Hardware Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A technician is talking with a customer who is having problems printing an application. Which question, when asked courteously, would be the best first step in gathering information from the customer about the problem?

"When did it last work?"

A user is writing a shell script for a computer running Linux. The script should receive execute in the standard command interpreter.

#!/bin/bash

A technician creates a script that includes cmdlets. Which of the following script file types did the technician create?

.ps1

A customer calls to tell you that he suspects that a computer has been infected by a virus. The customer has requested procedures for malware removal.

Malware infection recovery steps Verify the infection Quarantine the system Update antimalware software Scan and remove infection Schedule ongoing updates enable system restore and create a restore point

A smartphone's screen has gradually had slower response and sometimes freezes for a short time before starting to work again spontaneously.

Memory

While troubleshooting a user's Windows 10 laptop, a technician determines that they need to collect detailed information about the configuration of a computer's hardware and software.

Msinfo.32.exe

Which of the following file systems support native encryption?

NTFS

Documentation for a new network includes the drawing in the exhibit. What type of diagram does this represent?

Network topology diagram

A company is researching software that would allow its programmers to legally modify and customize the source code.

Open source

What combination of authentication factors will qualify as multi-factor authentication?

Password and smart card

A customer complains that their mobile phone's touch screen is completely unresponsive. The customer has tried removing and then replacing the battery, but after they turned the phone back on, the screen was still unresponsive.

Perform a hard reset.

Users complain that they cannot connect to any internet websites. They can connect to a web server deployed in the local perimeter network.

Ping an internet site by IP address.

A user is preparing a computer with UEFI firmware for a customer. The customer wants to be able to take advantage of UEFI features on the computer.

Possible steps: Covert the disk to a dynamic disk Select a Default installation Boot to DVD in BIOS mode Press Shift +10 from Windows setup Steps in order: Boot to DVD in UEFI mode Select a custom installation Delete the existing partitions Le Windows setup partition the drive Finish the installation.

Management is concerned about the time required to recover from a recent malware infection that spread through the network.

Prepare response policies and procedures

A technician is helping set up an office for a small business. Most of the equipment being used, computers and multifunction printers, is refurbished.

Properly grounded circuit

A user spends a lot of time traveling to provide sales support to customers. The user is concerned about protecting data stored on a tablet from disclosure while traveling.

Public charging stations

A customer has noticed that their phone's battery often discharges very quickly during the day. This seems to happen most often when they travel extensively on mass transit and other public transportation.

Put the phone in airplane mode.

A cybersecurity analyst suspects that a user's computer has been infected by malware. The analyst has not seen this type of malware before.

Quarantine the user's computer

Which windows 10 pro and windows 10 pro enterprise feature provides a user with a graphical interface to connect to another computer over a network?

RDP

A technician is writing a Window's batch script file and they need to insert the following as a comment: Testing new executable.

REM Testing new executable ::Testing new executable

An organization wants to allow an offsite contractor to use a central web-based console for device management, including installing software and patches.

RMM

A customer is preparing to install a game on a computer running Windows 10. The game was designed for an earlier Window's version. The customer is concerned that there might be problems after installing the game.

Recover from the restore point

A technician is trying to correct a problem with a third-party application on a computer running Microsoft Windows 10. The technician needs to edit the registry.

Regedit

A user's antivirus application reports multiple infections. Due to the complexity to the infections, the user is prompted to call a support number.

Reinstall the operating system

A company has employees who travel to remote sites for data collection. The company wants to ensure that the data is not lost if any employee's mobile device is lost or stolen.

Remote backup application

A technician has to order apart from the manufacturer to repair a customer's printer. They tell the customer that they should be able to get the part within two weeks but that they will let them know as soon as the manufacturer gives them a firm delivery date.

Reply to the customer's e-mail informing them that they have not been given a firm delivery date yet, but that they will contact them as soon as they receive this info from the manufacturer.

A company is concerned about unauthorized users being able to log onto workstations. Workstations include a mix of computers that run Linux and Windows.

Require strong passwords Configure failed login lockout

A user complains that a computer is crashing intermittently with Stop errors. The computer runs Windows 10.

Run a system Restore.

A network administrator needs to connect to a local network switch in order to make a configuration change. The connection must be protected from eavesdropping.

SSH

Which of the following should be used on a Linux system to share files and printers with Windows systems over a network?

Samba

A computer running Microsoft Windows 10 cannot access network or internet resources. A technician sees that the listing for the network adapter in Device Manager has an icon with an arrow that is pointing down.

Select the device and choose Enable from the Action menu.

A customer brings a computer in for repair. The customer complains about problems trying to print.

