part two

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Before opening up the computer..

-the power cord is plugged into the wall -the power switch is on the on position -the voltage switch is set to the correct voltage

XX POST

2nd things that happens, Power on Self Test, makes sure the system is running smoothly, locates operating system. Occurs during cold boot

At which of the following OSI layers does a router operate?

3

You have been asked to implement a RAID 5 solution for your network. What is the minimum number of hard disks that can be used to configure RAID 5?

3

You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?

500 resolution, 50mm, .05 LUX

Capacity of a DDR4 standard system memory module? 128 MB 512 MB 256 GB 512 GB

512 GB

Which of the following BEST describes the theoretical capacity of a DDR4 standard system memory module?

512 GB

Which of the following defines two-man control?

Certain tasks should be dual-custody in nature to prevent security breach.

You want to implement an authentication method that uses public and private key pairs. Which authentication methods should you use?

EAP

Which implementation is most secure?

EAP-TLS

Which of the following is an error detection technique that can also correct the error?

ECC (Error Correcting Code)

Which of the following security solutions would prevent a user from reading a file which she did not create?

EFS

A user has purchased an external speaker to play music from a mobile device over a wireless connection. Which of the following actions is most likely needed for speaker connectivity?

Enable pairing

You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do? (Select TWO. Each option is part of the complete solution.)

Enable the Erase Data option. Disable the Simple Passcode option.

Which of the following are characteristics of TACACS +?

Encrypts the entire packet, not just authentication packets

Which of the following is a characteristic of TACACS+? Supports only TCP/IP Encrypts the entire packet, not just authentication packets Requires that authentication and authorization are combined in a single server Uses UDP ports 1812 and 1813

Encrypts the entire packet, not just authentication packets

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?

Hub

Drag the collision domain property on the left to the appropriate network device(s) on the right. Each property can be used more than once.

Hub Single collision domain Switch Multiple collision domains 802.11n wireless access point Single collision domain Router Multiple collision domains Bridge Multiple collision domains Repeater Single collision domain Layer 3 switch Multiple collision domains

Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped?

IPsec PPP *ACL * VNC RDP

Which of the following network technologies is packaged as part of a BRI plan?

ISDN

You have a small wireless netwoek that uses multiple access points. The network uses WPA and brodcasts the SSI. WPA2 is not supported by the wireless access points. You want connect a laptop computer to the wireless network. Which of the following parameters will you MOST likely need to configure on the laptop? BSSID Channel Preshared key TKIP encryption AES encryption

Preshared Key TKIP encryption

You need to boot a Windows 10 system into Safe Mode. Which steps will accomplish this task? (Select TWO. Each choice is a complete solution.)

Press F8 at Startup. in Safe mode, select start > settings > Update&security > recovery > advanced startup > restart now

What is the goal of a TCP/IP hijacking attack?

Preventing legitimate authorized access to a resource. Destroying data. *Executing commands or accessing resources on a system the attacker does not otherwise have authorization to access.* Establishing an encryption tunnel between two remote systems over an otherwise secured network.

Which of the following is not a benefit of NAT?

Preventing traffic initiations from outside the private network Hiding the network infrastructure from external entities Using fewer public IP addresses *Improving the throughput rate of traffic*

UEFI Secure Boot

Prevents malware from infecting system boot loader, requires digital certificates store on the UEFI chip

Which of the following features are common functions of an all-in-one security appliance? (Select two.)

Spam filtering Bandwidth shaping

Capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which attack type?

Spamming *Man-in-the-middle attack* DDoS Passive logging

4-pin 12 V (P4) power

Starting with the Pentium 4 (P4) processor, CPUs required more power than could be provided through the ATX power plug. The 4-pin 12 V connector: -connects to the motherboard -provides two dedicated 12 V wires to the CPU (older processors only used 5 V power) *The 4-pin 12 V CPU connector is not the same as the 20+4-pin ATX power connector.

You are an IT technician for your company. One of your employees calls and tells you that every time they turn their computer on, they hear three beeps. Which of the following best describes an accurate replay to this employee?

Three repeated beeps may mean different things. First, we need to check the motherboard documentation.

Which of the following are used when implementing Kerberos for authentication and authorization? (Select two.)

Ticket granting server Time server

You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which tool would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards?

Time and language

Which of the following are used when implementing Kerberos for authentication and authorization? Select two

Time server Ticket granting server

What is the primary purpose of forcing employees to take mandatory one-week minimum vacations every year?

To check for evidence of fraud

Which of the following terms describes a test lab environment that does not require the use of physical hardware? VLAN Network as a service (NaaS) Virtual sandbox Offsite virtual storage

Virtual sandbox

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

Virus

Which of the following social engineering attacks use Voice over IP (VoIP) to gain sensitive information?

Vishing

Which of the following protocols carry phone calls over an IP-based network?

VoIP

Anti-virus software.

Which of the following measure are you most likely to implement in order to protect against a worm or Trojan horse?

4-pin CPU power 24-pin motherboard power

Which of the following motherboard power connectors typically connect directly to the motherboard? Select two.)

Faceplate

Which of the following objects is installed between the system case in the motherboard back panel I/O ports (such as sound, video, and USB ports)?

Anti-virus software should be configured to download updated virus definitions as soon as they become available.

Which of the following statements about the use of anti-virus software is correct?

What is the subnet mask?

255.255.255.0

Riser card

"Daughter board" used instead of expansion cards for long desktops rather than tall

Hyper threading

"Multi threading" 2 tasks at the same time.

L2 + L3

"Off dye" through internal bus

L1

"On dye", on the chip, fastest due to no traveling

Resolution

# of pixels in each dimension used to display a pictures

Refresh Rate

# of times per second that the monitor updates and image, measured by Hertz

Hertz

(Hz) measures processor speeds/cycles measured by clock

Cache

(cash) For of memory, very fast

64- bit processor

(x64) 16 Exobites max

32- bit processor

(x86) 4 GB RAM max

Which of the following is not one of the IP address ranges defined in RFC 1918 that are commonly used behind a NAT server?

*169.254.0.0/ 169.254.255.255* 172.16.0.0 172.31.255.255 192.168.0.0 192.168.255.255 10.0.0.0 10.255.255.255

Which of the following best describes the ping of death?

*An ICMP packet that is larger than 65,536 bytes* Partial IP packets with overlapping sequencing numbers Redirecting echo responses from an ICMP communication Sending multiple spoofed ICMP packets to the victim

Which of the following describes how access lists can be used to improve network security?

*An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.* An access list filters traffic based on the frame header such as source or destination MAC address. An access list looks for patterns of traffic between multiple packets and takes action to stop detected attacks. An access list identifies traffic that must use authentication or encryption.

You are the wireless network administrator for your organization. As the size of the organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. (select 2)

*Configure all wireless access points with client certificates* Configure all wireless workstations with client certificates. Configure the RADIUS server with a preshared key Configure all RADIUS clients with a preshared key *Configure the RADIUS server with a server certificate*

Which of the following is not a protection against session hijacking?

*DHCP reservations * Packet sequencing Time stamps AntiIP spoofing

Which of the following is a valid security measure to protect email from viruses?

*Use blockers on email gateways* Use reverse DNS lookup Use PGP to sign outbound email Limit attachment size to a maximum of 1 MB

Which is the best countermeasure for someone attempting to view your network traffic?

*VPN* Antivirus software Access lists Firewall IPS

A portion of the hard disk that cannot be used.

Bad sector

Which of the following are characteristics of Bluetooth? (Select TWO.)

-2.4 Ghz radio wireless -Ad hoc connections

You need to protect the user data on a windows 10 system. Which tools could you use to do this?

-File history -Windows 7 (Backup and restore)

Which of the following is true of a network using the 1000Base-T standard? (Select TWO.)

-The network operates at one gigabit per second. -The network uses copper UTP cables.

You've just installed a wireless access point (AP) for your organization's network. You know that the radio signals used by the AP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network? (Select two.)

*Disable DHCP on the AP* *Configure the AP to filter out unauthorized MAC addresses* Implement an AP with a shorter range Disable the spreadspectrum radio signal feature on the AP Use the AP configuration utility to reduce the radio signal strength Install a radio signal jammer at the perimeter of your organization's property

Which IPSec subprotocol provides data encryption?

*ESP* AH AES SSL

You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefits are the result of implementing this technology in your organization? (Choose two.)

*Enforcement of the organization's internet usage* policy *An increase in bandwidth availability* Prevention of phishing attempts Identification and disposal of infected content Prevention of emails containing threats

Which of the following are characteristics of a packet filtering firewall? (Select two.)

*Filters IP address and port* *Stateless* Filters based on sessions Filters based on URL Stateful

PPTP (PointtoPoint Tunneling Protocol) is quickly becoming obsolete because of which VPN protocol?

*L2TP (Layer 2 Tunneling Protocol)* TACACS (Terminal Access Controller Access Control System) L2F (Layer 2 Forwarding Protocol) SLIP (Serial Line Interface Protocol)

Which VPN protocol typically employs IPSec as its data encryption mechanism?

*L2TP* PPTP L2F PPP

Which of the following networking devices or services prevents the use of IPSec in most cases?

*NAT* Switch Firewall Router

Your company has a connection to the internet that allows users to access the internet. You also have a web server and an email server that you want to make available to internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?

*Network-based firewall* Host-based firewall VPN concentrator IDS IPS

You need to place a wireless access point in your twostory building. While trying avoid interference, which of the following is the best location for the access point?

*On the top floor* In the basement In the kitchen area Near the backup generators

Which of the following is a firewall function?

*Packet filtering* FTP hosting Protocol conversion Frame filtering

Which of the following denial of service (DoS) attacks uses ICMP packets and is only successful if the victim has less bandwidth than the attacker?

*Ping flood * Ping of death Fragmentation LAND

You have used firewalls to create a demilitarized zone. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server for retrieving product, customer, and order information. How should you place devices on the network to best protect the servers? (Select two.)

*Put the web server inside the DMZ.* *Put the database server on the private network.* Put the web server on the private network. Put the database server inside the DMZ.

Which of the following wireless network protection methods prevents the wireless network name from being broadcast?

*SSID broadcast* 802.1x MAC filtering Shared secret key

You have physically added a wireless access point to your network and installed a wireless networking card in two laptops that run Windows. Neither laptop can find the network. You have come to the conclusion that you must manually configure the wireless access point (AP). Which of the following values uniquely identifies the network AP?

*SSID* PS Channel WEP

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal website. What should you use to allow access?

*Static NAT* DNS CNAME record Multicast DNS A record Dynamic NAT

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these servers?

*Static* Overloading Restricted Dynamic

In which of the following denial of service (DoS) attacks does the victim's system rebuild invalid UDP packets, causing the system to crash or reboot?

*Teardrop * Deauth NACK Banana

Which statement best describes IPSec when used in tunnel mode?

*The entire data packet, including headers, is encapsulated* The identities of the communicating parties are not protected Packets are routed using the original headers, and only the payload is encrypted IPSec in tunnel mode may not be used for WAN traffic

You suspect that an Xmas tree attack is occurring on a system. Which of the following could result if you do not stop the attack? (Select two.)

*The system will be unavailable to respond to legitimate requests.* *The threat agent will obtain information about open ports on the system. * The system will send packets directed with spoofed source addresses . The system will become a zombie.

Your organization uses an 802.11g wireless network. Recently, other tenants installed the following equipment in your building: • A wireless television distribution system running at 2.4 GHz • A wireless phone system running at 5.8 GHz • A wireless phone system running at 900 MHz • An 802.11n wireless network running in the 5 GHz frequency range

*The wireless TV system* The 900 MHz wireless phone system The 5.8 GHz wireless phone system The 802.11n wireless network

You are concerned about sniffing attacks on your wireless network. Which of the following implementations offers the best countermeasure to sniffing?

*WPA2 with AES* MAC address filtering Firewall filtering on the access point WEP with shared secret authentication Disabling SSID broadcast

You need to enumerate the devices on your network and display the network's configuration details. Which of the following utilities should you use?

*nmap* samspade neotrace nslookup

the processor instruction set identifies all instructions (operations) that a processor can perform.

--32-bit processors use the IA-32 instruction set (x86) --Itanium processors from the Intel use the IA-64 instruction set --AMD64 and Intel 64 processors use the x86-64 instruction set (x64)

applications typically perform better on 64 bit systems

--64 bit applications typically perform better than 32 bit applications --in some cases 32 bit applications might perform better on 64 bit systems

if you plan to implement a virtual solution, check to see whether hardware support in the CPU is required. hardware support is provided by processors with the following features:

--Intel's Virtualization Technology (VT) --AMD's AMD Virtualization (AMD-V)

32 bit applications can run on 64 bit processors using

--Itanium processors use a software layer to translate between IA_32 and IA-64 --x64 processors execute both 32 bit and 64 bit instructions in the hardware

32-bit or 64-bit

--a 32-bit processor can process 32-bits of information at a time --a 64-bit processor can process 64- bits of information. --over the last several years, processors have been moving from 32-bit processors to 64-bit processors.

Integrated Memory controller

--in a traditional processor design, the processor is connected to the font side bus and the Northbridge chip. --the processor communicates with other system components through the front side bus. --smaller manufacturing size has reduced the overall size of a processor, leaving more room on the processor die for additional cores or cache. --to improve performance, some processors include the memory controller on the processor die rather than in the Northbridge chip, resulting in faster memory access by the processor.

beware of the following processor cache

--the size of the cache increases as you move from L1 to L3, with L1 being the smallest --as a general rule, a processor with more cache performs better than a processor with less cache (all other things being equal) --originally, L1 cache was on the processor die, with L2 cache being on the motherboard between the CPU and the RAM. as processor technology has advanced, L2 cache moved to the processor die, with L3 cache being on the motherboard. today, all three cache levels are located on the processor.

Consider the 850 nm multimode fiber optic cable shown below. How much loss can you expect between the transmitter and the receiver?

-1.2 dB

DDR4

-1.2 volts

Which of the following are not valid IP addresses? (Select THREE.)

-145.8.260.7 -257.0.122.55 -45.22.156.256

Which of the following are valid IP addresses? (Select two.)

-2.2.2.2 -172.16.1.26

Standard Definition Aspect Ratio

4:3

An administrator configures a server to run the TCP/IP suite protocol that allows users to download files contained in specific directories on the server and also protects access to those files by requiring user authentication. Which of the following TCP/IP port numbers allow this protocol to work properly? (Select TWO).

-20 -21

Match each port number on the left with its associated protocols on the right. -Secure Shell (SSH) -Apple Filing Protocol (AFP) -HTTP over SSL (HTTPS) -Hypertext Transfer Protocol (HTTP) -Server Message Block (SM B/CIFS) directly over TCP -Service Location Protocol (SLP) -Internet Message Access Protocol (IMAP)

-22 -548 -443 -80 -445 -427 -143

Which of the following are valid IPv6 addresses? (Select TWO.)

-6384:1319:7700:7631:446A:5511:8940:2552 -141:0:0:0:15:0:0:1

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (select two)

-802.11a -802.11g

Match each active directory definition on the left with its corresponding term on the right. (Some definitions do not have an associated term on the right.) -Domain controller -Sire -Subnet -Forrest root domain -Tree root domain

-A server that holds a copy of the active directory database that can be written to -Represents a group of networks that are connected with high-speed links -Represents a physical network segment -The first domain created in an active directory forest -The highest-level domain in a tree

A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production are to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration? (Select two.)

-Administrators -Remote desktop users

Match the social engineering description on the left with the appropriate attack type on the right. Phishing Whaling Spear phishing Dumpster diving Piggybacking Vishing

-An attacker uses a telephone to convince target individuals to reveal their credit card information. -An attacker gathers personal information about the target individual in an organization. -An attacker pretending to be from a trusted organization sends an email asking users to access a website to verify personal information. -An attacker searches through an organization's trash looking for sensitive information. -An attacker gathers personal information about the target individual, who is a CEO. -An attacker enters a secured building by following an authorized employee through a secure door without providing identification.

Identify and label the following attacks by dragging the term on the left to the definition on the right. Not all terms are used. Masquerading Whaling Vishing Spear phishing Spim Phishing Piggybacking Spam Tailgating

-Attackers send emails with specific information about the victim (such as which online banks they use) that ask them to verify personal information or send money. -Attackers use Voice over IP (VoIP) to pretend to be from a trusted organization and ask victims to verify personal information or send money. -Attackers send unwanted and unsolicited text messages to many people with the intent to sell products or services. -An attacker convinces personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access. -An attacker pretending to be from a trusted organization sends emails to senior executives and high-profile personnel asking them to verify personal information or send money.

A windows workstation is configured to receive its IP configuration information from a DHCP server on the company network. The user at the workstation reports that she cannot use email and is unable to reach the internet. Using the ipconfig command, you see that the workstation has been assigned the following special IP configuration. -IP Address: 169.254.0.1 -Subnet mask: 255.255.0.0 What is this special IP configuration called? Why did the workstation receive this type of configuration?

-Automatic private IP addressing (APIPA) -The workstation was unable to contact the DHCP server

A portable computer connected to a printer with an infrared interface works fine inside your office. However, when you go outside, it works sporadically. Which of the following would best resolve this issue? (Select TWO).

-Block direct and reflected sunlight from the pathway between the PC and the printer -Move the printer closer to the computer

Drag the wireless networking technology on the left to its associated transmission distance limitation on the right. Each technology can be used more than once. -Up to 100 meters for Class 1 devices -Up to 30 meters in areas without interference -Up to 10 meters for Class 2 devices

-Bluetooth -Infrared -Bluetooth

You manage a group of 20 windows workstations that are currently configured as a workgroup. You have been thinking about switching to an active directory configuration. Which advantages would you gain by switching to active directory? (Select TWO.)

-Centralized configuration control -Centralized authentication

You have a windows system with two sata hard drives, one used for the operating system and the other used for storing data. You have traced recent problems to a fault in the system motherboard. You replaced the motherboard and reconnected all the hardware. When you started the computer, the system showed the startup information screen, but then returned an error that an operating system could not be found. What should you do? (Select TWO. Each option is part of the complete solution.)

-Change the boot order in the UEFI configuration -Verify the operating system sata drive is configured as the boot drive in the UEFI configuration.

Match the employment process on the left with the appropriate task that should occur during that process on the right.

-Conduct role-based training *Employment* -Verify an individuals job history *Pre-employment* -Show individuals how to protect sensitive information *Employment* -disable a users account *Termination* -Remind individuals of NDA agreements *Termination* -Obtain an individuals credit history *Pre-employment*

You want to make sure that you always have the latest patches installed for an order entry application created by DataComLink corporation. What should you do? (Select TWO.)

-Configure the application to automatically download and install updates as they are released. -Check the datacomlink website regularly for patches and updates to the software.

A technician is configuring the static TCP/IP settings on a client computer. Which of the following configurations are needed for internet communications?

-DNS server address -IP address including a subnet mask (IPv4) or subnet prefix length (IPv6) -Default gateway address

Which of the following are atenna types that are commonly used in wireless networks? (Select two).

-Directional antenna -Omnidirectional antenna

Which of the following describes an IPv6 address? (Select two.)

-Eight hexadecimal quartets -128-bit address

Drag the group policy setting on the left to the appropriate description of how the setting is enforced on the right. -Causes the policy to be enforced -Does not change the current setting for the policy -Prevents the policy from being enforced

-Enabled -Not configured -Disabled

The following is an example of an IPv6 address: -Which part of the example IPv6 address is the prefix? -Which quartet in the example IPv6 prefix is used to identify the subnet? -Which part of the example IPv6 address is the interface ID?

-FEC0:1319:7700:F631 -F631 -446A:5511:CC40:25AB

You have a computer that runs windows 7, and you want to install windows 10. You are not concerned about keeping any of the existing data currently on the drive, and you want to do a clean install. After placing the windows 10 installation DVD in the optical drive, you restart the computer, but it does not boot to the DVD, and you are unable to install windows. Which of the following are the best methods for installing windows from the DVD? (Select TWO. each choice is a complete solution.)

-From the UEFI or BIOS firmware, change the boot order. -While the computer is rebooting, press the boot menu function key.

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select TWO.)

-Greater cable distances without a repeater -Immunity to electromagnetic interference

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.)

-Hexadecimal numbers -32 numbers, grouped using colons

You need to boot a windows 10 system into safe mode. Which steps will accomplish this task? (Select TWO. Each choice is a complete solution.)

-In safe mode, select start > settings > update & security > recovery > advanced startup > restart now. -Press F8 at startup

You have a laptop running windows 10. User account control (UAC) has been disabled. How would you re-enable UAC on the laptop? (Select two. Each choice is complete solution.)

-In the control Panel, select system and security and then security and maintenance. -In the control panel, select user accounts and then user accounts

Which of the following statements about the dynamic host configuration protocol (DHCP) are true? (SELECT TWO.)

-It can deliver a DNS address in addition to the host address. -A workstation must request addressing information from a DHCP server.

Which of the following statements accurately describes how a modem works? (Select two.)

-It demodulates analog data from a telephone network into digital PC data. -It modulates digital data from the PC into analog data and transmits it on a telephone network.

Which of the following are characteristics of coaxial network cable? (Select TWO.)

-It has a conductor made from copper in the center of the cable -It uses two concentric metallic conductors.

Symptoms of bad power supply include..

-the computer does not turn on -the computer sporadically shuts off or reboots -a broken or noisy fan

-A network in a small geographic are that typically uses wires to connect systems together. -A small network used for connecting devices, such as a notebook computer, a wireless headset, a wireless printer, and a smartphone. -A network that is typically owned and manged by a city as a public utility. -A group of networks that are geograhically isolated, but are connected to form a large internetwork. -Similar to a standard LAN, but uses radio signals instead of wires to connect systems together. -A network that covers an area as small as a few city blocks to as large as an entire city. -A set of subnets connected to each ohter, typically by wires, using at least one router.

-Local Area Network (LAN) -Personal Area Network (PAN) -Metropolitan Area Network (MAN) -Wide Area Network (WAN) -Wireless Local Area Network (WLAN) -Metropolitan Area Network (MAN) -Local Area Network (LAN)

Which aspects of virtual memory can you configure on a windows workstation? (Select TWO).

-Location of the paging file -Maximum size of the paging file

The 802.11ac wireless networking standard provides increased bandwidth and communication speeds by using which of the following technologies? (Select TWO).

-MU-MIMO to allow multiple users to use the same channel. -Channel bonding to combine more channels in the 5 Ghz band to allow for up to 160-MHz channels.

-Data transfers through the core using more than one light rays. -The core diameter is around 10 microns. -Cable lengths can extend a great distance. -Cable lengths are limited in distance.

-Multimode -Single mode -Single mode -Multimode

Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select TWO.)

-Near backup generators -Near cordless phones

proper safety precautions

-Never ground yourself when working on a power supply -Never open or disassemble a power supply. Always replace the entire unit.

To protect user data on a windows 10 system, you've configured system restore to automatically create restore points for the C: volume. Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your users' data? (Select TWO).

-No. You need to create a backup of your user data as well. -No. You need to enable file history

Which of the following are features of basic rate ISDN (BRI)? (Select three.)

-One control channel -Dial-up connection -Two data channels

Which of the following are characteristics of the 802.11g wireless standard?

-Operates in the 2.4 ghz range -Backwards compatible with 802.11b devices -Maximum bandwidth of 54 mbps

Match each active directory term on the left with its corresponding definition on the right. -Logical organization of resources -Collection of network resources -Collection of related domain trees -Network resource in the directory -Group of related domains.

-Organizational unit -Domain -Forest -Object -Tree

You are an IT technician for your company. Jodie, a receptionist, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run task manager. Which of the following tabs would be the most helpful for getting an overall view of how Jodie's computer is running? (select Two).

-Performance -Processes

A user is configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. Which of the following TCP/IP suite protocols can be used to retrieve email messages? (Select two).

-Post office protocol (POP3) -Internet Message Access Protocol (IMAP)

What are two major concerns regarding IoT devices? (Select TWO.)

-Privacy -Hacking

You are an IT technician for your company. Rachel, a receptionist, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctioning application. To help troubleshoot Rachel's computer, you run task manager. Which of the following tabs would be the most helpful for getting an overall view of how Rachel's computer is running? (select Two).

-Processes -Performance

What is the purpose of the Microsoft management console (MMC)? (Select TWO).

-Provide a common user interface for performing system administration tasks. -Provide a shell for running snap-ins

You are configuring an ADSL connection. Which of the following will be part of the configuration? (Select TWO.)

-RJ11 connectors -Filters or splitters

You have configured your windows systems to automatically back up user data every night at midnight. You also take a system image backup once per month. What else should you do to ensure that you are protected from data loss? (Select TWO.)

-Regularly test restoration procedures -Store a copy of all backups off-site

A home office user employs a technician to secure a windows computer. To secure the local accounts, which of the following actions should the technician perform? (Select TWO).

-Rename the administrator account -Disable the guest account

Which of the following paths opens the computer management tool in windows 10? (Select TWO).

-Right-click the windows icon and select computer management. -In the control panel, open system and security > administrative tools and then double-click the computer management icon

You manage windows desktops for your organization. You recently updated all of your workstations to windows 10. Your organization relies on a particular application, which worked correctly on windows 7, but now does not run in windows 10. You have checked the application vendor's website, but they do not provide a windows 10 update. What are your options for running the application? (Select two)

-Run the application in compatibility mode -Create a virtual computer that runes windows 7. Run the virtual computer each time the application runs.

Which of the following tools allow remote server management? (Select two.)

-SSH -Telnet

-Connects segments on the same subnet. Forwards signals to only the port connected to the destination device. -Can be used to connect wireless clients to wired clients on the same network. -Connects two network segments that have different subnet addresses. -Connects segments on the same subnet. Repeats signals out to all other ports. -Operates in full-duplex mode, meaning devices can both send and receive data at the same time. -Operates in half-duplex mode, meaning devices can either send or receive data at any given time. -Use the IP address within a packet to move packets between networks.

-Switch -Bridge -Router -Hub -Switch -Hub -Router

You manage a Windows system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations. Which tools could you use to do this? (Select TWO.)

-Task Manager -Performance Monitor

Which of the following identifies the prefix component of an IPv6 address? (Select two.)

-The first four quartets of an IPv6 address. -The first 64 bits of an IPv6 address/

Which of the following identifies the interface ID component of an IPv6 address? (Select two.)

-The last 64 bits of an IPv6 address. -The last four quartets of an IPv6 address.

Drag each definition on the left to its corresponding performance counter on the right. Each definition may be used once, more than once, or not at all. -Disk queue length -Processor utilization -Commit Charge -Disk time -Page file usage -Memory pages per second

-The number of read and write requests that are waiting to be processed -The amount of time the processor spends performing non-idle tasks. -The amount of memory that has been assigned to running processes -The amount of time that the disk subsystem is busy reading from and writing to disk -(Leave Blank) -The number of hard faults that occur each second.

Match each smart device with its description. -Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real-time, and adjusts itself depending on ambient conditions. -Can change colors, track motion, stream audio over blue-tooth, and double as a connected camera, but its only smart when turned on. It doesn't work when turned off. -Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. -Easy solution for making small appliances, such as lamps, coffee makers, and toasters, smart. -Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device. -Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. -Uses voice recognition software and activates through a wake word or hot word.

-Thermostat -Bulb -Switch -Plug -Door lock -Speaker/digital assistant

Which of the following is true of the way many large digital media vendors are using digital rights management technology? (Select TWO.)

-They are moving away from DRM because of several key shortcomings in the technology. -They are adopting alternatives to DRM such as encouraging customers to not illegally share digital files.

Which of the following are options for connecting a computing device, such as a notebook computer or a tablet., to a cellular network? (Select FOUR.)

-Use a USB cable to connect the device to the network through a smartphone. -Use an integrated cellular antennae to connect the device directly to the cellular network. -Use a USB cellular antennae to connect the device directly to the cellular network. -Use the device's wi-fi to connect to the network through a cellular wi-fi spot.

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? (Select two.)

-Use task manager to monitor memory utilization. -Use resource monitor to monitor memory utilization.

You turn on your desktop computer. You can hear the fans start up, but the monitor remains blank. You wait a while, but it doesn't appear that anything else is happening . The hard drive activity light doesn't show activity, and you never hear the sound that plays when Windows loads up. Which of the following are the most likely cause of the problem? (Select three.)

-Video card -Processor -Memory

CPU ALU

Arithmitic Logic Unit, manages calcuations

Which of the following is true of online software activation? (Select THREE.)

-With personal software licenses, the limit is usually one to three online activation. -Before running a newly installed application, the user must activate their license online on the software vendor's website. -Persistent activation may require the license to be continuously re-activated online at a preconfigured interval

While using a windows 10 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into safe mode and use system restore to revert the system to a point in time before the malware infection occurred. Given this information, which of the following are true?

-You must reinstall any applications that were installed after the restore point was taken -Your user files were not affected when the system was reverted to the restore point.

