following should you use?

Safe Mode with Networking option

You never enable the location tracking feature on your mobile device. Suddenly, you notice that location tracking feature is turned on even though you have switched it off multiple times. What should you do immediately?

Scan for malware

Your mobile camera gets activated without you activating it manually. How should you resolve this issue?

Scan for malware

You regularly get updates from Microsoft on Windows 10. Identify the reasons why Microsoft would be regularly updating Windows 10?

Security, Operating system stability, & New system functionality

You need to replace toners for about 10 laser printers. After you replace the toner cartridge, you need to ensure that they are disposed of in a proper manner. What should you do?

Send them to a toner manufacturer for refilling

You need to remotely disable several services on a system, which is placed in a different location. Which of the following should you use to do this?

Services Console

When browsing the Internet, you use Internet Explorer. You want to be prompted before any potential unsafe content is downloaded to your system. What should you do?

Set Medium-high security level for the Internet zone in Internet Options

You are using a laptop with the latest Windows version that you installed a day before. You have plugged-in headphones, but there is no audio. You need to resolve this problem. When you test with speakers, they are working fine. You have opened the Sound dialog box. Which of the following possible solutions can you try?[Choose all that apply.]

Set headphones as a default playback device & Change the audio format

Your Windows system has become unstable and keeps crashing. You want to repair it using the System File Checker (SFC). However, when you attempt to start SFC, you are prompted with the following error:Windows Resource Protection could not perform the requested Service or Start the Repair ServiceWhat should you do to resolve this issue?[Choose all that apply.]

Set the Windows Modules Installer service to Manual & Use the FixWin tool to run SFC

If your mobile device is showing a dim display, how should you correct it?

Set the display manually

You have installed a Windows 10 system. You do not want this system to be visible on the network, and it should not be used for print and file sharing. What should you do?

Set the profile mode to Public in Network and Sharing Center

Which of the following factors can cause a mobile device to slow down extensively?[Choose all that apply]

Shortage of storage space, Too many running apps, Mobile overheating, & Charging while several apps are running

Refer to the exhibit. Which method can be used to crush the hard drives into pieces as shown in the exhibit?

Shredder & Pulverizing

You are asked to interconnect two offices of your organization over the Internet. Each office has 20 employees. Computers at each location are required to communicate with those at the other office as if they were in the same physical network. Communication should occur in a safe and secure manner. Which of the following would be the best solution to these requirements?

Site-to-Site VPN

Refer to the exhibit. You need to save the system state when you press the power button of your laptop. When the button is pressed, the system should use the minimum amount of power. You should be able to get the laptop back to normal operations in a few seconds. Which of the power setting should you configure?

Sleep

One of the wireless routers in your organization has been running with the default settings. Which of the following is likely to occur on this wireless router?[Choose all that apply]

Someone gaining control and making configuration changes & Someone guessing its admin account and password

You have been asked to install a biometric system for authentication. You want to install a fingerprint scanner. Which of the following type of authentication system would this be?

Something you are

You need to enter the building by swiping an ID card on a badge reader. What type of authentication system is this?

Something you have

Which of the following can help identify a computer hoax?

Spam filter

You want to combine the disk space of two disks. The data written on the disks should not be equally distributed amongst them. You have converted both the disks to dynamic disks. Which type of volume should you create now?

Spanned volume

You have configured a router to examine incoming packets. You have configured a rule to filter out packets that have conflicting source addresses, especially if a packet shows a source address from the internal network. Such packets need to be automatically dropped. Which of the following are you trying to prevent with this configuration?

Spoofing

A wireless controller is used to:collectively configure wireless access points as a single entitymonitor and collect statistical data on wireless network behavior and usageupdate firmware and OS versions of access points when available.Which of the preceding statements is true?

Statements 1, 2 and 3

Which of the following is an example of multifactor authentication?

Swiping a credit card and entering a pin

Processor's data handling capacity becomes a limitation

Tablet & Mobile

You need to disable several applications when your Windows 10 device starts up. Which tool should be used to accomplish this?

Task Manager

You have received a frantic customer call and been informed that his system has crashed. When you reach the customer location, the customer is tensed. How should you handle this situation?

