Dion Practice Test 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which command is used to create a new disk partition on a Windows system?

diskpart

Which version of Windows supports Virtual Desktops?

Windows 10

Which of the following file types are commonly used to create applications that can be run on Linux, macOS, and Windows?

.py

A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?

.sh

What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system?

20 gb

Which of the following is categorized as an APIPA address?

169.254.12.64

What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system?

1gb

You are partitioning a 1 TB hard drive on a new workstation. The hard disk has been partitioned into four different partitions with 100 GB, 150 GB, 250 GB, and 500 GB. How many different file system types could you support on this 1 TB hard drive?

4

An offsite backup service is involved in an investigation currently. Because of this, they are not recycling outdated tapes. Which of the following is the MOST likely reason for this?

A notice of a legal hold

A network administrator has set up a firewall and entered only three rules allowing network traffic over ports 21, 110, and 25 to minimize the attack surface and better secure the network. Unfortunately, now the administrator receives complaints from users reporting that they cannot access any web pages using their URLs, such as DionTraining.com. Which of the following should the administrator do to correct this issue?

Add a rule to the ACL to allow traffic on ports 80 and 53 Port 80 is used for HTTP traffic. It must be open to allow the web browser to make a request from the network to the webserver. Port 53 is needed to reach the DNS servers to determine the IP address for a given URL or domain name (resolving DionTraining.com to its IP address).

Which mobile device strategy is most likely to introduce vulnerable devices to a corporate network?

BYOD

Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence?

Chain of custody

You just received your monthly smartphone bill. As you review your charges, you notice that this month shows three times as much data usage as a normal month. You don't remember changing your usage pattern, so there should not have been a large increase in data used. Which of the following should you do FIRST to determine the source of the increased usage?

Check network permissions and data usage for any applications installed within the last month

A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming wants to document his script so that other programmers can understand what his logic was when he wrote it. Which of the following should he use?

Comment

You are troubleshooting a workstation and need to run some diagnostic tools as an administrator on this Windows 10 workstation. Which of the following keys should you hold while left-clicking the mouse to open the Command Prompt as an administrator?

Ctrl

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)

Disconnect the laptop form the network Disable System Restore in Windows Update the anti-malware software

You are assisting a network administrator with updating the firmware of a Cisco iOS-based router. This router is the only border router for your organization, and it connects them to the internet. The request for change is being written and contains the purpose, plan, scope, and risk analysis of the proposed change. Which of the following should be added to the RFC before its approval?

Document a backout plan if the update is not successful

What is the SEVENTH step of the seven-step malware removal process?

Educate the end-user

You have just finished installing a new workstation for a user in your office. They need to be able to see the other workstations on the company's workgroup. Which of the following settings should you ensure is enabled?

Enable network discovery

After installation or change has been implemented, which of the following is necessary before closing the change request?

End-user acceptance

What network device uses ACLs to prevent unauthorized access into company systems?

Firewall

Which of the following devices would you configure an ACL to implement a security policy within your network?

Firewall

Which of the following data types would be used to store the number 3.14?

Floating-Point

You are trying to locate a protected .dll file to edit, but you cannot see it under the System32 folder. Which Control Panel utility should you use to find the file?

Folder Options

Which of the following security controls provides Windows system administrators with an efficient way to deploy system configuration settings across many devices?

GPO

You are working in a doctor's office and have been asked to set up a kiosk to allow customers to check-in for their appointments. The kiosk should be secured, and only customers to access a single application used for the check-in process. You must also ensure that the computer will automatically log in whenever the system is powered on or rebooted. Which of the following types of accounts should you configure for this kiosk?

Guest

Which of the following types of installations would require the use of an XML text file containing the instructions that the Windows Setup program would need to complete the installation?

Image installation

Which of the following types of backup requires the LEAST time to complete a backup?

Incremental

A user cannot open some files on a file server and contacts the help desk for support. The help desk technician troubleshoots the server and notices that all of the server's data backups are operational, but large portions of time are missing within the event log. The technician remembers that there have been several bad thunderstorms recently during those missing time periods. What might the technician do to prevent these server issues in the future?

Install a new battery backup

When Jason needs to log in to his bank, he must use a hardware token to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to login?

Key fob

Your company recently downloaded and installed the latest audio card driver for all of its workstations. Now, several users have had their usernames and passwords for several websites compromised. You believe the two issues are related. If they are, which of the following was MOST likely contained in the audio card driver file that was installed?

Keylogger

A new corporate policy dictates that all access to network resources will be controlled based on the user's job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy?

Least Privilege

Dion Training's offices are frequently experiencing brownouts and sags. Which of the following solutions would protect all of their workstations and servers from these brownouts?

Line conditioner

A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?

Loop

An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?