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select TWO.)

-You risk losing your job -You expose your company to litigation by violating the software license agreement.

What are the two protocols used most often with IoT devices? (Select TWO.)

-Z-Wave -Zigbee

You are the IT technician for your company. Which of the following mechanisms would best allow you to resolve a hostname into its associated IP address?

-hosts file -DNS

You need to view detailed IP configuration information on Windows workstation. In addition to the IP address, subnet mask, and default gateway configuration, you need to know see the network card's MAC address and the addresses of the DHCP and DNS servers the workstation is communicating with. What command would you enter at the command line to see this detailed information? When you see the address of the DNS server, you realize that this information needs to be updated. Earlier in the day, you implemented a new DNS server with a new IP address. The workstation will update this information in 24 hours. What command can you enter at the command line to update the DNS server information right away?

-ipconfig /all -ipconfig /flushdns

A user tells a help desk technician that their browser is displaying a message that a site can't be reached. When asked, the user tells the technician that other users in the same office can browse to the site. The technician suspects that the web server's name is not being translated to the correct IP address. The technician asks the user to open a command prompt window. Which of the following commands would confirm the technicians assumption? (Select TWO).

-nslookup -ping

-Resolves (looks up) the IP address of the specified hostname. -Tests connectivity between devices and shows the routers in the path between the two devices. -Sends an ICMP echo request/reply packet to a remote host -Displays current connections and incoming and outgoing connections -A few simple replies to this request from the remote host indicates that a connection exists between sender and reciever -Displays active sessions, ports, sockets, and the local routing table. -Performs a continuous connection test when used with the -t option

-nslookup -tracert -ping -netstat -ping -netstat -ping

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation and an application you are using is unable to connect to a Windows server named FileSvr2. Which commands can you use to test network connectivity between your workstation and the server? (select two)

-tracert -ping

You have had several employees call the help desk where you work, complaining that they are not able to reach the www.widgets.com server. To help troubleshoot this issue, you decide to run a variety of commands. Which of the following commands is most likely to return the IP address of the desired owner?

-tracert www.widgets.com -ping www.widgets.com -nslookup www.widgets.com

Which option, used with the copy command, makes sure that all copied files are written correctly after they have been copied?

/v

Your network performs a full back up every night. Each Sunday, the previous night's backup tape is archived. Wednesday morning the storage system fails. How may restore operations will you need to perform to recover all of the data?

1

Track

1 line that goes all around the disk

Visualization Station

1 machine with multiple cores and max ram inside

Sector

1 section on a track with 512 bits of data

Cylindar

1 track that is parallel on every disk

Assuming the same operating frequency, what are the advantages of DDR3 over DDR2? (select two)

1) DDR3 doubles the data transfer rate of DDR2 2) DDR3 uses less power than DDR2

Assuming the same operating frequency, what are the advantages of DDR4 over DDR3? (select two)

1) DDR4 doubles the data transfer rate of DDR3 2) DDR4 uses less power than DDR3

Insert CPU

1) Handle the CPU by the edges without touching the underneath connectors 2) A Zero Insertion Force (ZIF) socket uses a lever to allow installation of the processor. Drop the processor into place, then push down on the lever to lock the processor into place. 3) When installing a CPU, be sure to orient the CPU appropriately with the socket. 4) When installing a processor in a multi-processor system, unused processor slots much be filled with a special terminating resistor. 5) When adding multiple processors in a multi-processor system, be sure that the speed of the processors are the same.

Prepare for installation

1)Use anti-static protection when installing a CPU 2)The CPU and motherboard socket type much match. The socket identifies the number and layout of pins. 3)In addition to the socket type, the motherboard must support the processor speed. 4)Verify how heat connectivity will established between the CPU and heatsink.

Which of the following is included in an operations penetration test? (select three)

1. Looking through discarded papers or media for sensitive information 2.Eavesdropping or obtaining sensitive information from items that are not properly stored 3.Acting as an imposter with the intent to gain access or information

What is the maximum range of the Bluetooth 2.0 specification for class 1 devices?

100 M

Your network follows the 1000Base-T specifications for Gigabit Ethernet. What is the maximum cable segment length allowed?

100 Meters

You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose? (Select two.)

1000BaseLX Single mode fiber

Which type of fiber optic cable supports 10 gigabit ethernet with a maximum segment length of up to 40 km?

10GBaseER single-mode

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

What is the maximum data rate of an ISDN BRI line?

128 Kbps

Intel Core i7

1366

Intel Xeon

1366

What is the speed of an OC-3 connection?

155 mbps

Which of the following in NOT one of the ranges of IP addresses define in RFC 1918 that are commonly used behind a NAT server?

169.254.0.0-169.254.255.255

Which of the following IP address ranges is reserved for Automatic private IP addressing?

169.254.0.1 - 169.254.255.254

Given that your Windows workstation has Automatic Private IP Addressing (APIPA) implemented using default settings, which of the following TCP/IP addresses could be automatically assigned to the system should your DHCP server go down or become inaccessible?

169.254.1.26

What is the IPv4 address of the workstation?

169.254.201.11

High Defintion Aspect Ratio

16:9

RADIUS uses Uses UDP ports ___ and ___

1812 and 1813.

Blu-Ray Disk

25 GB, high def

Your network uses the following backup strategy: Full backups every Sunday night Differential backups Monday through Saturday nights Thursday morning the storage system fails. How many restore operations will you need to perform to recover all of the data?

2

Jumpers

2 pins and plastic, edge of motherboard

Multiple Core Processor

2 processors on 1 chip. If used with hyper threading, 4 tasks can get done

Which frequencies does Zigbee operate on?

2.4 Ghz, 900 MHz, and 868 MHz

Which three of the following IP addresses are Class C addresses?

222.55.0.0 223.16.5.0 192.15.5.55

Which port does telnet use?

23

What is the maximum number of nodes Z-Wave allows on its mesh network?

232

Which of the following is the maximum transmission speed for Bluetooth v3 and v4 devices?

24 Mbps

Parallel Port

25 pins, for printer, not common anymore, pink, LPT for operating system

PSI Slot

32 Bit

PCI Express

32 bit, Most popular, new used for video

Which of the following statements are true?

32-bit processors use only the IA-32 instruction set (also referred to as x86). 64-bit processors use the x86-64 instruction set (also referred to as x64). Explanation The processor instruction set identifies all instructions (operations) that a processor can perform. 32-bit processors use the IA-32 instruction set (also referred to as x86). Itanium processors from Intel use the IA-64 instruction set. AMD64 and Intel 64 processors use the x86-64 instruction set (also referred to a x64). 32-bit applications can run on 64-bit processors. x64 processors execute both 32-bit and 64-bit instructions in the hardware.

What is the approximate bus speed of DDR2 memory rated at PC2-5300?

333 MHz

To assist a user, a help desk technician is able to take advantage of a windows proprietary network protocol that allows the technician to open a graphical interface to connect with the users windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol?

3389

Which of the following TCP/IP port numbers is the default prt used by this protocol? 80 143 443 3389

3389

Which port must be opened in a firewall of a Windows system in order Remote Desktop connections to be established with it?

3389

Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?

3389

While working on a windows workstation, you've enabled windows remote desktop. Which of the following ports must be opened in the server's firewall to allow remote clients to access the desktop?

3389

You have a computer that has four DDR2 memory slots. Currently there are two 512 MB memory modules installed. You check the motherboard documentation and find that the system has a 4GB memory limitation. You want to add as much memory as possible without replacing the existing modules. What is the maximum total amount of RAM that can be installed in this system?

3GB

Your network uses the following backup strategy: o Full backups every Sunday night o Incremental backups Monday through Saturday nights Thursday morning the storage system fails. How many restore operations will you need to perform to recover all of the data?

4

DVD Memory

4.7 GB per side

While making an online bank transaction, a customer checks in to see that the web browser is displaying a lock icon that indicates that an encrypted TCP/IP suite protocol is being used. Which of the following TCP/IP port numbers does this protocol typically use when the browser encrypts its communications with the banks web server?

443

You are configuring PuTTY to be used to access the CLI of a Cisco switch. Which of the following configuration values would prevent PuTTY from connecting? (Select two.)

4600 baud Flow control = RTS/CTS

Which of the following ports are used with TACACS ?

49

Which of the following ports are used with TACACS? 22 49 50 and 51 1812 and 1813 3389

49

TACACS+: Uses TCP port ___

49.

You've just installed the DNS service on a Windows server. Which port must be opened in the server's firewall to allow clients to access the service?

53

You manage a network with two locations: Portland and Seattle. Both locations are connected to the Internet. All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements: • Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 Internet. • You want to use a site-to-site tunneling method instead of a host-to-host tunneling method. Which IPv6 solution should you use?

6 to 4

If the SONET (OC-1) base rate is 51.84 Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second?

622.06 Mb

PCI-X

64 Bits

DDR DIMM - Dual In-line Memory Module

64 birth data path that matches bus width RDRAM and DDR/2/3/4 are packaged into DIMMs, each having a unique # of pins a notch position

You want to build a new system that supports 6 GB of memory. Which of the following will be the MOST important consideration when building the computer?

64-bit processor

You want to build a new system that supports 6GB of memory. Which of the following will be the most important consideration when building the computer?

64-bit processor

CD Memory

650 gb

What is the recommend humidity level for server rooms?

70%

Intel Core 2 Duo

775

Intel Pentium D

775

Which wireless standard can stream data at a rate of up to 54 Mbps using a frequency of 5 Ghz?

802.11a

Which of the following sends unsolicited business cards and messages to a Bluetooth device?

Bluebugging Slamming Bluesnarfing *Bluejacking*

A customer is experiencing a sporadic interruption of their wi-fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. THe computer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following WI-fi standards should the replacement device support to best fulfill the customers needs?

802.11ac

Which of the following wireless networking standards uses a frequency of 5 Ghz and supports transmission speeds up to 1.3 Gbps?

802.11ac

After installing a new 2.4GHz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely to be using? (Select two.)

802.11b 802.11g

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)

802.11b Bluetooth

Which 802.11 standard will work best in this situation?

802.11n

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11n

You have been contacted by OsCorp to recommended a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 Ghz, and provide the highest possible transmission speeds. Which of the following solutions would you recommenced?

802.11n

Which of the following permits or denies access to resources through the use of ports?

802.1X permits or denies access to resources through the use of ports. It implements Port-based Network Access Control (PNAC). This is part of the 802.1 group of IEEE protocols. 802.1X should not be confused with 802.11x, which is an informal term used to denote any of the 802.11 standards including 802.11b, 802.11g, 802.11n, and 802.11ac. A hub connects computers by way of physical ports but does not permit or deny access to any particular resources; it is a simple physical connector of computers.

You want to increase security of your network by allowing only authenticated users to be able to access network devices through a switch. Which of the following should you implement?

802.1x

You want to increase the security of your network by allowing only authenticated users to be able to access netowrk devices through a switch. Which of the following should you implement?

802.1x

You want to increase the security of your network by allowing only authenticated users to be able to access network devices through a switch. Which of the following should you implement?

802.1x

Your organization's security policy requires you to restrict network access to allow only clients that have their firewall enabled. Which of the following is a collection of components that would allow you to meet this requirement?

802.1x authentication System health validator *Network access protection * IPsec enforcement

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4 GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)

802.3a Infrared *Bluetooth * *802.11g* 802.11a

Serial Port

9 Pins, was used for modems or mice, not used anymore, called COM on operating system

Which of the following best describes an evil twin?

A Bluetooth device that receives mobile phone commands via bluebugging. *An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.* An access point that is added to the network by an internal employee to provide unauthorized network access. A threat agent that marks the outside of buildings to indicate the presence of a wireless network.

Which of the following BEST describes the purpose of a CPU socket? A CPU socket allows computer memory (RAM) to be inserted in the computer. A CPU socket is used to expand the computer's functionality, like a video card, network card. A CPU socket is a single connector between a microprocessor and the motherboard. A CPU socket allows you to connect external devices such as your monitor and keyboard

A CPU socket is a single connector between a microporcessor and motherboard

Padded cell.

A Smurf attack requires all but which of the following elements to be implemented?

Dip Switches

A bank of 4 switches to go from 0-15

• Disable SSID broadcast on the WAP. • Implement WPA2.

A customer has called and indicated that he thinks his neighbor is connecting to his wireless access point (WAP) to use his high-speed internet connection. Which of the following will MOST likely help resolve this issue? (Select two.) • Disable SSID broadcast on the WAP. • Upgrade to an 802.11g access point. • Use the WAP configuration utility to change the signal channel. • Install radio signal jamming equipment between his house and the neighbor's house. • Implement WPA2.

Which of the following describes a man-in-the-middle attack?

A false server intercepts communications from a client by impersonating the intended server.

Your data center has highly critical information. Because of this you want to improve upon physical security. The data center already has a video surveillance system. What else can you add to increase physical security?

A mantrap is a device made to capture a person. It is usually an area with two doorways, the first of which leads to the outside and locks when the person enters, the second of which leads to the secure area and is locked until the person is granted access. Biometrics can help in the granting of this access by authenticating the user in a secure way, such as thumbprint, retina scan, and so on. Software-based token systems and access control lists are both logical and do not play into physical security.

Motherboard

A motherboard (system board, logic board, or mainboard) is a circuit board that either houses or is connected to all of the components operating in the computer. When selecting a mobo consider: CPU socket type, memory module compatibility, number of memory slots, maximum supported memory, expansion slot count and type, and onboard devices.

Which of the following attacks is a form of software exploitation...input variable is designed to handle?

Buffer overflow

Which of the following is the best definition of a LAN?

A network in a small geographic area, like in an office.

Which of the following is the strongest form of multi-factor authentications?

A password, a biometric scan, and a token device

What is the main purpose of a physical access log?

A physical access log's main purpose is to show who entered the facility and when. Different access control and authentication models will be used to permit or prevent employee access.

Which of the following describes a logic bomblogic bomb?

A program that performs a malicious activity at a specific time or after a triggering event

Which of the following describes a logic bomb? - A program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found. - A program that appears to be a legitimate application, utility, game, or screensaver that performs malicious activities surreptitiously - A program that performs a malicious activity at a specific time or after a triggering event. - A type of malicious code similar to a virus whose primary purpose is to duplicate itself and spread, while not necessarily intentionally damaging or destroying resources.

A program that performs a malicious activity at a specific time or after a triggering event. Explanation A logic bomb is a program that performs a malicious activity at a specific time or after a triggering event. Logic bombs can be planted by a virus, a Trojan horse, or an intruder. Logic bombs may perform their malicious activity at a specific time and date or when a specific event occurs on the system, such as logging in, accessing an online bank account, or encrypting a file. A type of malicious code similar to a virus whose primary purpose is to duplicate itself and spread while not necessarily intentionally damaging or destroying resources is a wormworm. A program that appears to be a legitimate application, utility, game, or screensaver that performs malicious activities surreptitiously is a Trojan horseTrojan horse. A program that has no useful purpose but attempts to spread itself to other systems and often damages resources on the systems where it is found is a virusvirus.

Which of the following information are you likely to find in a policy document?

A requirement of using encrypted communications for web transactions.

When assisting users, a technician often uses the Mac OS force quit functions and the linux kill command. Which of the following situations would require their use?

A runaway application does not respond to user input

...within your server room are failing at a rapid pace. You discover that the humidity room is at 60% and the temperature is at 80 degrees. What should do to help reduce problems?

A separate SC unit in the server room

What is a ZIF socket?

A special socket for inserting and securing a processor. Explanation Newer motherboard use a ZIF (Zero Insertion Force) socket for inserting the processor. A ZIF socket has a lever or screw that opens to install the processor and closes to lock the processor into place. A Pin Grid Array (PGA) has a series of pins on the bottom in concentric squares.

Spontaneous reboot or intermittent system crashes.. (troubleshoot)

A spontaneous reboot can also be cause by a bad power supply or device driver. A clicking noise when reading or writing data from the hard disk is an early sign of a failing drive.

In a variation of the brute force attack, an attacker may use a predefined list...best addresses this issue?

A strong password policy

Which of the following is an example of two-factor authentications?

A token device and a pin

Which of the following is an example of an Internal Threat?

A user accidentally deleted the new product designs.

Which of the following is an example of an internal threat?

A user accidentally deleted the new product designs.

Which of the following is an example of an internal threat?

A user accidentally deletes the new product designs

Which of the following is an example of an internal threat? A delivery man is able to walk into a controlled area and steal a laptop. A user accidentally deletes the new product designs. A water pipe in the server room breaks. A server backdoor allows an attacker on the internet to gain access to the intranet site.

A user accidentally deletes the new product designs.

Which of the following is the best example of remote access authentication? A user accesses a shared folder on a server A user establishes a dialup connection to a server to gain access to shared resources A user connects using Remote Desktop to a computer on the LAN A user logs on to an ecommerce site that use SSL

A user establishes a dialup connection to a server to gain access to shared resources

You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing, internet access, printers, and other local network resources. Which of the following would be the best implementation for your business?

A workgroup

What is the main difference between a worm and a virus?

A worm can replicate itself, while a virus requires a host for distribution.

What is the main difference between a worm and a virus? - A worm is restricted to one system, while a virus can spread from system to system - A worm can replicate itself, while a virus requires a host for distribution - A worm requires an execution mechanism to start, while a virus can start itself - A worm tries to gather information, while a virus tries to destroy data

A worm can replicate itself, while a virus requires a host for distribution. Explanation A wormworm is a self-replicating program that uses the network to replicate itself to other systems. A worm does not require a host system to replicate. Both viruses and worms can cause damage to data and systems, and both spread from system to system, although a worm can spread itself while a virus attaches itself to a host for distribution

DDR2

Doubles the data transfer rate of DDR, for four times the bandwidth of SDRAM 240 pins

Which of the following connectors are part of the system case and connect to header pins on the motherboard? (Select Two) A. Power Switch B. 8-pin EPS12v C. HDD LED activity D. SATA power E. 24-pin ATX power

A. Power switch C. HDD LED activity

You are in the process of installing a motherboard in a system case. Which of the following objects should you place between the motherboard and the system case? A. Standoffs B. Heat Spreaders C. Fans D. Support Manual E. Passive heat sink

A. Standoffs

A SYN attack or SYN flood exploits or alters which element of the TCP three-way handshake?

ACK

IPSec is implemented through two separate protocols. What are these protocols called? (Select two.)

AH ESP

IPsec is implemented through two separate protocols. What are these protocols called? select two

AH ESP

AMD Chips

AM, FM, PGA- pins grid array

AMD Athlon II

AM3+

AMD Phenom II

AM3+

How did the computer get its IP configuration information?

APIPA

Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attacker's computer?

ARP poisoning

Which of the following attacks tries to associate an incorrect MAC address with a know IP address?

ARP poisoning

Which of the following attacks tries to associate an incorrect MAC address with a known IP address?

ARP poisoning

Popular motherboards by size

AT->STANDARD ATX->MICRO ATX->MINI ITX->NANO ITX->PICO

A technician is tasked with preparing a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network. Which of the following network devices would be the best choice for this connectivity?

Access point

In preperation to use your laptop on the airplane as you travel to a conference, you disconnect the USB mouse. The cursor drifts to the left side of the screen while using the built-in trackpad. How do you stop it? Calibrate the trackpad in control panel Update the trackpad drivers Replace the trackpad Access the BIOS/UEFI configuration and disable the USB pointer option

Access the BIOS/UEFI configuration and disable the USB pointer option

You recently installed a windows 10 system. During the installation process, you elected to sign into the system using a local user account. After using the system for a time, you decide to begin using an online Microsoft account to authenticate to the system instead.

Accounts

What is the name of the service included with the windows server operating system that manages a centralized database containing user account and security information?

Active directory

A security administrator is conducting a penetration test on a network. She connects a notebook system running Linux to a wireless network and then uses NMAP to probe various network hosts to see which operating system they are running. Which process did the administrator use in the penetration test in this scenario?

Active fingerprinting

Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?

Ad hoc

You have a computer with an onboard LAN adapter. The LAN adapter has failed and you are unable to connect the computer to the network. What should you do?

Add a network card using a PCI slot

Joe has been complaining that it takes too long to perform tasks such as panning, rotating, and zooming. After examining Joe's computer, which of the following changes would BEST meet the needs of working with the CAD software? Add a second high-capacity hard drive to Joe's computer. Increase the memory for the onboard video embedded in the motherboard Configure Joe's workstation with dual monitors Add a very high-end video board with fast GPU

Add a very high-end video board with a fast GPU

Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 GB of system RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance?

Add paging files to the E: and F: volumes.

Consider the virtual memory configuration for the Windows 10 system shown in the exhibit. Given that this Windows 10 system has 16 GB of system RAM and three hard disks installed, which configuration change could you make to the paging file to increase system performance?

Add paging files to the E: and F: volumes.

You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?

Administrators

In addition to Authentication Header (AH), IPSec is comprised of what other service?

Advanced Encryption Standard (AES) *Encapsulating Security Payload (ESP)* Encryption File System (EFS) Extended Authentication Protocol (EAP)

You need to configure file history to automatically delete any stored snapshots that are older than one month. Click the control panel option you would use to do this.

Advanced settings

Which tool would you use to configure the paging file location and size on a windows system?

Advanced system settings in control panel

While browsing the Internet, you notice that the browser displays ads that are targeted towards recent keyword searches you have performed. What is this an example of?

Adware

Portable devices have a software-controlled switch that disables all wireless functionality. What is the name of this software controlled switch?

Airplane mode

Thick Client

All applications are on the computer, has to be up to date

Thin Client

All applications are used via network, just needs basic operating system

You have a computer with a Pentium IV CPU and two PC-2400 DDR modules. The motherboard has room for two additional memory modules, and you'd like to install two PC-4000 modules. Which of the following statements in true?

All memory will operate at 300 MHz

A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security goals is most at risk?

Confidentiality

You are implementing security at a local high school that is concerned with students accessing inappropriate material on the internet from the library's computers. The students will use the computers to search the internet for research paper content. The school budget is limited. Which content filtering option would you choose?

Allow all content except for the content you have identified as restricted *Restrict content based on content categories* Block specific DNS domain names Block all content except for content you have identified as permitted

Which of the following are characteristics of TACACS +? select two

Allowing for a possible of three different servers, one each for authentication, authorization, and accounting. Uses TCP.

What is the purpose of cache memory?

Allows a processor to access data more quickly. Explanation The increased speed of cache memory allows a processor to access frequently used data more quickly than by getting the data from system memory. Data is stored in cache where it can be accessed quicker than retrieving the data from RAM. Like RAM cache memory is volatile meaning that the contents of the memory are lost when the power is turned off.

TV Tuner

Allows for TV feed to be on the computer

You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP address from the DHCP server so you configure it to obtain IP and DNS information automatically. When he's working from home, the laptop must use IP and DNS information that connects with his home network. Which IP addressing method can you use to make sure he gets a network connection at home?

Alternate IP configuration

Thermal paste

Always apply thermal paste between the processor lid and the heatsink

Overheating

Always ensure that your heatsink fan is plugged into the motherboard so it has power. If it isn't plugged in your cpu will overheat

Which of the following best describes the Ping of Death exploit?

An ICMP packet larger than 65,536 bytes.

Which of the following best describes the Ping of Death exploit?

An ICMP packet larger than 65,536 bytes?

The CPU cooling fan and the power supply fan are working properly. The lock-ups are happening with increasing frequency. Most common condition that explains this sysmptom? The BIOS has never been flashed and has gotten more and more out of date An accumulation of dust has gradually built up The internal temperature sensor is beginning to malfunction intermittenly. The power supply has been switched to the wrong voltage setting

An accumulation of dust has gradually built up

Denial of Service.

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?

When a malicious user captures authentication traffic and replays it against the network later, what is the security problem you are most concerned about?

An unauthorized user gaining access to sensitive resources

Which of the following measures are you most likely to implement to protect against a worm or Trojan horse?

Anti-virus software

Which of the following statements about the use of anti-virus software is correct?

Anti-virus software should be configured to download updated virus definition files assoon as they become available.soon as they become

Which of the following statements about the use of anti-virus software is correct?

Anti-virus software should be configured to download updates virus definition files as soon as they become available.

Which of the following is the most effective protection against IP packet spoofing on a private network?

Antivirus scanners *Ingress and egress filters * Hostbased IDS Digital signatures

Which of the following is the correct definition of a threat?

Any potential danger to the confidentiality, integrity, or availability of information or systems

You have just purchased a new network device and are getting ready to connect it to your network. Which of the following should you do to increase its security? select two

Apply all patches and updates Change default account password

Which of the following is the best recommendation for applying hotfixes to your servers?

Apply only the hotfixes that apply to software running on your systems

Which of the following is the best protection to prevent attacks on mobile phones through the bluetooth protocol?

Apply the latest patches and updates Set the phone to non-discoverable mode *Disable Bluetooth on the phone* Add a user account and strong password for Bluetooth access

While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer. Which of the following is the MOST professional way to handle the situation?

Ask the customer if it is okay to take the call, and then step into the hallway to briefly talk on the phone.

What is another name for a logic bomb?

Asynchronous attack

Which of the following activities are typically associated with penetration testing? (select two)

Attempting social engineering Running a port scanner

You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building. Which of the following conditions are you most likely to experience?

Attenuation

AMR Riser Slot

Audio Modum Riser, in the middle of the motherboard

What is the primary means by which supervisors can determine whether or not employees are complying with the organization's security policy?

Auditing

RADIUS is primarily used for what purpose?

Authenticating remote clients before access to the network is granted

RADIUS is primarily used for what purpose? Managing RAID faulttolerant drive configurations Controlling entry gate access using proximity sensors Authenticating remote clients before access to the network is granted Managing access to a network over a VPN

Authenticating remote clients before access to the network is granted

What are the most common network traffic packets captured and used in a replay attack?

Authentication

Which of the following is the verification of a person's identity?

Authentication is the verification of a person's identity. Authorization to specific resources cannot be accomplished without previous authentication of the user.

The receptionist received a phone call from an individual claiming to be a partner in a high-level project and requesting sensitive information. The individual is engaging in which type of social engineering?

Authority

The company network is protected by a firewall, an IDS, and tight access controls. All of the files on this protected network are copied to tape every 24 hours. The backup solution imposed on this network is designed to provide protection for what security service?

Availability

What is the primary countermeasure to social engineering?

Awareness

Upon reviewing the specifications for a motherboard, you find that it uses an F CPU socket. Which of the following manufacturer's CPUs can be used in this motherboard? A. Intel B. AMD C. Cyrix D. IBM

B. AMD

Which function does a motherboard's chipset perform? A. Initializes devices during the boot process. B. Facilitates communication between the processor, memory, and peripheral devices. C. Maintains an accurate system time and date D. Controls devices and functions attached to the motherboard

B. Facilitates communication between the processor, memory, and peripheral devices.

You have a computer system with a dual-core processor. You would like to upgrade to a quad-core processor, but you don't want to replace the motherboard. Which of the following steps SHOULD you perform first? A. Edit the BIOS to allow quad-core CPUs B. Read the motherboard documentation to identify which processors are supported C. Replace the VRM. D. Configure jumpers on the motherboard to allow four CPU cores E. Install the processor

B. Read the motherboard documentation to identify which processors are supported.

Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?

BGP. BGP is an advanced distance vector protocol (also called a path vector protocol) that uses paths, rules, and policies instead of a metric for making routing decisions.

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidentally delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would best protect Lily's files?

Back up her files using file history

You have a computer with a removable disk drive formatted with NTFS. You want the drive to use FAT32 so it is compatible with more operating systems. The drive is currently configured using drive letter D:. Which of the following MUST you complete to accomplish this task?

Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

Which of the following are typically associated with human resource security policies? (Select two.)

Background checks Termination

You are filling out a change order form. Toward its end, you explain how you will return affected hardware and software to its original state if the change fails. What is this plan called?

Backout Plan

What does a differential backup do during the backup?

Backs up all files with the archive bit set; does not reset the archive bit.

What does an incremental backup do during the backup?

Backs up all files with the archive bit set; resets the archive bit.

What should you do (if possible) before updating the UEFI firmware? (Select two.)

Backup existing UEFI settings Connect the computer to a UPS

Which of the following is likely to be located in a DMZ?

Backup server Domain controller *FTP server* User workstations

You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help in identifying past average network traffic?

Baseline

You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help you identify past average network traffic? Network diagram Event log Baseline History log

Baseline

You are in the habit of regularly monitoring performance statistics for your devices. You find that this month a specific server has averaged a higher number of active connections than last month? Which type of document should you update to reflect the change?

Baseline

You are in the habit of regularly monitoring performance statistics for your devices. You find that this month, a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect this change? Network diagram Configuration documentation Baseline Change log Wiring schematic

Baseline

XX BIOS

Basic input output system, first thing the computer does is gives power for instructions to the BIOS, written to cmos chip. 16 gb instruction, hard to change cmos, doesn't include network

Which of the following is the final step a user needs to take before that user can access domain resources?