Tell the customer not to worry as you can handle the situation

You have a single pool of 250 IP addresses configured on a DHCP server. One morning, a few users complain that they are not able to connect to the network which they were able to do till yesterday. When you investigate, all users are getting IP addresses from the 169.254 pool of IP addresses. What could be the possible cause?

The DHCP IP pool is full

Refer to the exhibit. Your Web server is constantly showing high usage of memory and CPU. You check, and there are hardly any users connected to the Web server. Other users who attempt to connect are not able to connect to the Web server. What could be the possible issue?

The Web server is under a denial-of-service attack.

While browsing a secure Website, the address bar in the Web browser has turned Red. What does this indicate?

The Website is using an untrusted certificate

If you install a malicious app without having a firewall on an iPhone, what is likely to happen?

The application would be sandboxed and restricted

Refer to the exhibit. The system has a single 3 TB hard drive.You need to create a simple volume on the unallocated space, but this option is greyed out. What could be the possible problem?

The hard drive is formatted with the MBR partition table.

Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet, you receive a security message from the operating system stating that this service is blocked on your workstation. What could be the probable cause?

The host-based firewall settings are blocking the service

You attempt to connect your laptop to a mobile device using Bluetooth pairing. However, the laptop is unable to find your mobile device even though the mobile device has Bluetooth turned on. What could be the problem?

The mobile device is not in discoverable mode

You have lost an iPhone that has screen lock enabled. What will happen if the person who finds the phone, attempts to unlock the phone and exceeds the defined number of attempts?

The phone will be in a permanent lock state

You have a file named plab.txt. The current owner of the file is plabuser, and the group is also the plabuser. You execute the following command:sudo chown :plabsales plab.txtWhat would be the outcome of this command?

The plabsales group will now be the group of the file

After cleaning malware from a system, you have performed a system restore of a restore point that you had created a few days back. A few minutes later, you notice that the malware symptoms have re-appeared. What could be the possible cause?

The restore point was infected with malware.

You are reviewing the log files on a router. You notice the following entries:*Jan 11 4:10:29.779:%Router1: list 101 permitted tcp 192.10.10.204(57222) (FastEthernet 0/3) ->10.10.1.5 (6667), 3 packets.* Jan 11 4:10:38.779:%Router1: list 101 permitted tcp 192.10.10.204(57222) (FastEthernet 0/3) ->10.10.1.5 (6667), 6 packets.* Jan 11 4:10:45.779:%Router1: list 101 permitted tcp 192.10.10.204(57222) (FastEthernet 0/3) ->10.10.1.5 (6667), 8 packets.There are hundreds of entries like this in the log file.What should you infer from these log entries?

The router is acting like a bot

In which of the two scenarios would you need to restore a file from Time Machine backup?[Choose all that apply]

The source file's older version is required & The source file is deleted

If you are using an authenticator app, which of the following steps are likely to occur when a user attempts to log on to a Website?

The user provides username and password and then receives an one-time password (OTP), which the user needs to enter on the Website.

You have a company provided a laptop that you are able to connect to the wireless network without any authentication. However, when you attempt to connect your mobile phone to the same wireless network, you are unable to do so. When you try with the laptop again, you are able to connect. What could be the probable cause?

There is MAC filtering enabled on the wireless network

In your system, several files and folders have disappeared. You verified that the files had not been moved or hidden. What could be the possible cause?

There is a virus in the system

Refer to the exhibit. You are having issues with the network adapter on your laptop. You suspect that it is a device driver issue. You want to roll it back, but when you check the properties of the network adapter, you notice that the Roll Back Driver option is disabled. What could be the probable cause?

There is no previous version of the drivers installed.

You are monitoring network traffic. You notice that several internal desktops were connecting to an unknown IP address on the Internet. These desktops are sending high volumes of traffic using port 25 for several hours. What could be happening in this situation?

They are acting like zombies working in a SPAM attack.

You have bought a new laptop with 2 TB hard drive. When you check in File Explorer, the hard drive size is shown as 1.8 TB. What is the possible reason for this?

This space is used by the factory recovery partition

Why are multiple desktop styles/user interface layouts provided in an Operating Systems?