Sfc

A company is decommissioning several computers. It needs to ensure that the date on the hard disks cannot be recovered.

Shredding Degaussing

Which keyword should be used to create a loop in a windows batch file?

for

A technician is troubleshooting a computer running Windows 10. The technician wants to force the computer to boot into Safe Mode when it restarts.

msconfig

Which type of policy is most easily implemented and enforced through operating system (OS) configuration settings?

password policy

A user downloads and installs an unapproved audio driver on their workstation. Upon reboot, the system displays a BSOD.

run sfc/scannow from an elevated command prompt.

mantrap is MOST effective against which security threat?

tailgating

Users report that they cannot connect to a website. Using other means, a technician verifies that the website is operational.

tracert

A technician wants to copy the contents of a fixed hard disk to a removable hard disk for backup. Which command can copy all files, directories, and subdirectories to another disk all at once?

xcopy

A company has most of its operations in one location. The company also has three satellite locations in different geographic areas.

you need to prevent:Surge suppressor you need to ensure: uninterruptable power supply. you need to protect: line conditioner

A technician arrives at a customer's location for a service call. What should they do while the customer is describing the problem that they are experiencing?

Listen closely, make eye contact, and ask clarifying questions.

Which of the following protocols is specifically designed to add an additional layer of security for online accounts and help to protect against phishing attacks and other types of fraud by requiring at least two types of authentications?

MFA

A technician has been instructed to configure all on-premises workstations with IP addresses from ranges that will not be used on the internet.

192.168.0.0 to 192.168.255.255 10.0.0.0 to 10.255.255.255

A technician is unable to start a Windows 10 computer in Safe Mode. Which of the following problems would prevent a Windows 10 computer from starting up in Safe Mode?

A corrupt master boot record.

A company is preparing to change out several computers. They have asked for a technician's help in developing a safe disposal plan.

MSDS

A user calls in-house support to report that a computer running Linux is infected with malware. What should the support technician do first?

Identify and verify the virus symptoms.

A technician is concerned that a hacker could compromise a user's workstation by using a rainbow table attack. What should the technician do to address this risk?

Implement a password complexity policy.

What type of documentation is used as follow-up after recovery from a serious network security event?

Incident documentation

A company sets up a closet as a server room. The company uses servers in separate enclosures rather than rack mounted servers.

Install HEPA filters on the enclosures.

Which of the following features are exclusive to iPadOS when compared with IOS?

Apple pen support Multitasking

What is the role of a software token in computer and network security?

As part of a two-factor authentication system

Which of the following options should be used to track network equipment inventory?

Asset ID

An antivirus program identifies an infected file on a compuer running Windows 10 but cannot remove it because it is in use.

Boot into safe mode and run the virus scan again

Which two attack types are specifically designed to compromise user passwords?

Brute Force Rainbow Table

A company has been storing old computer equipment and related waste. A technician has been tasked with sorting the equipment for proper disposal.

CRT display: hazardous Battery: Hazardous Computer Case: non-hazardous Used Printer Paper: non-hazardous Circuit Boards: Hazardous

A company works on several government contracts. They need to provide proof that any devices containing data have been disposed of properly to ensure that none of the data is at risk when a device is decommissioning.

Certificate of Destruction

A company's network is configured as a wireless LAN (WLAN) with two 802.11n access points (APs), AP1 and AP2, as shown in the exhibit operating on the 2.4 GHz band.

Change the channel on one or both APs.

A technician is installing a new wireless router in a small office. The technician needs to mitigate the risk that an attacker will change the security settings of the router.

Change the username and password to non-default values.

A user complains that their windows 10 laptop runs slowly. Upon initial inspection, a technician suspects that the system is running low on memory.

Check the Hard Faults/sec counter in Resource Monitor

A user notices that recently their Android phone uses an excessive amount of data even though no apps are actively running on the screen.

Check the app permissions.

A window's 10 user suspects that a recently installed application is consuming excess CP and that it is slowing down the boot process.

Check the startup impact in Task manager.

An organization provides Windows 10 laptops to all remote workers. The organization's network administrator must ensure that it is not possible for communications between each laptop and the corporate network to be eavesdropped on.

Configure VPN connections on each user's system.

Several users are receiving large amounts of spam through their company email. The company maintains its own mail server. Company technicians need to correct the problem.

Configure email filters.

A company's web site crashes due to extremely high levels of incoming traffic. The traffic is coming from multiple sources around the internet.

DDoS

A user reports that, following the installation of several applications on their android phone, they are frequently interrupted with full-screen ads.

Determine if the APK's came from a trusted repository.

A user purchases a Bluetooth mouse. Which tool or utility could they use to enable Bluetooth in Windows 10?