Before a user can gain access to domain resources, the final step is to be authorized to those resources. Previously the user should have provided identification to be authenticated.

Two items are needed before a user can be given access to the network. What are these two items?

Before users can be given access to the network, the network needs to identify them and authenticate them. Later, users may be authorized to use particular resources on the network. Part of the authentication scheme may include a username and password. This would be known as an access control method.

RAM Modules

Better known as ram sticks

3 prong

Big plug to connect power supply to computer (xbox has it)

What do biometrics use to authenticate identity?

Biological attributes

Before gaining access to the data center, you must swipe your finger on a device. What type of authentication is this?

Biometrics. Single sign-on means that you can use one type of authentication to get access to more than one system. While that could be going on in this scenario, it is not explicit, so biometrics is the more accurate answer. Multifactor means that more than one type of authentication is needed; for example, a fingerprint and a PIN. Let's say that users were expected to type a PIN into a keypad to gain access to the data center. You might find over time that some persons who enter don't match the owner of the PIN. That uncertainty can be avoided by incorporating biometrics. Tokens are used to gain access to systems and networks, and might include rolling one-time passwords, but do not incorporate a person's physical characteristics such as a fingerprint.

Storage Cpacity

Bit, Byte, Kilo, mega, giga, tera ALWAYS 1024

You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which solution would you choose?

BitLocker

Which of the following are functions of gateway email spam blockers? (Select two.)

Blocks users from visiting websites with malicious content Helps enforce an organization's internet usage policy *Blocks email from specific senders* Blocks phishing attempts, which try to access confidential information *Filters messages containing specific content*

VGA

Blue, connector for video, 15 pins

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which would be the best choice?

Bluetooth

You want to use a wireless keyboard and mouse with your laptop computer. Which method should you choose?

Bluetooth

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standard could the network be using. select two

Bluetooth 802.11b

One day while trying to start your Windows 10 computer, the system displays the following error: Windows could not start. Could not read from the selected boot disk. Check boot path and disk hardware. Which of the following will most likely fix the problem?

Boot into the recovery environment and run the bootrec /rebuildbcd command

Wendy has been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the blue screen of death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the best place to begin repairing Wendy's computer?

Boot the computer from the windows installation disk and run startup repair.

Rodney, a user in the research department, reports that he is experiencing blue screen errors while using his windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV turner board in an expansion slot. Now he has to reboot the computer every time he loads the TV tuner application to watch TV> You need to fix Rodney's computer and prevent Rodney from using the T until you can install an update driver. What should you do?

Boot the system into safe mode. Disable the TV tuner driver in device manager.

A collection of zombie computers have been setup to collect personal information. What type of malware do the zombie computers represent?

Botnet

A collection of zombie computers have been setup to collect personal information. What type of malware do the zombie computers represent?

Botnet

A collection of zombie computers have been set up to collect personal information. What type of malware do the zombie computers represent? - Trojan horse - Botnet - Logic bomb - Spyware

Botnet Explanation A botnetbotnet is a collection of zombie computers that are commanded from a central control infrastructure and propagate spam or to collect usernames and passwords to access secure information. A logic bomblogic bomb is malware that lies dormant until triggered. A Trojan horseTrojan horse is a malicious program that is disguised as legitimate software. SpywareSpyware monitors the actions performed on a machine and then sends the information back to its originating source.

An attacker is conducting passive reconnaissance on a targeted company. Which of the following could he be doing?

Browsing the organization's website

A programmer that fails to check the length of input before processing leaves his codevulnerable to what form of common attack?

Buffer overflow

In business continuity planning, what is the primary focus of the scope?

Business processes

In business continuity planning, what is the primary focus of the scope? Business processes Company assets Recovery time objective Human life and safety

Business processes

While using a new Windows system, you find that the double-click speed setting on the mouse pointer is set much slower than you would prefer. You want to increase the double-click speed setting. Click the tab you would use in the Mouse Properties window to do this.

Buttons

By definition, which security concept ensures that only authorized parties can access data?

Confidentiality

Which of the following objects is installed between the system case and the motherboard's back I/O ports? A. Standoffs B. Fan C. Faceplate D. Heat Spreader

C. Faceplate

Which of the following services are available regardless of whether the telephone company network is available?

Cable modem

Which of the following is a valid MAC address?

C0-34-FF-15-01-8E

Which remote access authentication protocol periodically and transparently reauthenticates during a logon session by default? EAP PAP Certificates CHAP

CHAP

Which authentication method completes the following in order: logon request, encrypts value response, server, challenge, compare encrypted results, and authorize or fail referred to?

CHAP, the Challenge Handshake Authentication Protocol, authenticates a user or a network host to entities like Internet access providers. CHAP periodically verifies the identity of the client by using a three-way handshake; the verification is based on a shared secret. After a link has been established, the authenticator sends a challenge message to the peer; this does not happen in the other three authentication methods listed.

Match each of the motherboard components on the left with the appropriate description on the right. Non-volatile BIOS memory CMOS battery Flash Memory Southbridge Northbridge Expansion slots

CMOS battery: Maintains an accurate system time and date, even when the power is off Expansion slots: Allows additional features and capabilities to be added to the motherboard Southbridge: Houses the PCI bus controllers and communicates with the super I/O controller Flash Memory: Contains firmware that is used to configure motherboard settings and initialize devices Northbridge: Controls communication between the CPU, memory, and high-speed graphics bus. Non-volatile BIOS memory: Stores custom configurations settings made by the user

Which of the following fire extinguisher types poses a safety risk to users in the area? (select two)

CO2 Halon

Dynamic Frequency Cycle

CPU Throttling, automatically adjusting cycle speed to save energy

Northbridge

CPU to Memory (Front side bus)

All of the 802.11 standards for wireless networking support which type of communication path sharing technology?

CSMA/CA

What must you install between networks and a T1 line for your networks to use the T1 line?

CSU/DSU

Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?

CSU/DSU

Which of the following services are available regardless of whether the telephone company network is available?

Cable Modem

Which of the following types of internet connection services can allow you to be truly mobile when maintaining your internet connection?

Cellular

While investigating a network connectivity issue, a technician finds that the link light on a workstation is not lit, and there is no connectivity after replacing the patch cable with one that is known to be good. If the wall jack and patch panel ports are labeled correctly, which of the following tools would the technician most likely use next?

Cable tester

Ethernet

Cable with the clicky

Your laptop when new and fully charged lasted about 3 hours. Now you are lucky to get 2 hours before the battery charge level drops below 5%. When trying to correct this issue, what is the best first step? Replace the power meter chip on the battery Calibrate the battery Buy a new battery Clean the contacts on the battery

Calibrate the battery

Directly touching on an on-screen button doesnt depress or activate the button, but touching near the button dies. Which of the following action will correct the misalignment? Calibrate the touchscreen Lower the screen resoltion Update the touchscreen display driver Disable all mouse or touchpad devices

Calibrate the touchscreen

Bios hardware monitoring

Can show you temperatures, fan speeds, voltage, system clock, bus speed

Support manual

Can tell you what your mobo can/can't support. If you are ever unsure about something this is the place to go.

Man-in-the-middle attack.

Capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which security concern?

Which of the following fire extinguisher suppressant types is best used for electrical fires that might result when working with computer components?

Carbon Dioxide(CO2)

CRT MOnitor

Cathrode ray tubes, old monitor

A group of workers attend a team-building retreat at a remote cabin. They can place calls on their mobile smartphones, but the cabin has no wired phone, television, or wired internet connectivity. The workers need to access an internet webpage using their laptop computers. Which of the following internet connection types might be available to the workers?

Cellular

Cell phones with cameras and data transfer capabilities pose a risk to which security goal?

Confidentiality

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?

Change Management

A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet. Which of the following configuration changes on the SOHO router is most likely to improve VoIP performance?

Change QoS settings to give VoIP traffic more priority.

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update?

Change documentation

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update? Network diagram Change documentation Wiring schematic Configuration documentation

Change documentation

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?

Change management

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device? SLA Acceptable use Resource allocation Change management

Change management

You've just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from accessing the access point (AP) configuration utility?

Change the administrative password on the AP.

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?

Change the router's default password

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?

Change the router's default password.

You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?

Crimping tool

A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification. Which of the following actions should the technician take NEXT?

Check for and apply firmware updates.

A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification. Which of the following actions should the technician take next?

Check for and apply firmware updates.

You have just purchased a new plug-and- play sound card that uses a PCI slot. What should you do before installing the device in your Windows systems?

Check the HCL to make sure the device is compatible with the version of Windows running on your system. Download the latest driver from the manufacturer's Web site. Explanation Before installing the device, verify that it is compatible with your version of Windows and download the latest drivers. Because the card is a plug-and-play card, you do not need to manually assign system resources. The BIOS and the operating system will work together to assign resources. Windows Update does not download normal device driver files.

You would like to install Windows on a computer that previously had another operating system installed on it, but you are not sure if the audio card is compatible. The installed audio card is a SoundMax D1371 (PCI) card. What should you do?

Check the manufacturer website for compatibility information. Explanation Check the manufacturer website to verify compatibility between specific hardware devices and the operating system. While you could also go to the HCL, you are likely to get better compatibility information from the manufacturer.

You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted. What should you do next?

Check the vendor's Web site for an driver. Explanation Check the vendor Web site for an updated driver before further troubleshooting. Because the speakers worked before, you likely would not need to replace the speakers. PCI cards are plug-and-play, meaning that you should not need to manually configure resources such as IRQs. You should troubleshoot the problem completely before you resort to replacing the sound card.

You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections, and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted. Which of the following BEST describes the next step you should perform?

Check the vendor's website for an updated driver.

Chipset

Chipset is a group of chips that facilitates communication between the processor, memory, and peripheral devices. Older chipsets consist of two integrated circuits: Northbridge: dealt with faster devices such as graphics cards, RAM, or processor. Has a direct connection to the CPU. Nowadays, the northbridge is integrated with the CPU Southbridge: Used for slower devices such as RTC, hard drives, and PCI and USB controllers. Also communicates with the Super I/O controller. Intel CPUs use the Platform Controller Hub (PCH) AMD use the Fusion Controller Hub (FCH) Frontside bus replaced by the Direct Media Interface (DMI)

You want to configure your windows 10 workstation so that it can get windows updates direclty from other windows 10 systems on the network that have already downloaded them from Microsoft. Click the settings app option you would use to do this.

Choose how updates are delivered

You want to upgrade all memory in your system with the fastest memory available. Which of the following should you choose?

Choose the type of memory that is supported by your motherboard.

Which type of active scan turns off all flags in a TCP header?

Christmas tree Stealth *Null * FIN

Which type of network establishes a dedicated physical connection between two hosts who need to communicate on the network, not allowing any other host to use the medium until the communication is complete?

Circuit-switched

Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components?

Class C

A code of ethics provides for all but which of the following.?

Clearly defines courses of action to take when complex issue is encountered

You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this?

Client-side scripts

Which category can you use in control panel to control how times, dates, numbers, and currency are formatted and displayed for your computer?

Clock and region

When designing a firewall, what is the recommended approach for opening and closing ports?

Close all ports. Close all ports; open ports 20, 21, 53, 80, and 443. Open all ports; close ports that show improper traffic or attacks in progress. *Close all ports; open only ports required by applications inside the DMZ. * Open all ports; close ports that expose common network attacks.

Which of the following is not true regarding cloud computing?

Cloud computer requires end-user knowledge of the physical location and configuration of the system that delivers the services.

Which of the following network strategies connects multiple servers together so that if one server fails, the others immediately take over its tasks, preventing a disruption in service? Mirroring Clustering Adapter bonding Storage area networks (SANs)

Clustering

Which of the following network strategies connects multiple servers together such that if one server fails, the others immediately take over its task, preventing a disruption in service?

Clustering

Which of the following network strategies connects multiple servers together such that if one server fails, the others immediately take over its tasks, preventing a disruption in service?

Clustering

A technician is replacing a cable modem. The cable from the cable company has an inner solid wire conductor and an outer mesh conductor separated by PVC plastic insulation. Which of the following network cable types is being used?

Coaxial cable

Which of the following is a recovery site that may have electricity connected, but there are no servers installed and no high-speed data lines present?

Cold Site

Which of the following is a recovery site that may have electricity connected, but there are no servers installed and no high-speed data lines present?

Cold site

Consider the network shown in the exhibit. When you run the show interfaces command on switch1, you observe a significant number of runts on the Gi0/1 interface. What does this statistic indicate?

Collisions are occurring.

Which of the following is not a common criteria when authenticating users?

Common criteria when authenticating users include something you do, something you are, something you know, something you have, and somewhere you are. A person's likes and dislikes are not common criteria; although, they may be asked as secondary questions when logging in to a system.

Explanation

Commonly-implemented Intel processor sockets include the following: - 775: Used with the Intel Pentium 4, Celeron D, Intel Pentium 4 Extreme Edition, Pentium D, Pentium Dual-Core, Core 2 Duo, Core 2 Extreme. - Core 2 Quad, Xeon, and Celeron processors. - 1155: Used with the Intel Pentium 4, Celeron, Core i3, Core i5, Core i7, Core i7 Extreme, and Xeon processors. - 1156: USed with the Intel Pentium 4, Celeron, Core i3, Core i5, Core i7, and Xeon processors. - 1366: Used with the Intel Celeron, Core i7m and Xeon processors. - 1150: Used with the Intel Celeron Dual-core, Pentium Dual-Core, Core i3, Core i5, Core i7, Core i7 Extreme, and Xeon processors. - 2011: Used with the Intel Core i7 and Xeon processors. Commonly implemented AMD processor sockets include the following: - 940: Used with the AMD Opteron and Athlon 64 FX processors. - AM3: Used with the AMD Phenom II, Athlon II, Sempron, and Opteron processors. - AM3+: USed with the AMD Phenom II, Athlon II, Sempron, and Opteron processors. - FM 1: Used with the AMD Athlon II processor along with the A-series APUs. - FM2: Used with the AMD A4 series, A6 series, A8 series, A10 series, Athlon X2, Athlon X4, FX, FirePro, and Sempron processors. - FM2+: Used with the AMD A4 series, A6 series, A8 series, A10, Athlon X2, Athlon X4, and FX processors.

Match each third party integration phase on the left with the task that need to be completed during that phase on the right. Each phase may be used once, more than once, or not at all.

Communicate vulnerability assessment findings with the other party-Ongoing Operations Disable VPN config that allow partner access to your network-Off Boarding Compare your organization's security policies against the partner's policies-Onboarding Disable the domain trust relationship between networks-Off Boarding Identify how privacy will be protected-Onboarding Draft an ISA-Onboarding Conduct regular security audits-Ongoing Operations

As the victim of a Smurf attack, what protection measure is the most effective during the attack?

Communicate with your upstream provider

CNR Riser Slot

Communication and Network Riser, always on edge

As a victim of a Smurf attack, what protection measure is the most effective during the attack?

Communication with our upstream provider

CD ROM

Compact disk read only memory

XX CMOS

Complimentary metal oxide system contains BIOS- software/firmware with basic operating system, looks like a little bug

You create a new document and save it to a hard drive on a file server on your company's network. Then, you employ an encryption tool to encrypt the file using AES. This activity is an example of accomplishing what security goal?

Confidentiality

You want to make sure that the correct ports on a firewall are open or closed. Which document should you check? Wiring schematic Policy Baseline Configuration documentation

Configuration documentation

You want to make sure that the correct ports on a firewall have been opened or closed. Which document should you check?

Configuration documentation

System restore is currently disabled for all volumes on a windows 10 system. You need to enable system protection for the C: volume. Click the option you would select to do this?

Configure

One of your customers wants to configure a small network in his home. The home has three floors, and there are computers on each floor. This customer needs to share files between computers, print to a centrally located printer, and have access to the internet. Which of the following print solutions would best meet this client's needs?

Configure a Wi-fi infrastructure network.

Nate, an employee in your organization, has started to work from home two days a week. Nate uses the same company laptop while working in the office and working at home. Nate's laptop automatically connects to the wireless network in the office, but does not automatically connect to his home wireless network. Nate would like the laptop to connect automatically at home and at work. Which of the following would best allows this to happen?

Configure an alternate TCP/IP configuration on the laptop's wireless adapter to use a static IP address that is compatible with the home network.

Daisy Chain

Connecting 2 drives using 1 cable

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network will have multiple wireless access points. You want to use WPA2 on the network. What should you do to configure the wireless network? (Select two.)

Configure devices to run in ad hoc mode Use open authentication with MAC address filtering Use shared secret authentication *Configure devices to run in infrastructure mode* *Install a RADIUS server and use 802.1x authentication*

You have a windows system shared by three shift workers. Files that are used by all users are stored on the D:\ drive in various folders. The users have created hundreds of files on this drive and sometimes experience difficulty finding the files they need. What should you do?

Configure indexing to include the D:\ drive

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the Internet. Supervision of these computers has been difficult. You've had problems with patrons brining personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the Internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access point on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do?

Configure port security on the switch

You would like to control Internet access based on users, time of day, and websites visited. How can you do this?

Configure the Local Security Policy of each system to add Internet restrictions. Configure Internet zones using the Internet Options. *Install a proxy server. Allow Internet access only through the proxy server.* Enable Windows Firewall on each system. Add or remove exceptions to control access. Configure a packet-filtering firewall. Add rules to allow or deny Internet access.

You are the wireless network admin for your org. As the size of the org has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. To do this, you need to configure a RADIUS Server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is part of the complete solution)

Configure the RADIUS server with a server certificate and Configure all wireless access points with client certificates.

A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. They can communicate, but cannot browse the internet. What changes to the SOHO router is likely to restore internet connectivity? Update the firmware on the SOHO router Configure the SOHO router for NAT Disable DHCPS and configure the hosts with static IP addresses. Remove any QoS settings that give low priority to HTTP traffic

Configure the SOHO router for NAT

A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is most likely to restore internet connectivity?

Configure the SOHO router for NAT.

A salesperson in your organization spent most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organizations order database. Because she rarely... many of the things... Which key step should you take when implementing this configurations? select two

Configure the VPN connection to us IPsec Configure the browser to sent HTTPS requests through the VPN connection

Which of the following is "NOT" a protection against collusion?

Cross training

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take when implementing this configuration? (Select TWO. Each option is part of the complete solution.)

Configure the VPN connection to use IPsec Configure the browser to send HTTPS requests through the VPN connection

You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by DataComLink corporation. What should you do? (Select TWO.)

Configure the application to automatically download and install updates as they are released. Check the DataComLink Website regularly for patches and updates to the software.

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using WiFi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public WiFi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration? (Select two.)

Configure the browser to send HTTPS requests directly to the WiFi network without going through the VPN connection *Configure the VPN connection to use IPsec* *Configure the browser to send HTTPS requests through the VPN connection * Configure the VPN connection to use PPTP Configure the VPN connection to use MSCHAPv2

You recently purchased a laptop computer. As a memeber of the scales team, you often travel to present sales demonstrations. At one such presentation, you notice that the images being shown by a projector seem large and somewhat skewed. Which of the following changes would you MOST likely give you an accurate projection of your presentation? Configure the projector to use 4:3 aspect ratio Configure the projector to use 5:4 aspect ratio Configure the projector to use 16:9 aspect ratio Configure the projector to use 16:10 aspect ratio

Configure the projector to use 16:9 aspect ratio

You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following would be a required part of your configurations?

Configure the remote access server as RADIUS clients

You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following would be a required part of your configuration?

Configure the remote access servers as RADIUS clients.

You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following would be a required part of your configuration? Obtain certificates from a public or private PKI. Configure the remote access servers as RADIUS clients. Configure remote access clients as RADIUS clients. Configure the remote access servers as RADIUS servers.

Configure the remote access servers as RADIUS clients.

To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would BEST prevent this scenario from occurring again?

Configure the software to automatically download the definition file updates as soon as they become available.

To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would best prevent this scenario from occurring again?

Configure the software to automatically download the virus definition file as soon as they become available

You have just installed anti-malware software on all computers on your company's network. Which of the following additional actions would be BEST to take to help protect systems from malicious software? (Select TWO).

Configure the software to automatically update its definition files train users to scan removable storage devices before copying files

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to back up important data to your personal computer.

Vera may have a malfunctioning keyboard. Which of the following steps can you take to BEST determine if the keyboard needs to be replaced? Use Device Manager to make sure the correct keyboard driver is installed and up to date. Recalibrate the keyboards pressure sensors. Check for special keyboard failures that could enable that may cause some keys to perform alternate tasks. Check for cracks in the power bundles that go from the keyboard to the motherboard. Connect an external keyboard

Connecnt an extrenal keyboard Check for special keyboard feeatures that could be enabled

You are installing a high-end PCIe x16 video card in a new computer. The video card has connectors for two displays. The card also has dual fans to cool the unit. Which of the following will be part of the installation?

Connect a 6- or 8-pin power connector to the video card. Explanation Most high-end PCIe x16 video cards require a special 6-pin or 8-pin power connector for additional power. Be sure to connect the power after inserting the card in the system and prior to turning the system on. If the motherboard has integrated graphics, it should be disabled in the BIOS when installing a dedicated video card. Cross Fire bridge cables are used when installing two video cards in a multi- GPU configuration. Multiple display connectors on a video card do not need to be configured or enabled.

You manage a website for your company. The Web site uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage, and a single connection to your ISP. You want to provide redundancy such that a failure in a single component does not cause the website to be unavailable. What should you add to your configuration to accomplish this?

Connect one server through a different ISP to the Internet

You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage, and a single connection to your ISP. You want to provide redundancy such that a failure in a single component does not cause the website to be unavailable. What should you add to your configuration to accomplish this?

Connect one server through a different ISP to the Internet

You want to be able to watch and record live TV on your computer. Your computer already has a video card, so you want to purchase an additional card that provides TV tuner input capabilities. Which of the following should be part of the configuration process?

Connect the TV input to the tuner card using coaxial cable and F-type connectors. Purchase a card that supports ATSC. Explanation A TV tuner allows your video card to accept a cable TV input and change channels from within the computer. In North America, digital TV signals are sent using the ATC standard. When purchasing a new TV tuner, make sure it supports ATSC. NTSC is analogue standard that was used in North America but has been replaced by ATSC. Video cards and monitors with a built-in TV tuner have an F-type cable TV connector. The DMS-59 connector is used to allow multiple video ports from a single connection. The DMS-59 connector uses a special cable that splits the signal into separate video interfaces. You do not need to link the TV tuner card to the video card; the TV tuner is used for input, while the video card is used for output. Bridge clips are used for multi-GPU configurations.

You have just replaced the motherboard in your computer. Your computer starts, but the hard disk light does not come on while the system is booting. What should you do?

Connect the hard disk LED to the motherboard

A PC technician knows he will be late to an appointment with a customer. Which of the following actions should the technician take? (Select TWO).

Contact the customer and apologize. Give a realistic timeframe for your arrival.

You are working on your computer when a person from the shipping department delivers a new external solid state drive (SSD) you ordered. When you plug the drive into your USB port, Windows cannot find a suitable device driver for the drive. To best resolve the issue, from which of the following windows consoles would you access device manager?

Control Panel

Which of the following is not a valid concept to associate with integrity?

Control access to resources to prevent unwanted access.

• You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks. Which securityrelated recommendations should you make to this client? (Select two.)

Control access to the work area with locking doors and proximity readers. //Relocate the switch to the locked server closet.

Which of the following applications typically use 802.1x authentication? select two

Controlling access through a wireless access point Controlling access though a switch

You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network?

Convergence

Which of the following is a text file provided by a website to a client that is stored on a user's hard drive in order to track and record information about the user?

Cookie

Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter?

Copper telephone wire

What is the primary function of the IKE policy used with IPSec?

Create a security association between communicating partners.

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application? (Select TWO)

Create a virtual computer that runs Windows 7. Run the virtual computer each time the application runs. Run the application in Compatibility Mode.

A user reports that she can't connect to the Internet. After some investigation, you find that the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next?

Create an action plan.

A security administrator logs on to a Windows server on her organization's network. She then runs a vulnerability scan on that server. What type of scan was conducted in the scenario?

Credential scan

Which of the following is an example of privilege escalation?

Creeping Privileges

Which of the following is an example of privilege escalation?

Creeping privileges

Occurs when two files claim the same cluster.

Cross-linked file.

While sorting through a box of cables in your storage room, you find one that matches the configuration shown in the image. Which of the following BEST describes the type of cable configuration and the purpose for which it would be used?

Crossover cable configuration used to connect computers directly to one another for networking

Clock setting

Crystal setting

Assuming the same operating frequency, what are the advantages of DDR3 over DDR2?

DDR3 uses less power than DDR2. DDR3 doubles the data transfer rate of DDR2.

Which of the following memory ratings identifies the fastest memory?

DDR3-1600

Which memory rating identifies the fastest memory?

DDR3-2000

Which component is responsible for converting digital audio into sound that can be played on speakers?

DAC Explanation Sound cards use a component called a Digital-to-Analogue Converter (DAC) to convert digital data into analogue audio signals that can be played on speakers. The ADC (Analogue-to-Digital Converter) converts analogue sound into digital data. TXK is a sound quality standard that was developed for films. MP3 (MPEG-2 Layer III) is an audio codec used to compress digital audio files.

Your motherboard has sockets for 184-pin DIMM RAM. Which type of RAM should you install?

DDR

Your motherboard has sockets for 184-pin DIMM RAM. Which type of RAM should you install?

DDR-SDRAM

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?

DDoS

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This isan example of which kind of attack?an example of which kind of attack

DDoS

As the IT technician for your company, you need to ensure that IP addresses are automatically assigned to hosts while at the same time preventing the same address from being assigned twice. Which of the following services would be the BEST to use?

DHCP

Which of the following is not a protection against session hijacking?

DHCP reservations

Which of the following are terms used to identify memory modules?

DIMM

Which of the following are terms used to identify memory modules?

DIMM (Dual in-line memory module)

Which firewall implementation creates a buffer network that can be used to host email or web servers?

DMZ

Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless antivirus software and the latest operating system patches are installed. Which solution should you use?

DMZ *NAC * NAT NIDS VLAN

Currently, the users in your company are required to use their IP addresses when connecting to other hosts. Since IP addresses are difficult to remember, you want to implement a protocol on your network that allows computers to automatically find another host's IP address using a logical name. Which of the following protocols would be the best to implement?

DNS

You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?

DNS

Which of the following mechanisms would BEST allow you to resolve a hostname into its associated IP address? (SELECT TWO) DNS BOOTP DHCP host files FTP

DNS Host files

Which type of Denial of Service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly maps host names and IP addresses?

DNS poisoning

While using the Internet, you type the URL of one of your favorite sites in the browser. Instead of going to the correct site, however, the browser displays a completely different website. When you use the IP address of the Web server, the correct site is displayed. Which type of attack has likely occurred?

DNS poisoning.

What is the technology that protects the intellectual property rights of publishers and restricts the use of copyrighted works to those who have paid the necessary licensing fees?

DRM

A homeowner's connection to the internet is through an always-on modem that connects to existing telephone wiring and has a download speed of over 3 Mbps. The homeowner is able to make analog phone calls over the same wiring at the same time. Which of the following internet connection types is being used?

DSL

A homeowners connection to the internet is through an always-on modem that connect to exisiting telephone wiring and haw a download speed of over 3 Mbps. Which of the following internet connection type is being used? DSL ISDN Cable Dial up

DSL

Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?

DSL

Which of the following is not an example of wireless networking technologies?

DSL

Which WAN connection types uses digital communications over POTS?

DSL ISDN

Which protocol should you disable on the user access ports of a switch?

DTP

Are more powerful and more expensive.

Dedicated video cards.

Have a GPU and a dedicated high-speed video memory bank.

Dedicated video cards.

Installed in an expansion slot on the motherboard.

Dedicated video cards.

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change?

Default Gateway

You manage a large number of workstations that belong to a windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?

Default domain policy

Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?

Default gateway

Which of the following is NOT a valid response to a risk discovered during a risk analysis?

Denial

Which of the following is not a valid response to a risk discovered during a risk analysis? Assignment Acceptance Denial Mitigation

Denial

When a malicious user captures authentication traffic and replays it against the network later, what is the security problem you are most concerned about?

Denial of service *An unauthorized user gaining access to sensitive resources * Spam Bandwidth consumption

Which of the following common network monitoring or diagnostic activities can be used as a passive malicious attack?

Denial of service Logic bombs *Sniffing* Packet capture, edit, and retransmission

Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Denial of service attack

Your computer has a single NTFS partition used for the C: drive with the following folders: • C:\Confidential • C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: • Move Reports.doc from C:\Confidential to C:\PublicReports. • Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny read to reports.doc; Allow full control to costs.doc.

Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?

Deploy a man trap

Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?

Deploy a mantrap

Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's Web site, you find that a hotfix is available to address the issue. What should you do next?