To make the Operating Systems more user-friendly

PLAB Inc. network is PCI-DSS compliant. When a security administrator joins the organization, the IT manager advises him to probe the network devices on a regular basis. What could be the reason?[Choose two.]

To track missing updates and patches on the network devices & To review the logs

Due to which of the following reasons should you defrag a hard drive?

Too many reads/writes

After the credentials are entered in Windows 10, the profile starts to load, but it takes 7 to 10 minutes. Which of the following could be causing this issue?

Too many startup items, Corrupt user profile, & Several network drives mapped

With the most recent update of Windows 10, you are unable to find the UAC settings. You decide to use the msconfig tool to launch the UAC settings. Which tab in msconfig should you use for this purpose?

Tools

You are attempting to perform a system restore, but it fails with an error. What are the possible methods to make the system restore work?[Choose all that apply.]

Try an alternative restore point & Run system restore from Safe Mode

On your Windows 10 system, you are in the c:\plab directory in File Explorer. You want to navigate to the same directory on the command prompt with minimum administrative effort. What should you do?

Type cmd in the address bar of File Explorer

Users on a network are complaining that they cannot connect to a Web server by its name in the Web browser. You can access the Web server using its IP address. You discover an access list is blocking several UDP ports. Which port should you remove from the access list to allow users to connect to the Web server?

UDP: 53

An anti-malware application has detected malware on your system that is connected to the network. You have disconnected the system from the network. You need to remediate your system now. What should you do?[Choose all that apply]

Update the anti-malware application, Clean the infected system, & Disable system restore

One user in your organization complains that several E-mails have been received from unknown E-mail addresses. These E-mails contain files that have attachments with double extensions, .txt.vbs. The user has downloaded one of the attachments and double-clicked it. What should you do immediately on the user's system?[Choose all that apply.]

Update the anti-malware on the system, Disconnect the system from the network, Reboot the system in the Safe Mode, & Run the anti-malware scan on the system

Which of the following solutions can protect a Wi-Fi protected setup (WPS) from a brute-force attack?[Choose all that apply]

Update the firmware & Disable WPS

You have been using a wireless router at home. You get an E-mail from the manufacturer that the same router now has been provided with new functionality in its admin interface. You want to get this functionality on the same router without losing the existing configuration. What should you do with minimum administrative effort?

Upgrade the firmware on the existing wireless router

Recently, a user lost his laptop that had confidential data. You want to protect the company's data even if a laptop is lost. No one should be able to access the data at rest without proper authentication at boot. What should you do?

Use BitLocker to encrypt the disk

Recently, one of the company employees lost their laptop that had confidential data. Therefore, for all the other laptops, you decide to implement a solution to prevent losing and possible misuse of the data even if the laptop is lost. No one should be able to access the data at rest without proper authentication at boot. What should you do?

Use BitLocker to encrypt the disk

PLAB.com uses a complex image repository for its Windows Server 2016 deployment needs. PLAB commonly uses the concept of Zero Touch images that is specific to each business unit. Identify the mechanism that could be the most - cost-effective option for PLAB.com to update all Zero Touch images with the latest cumulative updates for Windows 2016 server released by Microsoft.

Use DISM to update the images

You are developing an application that will store the passwords in a database. However, you need to ensure that the passwords are protected from a rainbow table or brute-force attacks. What should you do?[Choose all that apply]

Use Key Stretching & Use Salting

The Sales team in your organization has been assigned new Android phones. You, as the IT Manager, do not want them to install any applications from the Internet. The Sales team should be able to install only the approved applications from your app store. How would you control this?

Use MDM to manage the mobile devices

You recently had a user who sent out a financial report to a competitive firm. You want to ensure that outbound E-mails do not contain any sensitive information. You need to block such E-mails immediately. An alert for such E-mail must be sent to you.What should you do?

Use a DLP solution

Due to a sudden voltage increase, one of the desktops has completely burnt out. You need to protect this from happening in the future. What should you do?[Choose all that apply.]