Devices

AA manager is in an important video conference on their mobile device. The manager notices that their battery is draining rapidly.

Disable background apps.

A user is concered about unauthorized location tracking of an Android smartphone.

Disable the GPS radio.

A company plans to use change management to manage updating server and client operating systems.

Document changes

For each description, select the term that most clearly matches.

Document that describes chain of custody License agreement: open source Agreement between an: EULA Restrictions placed: DRM

A user of a computer running OS X wants the safari browser on all of his devices to remember his usernames, passwords, and credit card numbers.

Enable iCLOUD Keychain

A technician configures a computer running Windows 10 to share a printer. Users report that they are unable to access he printer when the computer is not in use.

Enable the Allow this device to wake the computer option on the network adapter's configuration properties.

A technician configures BitLocker on a Windows 10 laptop. Which benefit does this configuration provide?

Encryption of data-at-rest

A user visits a website daily to check e-mail. The user receives a message that the site's certificate is not from a trusted source and its given option to exit or continue to the site.

Exit the web site

An organization's network is configured as an Active Directory Domain Services (AD DS) domain. The technician needs to ensure that domain user Alice does not have read access to the folder named Graphics.

Explicitly deny read access to the folder to Alice through local access security.

A user reports intermittent wireless connectivity on a new mobile phone. Other users do not report any issues using mobile devices connected to three access points in the office.

Firmware or drivers on the phone

A network with several geographic locations is configured as an active directory domain services (AD DS) domain. All domain clients run Windows 10.

Group Policy

Match each statement with the appropriate logical security concept. To answer, select the appropriate security concepts from the dropdown menus.

Hierarchical container: organization unit Centralized Active: Group policy Technology for creating: VPN

What should be included in a network AUP?

How equipment may be used Prohibited activities

A company has experienced several malware infections over the last several months. The company has installed antivirus/antimalware software on all network computers.

User education

A system administrator needs to be able to manage a remote server. Any input from the administrator, including keystrokes or mouse clicks, should be transmitted over the network to the remote server and executed as if the administrator was sitting physically at the server console.

VNC

An organization deploys a new intranet server that will be used to host sensitive HR and financial data. A technician has been instructed to ensure that all connections to the server are secure.

Verify that root certificates are updated on web browsers.

A user travels frequently to various factory and warehouse sites. Which type of mobile broadband network should a technician set up on a computer running Microsoft Windows 10 for that user?

WWAN

A technician discovers a program running in the background on several network client computers that run on Windows 10. The technician determines that the program is collecting address and computer name information form the network and sending it to an address on the internet.

Spyware

A user is running Windows 10 Professional. They attempt to reboot their computer, but the operating system will not load.

Startup repair

What is a social engineering method through which a user can gain entry to area protected by locked doors?

Tailgating

A system administrator runs "top" to view system utilization on a Mac. Which of the following is the administrator using?

Terminal

A company is decommissioning two file servers. The company is planning to reuse the hard disks.

The drives would be unusable after degaussing.

A customers desktop computer is configured with a Balanced power plan. The computer is using Control Panel settings to configure custom power options.

The feature is turned off through BIOS. The hybrid sleep option is turned on.

A technician is decommissioning a file server and plans to reuse the hard disk drives. The technician wants to make it as difficult as possible to recover any of the info currently on the hard disks.

The technician should run a disk wipe.

A user is browsing multiple websites researching an issue. The user accesses the internet through the company network.

The user was redirected to a rouge antivirus site.

A user installs freeware from the internet that causes their Window's 10 computer to run slowly and crash frequently. A technician has gone through multiple built-in troubleshooters in an attempt to repair this issue.

The user's personal files will be kept, but all apps and Windows settings will be removed.

Which of the following utilities can be used to create hourly snapshot backups on macOS?

Time Machine

How is the Linux apt-get command used?

To manage packages on a system

A technician downloads the installation files for a corportae approved web browser. The technician has been instructed to create hashes for each download prior to posting them on the company's intranet.

To verify that data has not been altered

A business is converting an enclosed office into a secure server area and wiring closet. The business has had additional environmental controls installed for heat and humidity.

UPS

A technician verifies that a user's computer is infected with malware. Which action should a service technician take before scanning and removing a malware infection?

Update the computer's antimalware software.

A user reports that after installing a new application, one of their other applications does not load. The user's computer is running Windows 10 Professional.

Use System Restore

A user needs advice on extending battery life on an Android smartphone.

Use WIFI instead of cellular connections when possible.


Ensembles d'études connexes

Chapter 11 - Project Risk Management

View Set

Triangles similarity statements and congruent statements

View Set