Deploy the hotfix on a test computer

On a Windows System, which task manager tab would you use to adjust the priority given to a specific program?

Details

Which of the following information are you likely to find in a procedure document?

Details on how to test and deploy patches

After several new computers are connected to a network device, every computer connected to the device begins to experience slow transfer speeds. Which of the following is the first step in troubleshooting this problem?

Determine whether the network device is a hub or a switch

Which of the following authentication protocols are you most likely to recommend to the client?

EAP

Which of the following best describes the concept of virtual LAN?

Device on the same network logically grouped as if they were on separate networks

Which backup strategy backs up only files which have the archive bit set, but does not mark them as having been backed up?

Differential

On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can "fix the restroom." What should you do?

Direct him to the front entrance and instruct him to check in with the receptionist.

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?

Disable SSID broadcast

You manage the website for your company. The Web1 server hosts the website. This server has the following configuration: *Dual core processor *Dual power supplies *RAID 5 volume *One RAID controller *Two 1000 Mbps network adapters Which component is a single point of failure for the website?

Disk controller

Which remote access authentication protocol allows for the use of smart cards for authentication?

EAP

Which of the following uses hacking techniques to proactively discover internal vulnerabilities?

Penetration testing

Employees in a small business have a habit of transferring files between computers using a USB flash drive and often bring in files from outside the company. Recently, a computer was infected with malware from a USB flash drive even though the employee did not access any files. Which of the following options would prevent this issue in the future?

Disable autorun.

You want to configure User access control so that you see the permission prompt only when programs try to make changes to your computer (Not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do?

Disable secure desktop

One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has been disabled on the system. Which of the following actions is MOST likely to increase the security of this system?

Disable the Guest account.

Which of the following actions should you take to reduce the attack surface of a server?

Disable unused services.

When informing an employee that they are being terminated, what is the most important activity?

Disabling their network access

If maintaining confidentiality is of the utmost importance to your organization, what is the best response when an intruder is detected on your network?

Disconnect the intruder.

You have physically installed a new hard disk drive in your computer and configured the disk in the BIOS using the CMOS setup program. You try to access the hard disk drive in Windows Explorer, but the drive is not displayed. Which of the following utilities will you MOST likely use to solve the problem?

Disk Management

You have physically installed a new hard disk in your computer and configured the disk in the BIOS using the CMOS setup program. You try to access the hard disk drive in Windows Expolrer, but the drive is not displayed. Which of the following utilities will you MOST likely use to solve the problem? chkdsk format sfc disk management

Disk Management

You manage the website for your company. The WEB1 server hosts the website. This server has the following configuration...Which component is a single point of failure for the website?

Disk controller

DDR

Double Data Rate- very common, 3 types each type doubles rate of the last (DDR, DDR2, DDR3)

DDR3

Double the data rate of DDR2, eight times the bandwidth of SDRAM 240 pins

You manage the website for your company. The Web1 server hosts the website. This server has the following configuration: • Dual core processor • Dual power supplies • RAID 5 volume • One RAID controller • Two 1000 Mbps network adapters Which component is a single point of failure for the website? Network adapter Power supply Disk controller Disk storage

Disk controller

You manage the website for your company. The web1 server hosts the website. This server has the following configuration: Dual core processor Dual power supplies RAID 5 volume One RAID controller Two 1000 Mbps network adapters Which component is a single point of failure for the website?

Disk controller

SATA

Disk drive interface, white =data connections, green=power connectors

Viewing Size

Display area, diagonal dimensions of the screen where you can really see

Which of the following is "NOT" an element of the termination process?

Dissolution of the NDA

Dot Pitch

Distance between 2 phosphors, smaller the better

Throw

Distance between projector and screen

The best way to initiate solid administrative control over an organization's employee is to have what element in place?

Distinct job descriptions

Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow for the creation of guest WLANs for keeping public wireless traffic separate from private traffic?

Distributed wireless mesh infrastructure

Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow for the creation of quest WLANs for keeping public wireless traffic separated from private traffic?

Distributed wireless mesh infrastructure

Which of the following is a common social engineering attack?

Distributing hoax virus information emails

Nathan, a long tmie Mac user, has been using his Mac computer for some time now with no issues. Recently, however, he reported that his mac will unexpectedly tell him that his computer must be restated by holding down the power button for several seconds or by pressing the restart button. Assuming that this is a symptom of kernel panic, which of the following steps would be the best first step for troubleshooting this issue?

Do a safe boot

You are building one of your customers a home theater PC (HTPC) to connect to an HDTV and high-definition audio system. The customer is going to be playing mostly Blu-ray movies on the system. Which of the following features should the sound card include?

Dolby Digital, DTS support, or SDDS support S/PDIF output Explanation Because the customer is using the computer as an HTPC, the sound card should include support for high-quality sound output, such as Dolby Digital, DTS, or SDDS support. In addition, the sound card should support a digital output, such as S/PDIF. Line-level in (line in) ports are used to receive analogue audio signals from musical instruments or CD players, which is not necessary for this computer. IEEE 1394 ports are used for connecting FireWire devices. MIDI support, which allows recording for digital synthesizers, is also unnecessary for this particular computer.

When you power the system on and load the OS, everything on the screen looks enlarged and pixelated. How do you resolve this problem? Verify that the system BIOS is compatible with the video card. Download and install the lastest driver from the video card manufacturer's website. Reboot the system into Safe Mode Upgrade the monitor to one that supports a higher refresh rate.

Download and install the fastest driver from the video card manufacturer's website

You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. Since the installation, the system frequently crashes when you try to access the new device. Which of the following steps would MOST likely resolve this issue?

Download and install the latest driver from the manufacturer's website.

You've just installed a new video card in an employee's Windows workstation. When you power the system on and load the OS, everything on the screen looks enlarged and pixelated. You try to change the resolution, but the only available option is 640x480. Which of the following will resolve this problem?

Download and install the latest driver from the video card manufacturer's website. Explanation You should download and install the latest video driver from the manufactuer's website. Because Windows didn't have the appropriate driver, it used a generic driver instead, which supports a very limited resolution. Windows Safe Mode is used to troubleshoot system issues and disables all unnecessary software and drivers. A monitor's refresh rate does not affect a systems max resolution. If BIOS compatibility was an issue, nothing would be displayed on the monitor.

To improve the safety of your location and to comply with regulations regarding work environments with hazardous materials, you have been assigned to assemble Material Safety Data Sheets (MSDS) for all chemicals used in your shop. How should you obtain these documents?

Download them from the chemical manufacturer's websites.

You have just started a new job as a network team leader for a small company. You are responsible for overseeing the work of Help Desk technicians, as well as doing your own share of the administrative work. To improve the safety of your organization, you decide to assemble Material Safety Data Sheets(MSDS) for all chemicals used in your organization. How should you get them?

Download them from the chemical manufacturer's websites.

A: PCI B: PCIe x16 C: PCIe x1 D: Case fan power E: CPU power F: CPU G: Memory H: Power Supply I: SATA J: Front/top panel K: USB L: IEEE 1394

Drag the label on the left to the letter on the right that best identifies the associated connector. j:

When you browse to a website, a pop-up window tells you that your computer has been infected with a virus...spyware on your system.

Drive-by download

Which of the following security measure encrypts the entire contents of a hard drive?

DriveLock

DIMM

Dual Incline Memory Modules- used today

Which of the following are examples of social engineering?

Dumpster diving //Shoulder surfing

YOU want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of NAT should you implement?

Dynamic

Which of the following firewall types can be a proxy between servers and clients? (Select two.)

Dynamic packet filtering firewall Stateful inspection firewall Kernel proxy filtering firewall *Application layer firewall * *Circuit proxy filtering firewall*

D-Ram

Dynamic ram, Asynchronous, info in each cell goes through memory refresh cycles, new charge of data, not popular

Which of the following is an advantage of purchasing a motherboard with integrated graphics and audio? A. Fewer system resources used B. Higher-quality components C. Reduced need for device drivers D. Faster communication between sound and video devices E. Lower overall system cost

E. Lower overall system cost

What is the weakest point in an organization's security infrastructure?

People

You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the UTP patch cable is run 75 feet from the wall outlet, passes through the ceiling and over several florescent light fixtures before reaching the client system. Which of the following is the most likely cause of the connectivity problem?

EMI interference

Which of the following statements about ESD is NOT correct?

ESD is much more likely to occur when the humidity is above 50%.

Active Matrix Technology

Each pixel has a separate transistor, better refresh rate

You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG-6 cable. You move the cable router a distance of 50 meters using RG-8 cables and special connector adapters. Which condition are you most likely to experience?

Echo

You want to configure user account control so that when a UAC prompt is shown, the desktop is not dimmed, allowing you to continue working without responding to the prompt immediately. What should you do?

Edit settings in the local security policy.

The PCI sound card in your computer stopped working. You decided to use the motherboard's integrated sound until you can replace the PCI sound card. After removing the PCI sound card and powering on the computer, you have no sound and the built-in sound does not show up in Device Manager. Which should you do to solve the issue?

Edit the CMOS settings and enable the onboard sound. Explanation When installing dedicated expansion card, you will typically disable the onboard device so that only the device you want to use shows in Device Manager. To make the onboard device detectable to Windows, enable the device in the CMOS settings. You cannot update the device drivers or enable the device until Windows can detect the device and it appears in Device Manager. An audio codec is a file format for saving audio files. Sound cards require codecs to play sound files; however, the sound card must be properly configured before a codec can be used.

EMI

Electro magnetic interference , con of magnetic hard drive

You have just purchased a new laptop with built-in 802.11 wireless and bluetooth capabilities. When you boot into windows, you do not see a Bluetooth adapter listed in Device Manager Which of the following would be the BEST to perform first? Enable Bluetooth in the BIOS/UEFI configuration Replace the wireless card in the laptop Enable the Bluetooth device in Device Manager

Enable Bluetooth in the BIOS?UEFI configuration

A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect. Which of the following router settings should the technician change?

Enable MAC filtering

You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of your network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down. Upon entering the server room, you see that the assistant administrator has configured your network rack as shown in the Exhibit. What should you do? (Choose two. Each response is a complete solution.)

Enable STP on each switch. Remove the patch cable connecting the first switch to the third switch.

You would like to implement BitLocker to encrypt data on a hard disk even if it moved to another system. You want the system to boot automatically without proving a startup key on an external USB device. What should you do?

Enable TPM in the BIOS

A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate while browsing the web/ Which of the following actions would help accomplish this goal?

Enable content filtering

Position the system properly

Ensure that the system isn't sitting next to any heat sources

What is the recommended size of the paging file under normal circumstances on a windows 10 system with 8 GB of RAM installed?

Equal to the amount of physical ram

ECC RAM

Error Correcting Code-Finds and corrects errors, slower, expensive, used for work and servers

Which of the following are solutions that address physical security?

Escort visitors at all times Require identification and name badges for all employees

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?

Establish a Remote Desktop connection and update the driver.

You provide desktop support for small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?

Establish a remote assistance connection and watch what the user is doing.

You provide desktop support for small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?

Establish a remote desktop connection and update the driver

Dumpster diving is a low-tech means of gathering information that may be useful in gaining unauthorized access, or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?

Establish and enforce a document destruction policy

Dumpster diving is a low-tech way to gathering information that may be useful in gaining unauthorized access or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?

Establish and enforce a document destruction policy

Which of the following is a wired networking method most commonly used today by desktop PC's and other network devices to connect to a local area network?

Ethernet

Which of the following devices allows network communications to be transmitted over existing AC power lines?

Ethernet over power

You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use?

Event log

Which of the following are true of a circuit proxy filter firewall? (Select two.)

Examines the entire message contents. *Verifies sequencing of session packets. * *Operates at the Session layer.* Operates at ring 0 of the operating system. Operates at the Application layer. Operates at the Network and Transport layers.

What is the goal of a TCP/IP hijacking attack?

Executing commands or accessing resources on a system the attacker does not otherwise have authorization to access

Expansion slots

Expansion slots (expansion buses) allow you to extend the capabilities of your computer by installing expansion cards. There are a number of different expansion slot types: -PCI (Peripheral Component Interconnect) -PCI-X (Peripheral Component Interconnect Extended) -PCIe (Peripheral Component Interconnect express) -AGP (Accelerated Graphics Port)

A SYN attack or SYN flood exploits or alters which element of the TCP threeway handshake?

FIN or RES SYN SYN/ACK *ACK*

AMD A-series APU

FM1

You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?

FTP

Which of the following is a secure alternative to FTP that uses SSL for encryption?

FTPS

Which of the following is a valid IPv6 address?

FEC0::AB:9007

EFI

Extensible Firmware Interface System Partition, located in tools, shows important boot files in the system, you can't edit them

Appliance Based

External storage listed as a Nas device

You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use?

F-Type

You're troubleshooting a malfunctioning LED display on a notebook computer system. An external monitor correctly displays the output from the notebook. Which of the following could be the cause? Failed blacklight Failed CCFL Failed inverter Failed video adapter

Failed blacklight

Which component of a change and configuration Management policy identifies technical and budgetary considerations associated with a purposed change and also identifies any potential impacts to the network?

Feasibility analysis

Processor Operation cycle

Fetch (get data from external data bus) Decode (What command) Execute (the command) Store (send the data back to whatever device communicated)

Which of the following security measures is a form of biometrics?

Fingerprint scanner

Which of the following identifies an operating system or network service based upon it response to ICMP messages?

Fingerprinting

Which of the following would fall into the category of "something a person is"?

Fingerprints are an example of something a person is. The process of measuring that characteristic is known as biometrics.

A user can't make an RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection? Switch Access point Hub Firewall

Firewall

You suspect that some of your computers have been hijacked and are being used to perform denial of service attacks directed against other computers on the Internet. Which log would you check to see if this is happening?

Firewall

Arrange the Group Policy Objects (GPOs) in the order in which they are applied

First The Local Group Policy on the computer. Second GPOs linked to the domain that contains the user or computer object. Third GPOs linked to the organizational unit that contains the object.

You have been using the same computer for several years. To improve performance, you decide to upgrade the processor. You check the motherboard documentation and purchase the fastest processor supported by the motherboard. However, when you try to start the computer it beeps regularly and nothing is displayed on the screen. What should you do?

Flash the UEFI firmware Reinstall the old processor in the motherboard

System beeps regularly, nothing is shown on the screen and it doesn't start.. (troubleshoot)

Flashing the BIOS is often required to upgrade system components that are part of the motherboard, such as to upgrade to a faster processor.

Plasma

Flat, for movie screens, may cause burn in

Riser

For a special project, you have been asked to recommend the lowest profile desktop computers available. You are attempting to put together the specifications for these machines. Which of the following types of cards are attached to the motherboard to allow expansion cards to plug into them instead of the motherboard?

Mini PCI

For cellphones

Firewire

For data interfaces, IEE

CAD/CAM System

For graphic design, NEEDS: Multicore processor, lots of graphics cards, hella memory

4/8 pin Power Supply Connector

For the fan, very tiny

Which of the following are denial of service attacks? (Select two.)

Fraggle Smurf

When a SYN flood is altered so that the SYN packets are spoofed in order to define the source and destination address as a single victim IP address, the attack is now called what?

Fraggle attack Impersonation Analytic attack *Land attack*

Which backup strategy backs up all files from a computer's file system regardless of whether the file's archive bit is set or not marks them as having been backed up?

Full

A user has complained about not being able to remove a program that is no longer needed on a computer. The programs option is not available in control panel. You suspect that a policy is enabled that hides this option from the user. But after opening the local group policy editor, you see that the policy to hide programs is not configured. You know that other users in this domain can access the programs option. To determine whether the policy is enabled, where should you look next?

GPOs linked to organizational units that contain this user's object.

Which of the following can route layer 3 protocols across an IP network?

GRE

Which of the following is the best device to deploy to protect your private network from a public untrusted network?

Gateway *Firewall* Router Hub

X1 Slot

General purpose

In a NAP system, what is the function of the System Health Validator?

Generate a statement of health (SoH) that reports the client configuration for health requirements Provide the resources necessary to help noncompliant clients become compliant *Compare the statement of health submitted by the client to the health requirements * Prevent users from disabling NAP on the client computer

Which of the following hardware selection criteria would be the MOST important for thin clients in a large organization? 64 bit 8 core processor Gigabit Ehternet adapter High-end video adapter RAID 0 array

Gigabit Ethernet adapter

Your organization uses the following tape rotation strategy for its backup tapes: The first set of tapes is used for daily backups. At the end of each week, the latest daily backup tape is promoted to be the weekly backup tape. At the end of the each month, one of the weekly backup tapes is promoted to be the monthly backup tape. What kind of backup tape rotation strategy is being used?

Grandfather

Video Card GPU

Graphics processing unit, on video card or integrated into the cpu

What is a major benefit STP provides that UTP does not?

Greater resistance to interference

Speakers Microphone Line in

Green Pink Blue- for ipods

You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1?

Green with white

On a windows system, which of the following is true of groups?

Group members have the access rights assigned to the group

You are building an HTPC (home theatre PC) that will be connected to an HDTV. You want to be able to play Blu-ray movies on the HTPC. Which of the following features should you make sure your video card and HDTV support?

HDCP Explanation High-bandwidth digital content protection (HDCP) is a method for protecting digital media, such as Blu-ray movies, from being intercepted and copied. When playing protected content from a PC, the optical device, video card, and external display must all support HDCP. Both DirectX and OpenGL are API collections that are used to improve graphic, animation, and multimedia creations. ATSC is a signal standard used to broadcast digital TV signals.

Match each physical security control on the left with an appropriate example of that control on the right. Each security control may be used once, more than once, or not at all.

Hardened carrier Protected cable distribution Biometric authentication Door locks Barricades Perimeter barrier Emergency escape plans Safety Alarmed carrier Protected cable distribution Antipassback system Physical access control Emergency lighting Safety Exterior floodlights Perimeter barrier

Match each physical security control with the appropriate example:

Hardened carrier: Protected cable distribution Biometric authentication: Door locks Barricades: Perimeter barrier Emergency escape plans: Safety Alarmed carrier: Protected cable distribution Anti-passback system: Physical access control Emergency lighting: Safety Exterior floodlights: Perimeter barrier

You have four volumes on a basic hard disk. Mosts likely to see the status of the fourth volume if it is valid and has no errors? Healthy (Dynamic) Healthy (Logical Drive) Healthy (Basic) Healthy Healthy (primary partition)

Healthy (logical drive)

A user calls to report a problem. She is trying to install an application on her new windows 10 system, but cannot. Her user account is a member of the users group on the system. What do you suspect is causing the installation issue?

Her group membership does not allow her to install new software

HDMI

Hi def plug

Which of the following are characteristics of a rootkitrootkit? (Select two.)

Hides itself from detection Requires administrator-level privileges for installation

Gaming System

High end video card, high end sound, high end processing and cooling system

When the TCP/IP session state is manipulated so that a third party is able to insert alternate packets into the communication stream, what type of attack has occurred?

Hijacking

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch and a router. You plan to configure a trunk port on each switch and connect them with a straight-through plenum UTP cable that will be run though the suspended tile ceiling of the data center. To protect against power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server. The only power available in the data center is located on the wall opposite the new server rack, so you must run extension cords across the floor to plug in the UPS unit. There are problems with this plan. What should you do?

Hire an electrician to install a wall outlet near the rack.

Which of the following is a common form of social engineering attack?

Hoax virus information e-mails

Which of the following are common forms of social engineering attack?

Hoax virus information emails

You have a company network with a single switch. All devices connect to the network through the switch. You want to control which devices are able to connect to your network. For devices that do not have the latest operating system patches, you want to prevent access to all network devices except for a special server that holds the patches that the computers need to download. Which of the following components will be part of your solution? (Select two.)

Honeypot *Remediation servers * Extranet DMZ *802.1x authentication*

You have been asked to deploy a network solution that requires an alternate location where operational recovery is provided within minutes of a disaster. Which of the following strategies would you choose?

Hot site

Which of the following terms describes a windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis?

Hotfix

CPU socket

Houses the CPU. There are a variety of CPU socket types, each with different pin outs and specifications. Your CPU must match the socket type.

Educate employees on the risks and countermeasures. Publish and enforce clearly-written security policies.

How can an organization help prevent social engineering attacks?

You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three.)

How many devices will need to be supported? Is the business expected to grow in size in the future? What type of data will be transmitted on the network?

Network packet sniffing is often used to gain the information necessary to conduct more specific and detailed attacks. Which of the following is the best defense against packet sniffing?

Hubs *Encryption * Switches Promiscuous NICs

What is the default encryption algorithm used by SSH (Secure Shell) to protect data traffic between a client and the controlled server?

IDEA

Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?

IDS

Which of the following protocols is used by an email client to retrieve messages from an email server and gives users the option to keep mail messages on the server?

IMAP

You want your windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this?

IP

Which of the following do switches and wireless access points use to control access through the device?

IP address filtering Port number filtering *MAC address filtering * Session filtering

How does IPsec NAP enforcement differ from other NAP enforcement methods?

IP filters are defined in network access policies to limit resource access for non-compliant computers. A connection request policy is created on the NAP server that uses PEAP and enables quarantine checks. *Clients must be issued a valid certificate before a connection to the private network is**allowed.* DHCP options are used to deliver IP configuration values to noncompliant computers.

Which of the following devices is capable of detecting and responding to security threats?

IPS

Which of the following is the best countermeasure against man-in-the-middle attacks?

IPSec

Which of the following network layer protocols provides authentication and encryption services for IP based network traffic?

IPSec

Which of the following is the best countermeasure against man-in-the middle attacks?

IPsec

Which of the following network layer protocols provides authentications and encryptions services for IP based network traffic?

IPsec

Your organization is in the process of negotiating an Interoperability Agreement(IA) with another organization. As part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain. This configuration will allow users in their domain to access resources in your domain and visa versa. As a security administrator, which task should you complete during this phase?(select two)

Identify how data will be shared. Identify how data ownership will be determined.

A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next?

Identify the affected areas of the network.

Match each network enumeration technique on the left with its corresponding description on the fish.

Identifying phone number with modems War dialing Scanning for wireless access points Wardriving Identifying operating system type and version number Banner grabbing Identifying services that can pass through a firewall Firewalking

Match each network enumeration technique on the left with its corresponding description on the right

Identifying phone numbers with modems: War dialing Scanning for wireless access points: Wardriving Identifying operating system type and version number: Banner grabbing Identifying services that can pass through a firewall: Firewalking

Configure CMOS Settings

If CMOS is not detected, you might need to use jumpers or edit the CMOS to configure the processor speed. newer processors released after the motherboard, you might be able to add support for the processor by updating the BIOS. -Typically, the processor will run at a speed lower than its rating if the motherboard does not support the higher speed,. -As a best practice, you should update the BIOS shortly after installing the processor (you must have a processor and memory installed to update the BIOS).

Which of the following results occurs when a biometric system identifies a legitimate user as unauthorized?

If a biometric system identifies a legitimate user as unauthorized, and denies that user access, it is known as a false rejection. False acceptance on the other hand is when a biometric system authorizes an illegitimate user. FAR is the false acceptance rate—the lower the better. CER stands for crossover error rate, which is the comparison of the FAR and the FRR. False exceptions have to do with software that has failed and needs to be debugged.

Which two options can prevent unauthorized employees from entering a server room?

If a person doesn't have the proper proximity card, that person will be prevented from entering a server room or other protected room. Security guards can also prevent people from accessing unauthorized areas. However, bollards (short vertical posts) probably wouldn't stop a person, besides they aren't normally installed in front of a server room entrance. A barricade might stop a person, but again, would be out of place! CCTV video surveillance is a detective control, but not a preventive control. 802.1X deals with authentication, not with physical security.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator. Which of the following is the most likely cause of her connectivity problems?

Interference is affecting the wireless signal

A workstation is connected to a switch on the Gi 0/2 interface using a straight-through cable. The Ethernet interface in the workstation has been manually configured to use a 100 Mbps link speed in full-duplex mode. Which of the following are true in this scenario? (Select three.)

If the link speed is 10 Mbps or 100 Mbps, half-duplex is used. The switch attempts to sense the link speed. If it can't, the slowest link speed. supported on the interface is selected. If the link speed is 1000 Mbps or faster, full-duplex is used.

You are in charge of training a group of technicians on the authentication method their organization uses. The organization currently runs an Active Directory infrastructure. Which of the following best correlates to the host authentication protocol used within that organization's IT environment?

If the organization runs Active Directory, that means it has a Windows Server that is acting as a domain controller. These use the Kerberos authentication system by default. TACACS+ is an example of a remote authentication system, but is owned by Cisco, and is not a part of Active Directory. LDAP is the protocol in Windows that controls Active Directory objects, and works in conjunction with Kerberos, but is not the actual authentication method used. 802.1X is an authentication method used by network adapters on the data link layer.

Listen for beeps

If your computer is having issues booting or anything else listen for beep codes, count the beeps and if you don't know the codes then look them up.

Which of the following is not a form of social engineering?

Impersonating a user by logging on with stolen credentials

The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at checkin, guests should then be allowed full access to the internet. If a user does not provide the correct code, they should not be allowed to access the internet. What should you do?

Implement 802.1x authentication using a RADIUS server Implement preshared key authentication *Implement a captive portal* Implement MAC address filtering

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system not boot if a change is detected in any of the boot files. What should you do?

Implement BitLocker with a TPM

The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for guests. The owner has asked that you implement security controls such that only paying guests are allowed to use the wireless network. She wants guests to be presesnted with a loging page when they initially connect to the WLAN. After entering a code provided at check in, guests should then be allowed full access to the Internet. If a user does not provide the correct code, they should not be allowed access to the internet. What should you do?

Implement a captive portal

You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around the facility you note the following: When you enter thefacility a receptionist greets you and escorts you through a locked door to the work area where the office manager sits. The office manager informs you that the orgnaizations servers are kept in a locked closet. An access card is required to enter the server closet She infroms you that the server backups are configured to run each night. A rotation of tapes are used as the backup media You notice the orgnaiation's network switch is kept in the server closet You notice that the router/firewall/content filter all in one device has been implemented in the server closet to protect the internal network from external attacks. The office manager information you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the rpocess. You carry the workstation to our car and bring it back to your office to work on it. What securityrelated recommendations should you make to the client?

Implement a hardware checkout policy

• The office manager informs you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the process. You carry the workstation out to your car and bring it back to your office to work on it. What securityrelated recommendations should you make to this client?

Implement a hardware checkout policy

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?

Implement a virtual firewall within the hypervisor.

You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.)

Implement an intrusion detection system (IDS) Implement an intrusion prevention system (IPS) Implement a network access control (NAC) solution *Check the MAC addresses of devices connected to your wired switch* *Conduct a site survey*

As you are helping a user with a computer problem you notice that she has written her password on a note stuck to her computer monitor. You check the password policy of your company and find that the following settings are currently required: Minimum password length = 10 Minimum password age = 4 Maximum password age = 30 Password history = 6 Require complex password that include numbers and symbols Account lockout clipping level = 3 Which of the following is the best action to take to make remembering passwords easier so that she no longer has to write the password down?

Implement end-user training.

Over the last month you have noticed a significant increase in the occurrence of inappropriate activities performed by employees. What is the best first response step to take in order to improve or maintain the security level of the environment?

Improve and hold new awareness sessions

What is the primary use of tunneling?

Improving communication throughput *Supporting private traffic through a public communication medium * Deploying thin clients on a network Protecting passwords

Which of the following is NOT a benefit of NAT?

Improving the throughput rate of traffic

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe.

A technician must press a cable connector's retaining tab to remove a faulty fiber optic network cable. Which of the following connectors does the cable use?

LC

To increase your ability to recover from a disaster, where should you store backup tapes?

In a safety deposit box at a bank

You need to place a wireless access point in your two story building. While trying to avoid interference, which of the following is the best location for the access point?

In the top floor

Which of the following locations contributes the greatest amount of interference for a wireless access point? (Select two.)

In the top floor of a twostory building *Near backup generators* Near DCHP servers *Near cordless phones*

A user reports that he can't browse to a specific website on the internet. From his computer, you find that a ping test to the web server succeeds. A traceroute test shows 17 hops to the destination web server. What is the most likely cause of the problem?

Incorrect DNS server address

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 Which of the following is the MOST likely cause of the problem?

Incorrect default gateway

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet This workstation can communicate with some hosts on private network, but not with other host. You run IPCONFIG/ALL and see the following: Ethernet adapter Local Area Connection : Connection- specific DNS Suffix . : mydomain . local Description . . . Broadcom network adapter Physical Address . : 00 - AA-BB-CC-74-EF DHCP Enabled . . . . . . . No Autoconfiguration Enabled . Yes IPv4 Address 192 . 168 . 1 . 102(Preferred) Subnet Mask . 255 . 255 . 0 . 0 Default Gateway : 192 . 168 . 2.1 DNS Servers . . 192 . 168 . 2 . 20 what is most likely cause of the problem?