Use a surge suppressor & use a power conditioner

You detect a keylogger on a user's Windows 10 system. The keylogger was capturing the user's keystrokes and sending it to a person outside the network. You need to clean the keylogger from the system with minimum administrative efforts. What should you do?

Use an anti-malware live boot CD to clean the keylogger

You have a laser printer in which toner has spilled. You need to clean the toner and ensure that it is not melted inside the printer during the cleaning. You also need to ensure that no internal components should suffer ESD damage. What should you do?

Use an anti-static vacuum cleaner

You have joined an organization as an IT administrator. The organization runs a wireless network. When you inspect the wireless network, you notice that the WEP is being used for encryption. You need to put optimal security controls to secure the network. What should you do?

Use an encryption protocol that is CCMP-based

Your organization uses Exchange Server for messaging. Several Sales people are always on the move and access their E-mails through mobile devices. You, as the IT Manager, want to configure a method to ensure that all the Sales people use strong passwords on their mobile devices. You must do this with minimum administrative efforts. What should you do?

Use the ActiveSync policies on mobile devices

You are logged in as a standard user on a system. You open the command prompt and run the chkdsk command but get the access denied message. What method should you use so that you are able to run this command with minimum efforts?

Use the Run as administrator option to open a command prompt and run this command

You have a custom service running on Windows, and it caters to a specific application. You need this service to be running all the time. You want to configure fault tolerance for this service. What should you do?

Use the Services console

You use a Windows 10 system. You are part of the Sales team and are always on the move. You have a copy of your data stored on a network location. Your requirement is to make offline changes on your system when you are on the move and then update the changes to the network location automatically when you connect to the network. What should you do?

Use the Sync Center to synchronize the files

You have installed a new application. However, after installing the application, Windows 10 becomes unstable, and the application fails to start. You want to revert to the stage before installing the application. You must do this with the minimum disruption to the system. What should you do?

Use the System Restore option

A user complains that there are too many applications starting when he logs into Windows. You need to rectify this and ensure only the necessary applications are in the startup. What should you do?

Use the Task Manager tool

You need to copy a set of files to a destination folder and then ensure that it is verified that the files are written correctly. What should you do?

Use the copy /V command

You have a Windows system with multiple hard drives. Two hard drives are unutilized and need to be used after creating multiple partitions on each disk. What should you do?

Use the diskpart command

You manage an Active Directory domain. Several users use different systems depending on the work they have been assigned. You need to ensure that the users are able to use their latest profile no matter which system they use. What should you do?

Use the folder redirection method

You have replaced a laptop's motherboard. After you start Windows successfully, you notice that there is no wireless connectivity. The Device Manager displays the detected wireless adapter. You do not find any issue in Device Manager. How should you resolve this issue?

Use the function and wireless keys combination to switch on the wireless adapter

You have a file named plab.txt. You want to prevent this file from being overwritten. What should you do?

Use the mv command with the -n parameter

You had configured a face lock and passcode lock on your mobile. Due to the dark ambiance, the camera on your mobile is unable to recognize your face and unlock the phone. What should you do?

Use the passcode lock instead

You had created a link named PLAB to the PLAB/PracticeIT/London directory. You want to remove the link now. What should you do?[Choose all that apply]

Use the rm and unlink command

You want to transfer files from your Linux system to another Linux system on the network. You want to ensure that the transfer is fast, and the file is compressed while being transferred. However, the file should be copied onto the destination system in the decompressed format. What should you do?

Use the scp command with the -C parameter

You are meeting a customer for the first time. How should you address the customer?

Use the title along with the surname

You need to create a password reset disk for a user on a Windows 10 system. To be able to do this, which of the following applet in Control Panel should you use?

User Accounts

Which of the following actions is NOT performed by the man-in-the-middle attacker?

Using compromised systems called zombie systems to overload the server, making it unavailable to the client

Your sales team is constantly on the move and needs to connect to the head office for data. Which of the following method would provide secure data sharing in this scenario?

VPN

Which of the following best practices can help reduce exposure to tailgating attacks?[Choose two]

Visitor policy & Mantrap security

A system is connected to the network after several months. It does not have the necessary updates installed. Which of the following attacks can take place in this system?