Mark each email as spam or junk

Your company wants to get rid of some old paper files. The files contain PII from previous customers, including their names, birth dates, and social security numbers. Which of the following are the appropriate data destruction and disposal techniques that should be utilized for these papers?

Micro-cut shredder

Which type of antivirus scan provides the best protection for a typical home user?

On-access scans

A user has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. The user states they do not want to pay for the software. Which of the following would MOST likely be the best option for them?

Open-source

A user's SOHO wireless network appears to have significantly slowed down today. Normally, they can download files at 900 Mbps or more, but today, they only averaged 23 Mbps when downloading. You check their wireless settings and see the following: * Network SSID: DionTraining* Security: WPA2* Password: diontraining* Mode: AC* ISP: Fiber1GBPS Which of the following is MOST likely the problem?

Other users have connected to the WiFi due to a weak password

Marta's organization is concerned with the vulnerability of a user's account being vulnerable for an extended period of time if their password was compromised. Which of the following controls should be configured as part of their password policy to minimize this vulnerability?

Password expiration

Your network administrator has handed you some documentation showing you which switch ports on a patch panel you need to connect with a CAT 5e patch cable for an upcoming network upgrade. What document are you MOST likely holding?

Physical network diagram

You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their own SOHO wireless router to that same switch port. Which of the following security features would BEST accomplish this goal?

Port security

What is the BEST way to secure the most vulnerable attack vector for a network?

Provide end-user awareness training for office staff

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have directly observed symptoms that indicate the system is infected with malware. Which of the following actions should you perform NEXT?

Quarantine the affected system

A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, and the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

Quarantine the machine and report it as infected to your company's cybersecurity department for investigation

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue?

RADIUS

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?

RADIUS With RADIUS and SSO configured, users on the network can provide their user credentials one time (when they initially connect to the wireless access point or another RADIUS client) are automatically authenticated to all of the network's resources.

An attacker is using a precomputed table of values to attempt to crack your Windows password. What type of password attack is this? ​

Rainbow table

A user is complaining that when they attempt to access Google's homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT?

Remove any proxy servers configured in their web browser

You have been asked to install a computer in a public workspace. Only an authorized user should use the computer. Which of the following security requirements should you implement to prevent unauthorized users from accessing the network with this computer?

Require authentication on wake-up

You have submitted an RFC to install a security patch on all of your company's Windows 2019 server on Friday at 11 pm using an automated patch installation process. Which of the following change request documents would describe any uncertainty or adverse effects that may occur during the installation process?

Risk analysis

After a company rolls out software updates, Ann, a lab researcher, can no longer use the lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest version of the drivers. Which of the following should the technician perform to get the researcher back to work as quickly as possible?

Roll back the drivers to the previous version

You need to connect to a Linux server to conduct some maintenance. The server is located in a remote office about 50 miles from your own. You decide to connect the server remotely instead of driving to the location to save some time, but you want to ensure you do this securely. The Linux server has VNC installed, but it isn't configured to provide an encrypted connection. Which of the following should you use to secure the VNC connection to the remote server?

SSH in tunnel mode

What is the FIFTH step of the seven-step malware removal process?

Schedule scans and run updates

What does the command "shutdown /s" do on a Windows workstation?

Shutdown the workstation

Which of the following types of attacks are usually used as part of a man-in-the-middle attack?

Spoofing

Which of the following data types would be used to store a user's name?

String

You are writing a script that will take an employee's name as the input. Which of the following data types would the employee's name be store in?

String

A user contacts the service desk and states a hardware conflict error is showing in their Device Manager. Which of the following log files should you review to determine the source of the conflict?

System log

You are troubleshooting a user's laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which log in Windows 10 would you review to determine if the print spooler service is causing this issue?

System log

You are working as a desktop repair technician for a large corporation. The company uses the exact same desktop hardware for all of its user's workstations. Today, you have received multiple calls from users complaining that their screen becomes filled with static when moving their mouse. You believe the video card driver may be at fault. Which log would you review to determine if the video card driver has been updated recently?

System log

A smartphone user notices that their phone gets very hot, and their battery is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem?

The smartphone is infected with malware and using a lot of processing power

A user calls the service desk and states that their workstation has a virus. The user states that they were browsing their favorite website when the antivirus displayed a full-screen message stating, "1532 file infected on this computer - Click to remove infected files NOW!" The user states that when they click the button, a message from the company's content filter states it is blocked, and they need your assistance to remove the infected files. Which of the following has MOST likely occurred?

The user is the victim of a rogue antivirus attack

Natalie's iMac has been infected with malware. The malware has caused numerous files to be deleted from the system, and the operating system is now corrupted. Natalie needs to access some of her files from the computer that have been deleted by the malware. Which of the following built-in utilities should be used to restore access to those files?