Incorrect default gateway

You manage a network that has multiple internet subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask.

Incorrect default gateway

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet, which uses the default subnet mask.

Incorrect subnet mask

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet This workstation can communicate with some hosts on private network, but not with other host. You run IPCONFIG/ALL and see the following: Ethernet adapter Local Area Connection : Connection- specific DNS Suffix . : mydomain . local Description . . . Broadcom network adapter Physical Address . : 00 - AA-BB-CC-74-EF DHCP Enabled . . . . . . . No Autoconfiguration Enabled . Yes IPv4 Address 192 . 168 . 1 . 102(Preferred) Subnet Mask . 255 . 255 . 0 . 0 Default Gateway : 192 . 168 . 1.1 DNS Servers . . 192 . 168 . 2 . 20 192.168.1.27

Incorrect subnet mask

Match each type of access point on the left with the wireless network architecture that they are commonly used in on the right

Independent access point infrastructure/ Intelligent AP Hub-and-spoke infrastructure/ Lightweight AP Distributed wireless mesh infrastructure/ Intelligent AP

You have decided to perform a double blind penetration test. Which of the following actions would you perform first?

Inform senior management

Which of the following CCTV types would you use in areas with little or no lights?

Infrared

Which of the following is the most effective protection against IP packet spoofing on a private network?

Ingress and egress filters

Which of the following authentication protocols uses a threeway handshake to authenticate users to the network? (Choose two.) MSCHAP PAP CHAP EA

MSCHAP CHAP

You have installed a new computer with a dual core 64-bit processor, 6GB of memory, and a PCIe video card with 512 MB of memory. After installing the operating system, you see less than 4GB of memory showing as available in Windows. What should you do?

Install a 64-bit version of the operating system.

You have installed a new computer with a quad-core 64-bit processor, 6 GB of memory, and a PCIe video card with 512 MB of memory. After installing the operating system, you see less than 4 GB of memory showing as available in Windows. Which of the following actions would MOST likely rectify this issue?

Install a 64-bit version of the operating system.

Which actions allow you to access the internet on your laptop via a cellular network?

Install a cellular USB adapter in a open port on the laptop

You have been asked to help a small office with a limited budget set up and configure a windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority. Which of the following is the BEST course of action in this situation?

Install a workgroup to allow each device to control what is shared and with whom.

A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older network laser printer that is shared by everyone in her department. When she picked up the output, only the top half of each page was printed, and the bottom half was blank. Which of the following will MOST likely rectify this issue?

Install additional memory in the printer.

Which of the following are antenna types that are commonly used in wireless networks

Omnidirectional antenna Directional antenna

You are setting up a small network in your office with one Windows server and 50 Windows workstation. You want to spend as little time as possible configuring the workstations with IP addressing information. What should you do?

Install and configure the DHCP service on your server

You have a computer with a dual core 64-bit processor that uses the x86-x64 instruction set. You want to install the 32-bit application on the computer. What should you do?

Install the application normally. Explanation You can install a 32-bit application on a system with a 64-bit processor. If the processor runs the x86-64 architecture the processor itself is capable of running the 32-bit application without modifications.

You have an existing computer running Windows 10 Enterprise. You want to configure a RAID 5 array in the computer. You install three new SATA drives and then use the RAID controller integrated into the motherboard to define a RAID 5 array using them. When you boot the computer, Windows does not show the logical RAID drive you just created. What should you do?

Install the drivers for the motherboard RAID controller.

Which of the following actions directly improves system security on a windows workstation?

Install the latest updates

Which of the following actions directly improves system security on a Windows workstation?

Install the latest updates.

Install case fans

Installing more exhaust and intake fans in your system will help to keep temps down

Don is an accountant in the Finance department, and for the last several months has been testing an online accounting program. After speaking with his manager, Don received permission to download a steamlined version of the software which requires a local installation. After downloading, Don tried to install the application, but the OS will not allow it. Out of frustration, he called the Help Desk. The Help Desk personnel came to Don's machine and installed the application without issue. Which of the following is the most likely reason Don could not install the application?

Insufficient permissions

While using a web-based order form...The value entered is large enough to exceed the maximum value...A large sum of money. What type of attack has occurred in this scenario?

Integer overflow

Are much cheaper and less powerful

Integrated video cards.

GPU is integrated with another hardware component such as a motherboard or CPU.

Integrated video cards.

Shares system memory for graphic processing.

Integrated video cards.

Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user. Before transmission, you hash the message, then encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, what protection does the hashing activity provide?

Integrity

Manufacturer

Intel and AMD are the two producers used in modern PCs -- both Intel and AMD processors work in PC systems and support Windows software. -- Intel has a larger market share, while AMD processors generally cost less. --Processor performance and special features vary between models and manufacturers

Which of the following features are common functions of an all-in-one security appliance?

Spam filtering Bandwidth shaping

Capacitor

Internal conductors that temporarily store charges, as if leaky bucket

Which of the following is a privately controlled portion of a network that is accessible to some specific external entities?

Internet MAN *Extranet* Intranet

A user configuring an email client application and plans to use a standard TCP/IP suite protocol to retrieve email messages from an email server. How do you retrieve email messages? (SELECT TWO) Internet Message Access Protocol (IMAP) Simple Network Management Protocol (SNMP) Post Office Protocol (POP3) Simple Mail Transfer Protocol (SMTP)

Internet message access protocol Post office protocol

Of the following security zones, which one can serve as a buffer network between a private secured network and the untrusted internet?

Intranet *DMZ * Padded cell Extranet

Which of the following best describes how a switch functions?

It connects multiple cable segments or devices and forwards frames to the appropriate segment.

You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. Which of the following BEST describes what happened to the file?

It has been moved to a folder on your computer.

You have installed anti-malware software that checks for viruses in email attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. What has happened to the file?

It has been moved to a secure folder on your computer.

Which of the following best describes spyware?

It monitors the actions you take on your machine and sends the information back to its originating source.

Which of the following best describes spyware?

It monitors the actions you take on your machine and sends the information back to itsoriginating source.

Which three of the following are characteristics of ISDN?

It provides enough bandwidth to transmit data at much higher speeds than standard modems and analog lines. It lets you transmit voice, video, and data over the same lines. It is a dial-up service that uses existing copper wires for the local loop.

What is a DB-15 connector on a sound card typically used for?

Joystick MIDI Explanation Use a DB-15 connector on a sound card to connect MIDI devices or game joysticks. Headphones, speakers, and microphones connect to TRS ports.

When should a hardware device be replaced in order to minimize downtime?

Just before it's MTBF is reached

When should a hardware device be replaced in order to minimize downtime?

Just before its MTBF is reached

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).

Keep the operating system up to date. Lock the screen with some form of authentication.

Which of the following is the most important thing to do to prevent console access to a network switch?

Keep the switch in a room that uses a cipher lock.

Which of the following is the most important thing to do to prevent console access to a network switch?

Keep the switch in a room that uses a cipher lock.

What are two examples of common single sign-on authentication configurations?

Kerberos and smart card setups are common single sign-on configurations.

What is the most secure method of authentication and authorization in its default form?

Kerberos is the most secure method of authentication listed. It has a more complicated system of authentication than TACACS (which is outdated) and RADIUS (which is used in different scenarios than Kerberos). LDAP deals with directories (for example, the ones on a Microsoft domain controller), which Kerberos first needs to give access to.

Which of the following authentication systems makes use of a Key Distribution Center?

Kerberos uses a KDC (key distribution center) to centralize the distribution of certificate keys and keep a list of revoked keys.

Kerberos uses which of the following?

Kerberos uses a ticket distribution service and an authentication service. This is provided by the Key Distribution Center. A Faraday cage is used to block data emanations. Port 389 is used by LDAP. One of the more common ports that Kerberos uses is port 88.

Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?

Kernel proxy *Bastion or sacrificial host * Multi-homed Circuit proxy

KVM

Keyboard, video, mouse

PS2 Connector

Keyboard= purple and mouse= green, outdated

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? select two

L2TP PPTP

You are putting together a gaming system and need to make sure you get a display that meets your needs. Has to have a very good response time, affordable, and power efficient. LCD display with IPS panel LCD display with TN panel Plasma display with no motion blur OLED display with wide-anlge veiwing

LCD display with TN panel

Intel Chips

LGA-Land grid array

What is the most common failure of a security policy in an environment?

Lack of user awareness

A SYN packet is received by a server. The SYN packet has the exact same address for both the sender and receiver addresses, which is the address of the server. This is an example of what type of attack?

Land attack

When a SYN flood is altered so that the SYN packets are spoofed in order to define the source and destination address as a single victim IP address, the attack is now called what?

Land attack

At which of the following OSI layers does a router operate?

Layer 3

A new laptop was delivered to your home and left on the porch while you were at work. It is very cold outside, and you don't know how long it has been there. You unpack the computer. You would like to know if it is working properly. Which of the following is the BEST action to take?

Let the computer warm up to room temperature before turning it on.

CPU Registers

Like RAM, temporary memory for the calulations

A SOHO's connection to the internet is through an antenna that sends and recieves a microwave signal to the ISP's antenna. There can be no obstacles on the direct path between the two antennae. Which of the following internet connection types is being used?

Line-of-site wireless

Which of the following is the MOST likely symptom of a dirty drum or roller in a laser printer? Lines or splotches repeated at regular intervals on the print job A vertical black or white stripe on the print job Smudges on the print job A faint image on the print job

Lines or splotches repeated at regular intervals on the print job

Cross fire/ IMD

Links 2 graphics cards together for better sound and picture

LCD Monitor

Liquid crystal display, most common, safer, lighter

• Configure the Internet connection • Configure the wireless router • Enable NAT • Configure DHCP • Secure the SOHO network

List the general steps that are used to configure a SOHO router and set up the network. (Assume that the wireless router does not also function as a modem.) Put the steps in the correct order. • Select a physical network topology • Configure DHCP • Configure the network server • Select a wireless communication technology • Configure the Internet connection • Secure the SOHO network • Enable NAT • Configure the wireless router • Design your subnetting scheme

CPU-Z Tool

Live data from the motherboard such as hardware and what the bios is doing

You have a Web server on your network that hosts the public Web site for your company. You want to make sure that the Web site will continue to be available even if a NIC, hard drive, or other problem prevents the server from responding. Which solution should you implement?

Load balancing

You have a Web server on your network that hosts the public Web site for your company. You want to make sure that the Web site will continue to be available if a NIC, hard drive, or other problem prevents the server from responding. Which solution should you implement?

Load balancing

You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use

Load tester

You are configuring a new system and want to use a RAID 0 array for the OS using SATA disks and the RAID functionality built into the motherboard. Which of the following actions will you take as part of the configuration? In the BIOS, set the disk mode to IDE Load the RAID drivers during operating system installation. Set the disk mode to AHCI in the BIOS Set master/slave jumpers on the hard drives

Load the RAID drivers during operatig system intallation

You are managing a workstation that is not part of a windows domain. Users on this computer should not be permitted to download applications from the windows store. Which administration tool can you use to enable a policy that turns off the store application for all users on this computer?

Local group policy editor

You are designing a wireless network implementation for a small business. the business deals with sensitive customer information, so data emanation must be reduces as much as possible. The floor plan of the office is shown below. Match each type of access point antenna with the appropriate location on the floorplan.

Location = type A= Directional B= Directional C=Omnidirectional D= Directional E= Directional F= Directional G= Directional

Which of the following controls is an example of a physical access control method?

Locks on doors

Of the following choices, which action could be most physically harmful to you?

Looking into the end of a fiber optic cable.

Your workstation is unable to communicate with any other computer on the network. Which of the following tools should you use to test the ability of the network card to send and receive signals?

Loopback plug

Home Theature System

Lots of HDMI cable ports, TV tuner card

Which of the following do switches and wireless access points use to control access through the device?

MAC Filtering

Set up and configure a wireless network to service all of the conference rooms. What lets you allow or reject client connections based on the hardware address? DHCP MAC Address filtering SSID WEP

MAC address filtering

Which of the following features on a wireless network allows or rejects client connections based on the hardware address?

MAC address filtering

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address?

MAC address filtering

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address?

MAC address filtering

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room across the hall and next to the elevator. What is the most likely cause of her connectivity problem?

MAC filtering is preventing the computer from connecting. SSID broadcast has been disabled. *Interference is affecting the wireless signal.* The client computer is using the wrong channel number. The user has not yet rebooted her laptop computer while at her new location.

Which of the following attacks, if successful, causes a switch to function like a hub?

MAC flooding

which of the following attacks, if successful, causes a switch to function like a hub?

MAC flooding

You work in the IT department. To perform your daily tasks, you often use many of the windows consoles, such as the device manager, hyper-v manager, and the performance monitor. Although each of these can be accessed from various locations in windows, you want one location from which these common tools can be accessed. Which of the following system utilities would best provide this capability?

MMC

Which of the following technologies uses variable-length packets and adds labels to packets as they enter the WAN cloud, with the labels being used to switch packets and prioritize traffic?

MPLS

Which of the following about authentication is false?

MS-CHAPv2 is capable of mutual authentication of the client and server. However, MS-CHAPv1 is not. That's why it is important to use MS-CHAPv2. Mutual authentication is accomplished with Kerberos. All the other statements are true.

Match the recovery term on the right with the appropriate definition on the left

MTTF- Measures the average time to failure of a system or component MTD- Identifies the length of time an organization can survive with a specific service, asset, or process down MTTR- Identifies the average amount time to repair a failed component or to restore an operation MTFB- Identifies the average lifetime of a system or component

What is the primary goal of business continuity planning? Maintaining business operations with reduced or restricted infrastructure capabilities or resources Minimizing the risk of delays and interruptions in services Protecting an organization from major computer services failure Minimizing decision-making during the development process

Maintaining business operations with reduced or restricted infrastructure capabilities or resources

What is the primary goal of business continuity planning?

Maintaining business operations with reduced or restricted infrastructure capabilities or resources.

You walk by a server room and notice a fire has started. What should you do first?

Make sure everyone has cleared the area.

You walk by the server room and notice a fire has started. What should you do first?

Make sure everyone has cleared the area.

After installing two memory modules, you power on the system to check for errors. You find that the BIOS program recognizes only one of the memory modules. What should you do first? Make sure that both modules are seated properly in their slots Reboot the computer and run the memory diagnostic tests on the memory Return both modules for a replacement Scan for new devices in Device Manager enable any disabled memory modules

Make sure that both modules are seated properly in their slots

After installing two memory modules, you power on the system to check for errors. You find that the BIOS program recognizes only one of the memory modules. What should you do first?

Make sure that both modules are seated properly in their slots.

You have a series of WAN links that connects to your site to multiple other sites. Each remote site is connected to your site using a dedicated line. What type of connection is being used?

Point-to-point

Which of the following describes a maninthemiddle attack?

Malicious code is planted on a system, where it waits for a triggering event before activating. *A false server intercepts communications from a client by impersonating the intended server.* An IP packet is constructed that is larger than the valid size. A person convinces an employee to reveal their login credentials over the phone .

While using the internet, you type the URL of one of your favorite sites in the browser. Instead of going to the correct site, however, the browser displays a completely different website. When you use the IP address of the web server, the correct site is displayed. Which type of attack has likely occurred?

Man-in-the-middle Spoofing *DNS poisoning* Hijacking

An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. What kind of exploit has been used in this scenario? (Choose two. Both responses are different names for the same exploit.)

Man-in-the-middle Reconnaissance Domain name kiting *Pharming* *DNS poisoning*

Capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which security concern?

Man-in-the-middle attack

CPU Control Unit

Manages activities

Match each wireless device on the left with is corresponding characteristics on the right.

Manages all of the Apps that are connected to it/ Wireless controller Suppors 30 to 50 wireless clients per access point/ Wireless controller Profides NAT routing and an ethernet switch in one device/ SOHO wireless router Supports a maximum of 5-10 wireless clients/ SOHO wireless router Pushes wireless configurations settings to connected access points/ Wireless controller

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggy- backing to gain access to your building. The individual in question did not have a security badge. Which of the following would you MOST likely implement to keep this from happening in the future?

Mantraps

Onboard components

Many MOBOs include onboard components (such as network cards, audio cards, video cards, or USB and FireWire connections. Selecting a mobo with onboard devices is typically cheaper but they might not have high quality like an expansion card.

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. What kind of attack has occurred in this scenario?

Masquerading

Which business document is a contract that defines a set of terms that will govern future agreements between two parties?

Master Service Agreement

You've used Bitlocker to implement full volume encryption on a notebook system. The notebook motherboard does not have a TMP chip, so you've used an external USB flash drive to store the Bitlocker startup key. Which system components are encrypted in this scenario? select two

Master boot record C:\volume

You want to add a second processor to your dual-processor system. Which of the following should you do?

Match the speed of the new processor with the speed of the existing processor. Explanation When adding multiple processors in a multi-processor system the speed of the processors must be the same. The terminating resistor occupies the processor slot when a second processor is not installed; it must be removed before the second processor is added. Level II cache is on the processor and cannot be upgraded.

Lumens

Measurement of the light source by the human eye

A computer needs to use several applications. Currently, the computer cannot keep all the necessary applications open at the same time. Which of the following components should you consider upgrading?

Memory

Temporary memory

Memory is only there a long as there is power

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topolgies provides redundancy for a failed link?

Mesh

You have implemented an ad-hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?

Mesh

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device.

Which port on a sound card should you connect a non-amplified microphone to?

Mic In Explanation Connect a non-amplified microphone to a sound card's Mic In (microphone in) port. The speaker out connector sends signals to external speakers. This signal is amplified and the computer and the speakers can control the sound level. The line out connectors send unamplified audio signals to other sound devices. The line in connector receives signals from the line out port of other audio devices.

A sales person requires that a large number of documents, data, presentation, image, and video files be accessible on their personal devices when making sales pitches. Which accessory would a technician BEST meet the sales person requirments? Micro SD Credit card reader Wireless hotspot Docking station

Micro SD

Threading

Older, task 1 data goes to the processor, comes out then task 2 goes in, comes out. Too slow

Which of the following features are typically available through TRS ports on a sound cards?

Microphone in Speakers out Explanation TRS ports on a sound card accept 3.5 mm (1/8") plugs for analogue audio input and output. The number of ports on the sound card depends on the type of support (e.g, 5.1 surround support). An IEEE 1394 port is used to connect FireWire devices. S/PDIF audio is supplied through either a TOSLINK optical port or an RCA port. HDMI audio is supplied through an HDMI port.

Which of the following motherboard form factores BEST allows for low-consumption power supplies? microATX NLX Mini-ITX EATX

Mini-ITX

Raid level 0 1

Mirror of stripes

Level 1 Raid

Mirroring! Each block goes to each drive, redundency

Which of the following is an example of a vulnerability?

Misconfigured server

You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on that subnet, however the computer does access other computers on other subnets as well as the Internet. Which of the following is most likely the cause of the problem?

Missing route on the default gateway router

When recovery is being performed due to a disaster, which services are to be stabilized first?

Mission Critical

When recovery is being performed due to a disaster, which services are to be stabilized first? Mission critical Outside communications Least business critical Financial support

Mission critical

To access the Internet through the PSTN, what kind of connectivity device must you use?

Modem

8-pin EPS12V CPU power

Modern processors consume even more power. The 8-pin EPS12V connector provides four ones of 12 V power. -The 8-pin EPS12V was originally used with some older dual processor systems -All modern multi-core processors use this connector -Some power supplies have two 4-pin connectors (4+4) that are meant to be used side-by-side in the 8-pin plug.

You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next?

Modify the NTFS permissions on the folder.

Pirifrom Speccy Tool

More live data such as temprature

Memory slots

Most motherboards have memory slots. Memory slots are compatible with certain memory modules.

Heart Brain Veins

Motherboard CPU- central Processing Unit Bus

What types of technologies are used by external motion detectors?

Motion detectors often use infrared technology; heat would set them off. They also use ultrasonic technology; sounds in higher spectrums that humans cannot hear would set these detectors off.

You are in the process of configuring a new computer. The motherboard has four memory slots and supports dual channel memory. You install two memory modules. When you boot the computer, the BIOS recognizes both modules, but the memory is not configured to run in dual channel mode. What should you do?

Move the modules to the correct motherboard slots.

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?

Move the router to a secure server room

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration from your notebook computer using an SSH client with the user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?

Move the router to a secure server room

Which of the following is the most common method for removing RAM from a motherboard?

Move the tabs holding the RAM out of the way; pull straight up to remove the RAM.

Match the wireless networking term or concept on the left with its appropriate description on the right.

Moving an wireless device/Roaming Used by Cisco wireless equipment/ LWAPP Specifies the number of clients/ Device density Automatically partitions a single/ VLAN pooling Graphically displays wireless/ Heat map Connects tow wired networks/ Wireless bridge Identifies how strong/ The number of useful bits/ Goodput

Which utility allows you to choose selective startup in windows?

Msconfig (System configuration)

Which tool can you use to view (but not modify) hardware and configuration information for your computer?

Msinfo32

To gain access to your network, users must provide a thumbprint and a username and password. What type of authentication model is this?

Multifactor authentication means that the user must provide two different types of identification. The thumbprint is an example of biometrics. Username and password are examples of a domain logon. Single sign-on would only be one type of authentication that enables the user access to multiple resources.

A customer is upgrading the routers and switches in their network. The signal source in these network devices is a light-emitting diode. Which of the following network cabling options is most likely being used in this upgrade.

Multimode fiber

A medical center wants to upgrade their network backbone to 10-gigabit Ethernet (10 Gbps) so they can perform daily backups of large amounts of data to the secure on-site storage area network (SAN) without bogging down the network. Some of the backbone segments will have to reach between buildings that are close to 300 meters apart. Which of the following cable types best supports the 10-gigabit Ethernet at the necessary segments lengths while keeping costs as low as possible?

Multimode fiber optic

Which of the following is a characteristic of a multi-processor system? Shared L2 cache Abillity to use over 4 GB of memory Multiple cores on the same die Multiple processor sockets on the motherboard

Multiple processor sockets on the motherboard

Which of the following is a feature of MSCHAP v2 that is not included in CHAP? Hashed shared secret Mutual authentication Threeway handshake Certificatebased authentication

Mutual authentication

Which of the following features of MS-CHAP v2 that is not included in CHAP?

Mutual authentications

Members of the Sales team use laptops to connect to the company network. While traveling, they connect their laptops to the Internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless anti-virus software and the latest operating system patches have been installed. Which solution should you use? VLAN

NAC

Which of the following network devices or services prevent the use of IPsec in most cases?

NAT

Which of the following network devices or services prevents the use of IPsec in most cases?

NAT

Which of the following networking devices or services is LEAST likely to be compatible with VPN connections?

NAT

Audio Visual Editing System

NEEDS: Dual monitors, high end video card, memory, performance, specialized sound card and video card

A user pays for a retail purchase by placing a smart phone next to the merchant's reader. Which of the following mobile device connections is being used?

NFC

A user pays for retail purchase by placing a smart phone next to the merchant's reader. Which of the following mobile connections is used? MicroUSB Bluetooth Lightning NFC

NFC

Which of the following wireless communication techniques can be described as follows? -Has a very limited transmission range of less than two miles -Used with credit cards and passports -Slower than other wireless technologies -Constantly emits a signal.

NFC

An attacker has hidden an NFC reader behind an NFCbased kiosk in an airport. The attacker uses the device to capture NFC data in transit between end user devices and the reader in the kiosk. She then uses that information to masquerade as the original end user device and establish an NFC connection to the kiosk. What kind of attack has occurred in this scenario?

NFC jamming NFC maninthemiddle attack NFC denial of services (DoS) *NFC relay attack*

Which of the following prevents access based on website ratings and classifications?

NIDS DMZ *Content filter * Packetfiltering firewall

What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell?

Near a window

Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select two.)

Near backup generators Near cordless phones

If an organization shows sufficient due car, which burden is eliminated in the event of a security breach?

Negligence

If an organization shows sufficient due care, which burden is eliminated in the event of a security breach? Negligence Investigation Liability Asset loss

Negligence

You are the office manager of a small financial credit business. Your company handles personal financial information for clients seeking small loans over the internet. You are aware of your obligation to secure clients records. Budget is an issue for your company. Which item would provide the best security for this situation?

Network Access Control system Proxy server with access controls *All-in-one security appliance* Firewall on your gateway server to the Internet

In troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?

Network Diagram

NIC

Network Interface Card, plug into router

When troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information? Wiring schematic Procedure Baseline Network diagram Policy

Network diagram

Which network component connects a device to the transmission media and allows it to send and receive messages?

Network interface card

Which type of device should you use to create the DMZ?

Network-based firewall

Your company has a connection to the Internet that allows users to access the Internet. You also have a Web server and an e-mail server that you want to make available to Internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?

Network-based firewall

Your company has a connection to the Internet that allows users to access the Internet. You also have a Web server and an e-mail server that you want to make available to Internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?

Network-based firewall

6+2 pin PCIe

Newer video cards require more power than can be supplied through the PCI Express bus. The 6+2-pin PCIe connector plugs directly into the video card to supply additional, dedicated power. The 6+2-pin PCIe: -Provides up to 150 watts -Is also known as a PEG6+2 (PCI Express Graphics 6+2 pin) -Some motherboards only have a 6-pin PCIe connector. These connectors provide up to 75 watts.

What type of internet access would this computer have?

No Access

To protect a Windows 10 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No, you need to enable File History.

To protect a windows 10 system, you've configured system restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No, you need to enable file history

You are setting up a wireless hotspot in a local coffee shop. For best results, you want todisperse the radio signals evenly throughout the coffee shop.Which of the following types of antennas would you use on the AP to provide a 360degree dispersed wave pattern?

Omni-Directional

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MT-RJ connectors. You connect each module to the switch with 1 meter multimode patch cables. Will this implementation work?

No, you shouldn't use multimode patch cables with single mode GBIC modules.

You need to back up user data on a windows 10 system. The computer has a single SSD storage device installed that contains both the windows operating system (in c:\windows) and user profile data (in C:\users). You plan to do the following: -Use backup and restore to backup user data -Run the backup automatically every night at 11:00 p.m. -Store the backups in the C:\backups folder -Include a system image in each backup Will this configuration work?

No. Backups created with backup and restore can't be stored on the drive that contains the information being backed up.

Which of the following is a legal contract between the organization and the employee that specifies the employee is not to disclose the organization's confidential information?

Non-disclosure agreement

By definition, which security concept uses the ability to prove that a sender sent an encrypted message?

Non-repudiation

Your consulting firm has been hired by a small business to implement a wireless network. The company leases two office suites within a business park approximately 200 m apart, as shown below. The objectives of the implementation are as follows: • Create a secure wireless network whose signal doesn't emanate beyond each office space by implementing access points in locations A-D in each building. • Connect the wireless networks at each office together with a secure outdoor wireless link using locations E and F. Drag the antenna type from the list on the left to the appropriate location on the right. Each antenna type can be used more than once or not at all.

Normal gain directional antenna aimed East Normal gain directional antenna aimed South Normal gain directional antenna aimed North Normal gain directional antenna aimed West High-gain directional parabolic antenna aimed East High-gain directional parabolic antenna aimed West

You have just received an order of various system components from an order you placed several weeks ago. One of them labeled SODIMM memory. Which of the following was this memory most likely purchased? Servers Printers Desktop workstation Notebook computers

Notebook computers

Which of the following will most likely contain SODIMM (Small outline dual in-line memory module) memory?

Notebook computers.

Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rack-mounted environment monitoring device within the rack. Currently, the device shows the temperature within the rack to be 70 degrees Fahrenheit (21 degrees Celsius). What should you do? Install a humidifier to increase the humidity within the server room.

Nothing, the temperature within the rack is within acceptable limits.

You have booted your Windows workstation into Safe Mode and enabled Boot Logging. To which log file is the boot logging information now being written?

Ntbtlog.txt

You have booted your Windows workstation into Safe Mode and enabled Boot logging. To which log file is the boot logging information now being written?

Ntbtlog.txt

Which type of active scan turns off all flags in a TCP header?

Null

Which of the following attacks tries to associate an incorrect MAC address with a known IP address?

Null session Hijacking *ARP poisoning* MAC flooding

Lloys needs a monitor that accuretely represents colors. You have been asked to find a monitor with a fasst pixel refresh rate, low energy consumption, and very accurate colors representation. LCD CTR Plasma OLCD

OLCD

You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?

Obtain a certificate from a public PKI

ISA Slots

Old, 16 and 32 bit

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?

On a RADIUS Server

Dimm slots

On motherboard, push memory module into lever, it clicks

IP Based

On network, has an IP Adress

Which step is required to configure a NAP on a Remote Desktop (RD) gateway server?