Vulnerability exploitation

Your mobile device is connected to the home wireless network. You are attempting to upload a large document but facing an issue as it keeps on disconnecting. What could be the possible cause?

Weak signal

You need to clean inside a laser print, which has not been cleaned for two years. You need to ensure that you follow all the safety precautions as per safety standards. What should you do?[Choose all that apply.]

Wear safety goggles & Put on an Air Filter Mask

To implement a technological change, which of the following should be the most critical question?

Why should the change be implemented?

You recently installed the latest version of Windows 10. You notice that the HomeGroup feature is not available. What could be the probable cause?

Windows 10 does not offer this feature anymore.

You want to create a homegroup to be used by some systems that are out of the company's domain. Which operating system should you opt for to create and use homegroup?[Choose all that apply]

Windows 7 & 8

On your network, you have the following systems: Windows 7 RTM Windows 7 SP1 Windows 8 Windows 8.1 RTM Which of the following OS will you be able to perform a direct upgrade?

Windows 7 SP1

Which Windows was designed specifically for the touch-enabled devices?

Windows 8.1

If you have 1 GB RAM in a system, which of the following 32-bit Windows versions will you be able to install?[Choose all that apply]

Windows Vista, 7, 8.1, 10

You are using a Wireless-A router that works at 150 Mbps speed. Users constantly complain of weak signals. You need to upgrade the router. Which of the following would be the best replacement to the existing router?

Wireless-AC

You need to save a file into a directory that is owned by another user. When you attempt to save the file, you get the access denied message. Which of the following permission should have just to save the file?

Write

You have a hard drive with a Master Boot Record (MBR) partition. You create three primary partitions and an extended partition. How can you create another extended partition?

You can only create a single extended partition on a hard drive

You need to use Windows To Go for Windows 10. Which of the following requirements must be met to be able to use Windows To Go?[Choose all that apply]

You can use USB 2.0 and 3.0 ports on a system & You must use USB 3.0 drives

To kill the notepad.exe application from the command prompt, you execute the following command: taskkill notepad.exeHowever, you are prompted with the following error:ERROR: Invalid argument/option - 'notepad.exe'.What should be the probable cause?

You have not specified the image name parameter for notepad.

If you took a full backup on Monday and till Friday, you have taken incremental backups, what would happen if you lose the incremental backup of Wednesday?

You will not be able to restore this backup

You are receiving a certificate error when you visit a Website that is using a valid certificate. When you test the same Website on another system, you do not receive this error. What could be the probable cause?

Your system's date and time are incorrect.

Recently, one of the newly deployed application was attacked, and the attacker was able to gain administrative access to the application. The antivirus and HIDS deployed on the server hosting the application was not able to detect any suspicious file or malware. What could have been the possible cause?

Zero-day

Which of the following attack exploits a security loophole in software before it is known to the developer?

Zero-day

You are in the command prompt in the c:\Users\Wilson directory. You need to move to the root of the C drive. Which of the following commands could you use?

cd\

You need to copy data to a raw device without involving the filesystem. Which of the following command will help you achieve this?

dd

Which command displays a list of environment variables that have been exported?

env

You need to share external drives between Windows and Mac systems. You need to ensure that the Mac system is able to read and write to the drive. Which of the following filesystem type should you format the external drive with?

exFAT

You have a list of items that you want to iterate until the list is exhausted. Which of the following loop commands would be most appropriate to use in this scenario?

for

You have a file named PLAB that contains thousands of lines. You want to find all the lines that start with the word Testing. Which of the following command will provide the desired output?

grep "^Testing" PLAB

You want to verify the status of currently open connections to the Linux Web server immediately. Which of the following should you use?

netstat

You have used the useradd command to create a user, which is in the locked state by default. Which of the following command will you use to unlock the user?

passwd

After making some configuration changes on a Windows 8 system, you need to reboot the system from the command line. You want to display the shutdown window for 30 seconds before rebooting. Which of the following command will help you achieve this?

shutdown -r -c


Ensembles d'études connexes

Chapter 18 Management of Patients with Upper Respiratory Tract Disorders PrepU

View Set

Nursing 111 Final Exam Review. ATI Questions

View Set