Time Machine

Which of the following file system formatting types should be used with a DVD?

UDF The Universal Disk Format (UDF or ISO 13346) is an updated file system for optical media supporting multisession writing. It is the standard used by Windows, referred to as the Live File System, for CD and DVD recordable and rewritable discs. There are several different versions of UDF, with 2.01 being the default in Windows. Blu-ray reading and writing requires version 2.5 and third-party software.

During a security audit, you discovered that customer service employees have been sending unencrypted confidential information to their personal email accounts via email. What technology could you employ to detect these occurrences in the future and send an automated alert to the security team? ​ SSL

UTM

Karen lives in an area that is prone to hurricanes and other extreme weather conditions. She asks you to recommend an electrical conditioning device that will prevent her files from being corrupted if the building's power is unstable or lost. Additionally, she would like the computer to maintain power for up to an hour of uptime to allow for a graceful shutdown of her programs and computer. Which of the following should you recommend?

Uninterruptible power supply

A factory worker suspects that a legacy workstation is infected with malware. The workstation runs Windows XP and is used as part of an ICS/SCADA system to control industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation. After its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent reinfection? ​ Quarantine the infected system

Update the anti-malware solution

You are working as a technician for a small company and recently moved some files from one server to another to free up some storage capacity on the existing server. Now, multiple users have begun reporting that they cannot access some of their previous shares on the file server. If a user attempts to open one of the shares, they get an "Access Denied" error. You have verified that all users are located in the correct security groups, and their access permissions are correct. Still, the users cannot access the network shares. Which of the following is MOST likely causing the issue with the users accessing the network shares? ​ The network shares require administrative permissions

Users are trying to access the shares via their previously mapped drive letters

Sam and Mary both work in the accounting department and use web-based software as part of their job. Sam cannot log in to the website using his credentials from his computer, but Mary can log in with her credentials on her computer. Sam asks Mary to login into her account from his computer to see if the problem is with his account or computer. When Mary attempts to log in to Sam's computer, she receives an error. Mary noticed a pop-up notification about a new piece of software on Sam's computer when she attempted to login to the website. Which TWO of the following steps should Mary take to resolve the issue with logging in from Sam's computer?

Verify Sam's computer has the correct web browser configuration and settings Ask Sam about the pop-up notification and determine what ew programs he installed on his computer

A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system's web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then perform the remediation to remove the malware. You have scanned the machine with several anti-virus and anti-malware programs and determined it is now cleaned of all malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated anti-virus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers?

Verify the hosts.ini file has not been maliciously modified

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?

WPA personal

Ted, a file server administrator at Dion Training, has noticed that many sensitive files have been transferred from a corporate workstation to an IP address outside of the local area network. Ted looks up the IP address and determines that it is located in a foreign country. Ted contacts his company's security analyst, verifying that the workstation's anti-malware solution is up-to-date and the network's firewall is properly configured. What type of attack most likely occurred to allow the exfiltration of the files from the workstation?

Zero-day

You are working as a penetration tester and have discovered a new method of exploiting a vulnerability within the Windows 10 operating system. You conduct some research online and discover that a security patch against this particular vulnerability doesn't exist yet. Which type of threat would this BEST be categorized as?

Zero-day

Which of the following commands is used on a Linux system to perform installations of new software packages?

apt-get

Which of the following commands is used on a Linux system to change the ownership of a file or directory on a system?

chown

Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?

dd The dd command is used to convert and copy files. On Unix and Unix-like operating systems like Linux, almost everything is treated as a file, even block devices like a hard disk drive. This makes dd useful to clone disks or wipe data. The dd utility is available out of the box even in the most minimal installation of all distributions.

A network technician determines that two dynamically-assigned workstations have duplicate IP addresses. What command should the technician use to correct this issue?

ipconfig /release | ipconfig /renew

Which command-line tool could you use on a Windows system to enable an inactive administrator account?

net user

Which command-line entry would be used on a Windows system to test if your system can reach diontraining.com?

ping diontraining.com

Which of the following Linux command-line options would shutdown a Linux server in 11 minutes from now?

shutdown +11

Which of the following commands is used on a Linux system to switch to another user's account?

su

What can be issued from the command line to find the layer 3 hops to a remote destination?

traceroute

You are troubleshooting a network connectivity issue and need to determine the packet's flow path from your system to the remote server. Which of the following tools would best help you identify the path between the two systems?

tracert

Which of the following commands is used on a Linux system to edit a text file on a server?

vi


Ensembles d'études connexes

RHEL - CHAPTER 6 | Managing Local Users and Groups

View Set

Chapter 20: Genes Within Populations

View Set

GW- Ch 9- CompTIA Security+ (Exam SYO-501)

View Set