On the 802.1x switch, define the Remote Desktop (RD) gateway server as a compliant network VLAN *Edit the properties for the server and select Request clients to send a statement of* *health* Configure the server to issue a valid statement of health certificate Configure the enforcement point as a RADIUS client to the NAP server

You have been having trouble with your laptop crashing. You would like your computer to create a memory dumb file when it crashes. Where should you place the paging file?

On the system volume

You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file?

On the system volume

Heat sink

On top of the processor, pulls air up from the chip

Which two of the following describes the channels and data transfer rates used for ISDN BRI?

One D channel operating at 16 Kbps. Two B channels operating at 64 Kbps each.

A technician connects two network switches using a twisted pair cable. Neither switch supports auto-uplinking. Which of the following identifies the TIA wiring standard required on each end of the cable?

One end must be T568A, and the other must be T568B

What is the primary difference between impersonation and masquerading?

One is more active, the other is more passive

Wireless router

One of your customers has hired you to set up and configure a SOHO (Small or Home Office) network. Which of the following is the PRIMARY device required? • DSL modem • Firewall/DMZ appliance • NAT router • DHCP server • Cable modem • Wireless router

Which of the following are backed up during a differential backup?

Only files that have changed since the last full backup.

Which of the following are backed up during an incremental backup?

Only files that have changed since the last full or incremental backup.

You've used Bitlocker to implement full volume encryption on a notebook system. The notebook motherboard does not have a TMP chip, so you've used an external USB flash drive to store the Bitlocker startup key. You use EFS to encrypt the C:\secret folder and its contents Which of the following is true in this scenario? select two

Only the user who encrypted the C:\secrets file will be able to open it by default If the C:\secrets file is copied to an external USB flash drive, it will be saved in an unencrypted state

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model?

Open source

Ohms

Opposition, resistance

Provides a high-level overview of the organization's security program.

Organizational security policy

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems?

Overlapping channels

Which of the following authentication protocols transmits passwords in clear text, and is therefore considered too insecure for modern networks? RADIUS CHAP EAP PAP

PAP

Which of the following expansion buses are most commonly used for video cards in modern computer systems?

PCI Express Explanation The PCI Express expansion buses are most commonly used for video cards in modern computer systems. PCI buses are most commonly used for devices such as sound cards, modems, network cards, and storage device controllers. While you can use PCI for video, better performance is obtained from PCI Express. CNR is a legacy on-motherboard slot to support networking, wireless communication, sound, or modem functions. AMR slots are also legacy buses provided on some motherboards for riser cards to support sound or modem functions.

Which of the following is a mechanism for granting and validating certificates?

PKI

What is the name for the routine that tests the motherboard, memory, disk controllers, video, keyboard and other system hardware?

POST (Power On Self-Test)

A computer will not boot properly. No information is displayed on the monitor when plugged in. Which tools will BEST help you understand the error codes? POST card Card reader Loopback plug Multimeter

POST card

Which of the following describes the lines used in the local loop for dial-up telephone access?

POTS

You are configuring your computer to dial up to the Internet. What protocol should you use?

PPP

Which of the following protocols or services is commonly used on cable Internet connections for user authentication?

PPPoE

You have just signed up for Internet access using a local provider that gives you a fiber optic line into your house. From there, the Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection?

PPPoE

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

Which of the following terms identifies the network of dial-up telephone and the long-distance lines?

PSTN

You are moving to an area where DSL will be available in the next six months. Which method of Internet connectivity should you implement until DSL is available, if your existing connectivity needs are minimal?

PSTN

You are traveling throughout North America to many metropolitan and rural areas. Which single form of Internet connectivity provides the greatest potential connectivity wherever you travel?

PSTN

You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose?

PTZ

You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose?

PTZ

You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which type of camera should you choose?

PTZ

Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?

PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.

You provide internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you install?

Packet filtering IPS *Application level * Circuit-level

You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?

Packet filtering VPN concentrator Application level *Circuit-level*

Which type of network divides data to be transmitted into small units and then routes these units from the originating system to the destination system, allowing multiple, concurrent communications on the network medium?

Packet-switched

Which of the following is an error detection technique that can detect errors with only one bit?

Parity

A security administrator is conducting a penetration test on a network. She connects a notebook system to a mirror port on a network switch. She then uses a packet sniffer to monitor network traffic to try and determine which operating systems are running on network hosts. Which process did the administrator use in the penetration test in this scenario?

Passive fingerprinting

authentication protocols used between the client and the server

Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP

Thermal Paste

Past put on top of fan to help air flow

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?

Peer-to-peer

You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?

Peer-to-peer

The disaster recovery plan calls for having tape backups stored at a different location. The location is safe deposit box at the local bank. Because of this, the disaster recovery plan specifies to choose a method that uses the fewest tapes, but is also quick to back up and restore files. Which backup strategy would best meet the disaster recovery plan for tape backups?

Perform a full back up once a week with a differential back up the other days of the week.

You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Click on the tab in Task Manager that you would use to do this.

Performance

Which tool can you use to gather and display statistics that help you monitor the operation of a windows system?

Performance monitor

You have an AMD processor and an Intel processor both of which have the same speed rating. Which of the following statements is true about the relative performance of both processors?

Performance will depend on other factors such as cache and other features. Explanation Processor performance is dependent on the specifications of the chip not on the manufacturer or even the speed rating. Other factors such as the amount of cache has a greater impact on performance than does the processor speed.

CHAP performs which of the following security functions? Links remote systems together Periodically verifies the identity of a peer using a threeway handshake Allows the use of biometric devices Protects usernames

Periodically verifies the identity of a peer using a threeway handshake

Hard drive data

Permenent

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use?

Personal Area Network (PAN)

An attacker uses an exploit to push a modified hosts file to client systems. This hosts fileredirects traffic from legitimate tax preparation sites to malicious sites to gather personal andredirects traffic from legitimate tax preparation sites to malicious sites to gather personal andfinancial information.financial information. What kind of exploit has been used in this scenario?

Pharming DNS poisining

An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. What kind of exploit has been used in this scenario? (Choose two. Both responses are different names for the same exploit.)

Pharming DNS poisoning

A user within your organization received an email relation how an account containing a large of money has been frozen by the government of a small African nation. The user was offered a 25% share of this account if she would help the sender transfer it to the a bank in the United States.The user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used the information to drain her back account. What type of attack occurred?

Phishing

Several users have forwarded you an e-mail stating that your company's health insurance provider has just launched a new website for all employees. To access the site they are told in the e-mail to click a link and provide their personal information. Upon investigation, you discover that your company's health insurance provider did not send this email. What kind of attack just occurred?

Phishing

Users in your organization receive email messages informing them that suspicious activity hasbeen detected on their bank account. They are directed to click a link in the email to verify theirbeen detected on their bank account. They are directed to click a link in the email to verify theironline banking username and password. The URL in the link is in the .ru top-level DNS domain.online banking username and password. What kind of attack has occurred?

Phishing

Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this?

Phishing

Which of the following attacks tricks victims into providing confidential information (such as identity information or login credentials) through emails or websites that impersonate an online entity that the victim trusts?

Phishing

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or Websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

Phishing

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

Phishing Maninthemiddle Social engineering *Rogue access point * Physical security

Match the social engineering description on the left with the appropriate attack type on the right.

Phishing -An attacker sends an email pretending to be from a trusted organization, asking users to access a website to verify personal information. Whaling -An attacker gathers personal information about the target individual, who is a CEO. Spear phishing -An attacker gathers personal information about the target individual in an organization. Dumpster diving -An attacker searches through an organization's trash for sensitive information. Piggybacking -An attacker enters a secured building by following an authorized employee through a secure door without providing identification. Vishing -An attacker uses a telephone to convince target individuals to reveal their credit card

Network signaling is a function of which layer of the OSI model?

Physical layer

Match the authentication factor types on the left with the appropriate authentication factor on the right.

Pin Something you know Smartcard something you have Password Something you know Retina scan Something you are Fingerprint scan Something you are Hardware token Something you have User name Something you know Voice récognition Something you are WI-FI triangulation Somewhere you are Typing behaviors Something you do

Which of the following denial of service (DoS) attacks uses ICMP packets and is only successful if the victim has less bandwidth than the attacker?

Ping flood

which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building>

Place access points above where most clients are

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Place accès points above where most clients are

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Place multiple access points in the same area. Place access points in the basement. Place access points near outside walls. *Place access points above where most clients are.*

You are installing network cable in the space between the ceiling and the roof of a building. Which type of cabling should you use?

Plenum

A technician is running a network above a dropped ceiling that is also used for ventilation. The cable must be twisted pair and must be capable of gigabit Ethernet speeds. Which of the following cables should be used?

Plenum-rated CAT-6a

You have site in your network that is connected to multiple other sites. A single virtual circuit is used to connect all other sites. What type of connection is being used?

Point-to-multipoint

While using a new windows system, you find that the mouse pointer tracks much more slowly on the screen than you would prefer. You want to increase the mouse pointer speed. Click the tab you would use in the Mouse Properties window to do this.

Pointer options

A new law was recently passed that states that all businesses must keep a history of the emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law? Procedure Configuration documentation Change documentation Policy

Policy

A new law was recently passed that states that lll businesses must keep a history of emails sent between members of the board of directors. You need to ensure that you organization complies with this law. Which document type would you update first in response to this new law?

Policy

20 or 24 pin power supply connector

Popular, for the motherboard

Which port number does the protocol LDAP use when it is secured?

Port 636 is the port used to secure LDAP (called LDAPS). Port 389 is the standard LDAP port number. Port 443 is used by HTTPS (SSL/TLS), and port 3389 is used by RDP.

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to make sure that visitors cannot plug in their computer to the free network jacks and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?

Port authentication

You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. You want to make sure that visitors cannot plug their computers to the free network and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?

Port authentication.

A technician is installing a network-enabled smart home control system in a SOHO. To access the system from the internet, which of the following configurations is most likely required on the SOHO router?

Port forwarding

A network utilizes a Network Access Control(NAC) solution against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied. What is this process called?

Posture assessment

Which of the following devices can be used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher)?

Power over Ethernet

A relatively new employee in the data entry cubical farm was assigned a user account similar tothat of all of the other data entry employees. However, audit logs have shown that this useraccount has been used to change ACLs on several confidential files and has accessed data inaccount has been used to change This situation indicates which of the following has occurred?

Privilege escalation

Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Privilege escalation Brute force attack Maninthemiddle attack *Denial of service attack*

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions?

Privilege escalation.

Degaussing

Process of eliminating unwanted magnetic fields

To fix a problem you are having with your PC, you have determined that you must flash the computers BIOS. What should you do prior to flashing the BIOS? Locate the flash utility or tool that was shipped with your PC. Test the memory to ensure that it is functioning properly. Properly identify the motherboard Download the flash utility or tool from the manufacturer''s website Create a backup of the hard disk

Properly identify the motherboard Download the flash utility or tool from the manufacturer's website

What is modified in the most common form of spoofing on a typical IP packet?

Protocol type field value *Source address* Hash total Destination address

Parity Memory

Provides error detection, 1/8 is used, cant correct the error

Match each description on the eft with the appropriate cloud technology on the right

Public cloud-Provides cloud services to just about anyone Private cloud- Provides cloud services to a single organization Community cloud- Allows cloud services to be shared by several organizations Hybrid cloud- Integrates one cloud service with other cloud services

How can an organization help prevent social engineering attacks?

Publish and enforce clearly written security policies //Educate employees on the risks and countermeasures

A technician is tasked with replacing a 110-style keystone jcak module in a patch panel. Which of the following tools would the technician use to attach the new module to the end of the cable? (SELECT TWO) Tone generator and probe Punchdown tool Multimeter Crimper Cable Stripper

Punchdown tool Cable Stripper

You have an existing system that has a single DDR3 memory module installed. You would like to add more memory to the three remaining memory slots. What should you do to make sure you get the right memory for the system? (Select two.)

Purchase additional modules that are the same as what is currently installed. Check the motherboard documentation to find which modules are supported.

What is the advantage of RAID 5 over RAID 1?

RAID 5 improves performance over RAID 1

You are in the process of building a new computer. You would like to configure your computer to use SLI to improve performance when playing your favourite game. Which of the following will be part of the configuration process?

Purchase two graphics cards with SLI and similar specifications. Connect at least one monitor to the graphics card. Purchase a motherboard with two (or more) PCIe x16 slots. Explanation For increased performance, especially in games, you can install multiple video cards and link those cards together so that multiple GPUs draw a single screen. Scalable Link Interface (SLI) from NVIDIA and CrossFireX from AMD are two different methods for linking video cards. In most cases you will need to install identical video cards, or at least video cards with very similar specifications. Cards are linked using a special bridge clip or through software (depending on the implementation). Both the motherboard and the video cards must support the selected method (either SLI or CrossFireX). The motherboard must have at least two 16x PCIe slots. Some motherboards are able to link an onboard graphic controller a video card installed in a single PCIe slot. Connect the monitor to an output port on the first video card ATSC signals are digital TV signals and are not used for SLI.

You are in the process of building a new computer. You would like to configure your computer to use Crossfire to improve performance when playing your favourite game. Which of the following will be part of the configuration process?

Purchase two identical video cards. Explanation For increased performance, especially in games, you can install multiple video cards and link those cards together so that multiple GPUs draw a single screen. Scalable Link Interface (SLI) from NVIDIA and CrossFire from AMD are two different methods for linking video cards. In most cases you will need to install identical video cards, or at least video cards with very similar specifications. Cards are linked using a special bridge clip or through software (depending on the implementation). The motherboard and the video cards must each support the selected method (either SLI or CrossFire). The motherboard must have multiple 16 x PCIe slots. Connect the monitor to an output port on the first video card. Select a video card that supports NTSC for analogue video capture or analogue TV tuner capabilities. Select a video card that supports ATSC for digital TV. HDCP is a copy-protection method that prevents playback of protected content (such as movies on Blu-ray discs) devices that do not support HDCP.

When analyzing assets, which analysis method assigns financial values to assets?

Quantitative

When analyzing assets, which analysis method assigns financial values to assets? Quantitative Acceptance Qualitative Transfer

Quantitative

While running a full system scan using your anti-malware software, three files have been identified as possible problems. You want to keep the files intact so you can review them later, but you also need to ensure they can't harm anything else on your computer. Which of the following is the BEST next step?

Quarantine the files.

A group of salesmen would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?

RADIUS *VPN concentrator* IPS DMZ IDS

Which of the following are differences between RADIUS and TACACS+? RADIUS uses TCP; TACACS+ uses UDP. RADIUS encrypts the entire packet contents; TACACS+ only encrypts the password. RADIUS supports more protocols than TACACS+. RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers

RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers

You are tasked with setting up a wireless network that uses 802.1X for authentication. You set up the wireless network using WPA2 and CCMP; however, you don't want to use a PSK for authentication. Which of the following options would support 802.1X authentication?

RADIUS is a common back-end authenticator for 802.1X. When setting up a wireless access point, the two security mode options are usually PSK (pre-shared key), which is stored on the WAP, and Enterprise, which usually refers authentication to an external RADIUS server. Kerberos deals with authentication to Microsoft domains. CAC cards are smart cards that are used for ID and authentication to systems.

Which of the following is an authentication system that uses UDP as the transport mechanism?

RADIUS is the authentication system that uses UDP as the transport mechanism. The others all use TCP. Remember, RADIUS uses ports 1812 and 1813 (or 1645 and 1646), LDAP uses 389 (or 636 for secure LDAP), Kerberos uses port 88, and TACACS+ uses port 49.

Which type of device is required to implement port authentication through a switch?

RADIUS server

Which of the following drive configurations is fault tolerant?

RAID 5

What is an advantage of RAID 5 over RAID 1?

RAID 5 improves performance over RAID 1

Volatile memory

RAM, can be deleted

Which RAM standard requires heat spreaders?

RAMBUS

Which of the following requires that either all memory slots are populated with memory modules or with a continuity module?

RAMBUS

You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. What service should you implement?

RAS

You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer connected to a computer at home. Which protocol should you use?

RDP

A technician is installing a cable modem that supplies internet connectivity for a home office. Which of the following cabling types would be used to connect

RG6

Phospohors

RGB make up the pixel

Which kind of connector do you use to connect a modem to a standard telephone line?

RJ11

Which connector is used with unshielded twisted pair (UTP) cable?

RJ45

Which of the following protocols can TLS use for key exchange? (Select two.)

RSA Diffie-Hellman

RAM

Random Access Memory, travels externally, stores bits in a group of capacitors

CD-RW

Re-wrtiable

You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult? Regulation Procedure Policy Baseline

Regulation

Which of the following features are common functions of an all-in-one security appliance?

Spam filtering Bandwidth shaping

You have a computer with a dual-core processor. You would like to upgrade to a quad-core processor but don't want to replace the motherboard. Which should you perform first? Read the motherboard documentation to identify which processors are supported Install the processor Configure jumpers on the motherbaord Edit the BIOS to allow quad-core CPUs

Read the motherboard documentation to identify which processors are supported

You have a computer system with an Intel Core i3 processor that operates at 3.7 GHz. You would like to upgrade to a faster processor, but you don't want to replace the motherboard. Which of the following should you do first?

Read the motherboard documentation to identify which processors are supported. Explanation The first thing you need to do before purchasing and installing a new processor is to verify with the motherboard documentation that the new processor is supported by your existing motherboard. After you have determined that the new processor is supported by the motherboard you can take additional steps such as installing the processor editing the CMOS configuring jumpers and replacing the VRM if necessary.

Bionetric Sensor

Reads finger prints, on laptops

User complains that the digitilizer pad registers stylus taps about 1 in to the right of where the tap occured. How do you fix this issue? Remove any scratches from the digitilizer pad Replace the digitilizer pad Recalibrate the digitilizer pad Hold the stylus at an increased angle Replace the stylus

Recalibrate the digitilizer pad

Which form of alternate site is the cheapest but may not allow an organization to recover before reaching their maximum tolerable downtime?

Reciprocal agreement

Which phase or step of security assessment is a passive activity

Reconnaissance

CD-R

Recordable once, then finalized

Which of the following terms describes the actual time required to successfully recover operations in the event of an incident?

Recovery Time Objective (RTO)

What is the primary security feature that can be designed into a network's infrastructure to protect and support availability?

Redundancy

Raid controller card

Redundant array of independent disks, allows multiple skuzzy and sata hard drives, managing physical drives in a system and presenting them to the computer as logical units.

Your company has decided to hire a full-time video editor. You have been asked to find a system with the level of display quality needed by someone who will be working with video all day. Which of the following video card specifications will have the greatest impact on display quality?

Refresh rate Resolution Explanation The quality of video is determined by both the video card and the external display. When selecting a video card, the following specifications should be considered: - Resolution: The number of pixels displayed on the screen. A higher resolution means that more information can be shown on the screen (screen "real estate"). A video card is rated by its max resolution, which is the highest possible resolution it can display (e.g., 1920 x 1080 or 4096 x 2160). A video editor is going to need as much estate as you can afford. - Refresh rate: The number of times in one second that the GPU draws a frame. Refresh rates are measured in hertz. A refresh rate of 70 Hz or lower may cause eye fatigue. An optimal refresh rate is between 75Hz and 85Hz. The display specifications should match the video card specifications. Memory, GPU configuration, and display connection type are all factors that will contribute to video performance or compatibility with the display. But these factors do not directly determine the display quality.

Which tool lets you view and directly edit the registry?

Regedit

Keep system clean

Regularly clean out dust inside of the system to ensure temperatures stay normal

Even if you perform regular backups, what must be done to ensure that you protected against data loss?

Regularly test restoration procedures

You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult?

Regulation

You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around the facility you note the following: When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured with a cable lock. The office manager infroms you that the organizations servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. She informs you that the server backups are configured to run each night. A rotation of external usb hard drisks are used a backup media You notice the orgnaization's network switch is kept in an empty cubicle adjacent to the office managers workspace You notice that a router/firewall/content filter all in one device has been implemented in the server closet to protect the internal network from external attacks. Which security related recommendations should you make to this client?

Relocate the switch to the locked server closet Control access to the work area with locking doors and card readers

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need?

Remote access

What does a remote access server use for authorization? Remote access policies SLIP or PPP CHAP or MSCHAP Usernames and passwords

Remote access policies

Which of the following remote access mechanisms on a windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks?

Remote assistance

A SYN packet is received by a server. The SYN packet has the exact same address for both the sender and receiver addresses, which is the address of the server. This is an example of what type of attack?

SYN flood Teardrop attack *Land attack * Ping of death

Resetting a bios password

Removing CMOS battery usually rests the password

Brick

Rendering a system to un-operable such as unplugging it during a flash

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360dispersed RF wave design. After installed, the signal between the two systems is weak as many obstacles interfere with the signal.

Replace the Omni-directional antenna with a directional antenna

Your computer has one single core processor installed. The motherboard supports processors with up to four cores. You want to upgrade your computer to a quad-core system. Which of the following will be part of your configuration?

Replace the existing processor. Explanation A multi-core system supports processors that have multiple processors on a single processor die. Multi-core systems have a single processor slot. To upgrade this system you will need to remove the existing processor and replace it with one that has four cores. Multi-processor systems have speed. Unused slots are filled with a terminating resistor. Dual-channel memory does not affect using dual processors or dual core processors.

You work for a company based in Phoenix, Arizona, which is a very hot and dry area. Several people in the research department have reported that even though their files are printing to their laser printer correctly, a much lighter copy of the same text also prints within 2 to 3 cm of the original text. Which of the following would MOST likely fix this type of ghosting image?

Replace the imaging drum, as it is probably at end of life.

A user calls to complain that her computer is behaving erratically. Some days it functions correctly, other days it crashes frequently. Sometimes, the system won't boot at all. You open the system case and notice the following: Two of the mounting screws are missing from the system hard disk drive The system uses memory modules from several different manufacturers with mismatched capacities. Several capacitors on the motherboard are bulged and have a brown liquid oozing from them The chassis fan on the front of the case is oriented to blow air into the system

Replace the motherboard

A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server. Which of the following troubleshooting actions are you most likely to perform first?

Replace the network card in the user's computer

You test installing a second CPU. You remove the terminating resistor from the second CPU slot, insert the CPU and perform your testing . Upon conclusion of the test you remove the second CPU and find that your system no longer boots up properly. How can you correct this situation?

Replace the terminating resistor in the slot that was occupied by the second CPU. Explanation In this case, the motherboard originally required a terminator. Whenever a second CPU is removed, the terminator must be replaced. Some motherboards are self-terminating while resistor in the unused processor slot. When troubleshooting a problem focus first on the things you changed, (in this case removing the terminator). Most motherboards now detect new processors, so changing the BIOS is likely not necessary.

When the TCP/IP session state is manipulated so that a third party is able to insert alternate packets into the communication stream, what type of attack has occurred?

Replay *Hijacking* Masquerading Spamming

You are implementing a wireless network in a dentist's office. The dentist's practice is small, so you choose to use an inexpensive consumergrade access point. While reading the documentation, you notice that the access point supports WiFi Protected Setup (WPS) using a PIN. You are concerned about the security implications of this functionality. What should you do to reduce risk?

Require a complex PIN in the access point's configuration *Disable WPS in the access point's configuration* Update the access point's firmware Require a complex PIN in the configuration of each wireless device

Which of the following are solutions that address physical security?(Select two)

Require identification and name badges for all employees //Escort visitors at all times

Which of the following are characteristics of a rootkit? (Select two) - Requires administrator-level privileges for installation - Uses cookies saved on the hard drive to track user preferences - Monitors user actions and opens pop-ups based on user preferences - Hides itself from detection

Requires administrator-level privileges for installation Hides itself from detection Explanation A rootkitrootkit is a set of programs that allows attackers to maintain hidden, permanent, administratorlevel access to a computer. A rootkit: • Is almost invisible software • Resides below regular antivirus software detection • Requires administrator privileges for installation, then maintains those privileges to allow subsequent access • Might not be malicious • Often replaces operating system files with alternate versions that allow hidden access SpywareSpyware collects various types of personal information, such as internet surfing habits and passwords, and sends the information back to its originating source. AdwareAdware monitors actions that denote personal preferences, then sends pop-ups and ads that match those preferences. Both Spyware and adware can use cookies to collect and report a user's activities

Which of the following is a characteristic of a virus? - Requires an activation mechanism to run - Requires administrative privileges to install - Capable of replicating itself - Is remotely controlled by a central command

Requires an activation mechanism to run Explanation A virus has the following characteristics: • A virus requires a replicationreplication mechanism, which is a file that it uses as a host. When the host file is distributed, the virus is also distributed. Viruses typically attach to files with execution capabilities such as .doc, .exe, and .bat extensions. Many viruses are distributed to everyone in your email address book. • The virus only replicates when an activationactivation mechanism is triggered. For example, each time the infected file or program is executed, the virus is activated. • The virus is programmed with an objectiveobjective, which is usually to destroy, compromise, or corrupt data

You installed a new toner cartridge in a company-owned laser printer and did some maintenance tasks you noticed that needed to be done. What should you do next? Reinstall the print drivers. Use the automatic cleaning function Reset the page count. Check the gap between the printer head and the paper

Reset the page count

Your company has developed and implemented countermeasures for the greatest risk to their assets. However, there is still some risk left. What is the remaining risk called?

Residual risk

Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called? Risk Loss Residual risk Exposure

Residual risk

Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?

Resource Monitor

Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?

Resource monitor

You are an IT technician for your company. Fred calls you complaining that every time he opens his internet browser. the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the best way to remove the malware?

Restore Fred's computer back to a previous restore point

Micka, a tech-savy employee, tried to upgrade her computer from Windows 7 to windows 10 from the internet. Something went wrong during the upgrade, and Micka's computer will no longer boot to windows. She has brought her computer to the IT department for you to repair. You have tried to repair the computer, but you are unable to boot to windows. Which of the following methods would be the quicest way to get Micka's computer back to its original windows 7 operating system?

Restore her system using the recovery partition

A system failure has occurred. Which of the following restoration processes would result in the fastest restoration of all data to its most current state?

Restore the full backup and the last differential backup

You want to connect your small company network to the internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of network address translation (NAT) should you implement?

Restricted *Dynamic* Static Shared

You recently discovered several key files of your antivirus program have been deleted. You suspect that a virus has deleted the files. Which type of virus deletes key antivirus program files?

Retro

Bryce's computer is acting unusually sluggish today. He calls you, an IT technician, to see if you can find out what is going on and to improve his computer's performance. You run task manager on Bryce's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following can be used from Task manger to stop the application from running?

Right-click > End Task

Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you can find out what is going on and to improve her computer's performance. You run task manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following actions can you take from task manager to stop the application from running?

Right-click > end task

You have heard about a new malware program that presents itself to user as a virus scanner. When users run the software, it installs itself as a hidden program that has administrator access to various system components. The program then tracks system activity and allows an attacker to remotely gain administrator access to the computer. Which of the following terms best describes this software?

Rootkit

Which of the following is undetectable software that allows administrator-level access? - Trojan horse - Rootkit - Logic bomb - Spyware - Worm

Rootkit Explanation A rootkitrootkit is a set of programs that allows attackers to maintain permanent, administrator-level, hidden access to a computer. A rootkit: • Is almost invisible software • Resides below regular antivirus software detection • Requires administrator privileges for installation, then maintains those privileges to allow subsequent access • Might not be malicious • Often replaces operating system files with alternate versions that allow hidden access A wormworm is a self-replicating virus. A Trojan horseTrojan horse is a malicious program that is disguised as legitimate or desirable software. A logic bomblogic bomb is designed to execute only under predefined conditions and lays dormant until the predefined condition is met. SpywareSpyware is software that is installed without the user's consent or knowledge and designed to intercept or take partial control over the user's interaction with the computer.

When you print from your laser printer, the paper contains faint images from previous printouts. Which of the following components is MOST likely the cause? (Select TWO).

Rubber scraper Fluorescent lamp

Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network?

SaaS

You have recently been called to troubleshoot network connectivity problems at a user's workstation. You have found that the network cable runs across high-traffic areas on the floor, causing the cable to wear through and break. You have replaced cable with a plenum rated, shielded, twisted pair. You would like to minimize the problem and prevent it from happening again. What should you do?

Run the cable through the ceiling area instead of across the floor.

Which of the following activities are typically associated with a penetration test? (Select two.)

Running a port scanner Attempting social engineering

Overclocking

Running the CPU over recommended speed, risks overheating

You are building a new computer and want to purchase a motherboard that has integrated sound with digital audio output. Which of the following ports would you MOST likely find on the motherboard faceplate that indicates digital adio support? Mini-TRS F-type DB-15 Mini-DIN S/PDIF

S/PDIF

You want to purchase a motherboard that has integrated sound with digital audio output. Which port would you likely find on the motherboard faceplate that indicates digital audio support?

S/PDIF Explanation S/PDIF audio is digital audio output. A TOSLINK connector is a connector used by fiber optic digital audio. An RCA connector for audio is also digital audio using coaxial cable. Mini TRS ports on the sound card indicate analogue audio input and output. DB-15 connector on a sound card is used to connect MIDI devices. A mini-DIN connector is used on video cards for S-video input and output. An F-type connector is used for TV input from cable or an antenna.

As network administrator you are asked to recommend a secure method of transferring data between hosts on a network. Which of the following protocols would you recommend? (Select two.)

SCP SFTP

Scuzzy

SCSI small computer system interface storage, has ID 0-7 or 0-15. 0 is priority

Synchronous Dynamic RAM (SDRAM)

SDRAM is synchronized with the system bus clock, allowing it to receive instructions in a continuous flow

Which of the following Internet services provides equal upload and download bandwidth?

SDSL

Which protocol is used to send email messages from a mail client to a mail server?

SMTP

You manage a small network at work. Users use workstations connected to your network. No portable computers are allowed. As part of your security plan, you would like to implement scanning of e-mails for all users. You want to scan the e-mails and prevent any e-mails with malicious attachments from being received by users. Your solution should minimize administration, allowing you to centrally manage the scan settings. Which solution should you use?

SMTP Host based firewall *Network based firewall * DMZ

Which of the following is an WAN technology that allows for interoperability of vendor hardware for fiber optic networking?

SONET

Which of the following is a denial of service attack that: • Subverts the TCP three-way handshake process by attempting to open numerous sessions on a victim server • Intentionally fails to complete the session by not sending the final required packet

SYN flood

Static RAM (SRAM)

SRAM stores data using four transistors for every bit of data. SRAm does not require constant power to maintain the contents of memory

Which of the following BEST describes the features of solid-state drives (SSD) compared to hard disk drives (HDD) SSD can be adversely affected by magnetism SSD opens files faster than HDD SSD stores a large amount of storage cheaply SSD spindles spin in a faster rate than HDD SSD has the best Mean Time before failure SSD uses flash technology to store data

SSD opens files faster than HDD SSD uses flash technology to store data

SFTP uses which mechanism to provide security for authentication and data transfer?

SSH

Telnet is inherently insecure because its communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?

SSH

Telnet is inherently insecure because its communications is in plain text and easily intercepted. Which of the following is an acceptable alternative to Telnet

SSH

What is name of the utility that is (1 similar to Telnet and (2 used to establish a secure remote server management session?

SSH

What is the name of the utility that is (1 similar to telnet and (2 used to establish a secure remote server management session?

SSH

Which of the following can be used to create a secure connection to a remote server?

SSH

Which of the following network services or protocols uses TCP/IP port 22?

SSH

Which of the following protocols can be used to securely manage a network device from a remote connection?

SSH

Which of the following protocols can be used to securely manage a network device from a remote connection?

SSH.

Which of the following is used on a wireless network to identify the network name?

SSID

you have physically added a wireless access point to your network and installed a wireless network card in two laptops running windows. Neither laptop can find the network and you have come to the conclusion that you must manually configure the wireless access points (AP). Which of the following values uniquely identifies the network AP?

SSID

Which of the following features on a wireless network allows or rejects client connections based on the hardware address?

SSID DHCP *MAC address filtering * WPA WEP

Which protocol does HTTPS use to offer security in Web transactions?

SSL

You are purchasing a hard disk over the Internet from an online retailer. What does your browser use to ensure that others cannot see your credit card number on the Internet?

SSL

You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations.

SSL

You can use a variety of methods to manage the configuration of a network router. Match the management option on the right with its corresponding description on the left. (Each option can be used more than once.)

SSL Uses publickey cryptography HTTP Transfers data in clear text SSH Uses publickey cryptography Telnet Transfers data in clear text Console port Cannot be sniffed

Which protocol does HTTPS use to offer greater security for Web transactions?

SSL.

The IT director has asked you to set up an authentication model in which users can enter their credentials one time, yet still access multiple server resources. What type of authentication model should you implement?

SSO (single sign-on) enables users to access multiple servers and multiple resources while entering their credentials only once. The type of authentication can vary but will generally be a username and password. Smart cards and biometrics is an example of two-factor authentication. VPN is short for virtual private network.

Which of the following are denial of service attacks? (Select two.)

Salami *Smurf * *Fraggle* Hijacking

A healthcare organization provides mobile clinics throughout the world and needs to transfer patients' statistical data to a central database via the internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

Which of the following is most susceptible to interference related to atmospheric conditions?

Satellite

You have installed anti-virus software on the computers on your network. You update the definition and engine files and configure the software to update those files every day. What else should you do to protect your systems from malware?

Schedule regular full system scans Educate users about malware

You have installed anti-virus software on the computers on your network. You update thedefinition and engine files, and configure the software to update those files every day. What else should you do to protect your systems from malware?(Select two.)

Schedule regular full system scans. Educate users about malware.

An administrator configures the time machine application on Mac OS computer and develops scripts that use the tar command on Linux computers/ Which of the following best practices is the administrator following?

Scheduled backups

Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her Mac?

Screen sharing

You're troubleshooting a computer that runs windows 10. The operating system has halted, and a blue screen isdisplayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue?

Search for the error in Microsoft's knowledge base

Which security protocols use RSA encryption to secure communications over an untrusted network? (Select two.)

Secure Sockets Layer Transport Layer Security

You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?

Security guards

Marcus was attempting to tweak the way his Windows 10 workstation boots when he inadvertently corrupted his system boot files. It will now no longer boot to a logon prompt. He boots the system from the Windows installation disc and accesses the Recovery Environment. What should he do next?

Select troubleshoot > advanced options > startup repair

What is the primary distinguishing characteristic between a worm and a logic bomb?

Self-replication

An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?

Send the frame out ports 2-8.

Rendering

Sending a new video file to replace the old video file after it has been edited.

Which of the following best describes Bluesnarfing?

Sending anonymous electronic business cards Cloning a mobile device Executing commands on a mobile device *Viewing calendar, emails, and messages on a mobile device without authorization*

One of the components of Simple Network Management Protocol (SNMP) is an alert. Which of the following best describes an SNMP alert?

Sends a message via email or SMS when an event occurs.

SSL (Secure Socket Layer) operates at which layer of the OSI model?

Session

Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?

Session hijacking Fraggle *Smurf * Fingerprinting

What are the most common network traffic packets captured and used in a replay attack?

Session termination File transfer DNS query *Authentication*

What is modified in the most common form of spoofing on a typical IP packet?

Source address

A small business hires an after-hours cleaning service that is known to have a high turnover of employees. They want to prevent unauthorized access to their computers, but do not want to send money on new hardware. Which of the following is the best solution?

Set login time restrictions

Mobile devices in your organization us the access point shown in the figure below to connect to your wireless network. what should you do. select two

Set the channel used by access pint B to 8 Set the access point B to sue 802.11n wireless network

Interface

Shared boundary across 2 components to share information

Which of the following are examples of social engineering

Shoulder surfing Dumpster diving

Which of the following are examples of social engineering? (Select two.)

Shoulder surfing Dumpster diving

After arriving at work, you turn on your computer to begin your day. Instantly, you see smoke and smell a strange odor coming from the computer. What should you do?

Shut off the system immediately

SIMM

Single incline memory module- not used at all, had to be installed in pairs

Which of the statements is true regarding single- and double-sided memory?

Single-sided memory uses half the number of memory modules as double-sided memory of the same capacity.

Form Factors

Size and shape

SODIMM

Small outline dual incline memory module- in laptops

Cluster

Smallest amount of data on the disk that can be written, can be multiple sectors

Bits

Smallest form, how many "lanes" the bus is or width, always a 0 or 1

Which of the following are examples of Type 2 authentication credentials? select two

Smart card Photo ID

Your organization provides employee badges that are encoded with a private encryption key and specific personal information. The encoding is used to provide access to the organization's network. What type of authentication method is being used?

Smart card. Tokens are software-based and could be used with a USB flash drive or could be stored on a mobile device. An example of biometrics is a thumbprint scan or retina scan. Kerberos is an authentication technology used by operating systems such as Windows (often in domain scenarios).

Users report that the Internet is no longer accessible. You suspect that the line connecting your building to the Internet is not working properly. Which of the following allows the service provider to remotely test the local loop?

Smart jack

Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?

Smurf

Which of the following are denial of service attacks? (Select two.)

Smurf Fraggle

Which type of activity changes or falsifies information in order to mislead or redirect traffic?

Snooping Sniffing Spamming *Spoofing*

An attacker is conducting passive reconnaissance on a targeted company. Which of the following could he be doing?

Social engineering Scanning ports *Browsing the organization's website War driving* War dialing

Which type of social engineering attack uses peer pressure to persuade someone to help an attacker?

Social validation

Firmware

Software installed on a chip

Hypervisor

Software such as VM ware or Hyper V, virualizes system hardware then shares it among other computers , enable in BIOS

SSD

Solid State Drive- no moving parts, all circuits, very fast, same technology as an SD card

A router on the border of your network detects a packet with a source address that is from an internal client, but the packet was received on the internetfacing interface. This is an example of what form of attack?

Spamming Sniffing Snooping *Spoofing*

Which of the following solutions would you implement to eliminate switching loops?

Spanning Tree

You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. What feature should your switch support?

Spanning tree

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches?

Spanning tree

Match each Interoperability Agreement document on the left with the appropriate description on the right. Each document may be used once, more than once, or not at all.

Specifies exactly which service will be performed by each party-SLA Creates an agreement with a vendor to provide services on an ongoing basis-BPO Provides a summary of which party is responsible for performing specific task-MOU Documents how the networks will be connected-ISA Defines how disputes will be managed-SLA Specifies a preset discounted pricing structure-BPO

Match each Interoperability Agreement document on the left with the appropriate description on the right. Each document may be used once, more than once, or not at all.

Specifies exactly which services will be performed by each party SLA Creates an agreement with a vendor to provide services on an ongoing basis BPO Provides a summary of which party is responsible for performing specific tasks MOU Documents how the networks will be connected ISA Defines how disputes will be managed SLA Specifies a preset discounted pricing structure BPO

You are configuring the DHCP Relay Agent role service on a Windows server. Which of the following is a required step for the configuration?

Specify which server network interface the agent listens on for DHCP messages.

Megahertz

Speed of DDR (speed X amount)

A router on the border of your network detects a packet with a source address that is from an internal client but the packet was received on the Internetfacing interface. This is an example of what form of attack?

Spoofing

After receiving several complaints from the employees in your company, you start to troubleshoot a laser printer. After a short while, you have concluded that the most probable cause is a dirty drum. Which of the following is the MOST logical reasons for this conclusion?

Spots at regular intervals on the page

What type of malware monitors your actions? - Trojan horse - Worm - Spyware - Virus

Spyware Explanation SpywareSpyware monitors the actions performed on a machine and then sends the information back to its originating source. A virusvirus is a program that attempts to damage a computer system and replicate itself to other computer systems. A wormworm is a self-replicating program that can be designed to do any number of things, such as negatively impacting network traffic. A Trojan horseTrojan horse is a malicious program that is disguised as legitimate software.

VGA Monitor Connector

Square, blue for monitors

Actual Sizes

Standard:12 X 9.6-Desktops MICRO: 9.6 X 9.6 MINI:6.7 X 6.7 NANO: 4.7 X 4.7 PICO: 3.2 X 2.8

Which of the following topoglies connects each network device to a central hub?

Star

You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To increase performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this.

Startup

You have just installed the latest windows updates on your windows 10 computer. After the computer has rebooted, you get the following error message: Error: Windows failed to start. A recent hardware or software change might have caused the issue after you installed windows updates. Since your computer wont start, you have booted your computer into the advanced options section of the windows 10 recovery environment (see image). While troubleshooting this issue, which of the advanced options would be the best to try first?

Startup repair

Which of the following are characteristics of a circuit-level gateway? (Select two.)

Stateless Filters IP address and port *Filters based on sessions* Filters based on URL *Stateful*

While setting up a home office, a technician disables the DHCP service on the office router, but does not want to rely on link-local addressing. Which of the following IP addressing methods should be used?

Static

You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers?

Static

A host on your network that provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address?

Static IP addressing

You have a small network at home that is connected to the internet. On your home network you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow Internet hosts to contact the server to browse a persona Web site. What should you use to allow access?

Static NAT

Which type of virus conceals its presence by intercepting system requests and altering service outputs?

Stealth

Arrange the steps in the Change and Configuration Management process on the left in the

Step 1: Identify the need for a change. Step 2: Conduct a feasibility analysis. Step 3: Define the procedure for implementing the change. Step 4: Notify affected parties of the pending change. Step 5: Implement the change. Step 6: Test the implementation. Step 7: Document the change

Arrange the steps int eh change and Configuration management process on the left in the correct order in which they should be completed on the right.

Step1-Identify the need for a change Step2-Conduct a feasibility analysis Step3-Define the procedure for implementing the change Step4-Notify affected parties of the pending change Step5-Implement the change Step6-Test the implementation Step7-Document the change

Raid Level 1 0

Stripe of mirrors

Raid Level 5

Stripping with parity, at least 3 disks. If one fails, the parity disk will reconstruct the data. 66% of the drive is open, the rest is used by parity

Level 0 Raid

Stripping! taking 1 block to one drive then the 2 block to a second drive, no redundancy

A VPN is used primarily for what purpose?

Support secured communications over an untrusted network.

A VPN is primarily used for what purpose?

Support the distribution of public web documents *Support secured communications over an untrusted network * Allow the use of networkattached printers Allow remote systems to save on longdistance charges

Which of the following is a characteristic of SDSL?

Supports data traffic only (no voice)

Which of the following are characteristics of MPLS?

Supports variable-length data units. Adds labels to data units.

A drivev requires Susan a minimum bandwidth of 400 Mbps and at least 900 milliamps to function. The correct drivers are installed, but the drive is not functioning. Why not? Susan has connected her drive to a USB 2.0 port, which does not have enough power for her drive Susan has connected her drive to a USB 2.0 port, which does not support the maximum bandwidth required

Susan has connected her drive to a USB 2.0 port, which does not have enough power for her drive.

A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the best replacement?

Switch

A virtual LAN can be created using which of the following?

Switch

What device is used to create a physical star topology?

Switch

Which of the following LAN devices receives a signal on one port and forwards that signal only to the port where the destination device is connected?

Switch

When configuring VLANs on a switch, what is used to identify VLAN membership of a device?

Switch port

SD-RAM

Synchronous dynamic ram, tied to system clock like the cpu

Your job functions have recently changed. As a result, you find that you are needing to work with more running programs on your windows 10 computer at a time. Although yo haven't seen these in the past, you are now starting to receive error messages warning you of low virtual memory. However, no additional RAM can be added to your computer. Which of the following control panel utilities would best allow you to eliminate or reduce the number of error messages?

System

You need to enable remote desktop on a user's windows 10 system so that you can manage it over the network from your office. Click the control panel option you use to accomplish this task.

System and Security

System lockups and restarts.. (troubleshoot)

System lockups and restarts can be caused by an overheated processor. Make sure the CPU fan is running, and that you have used thermal paste between the CPU and the heat sink.

A new computer has been added to the sales department and needs to be joined to the corpnet domain. Which of the following system properties settings must be used to make the change?

System properties > computer name

You want to perform a windows update on your windows 10 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update. Which of the following control panel utilities is best to enable and use prior to the update?

System protection

System restore point has been enabled for all volumes on a windows system. Recently, a new network driver was installed on the system. However, the driver code contained bugs and now your network board no longer functions. You are unable to access the internet to download an older version of the driver. You need to revert the system to a prior restore point that was taken before the driver was installed. Click the option you would use to do this.

System restore

Failing CPU Symptoms

System will not boot, OS fails to load, POST parity problems with a number of devices, locks up shortly after startup.

Which of the following correctly describes the T1 carrier system?

T1 lines use two pairs of copper wires. A single T1 channel can transfer data at 64 Kbps.

You are implementing Internet connectivity for a new start-up company. Your client will provide on-line storefronts for retailers. To do this, they have calculated that their Internet connection must provide a data rate of at least 20 - 30 Mbps. Which type of service should you implement?

T3

Which of the following protocols can be used to centralize remote access authentication?

TACACS

Which of the following protocols can be used to centralize remote access authentication? Kerberos EAP CHAP TACACS SESAME

TACACS

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access?

TACACS+ RADIUS

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.) 802.1x EAP PKI TACACS+ RADIUS AAA

TACACS+ RADIUS

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? select two

TACACS+ RADIUS

Which of the following is an authentication and accounting service that uses TCP as its transport mechanism when connecting to routers and switches?

TACACS+ is an authentication, accounting, and authorization service. It uses TCP as its transport mechanism. Kerberos authenticates only, and can use TCP and UDP. RADIUS performs authentication and accounting but uses UDP as the transport mechanism. A captive portal redirects people in an effort to authenticate them. It will often do this within a web browser, and might use TCP (HTTPS), but does not perform accounting services.

When attempting to grant access to remote users, which protocol uses separate, multiple-challenge responses for each of the authentication, authorization, and audit processes?

TACACS+ is the only answer listed that uses separate processes for authentication, authorization, and auditing. That is one of the main differences between it and RADIUS. TACACS is deprecated and is not often seen in the field. LDAP deals with managing directories of information.

Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)

TLS SSL

Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)

TLS// SSL

As you troubleshoot a problem during a customer appointment, you discover the problem is directly related to the customer's actions. Which of the following is the BEST way to address the situation?

Tactfully explain the problem without accusing or judging the customer.

Fan

Takes air from the heat sink to flow air away. Fan faces away from the chip

You manage a Windows system. You want to view information about all of your programs running on your system and sort each program by the amount of memory and CPU that the program uses. Which tool should you use?

Task manager

Your computer has a quad-core processor that supports multithreading installed. Given that the system is running windows, how can you verify whether multithreading has been enabled?

Task manager can display CPU utilization graphs for eight processors.

Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?

Task scheduler

You have an application that you would like to run on your windows workstation every monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?

Task scheduler

You would like to run an application on your windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?

Task scheduler

You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become the victim of a social engineering attack. What should you recommend they do to mitigate the risk?

Teach users how to recognize and respond to social engineering attacks

In which of the following denial of service (DoS) attacks does the victim's system rebuild invalid UDP packets, causing the system to crash or reboot?

Teardrop

Master-boot Record

Tells the system to begin, contains the clock and settings

You are an IT technician for your company and would like to be able to: *establish a remote server management session *Send unencrypted (clear text) transmossion to the remore server *Manage specialized industrial and scientific devices Which of the following utilities would be the BEST to use to accomplish these tasks? RUMBA Telnet xterm SSH PuTTY

Telnet

You are an IT technician for your company and would like to be able to: -Establish a remote server management session -Send unencrypted (clear text) transmissions to the remote server. -Manage specialized industrial and scientific devices. Which of the following utilities would be the best to accomplish these tasks?

Telnet

What is the primary purpose of penetration testing?

Test the effectiveness of your security perimeter

24-pin (20+4 pin) ATX connector

The 24-pin ATX power plug supplies power to the motherboard. -Some 24-pin connectors have one 20-pin plug and 4-pin plug (detachable)/ this allows for backwards compatibility with 20-pin motherboards. -You can plug a 24-pin ATX power plug into a 20-pin motherboard connector, leaving the four pins unconnected. *Older motherboards used 20 pin power plugs. With a 24 pin ATX power plug, the four extra pins supply an additional 3.3, 5, and 12 volts of DC power.

4-pin peripheral power

The 4 pin peripheral power connector (colloquially called a 4-pin Molex connector) is used by legacy components (e.g., IDE hard drives and PATA optical drives), case fans, and other accessory devices. The connector provides both 5 V (red wire) and 12 V (yellow wire). -Each power supply cable typically has multiple 4-pin connectors on the same cable. -When connecting devices, try to balance the devices connected to each cable.

4-pin mini-Molex

The 4-pin mini-Molex connector provides both 5 and 12 volts and is used by floppy drives. *Most modern power supplies do not have a 4-pin mini-Molex connector.

CMOS battery

The CMOS battery is used to keep the RTC going. If clock is not right you need to replace this battery. Nowadays, CMOS data is stored in flash memory chips on the mobo and no longer the CMOS chip.

Which of the following is the main difference between a DoS attack and a DDoS attack?

The DDoS attack spoofs the source IP address. *The DDoS attack uses zombie computers.* The DDoS attack does not respond to SYN ACK packets in the threeway handshake process. The DDoS attack uses an amplification network.

Which of the following is the main difference between a DoS attack and a DDoS attack?

The DDoS attack uses zombie computers.

The hide programs option setting is configured for a specific user as follows: Local Group Policy: Enabled Default domain policy GPO: Not configured GPO linked to the user's organizational unit: disabled. After logging in, the user is able to see the programs option. Why does this happen?

The GPO linked to the user's organizational unit is applied last, so this setting takes precedence.

A laptop has a wired connection to the network and is configured with a static IP address. The link light on the NIC is lit, but the latop can't communicate with any hosts on the local network. Which of the following is the most likely cause of the issue?

The IP address conflicts with another host on the local network.

What does a virtual private network use to connect one remote host to another?

The Internet is used to connect hosts to each other in virtual private networks. A particular computer will probably also use a VPN adapter and/or a network adapter. Modems generally are used in dial-up connections and are not used in VPNs.

SATA power

The SATA power connector has 15 pins and proves 3.3, 5, and 12 volts. As its name implies, it powers SATA devices. -You can use a special adapter to convert a 4-pin peripheral power connector to a SATA connector. -When using an adapter, or on some power supplies, the connector only supplies 5 and 12 volts.

You have just finished replacing the motherboard in your friend Ethan's computer with the same type of motherboard it originally had. You tested the motherboard by powering it on and verifying that the operating system started, and his applications were working. Now Ethan is complaining that his computer no longer recognizes his external hard drive. Which of the following is MOST likely causing the external hard drive not to function? A. The USB front panel connector was not properly connected B. The replacement motherboard does not support external hard drives C. The computer's power supply was not connected properly D. Ethan's hard drive failed.

The USB front panel connector was not properly connected

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and that the audio was frequently out of sync with the video. What is the most likely cause of this poor WAN performance? There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link

The WAN provider is throttling bandwidth on the link.

What is the biggest advantage of 64-bit processors over 32-bit processors?

The ability to use over 4 GB of memory. Explanation The biggest advantage of 64-bit processors over 32-bit processors is in the amount of memory they can use. 32-bit processors have a limit of 4 GB. 64-bit processors have a theoretical limit of 16 EB. 32-bit processors use the IA-32 instruction set (also referred to as x86). Applications typically perform better on 64-bit systems but this is not the biggest advantage. Hyper-threading is a feature of same Intel processors that allows a single processor to run threads (instructions) in parallel as opposed to processing threads linearly, and is not dependent on whether the processor is 32-or 64-bit.

Native Monitor Resolution

The actual grid of a monitor (if the input signal is bigger, it gets converted to fit the native monitor resolution)

A user on your network has been moved to another office down the hall. after the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?

The client system has moved to far away from the access point.

A user on your network has been moved to another office down the hall. After the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?

The client system has moved too far away from the access point.

A user on your network has been moved to another office down the hall. after the move, she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?

The client system has moved too far away from the access point.

When using SSL authentication, what does the client verify first when checking a server's identity?

The current date and time must fall within the server's certificate validity period.

Firmware

The firmware on the mobo is stored on integrated flash memory. Mobos use one of two firmware implementations: BIOS (Basic Input/Output System UEFI (Unified Extensible Firmware Interface)

When you try to boot your computer, it hangs after POST. When you access the CMOS setup program, you see that the date is several years behind and the time is set to 12:01 am. What is the most likely problem? The motherboard battery has failed A RAM module has become unseated from its socket the UEFI firmware is corrupt

The motherboard battery has failed

The user indicated that the LCD screen suddenly became dark and difficult to read while downloading a large file. The determined the backlight has stopped working. Why? The extended download placed high demands on the system DC power; causing the BIOS to shut off. The wireless network card is emitting radio signals that interfere with the backlight The inverter in the LCD assembly has malfunctioned The cold cathode fluorescent lamp has burned out and needs to be replaced. Malware was installed as part of the download

The inverter in the LCD assembly has malfunctioned The cold cathode fluorescent lamp has burned out and needs to be replaced

Which of the following describes the part of the IPv6 address that identifies the subnet address?

The last quartet in the IPv6 address prefix.

Which of the following are true regarding a dual-channel memory bandwidth configuration? (Select two)

The memory controller must support dual-channels. Bandwidth is increased by 5-15%.

When you try to boot your computer, it hangs after POST. When you access the UEFI setup program, you see that the date is several years behind and the time is set to 12:01 am. What is the most likely problem?

The motherboard battery has failed.

A customer wants to add an additional video card to her computer so she can play the latest computer games. Which of the following statements are true of a multi-GPU configuration?

The motherboard should support either SLI or CrossFire. For the best performance, both video cards should be identical. Explanation For increased performance, especially in games, multiple video cards can be linked together using a special bridge clip. This allows multiple GPUs to draw a single screen. For the best performance, both video cards should be identical. In addition, the motherboard must be compatible with either SLI (used by NVIDA cards) or CrossFire (used by AMD cards). Because each card is sharing the processing load, the memory banks and GPU in both video cards are being used. In a multi-GPU configuration, the secondary (bottom) card's display connectors are typically disabled.

Magnetic hard disc actuator

The motor for the actuator arm that goes in between disks to read them

Of the following, which is not a logical method of access control?

The only answer that is not a logical method of access control is biometrics. Biometrics deals with the physical attributes of a person and is the most tangible of the answers. All the rest deal with software, so they are logical methods.

You suspect that an Xmas tree attack is occurring on a system. Which of the following could result if you do not stop the attack? (Select two.) The system will become a zombie

The system will be unavailable to respond to legitimate requests. The threat agent will obtain information about open ports on the system

You are installing a satellite connection so your home office can connect to the internet. Which of the following statements is true?

The satellite dish must be pointed in the correct direction for communicating with the satellite.

A laptop has a weird connection to the network and is configured with a static IP address. The link light on the NIC is lit, but the laptop can't communicate with any hosts on the local network. Which of the following is the most likely cause of the issue?

The static IP address and subnet mask are configured with the wrong network address

Your company security policy requires separation of duties for all network security matters. Which of the following scenarios best describes this concept?

The system administrator configures remote access privileges and the security officer reviews and activates each account

You are the wireless network administrator for your organization. As the size of the organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of preshared keys. You've decided to use LEAP to authenticate wireless clients. To do this, you configured a Cisco RADIUS server and installed the necessary Cisco client software on each RADIUS client. Which of the following is true concerning this implementation?

The system could be made more secure by using a digital certificate only on the RADIUS server. The system encapsulates authentication requests in an SSL/TLS tunnel. *The system is vulnerable because LEAP is susceptible to dictionary attacks. * The system uses the strongest authentication mechanism currently available.

You are the wireless network admin for your org. As the size of the org has grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. You've decided to use LEAP to authenticate wireless clients. To do this, you configured a Cisco RADIUS server and installed the neccessary Cisco client software on each RADIUS client. Which of the following is true concerning this implementation?

The system is vulnerable because LEAP is susceptible to dictionary attacks.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. Which of the following is the most likely cause of her connectivity problems?

The user is out of the effective range of the wireless access point on her floor

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee rom two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor

A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer. The printer seems to work fine for all other users. What is the most likely cause of the problem?

The user is using an incorrect printer driver

Which of the following are true regarding power supply wattage? A system wattage requirment does not depend on the amount of devices in the system. A system wattage requirment equals the highest wattage requirment for a single individual circuit. The watt rating indicates how much power can be supplied to various devices. The wattage requirment for each individual circuit uses formula W = V x A The lower the wattage rating, the more amps a power supply can deliver

The watt rating indicates how much power can be supplied to various devices. The wattage requirment for each individual circuit uses formula W=VxA

Internal connectors

There are a number of connectors on mobos for components such as psu, fans, and LED lights. Computer cases often have front panel ports (USB, FireWire, or audio ports) that need to be connected to the motherboard. These ports are connected to the motherboard's front panel connectors, which are also called headers.

You have two switches connected together as shown in the following diagram. How many broadcast domains are there in the network shown?

There are two broadcast domains. Each VLAN is in its own broadcast domain. When connecting devices to a switch, each switch port connection is in its own collision domain.

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Up What is the most likely cause of this WAN issue?

There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link.

TFT

Thin Film Transistor, for LCD screen, uses thin layers to make the image

You have several users who want to work from home by connecting to a server running at the corporate headquarters. Which of the following PC's would work BEST? CAD/CAM workstation Tablet Thin client Thick client

Thin client

What is the purpose of an MSDS?

To document how to safely handle and dispose of hazardous materials.

What purpose does a wireless site survey serve? (Choose two)

To identify existing or potential sources of interference. To identify the coverage area and preferred placement of access points.

Why should backup media be stored offsite?

To prevent the same disaster from affecting both the network and the backup media

Why should backup media be stored offsite?

To prevent the same disaster from affecting both the system and its associated backup media.

Voltage Switch

To switch between power supplies depending on the outlet

Which of the following is an example of three-factor authentication?

Token device, keystroke analysis, cognitive question

The ink light on a workstation is not lit, and there is no connnectivity after replacing the the patch cable with onw that is known to be good. What tool should be used? Crimper Punchdown tool Tone generator Cable Tester

Tone generator

While investigating a network connectivity issue, a technician finds that the link light on a workstation is not lit, and there is no connectivity after replacing the patch cable with one that is known to be good. The wall jack is not labeled, and within the switch room, none of the cables or patch panel ports are labeled. Which of the following tools would the technician most likely use next?

Tone generator

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the united states. Users have been complaining that they are unable to acccess resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. To troubleshoot the routers, which of the following TCP/IP utilities would be best to use?

Tracert

A user named Bob Smith has been assigned a new desktop workstation to complete his day-to-day work. The computer runs Windows 7. When provisioning Bob's user account in your organization domain, you assign an account name of BSmith with an initial password of bw2Fs3d. On first logon, Bob is prompted to change his password, so he changes it to Fido, the name of his dog. What should you do to increase the security of Bob's account?(select two)

Train users not to use passwords that are easy to guess. Require users to set a stronger password upon initial logon.

Purchasing insurance is what type of response to risk?

Transference

Purchasing insurance is what type of response to risk? Rejection Acceptance Deployment of a countermeasure Transference

Transference

Which of the following are characteristics of SONET?

Transport protocol used for other traffic types. Dual counter-rotating fiber optic rings.

TPM

Travel Platform Module, goes on motherboard, if someone steals it they need to know the key to get in.

Which is a program that appears to be a legitimate application, utility, game, or screensaver and performs malicious activities surreptitiously? - Trojan horse - Outlook Express - ActiveX control - Worm

Trojan horse Explanation A Trojan horse is a program that appears to be a legitimate application, utility, game, or screensaver, but performs malicious activities surreptitiously. Trojan horses are very common on the internet. To keep your systems secure and free from such malicious code, you need to take extreme caution when downloading any type of file from just about any site on the internet. If you don't fully trust the site or service that is offering a file, don't download it. Outlook Express is an email client found on Windows. A worm is a type of malicious code similar to a virus. A worm's primary purpose is to duplicate itself and spread, while not necessarily intentionally damaging or destroying resources. ActiveX controls are web applications written in the framework of ActiveX.

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?

Trunk ports

As the victim of a Smurf attack, what protection measure is the most effective during the attack?

Turn off the connection to the ISP *Communicate with your upstream provider* Block all attack vectors with firewall filters Update your antivirus software

What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?

Turnstiles

Of the following, what two authentication mechanisms require something you physically possess?

Two of the authentication mechanisms that require something you physically possess include smart cards and USB flash drives. Key fobs and cardkeys would also be part of this category. Certificates are granted from a server and are stored on a computer as software. The username/password mechanism is a common authentication scheme, but it is something that you type and not something that you physically possess.

Which of the following is an example of two-factor authentication?

Two-factor authentication (or dual-factor) means that two pieces of identity are needed prior to authentication. A thumbprint and key card would fall into this category. L2TP and IPsec are protocols used to connect through a VPN, which by default require only a username and password. Username and password is considered one-factor authentication. There is no client and server authentication model.

I/O Connectors

Typically: PS/2 mouse and keyboard ports USB ports Serial ports Parallel Ports audio jacks ethernet port

You are a software developer and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP networks. Which transport protocol should your application use to send data between the clients and the server?

UDP

Which of the following is the best countermeasure against maninthemiddle attacks?

UDP *IPsec* MIME email PPP

What is the greatest threat to the confidentiality of data in most secure organizations?

USB devices

What is the greatest threat to theft of data in most secure organizations? USB devices Hacker intrusion Malware Operator error

USB devices

When a cryptographic system is used to protect the confidentiality of data, what is actually protected?

Unauthorized users are prevented from viewing or accessing the resource

Which of the following are characteristics of VDSL?

Unequal download and upload speeds. Supports both data and voice at the same time.

A notebook that you previously purchased was shipped with SODIMM memory to accommodate the notebook's form factor. You would like to upgrade the memory. Which of the following is an upgrade to the SODIMM standard?

UniDIMM

UniDIMM

UniDIMM (Universal DIMM) is a specification for DIMMs and is designed to carry DRAM chips

UEFI

Unififed Extensible Firmware Interface. Apple. Newer, bios but more. Any size, lets you change bios settings, 62 gb instruction, use mouse instead of keyboard, add ram to chip, can spread firmare data to file system

USB

Universal Serial Bus, 3.0= 5 Gbs

In a secure environment, which authentication mechanism performs better?

Unlike RADIUS, TACACS+ (Terminal Access Controller Access-Control System Plus) encrypts client-server negotiation dialogues. Both protocols are remote authentication protocols

Of the following, which best describes the difference between RADIUS and TACACS+?

Unlike RADIUS, TACACS+ separates authentication, authorization, and auditing capabilities. The other three answers are incorrect and are not differences between RADIUS and TACACS+.

Touchpad does not move the curser, but the USB mouse does Before checking the laptop case to re-check the connection, which of the following actions should the technician perform? Perform a minimal boot of the operating system so that device drivers are not loaded Increase the operating system's mouse speed setting Unplug the USB mouse and re-check touchpad movements. Toggle the scroll lock key on the keyboard

Unplug the USB mouse and re-check touchpad movements

You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?

VPN concentrator

You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You check the motherboard documentation and purchase the fastest processor supported by the motherboard. However, when you start the computer, it beeps regularly and nothing is displayed on the screen and it doesn't start. What should you do first?

Update the UEFI firmware

If your anti-virus software does not detect and remove a virus, what should you try first?

Update you virus detection software.

Flash

Updating firmware

Your motherboard has two memory slots and supports a maximum of 8 GB of RAM. After installing two 4 GB modules and booting your system, you find that Windows only recognizes 3.5 GB of RAM. What should you do?

Upgrade to a 64-bit version of Windows.

Flashing BIOS

Upgrading it

While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?

Use a different channel ID

You manage a network with a single switch. All host connect to the network through the switch. You want to increase the security of devices that are part of the accounting dept. You want to make sure that broadcast traffic sent by an accounting computer is only received by the other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network. What should you do?

Use a router to configure a subnet for the accounting computers.

You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by accounting computers is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network. What should you do? Use a router to configure a subnet for the accounting computers. Configure a VLAN on the switch for the accounting computers. Implement NAC with 802.1x authentication for the accounting computers. Configure MAC address filtering on the switch for the accounting computers.

Use a router to configure a subnet for the accounting computers.

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires and ID card to gain access...What should you do to increase the security of this device?

Use a stronger administrative password

You need to connect a monitor that provides an HDMI port and a VGA port to a video adapter in a PC system that uses a DVI-D connector. Which option would provide the best display quality at the lowest cost?

Use an adapter to connect the monitor HDMI port to the DVI-D connector on the PC. Explanation Using an adapter to connect the DVI-D connector on the video adapter to the HDMI port would provide the best quality output at the lowest cost. Because DVI-D and HDMI both use digital signalling, the signal is not degraded during conversion. In fact, HDMI was specifically designed to support DVI-D signalling. DVI-D to HDMI converters can be purchased for less than $20.00 USD. Using a DVI-D to VGA adapter would allow you to connect the video board to the monitor, however, this type of adapter must convert digital signals to analogue signals, which would likely degrade the signal slightly. Purchasing a new monitor with a DVI-D port would provide a high-quality signal but would coat much more that the other alternatives.

You're conducting scheduled maintenance on a laser printer. You notice that there is a build-up of excess toner inside the interior of the printer. Which of the following is the BEST way to remove the excess toner?

Use an anti-static vacuum.

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement?

VPN concentrator

You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?

Use cable locks to chain the laptops to the desks

You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?

Use cable locks to chain the laptops to the desks

You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use?

Use firewalls to create a DMZ. Place the web server and the private network inside the DMZ. *Use firewalls to create a DMZ. Place the web server inside the DMZ and the private* *network behind the DMZ.* Use a single firewall. Put the web server in front of the firewall and the private network behind the firewall. Use a single firewall. Put the web server and the private network behind the firewall.

You are the network administrator for a growing business. When you were initially hired, the organization was small and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?

Use syslog to implement centralized logging.

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? (Select two.)

Use task manager to monitor memory utilization Use resource monitor to monitor memory utilization

A customer has called and indicated that he thinks his neighbor is connecting to his wireless access point (AP) to use his highspeed internet connection. Which of the following will resolve this issue? (Select two.)

Use the AP configuration utility to change the signal channel Upgrade to an 802.11g AP Install radio signal jamming equipment between his house and the neighbor's house *Implement MAC address filters* *Disable SSID broadcast on the AP*

How can you keep a Windows 10 system from automatically restarting after a critical system error occurs?

Use the Disable automatic restart after failure option on the Advanced Startup Options menu.

How can you keep a windows 10 system from automatically restarting after a critical system error occurs?

Use the Disable automatic restart after failure option on the advanced startup options menu

For the past several days, the print jobs from the inkjet printer are missing colors and leaving gaps. Which of the following will MOST likely resolve the problem?

Use the automatic print head cleaning feature.

A customer who uses a Windows computer recently purchased an inkjet printer from your store. She is now calling to complain that the colors in the photos she printed on her new printer don't match the colors in the original photos created by the photo shop. Which of the following actions will MOST likely resolve the issue? (Select TWO).

Use the color management tab of the printer driver to calibrate the driver's color settings download and install the latest printer drivers

Direct Current

Used by devices. always goes in 1 direction

Alternating Current

Used by homes and business, direction flow changes. 50-60 Hertz, 110-230 voltage

Which of the following transport layer TCP/IP suite protocols is MOST likely used for this service? User Datagram Protocol (UDP) Internet control message protocol (ICMP) Transport Layer protocol (TCP) File transfer protocol (FTP)

User Datagram Protocol (UDP)

which windows component prompts the user for credentials or permission to protect against unauthorized activities, such as an unintended software installation

User account control (UAC)

What is the best countermeasure against social engineering?

User awareness training

You have installed anti-virus software at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measure to help prevent this from happening again?

User awareness training

You have installed anti-virus software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measures to help prevent this from happening again?

User awareness training

Which of the following are true concerning the Virtual Desktop Infrastructure (VDI)? select two

User desktop environments are centrally hosted on servers instead of on individual desktop systems. In the event of a widespread malware infection, the administrator can quickly reimage all user desktops on a few central servers.

Which of the following identifications and authentication factors are often well-know or easy to discover by others on the same network or system?

Username

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only minimum rights necessary on the computer. Which group should this user be a member of?

Users

Phising.

Users on your network report that they have received an e-mail stating that the company has just launched a new Website for employees, and to access the Website they need to go there and enter their username and password information. No one in your company has sent this email. What type of attack is this?

Which of the following are characteristics of TACACS+? (Select two.) Uses TCP Allows for a possible of two different servers, one for authentication and authorization, and another for accounting Allows for a possible of three different servers, one each for authentication, authorization, and accounting Uses UDP

Uses TCP port 49, Allows for a possible of three different servers, one each for authentication, authorization, and accounting

Which of the following are characteristics of ATM?

Uses fixed-length cells of 53-bytes. Adds labels to data units.

Which of the following statements about SSL VPN are true? select two

Uses port 443 Encrypts the entire communication session

Modum

Uses telephone cable

AMD's standard of virtualizing

V

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive doc. on a computer that would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you implement?

VLAN

Your company is a small start-up company that has leased office in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides Internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented?

VLAN

Your company is a small startup company that has leased office space in a building shared by other business. All business share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implmented?

VLAN

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet Access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement?

VLANs

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. Which solution should you use?

VPN concentrator *Host based firewall * Proxy server Network based firewall

Intel's standard of virtualizing

VT-X

Which of the following CCTV camera types lets you adjust the distance that the camera can see?

Varifocal

A user has called to complain that her computer won't boot. It stops on the system startup screen right after the memory has been tested and displays a 301 keyboard error. What should you do first?

Verify that no keys are being pressed down during POST.

You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you are to go to a website and enter your username and password at a new website so you can manage your email and spam using the new service. What should you do?

Verify that the email was sent by the administrator and that this new service is legitimate

You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that, as part of a system upgrade, you are to go to a website and enter your user name and password at a new website so you can manage your email and spam using the new service. What should you do?

Verify that the email was sent by the administrator and that this new service is legitimate.

A customer has brought a computer in to be repaired. He said he thinks that the sound card has stopped working because no audio is produced when music, video, or DVDs are played. Which troubleshooting step should you take first?

Verify that the speakers are plugged into the correct jack and are powered on. Verify that the volume isn't muted. Explanation You should first verify that the speakers are plugged in correctly and powered on. You should also verify that the volume isn't muted in the operating system. Before investigating more complex possibilities, you should always check the obvious first when troubleshooting computer problems. The other actions might need to be performed if checking the obvious solutions does not correct the problem.

Which of the following is another name for the paging file?

Virtual memory

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Verify that your network's existing security infrastructure is working properly. Install the latest firmware updates from the device manufacturer.

You've just received an email message explaining that a new and serious malicious code threat is ravaging across the internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system. In response to this message, which action should you take first?

Verify the information on well-known malicious code threat management websites

Which of the following paper types should not be used in inkjet printers?

Very glossy paper

X16 Slot

Video

Which of the following are good practices for tracking user identities?

Video cameras enable a person to view and visually identify users as they enter and traverse a building. Key card access systems can be configured to identify a person as well, as long as the right person is carrying the key card!

Explanation

Video cards process graphical information for output to an external display. Video cards can be implemented as a dedicated expansion board or integrated with other components (e.g., the motherboard or CPU). Dedicated video cards: - Are installed in an expansion slot on the motherboard. -Have a GPU and a dedicated, high-speed video memory bank. - Are more powerful than integrated video cards, but are also more expensive. Integrated video cards: - Integrate the GPU with another hardware component (e.g., a motherboard or CPU) - Share system memory for graphic processing. - Are much cheaper than dedicated video cards, but are also less powerful.

What is the purpose of the services snap-in?

View and manage software programs running in the background

What is the purpose of the dxdiag tool?

View information related to DirectX operation

Recently, a Windows 10 update was automatically download and installed on your Windows 10 system. After you install the update, your contact manager database application no longer works correctly. You want to uninstall the latest updates to see if the application starts working again. Click the option you would use in the settings app to do this.

View your update history

Which of the following terms describes a test lab environment that does not require the use of physical hardware?

Virtual Sandbox

You are the network technician for a small company. One of your responsibilities is to ensure that all new hardware is connected and functioning properly. You have several different types of connections that are used for various types of hardware. One of the types of cable available to you is an RJ45 cable. Which of the following best describes where this cable would most likely be used?

Voice over IP connection

Using a multimeter or power supply tester..

Voltage levels should be within +/- 5% of normal. If they aren't, the power supply is bad or failing and should be replaced.

Voltage

Volts, force of electricity, strength of power (hose=low power, power house= high power)

What is the main difference between vulnerability scanning and penetration testing?

Vulnerability scanning is performed within the security perimeter; penetration testing is performed outside of the security perimeter.

Which of the following provides security for wireless networks?

WPA

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

WPA2 TKIP WPA *RADIUS*

Which of the options wll provide the most secure access? WEP 128 WPA and TKIP WPA and AES WPA2 and AES WPA2 and TKIP

WPA2 and AES

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?

WPA2 and AES

You are concerned about sniffing attacks on your wireless network. Which of the following implementations offers the best countermeasure to sniffing?

WPA2 and AES

What is the difference between UXGA and WUXGA displays?

WUXGA has a widescreen aspect ratio.

Daily backups are done at the ABD company location and only a weekly backup is maintained at another network location. Which of the following disaster recovery strategies is ABD using?

Warm Site

Daily backups are done at the ABD company location and only a weekly backup is maintained at another network location. Which of the following disaster recovery strategies is ABD using?

Warm site

RAMBUS

Was suppose to be the next best thing, it wasn't, by Intel

Liquid cooling

Water in tubes absorbs heat from the chip, blows away through the fan, then it cools, cycles on

Replacing a cmos battery

Wear special gloves, turn computer totally off, take it out for 20 then put the new one in.

You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?

Web server, email server

You manage a Web site for your company. The Web site uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which components represent a single point of failure?

Website storage

You manage a website for your company. The Web site uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure?

Website storage

You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a dingle power supple. Considering the availability of your website, which component represents a single point of failure?

Website storage

You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure? Power supply Website storage Network adapter Web server

Website storage

You have configured your organization's DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. A user's workstation is powered on and receives addressing information from this DHCP server Monday morning at 8:00 AM. When will the client contact the DHCP server to renew the lease (by default)?

Wednesday morning

A senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. The email was sent from someone she doesn't know, and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of an attack best describes the scenario?

Whaling

A senior executive reports that she received a suspicious email concerning a sensitive, internal project that is behind production. The email is sent from someone she doesn't know and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of an attack best describes the scenario?

Whaling

Virus.

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

Facilitate communication between the processor, memory components, and peripheral devices.

What is the function of the chipset on the motherboard?

A worm can replicate itself and does not need a host for distribution.

What is the main difference between a worm and a virus?

Awareness.

What is the primary countermeasure for social engineering?

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header.

Flux Reversal

When a magnetic hard disk switches the 0 and 1

Burn In

When an image is stuck to the screen

XX AND DOWN Cold Boot

When the computer first starts up

When would choosing to do nothing about an identified risk be acceptable?

When the cost of protecting the asset is greater than the potential loss

When is choosing to do nothing about an identified risk acceptable? When the cost of protecting the asset is greater than the potential loss. When the threat is most likely to come from an internal source instead of an external source. When the threat is likely to occur less than once a year. When the asset is an intangible asset instead of a tangible asset.

When the cost of protecting the asset is greater than the potential loss.

Denial of Service attack.

Which is a form of attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occuring?

Dumpster diving. Shoulder surfing.

Which of the following are examples of social engineering?

To translate between Internet IP addresses and the IP addresses on your private network

Which of the following are good reasons to enable NAT? • To translate between Internet IP addresses and the IP addresses on your private network • To cache web pages • To limit public access to just your DHCP server instead of your whole network • To prevent hackers from accessing your network

CMOS battery

Which of the following components is necessary to save system settings when you power off the computer?

Hard disk LED light Power switch

Which of the following connectors are part of the system case and connect to header pins on the motherboard? (Select two.)

A false server intercepts communications from a client by impersonating the intended server.

Which of the following describes a man-in-the-middle attack?

169.254.0.1 - 169.254.255.254

Which of the following is NOT one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT router? • 10.0.0.1 - 10.255.255.254 • 192.168.0.1 - 192.168.255.254 • 169.254.0.1 - 169.254.255.254 • 172.16.0.1 - 172.31.255.254

Smurf.

Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?

Lower overall system cost

Which of the following is an advantage to purchasing a computer with video and audio integrated onto the motherboard?

It infects the MBR of a hard drive.

Which of the following is not a primary characteristic of a worm?

IPSec.

Which of the following is the best countermeasure against man-in-the-middle attacks?

Give VoIP network traffic higher priority and more bandwidth than HTTP (web browser) traffic.

While configuring a SOHO (Small or Home Office) for one of your customers, you decide to enable quality of service (QoS). Which of the following is the BEST example of a network feature that could now be implemented? • Cause all incoming traffic to be forwarded to the specified DMZ host. • Enable devices to easily discover each other on the network and share data and media content. • Give VoIP network traffic higher priority and more bandwidth than HTTP (web browser) traffic. • Prevent hosts from accessing specific websites or using a specific internet service, such as chat, torrent, or gaming applications.

Drag each penetration test characteristic on the left to the appropriate penetration test name on the right.

White box test The tester has detailed information about the target system prior to starting the test. Grey Box test The tester has the same about of information that would be available to a typical insider in the organization. Black box test The tester has no prior knowledge of the target system. Single blind test Either the attacker has prior knowledge about the target system, or the administrator knows that the test is being performed. Double blind test The tester does not have prior information about the system and the administrator has no knowledge that the test is being performed

DVI

White, digital hi resolution, 30 pins

Contrast Ratio

Whitest white verses the blackest black, the higher the better

Aspect Ratio

Width of the image to its height

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found it applications, you are concerned that your windows 10 computers may be vulnerable. You also want to ensure that windows is using the latest features. Which of the following would best protect your computers?

Windows updates

Which of the following types of penetration test teams will provide you information that is most revealing of a real-world hacker attack?

Zero knowledge team

Which of the following is true when the DHCP setting is disabled in a wireless network?

Wireless clients must use a static IP address within the correct IP address range to connect to the network.

WLAN

Wireless to network, includes antenae

Which type pf documentation would you consult to find the location of RJ-45 wall jacks and their endpoints in the intermediate distribution closet?

Wiring Schematic

Which of the following documents would likely identify that drop cables on your network use the T568A standard?

Wiring Schematics

Which of the following documents would likely identify that drop cables on your network use the T568A standard? Baseline Wiring schematic Policy Network diagram Change log

Wiring schematic

Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet? Policy Procedure Baseline Wiring schematic

Wiring schematic

You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update?

Wiring schematic

You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update? Logical network diagram Wiring schematic Procedure Baseline

Wiring schematic

You are troubleshooting the connection of a computer in an office to the punch down block in the distribution closet. Which document would you consult to identify the termination of the cable on the punch down block based on the wall jack location in the office? Logical network diagram Regulation Procedure Wiring schematic

Wiring schematic

PCIe

With expansion bus is best for high-speed, high-resolution, three-dimensional graphics?

Watts

Workload. Volts X Amps

Standoffs

You are in the process of installing a motherboard in a system case. Which of the following objects would you place between the motherboard and the system case?

Which of the following best describes the proper method and reason to implement port security?

You can achieve port security by applying a security control (such as 802.1X), which ties specific physical ports to end-device MAC addresses and prevents additional devices from being connected to the network. Note that port security solutions such as 802.1X are data link layer technologies (layer 2) so they deal with MAC addresses, not IP addresses. You wouldn't want to exclude all devices from being connected to the network as this would cause a severe problem with connectivity.

A system board has four 32-bit RIMM slots. You have installed one RIMM. Which of the following are correct? (Select two.)

You can complete the installation by installing three continuity modules. You can complete the installation by installing three more RIMMs.

Return the motherboard and replace it with a BTX form factor motherboard. Purchase an ATX form factor case.

You decided to upgrade your PC to use a faster processor. To do this, you ordered a new motherboard over the Internet that supports the processor you want to use. However, when it arrives, you discover that the motherboard uses the ATX form factor. You're a sissy PCs case uses the BTX form factor. What options do you have in this situation

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select TWO.)

You expose your company to litigation by violating the software license agreement. You risk losing your job.

Connect the power button to the motherboard.

You had just replaced the motherboard in your computer. Now your computer would not start. You press the power button on the system case, but nothing happens; there are no sounds all lights. What should you do?

• 192.168.12.253 • 172.18.188.67 • 10.0.12.15

You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select three.) • 240.12.188.1 • 224.15.166.12 • 192.168.12.253 • 172.18.188.67 • 32.188.99.10 • 10.0.12.15 • 127.0.0.1

• Preshared key • TKIP encryption

You have a small wireless network that uses multiple access points. The network uses WAP and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer ot the wireless network. Which of the following parameters will you MOST likely need to configure on the laptop? (Select two.) • AES encryption • Preshared key • TKIP encryption • Channel • BSSID

• Configure each client with the same key. • Implement WPA2-AES.

You have a small wireless network with less than 50 client computers. You upgraded the hardware on two wireless devices so you can use a better security standard than WEP. Now you need to implement the new security standard. You need the greatest amount of security with the least amount of effort and without replacing any of the wireless infrastructure. Which of the following steps would you MOST likely perform? (Select two.) • Configure each client with the same key. • Implement WPA2-AES. • Implement WPA-PSK. • Implement WPA2-Enterprise. • Configure each client to use a different key.

Install a network virus detection software solution.

You have worked as the network administrator for a company for seven months. One day all picture files on the server become corrupted. You discover that a user downloaded a virus from the Internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation does not reoccur. What should you do?

While using a Windows 10 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to a point in time before the malware infection occurred. Given this information, which of the following are true? (Select TWO).

You must reinstall any applications that were installed after the restore point was taken. Your user files were not affected when the system was reverted to the restore point.

WPA2

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement? • WEP • WPA2 • WPA • Kerberos

You are talking with a customer support technician on the telephone. The technician recommends downloading a particular driver from Internet. When you try to connect to the Internet using your modem, you can't What is the problem?

You need to hang up.

Update the firmware

You recently installed a wireless router in a small home office. One of your main goals is to avoid security holes and bugs. Which of the following tasks would you MOST likely perform on the router? • Enable NAT • Update the firmware • Configure port triggering • Configure the DHCP service

The power supply in a tower server system had malfunctioned. To get the server back on line, you decide to open the server case and open it. You place the server on a static mat, ground the server's case to the mat, and then ground yourself to the mat with a wrist band. Next you remove the power supply unit from the server and open it up. To identify which component has failed you plus in the power supply to the wall outlet and then use a multimeter to test the various components within it. Which safety rules were violated during this scenario? (select two)

You should unplug a device from the wall outlet before connecting yourself to it with a static wristband. You should never open a computer power supply.

In which of the following situations would you most likely implement a demilitarized zone (DMZ)?

You want internet users to see a single IP address when accessing your company network. You want to encrypt data sent between two hosts using the internet. *You want to protect a public web server from attack.* You want to detect and respond to attacks in real time.

In which of the following situations should you install a firewall?

You want to restrict internet users from accessing private data on your network.

In which of the following situations would you use port security?

You wanted to restrict the devices that could connect through a switch port

Using the ipconfig command, you've verified that the workstaton is receiving correct IP address parameters. You tried entering tracert 137.65.1.2 at a command prompt and found that you're able to reach this server on the internet without any issues. Which of the following is MOST liekly causing this issue? Automatic Private IP Addressing (APIPA) has assigned a non-routable IP address to your workstation. Your ISP's DSL service may be down The SOHO router isn't working properly Your ISP's DNS server is down

Your IPS's DNS server is down

You're trying to access your office network with your Windows workstation from home using your organization's virtual private network (VPN). Your DSL modem has connected to your ISP, but you can't connect to your office network. You issue the ipconfig command from the command prompt and learn that your system has been assigned an IP address of 169.254.1.12. What's causing the problem?

Your ISP's DHCP server isn't working

Rogue Access Point.

Your company security policy states that wireless networks are not to be used because of the potential security risks they present to your network. One day you find that an employee has connected to a wireless access point to the network in his office. What type of security risk is this?

You have just downloaded a file. You created a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?

Your copy is the same as the copy posted on the website

Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does not go away. What is the MOST likely problem?

a corona wire is dirty

Multi-core

a multiple core processor has multiple processors within a single processor package. --dual core, triple core, and quad core processors are typical in desktop systems --multi core systems enable the operating system to run multiple applications simultaneously. without multiple processors, applications appear to run at the same time, but must wait their turn for processing time from the single processor. --some applications can be written to execute on multiple processors at the same time. --some motherboards use tow processor sockets to provide a multiple processor solution. multi core processors use a single motherboard socket to support multiple processors.

Which characteristic of a switch can improve bandwidth utilization and reduce the risk of sniffing attack on the network?

a switch filters port traffic based on MAC address

Consider the memory modules shown in the image below. Drag the label on the left and drop it on the letter on the right that best identifies the associated memory module form.

a) DDR DIMM b) DDR3 DIMM c) DDR4 DIMM d) DDR2 DIMM e) 200-pin SODIMM f) 144-pin SODIMM g) UniDIMM

Defines an employee's rights to use company property.

acceptable use policy

Sets expectations for user privacy when using company resources.

acceptable use policy

You manage two folders in your computer as follows: • C:\Confidential • D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: • Reports.doc • Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: • Move Reports.doc from C:\Confidential to D:\PublicReports. • Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?

allow full control to both

virtualizations

allows a single physical machine to run multiple virtual machines. appear to be self-contained and separate physical systems. --performed by adding a layer between the physical system and the operating system. this layer acts as the hardware to the guest system. --early virtualization was performed by software only. newer virtualization uses special instructions supported by the processor to improve performance. --VMware is the most popular virtualization solution. Microsoft has several virtualization products including virtual pc, virtual server, and hyper-v

You are concerned about protecting your network from network based attacks from the internet. Specifically you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?

anomaly based IDS

What is the most common form of host based IDS that employs signature or pattern matching detection methods?

anti-virus software

You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

apt -get install httpd

Which of the following switch attacks associates the attacker's MAC address with the IP address of the victim's device.

arp spoofing/poisoning

You are working at the command line and want to add the read-only attribute to a file and remove the hidden attribute. which command would you use?

attrib +r -h

AAA stands for

authentication, authorization, and accounting

You have just received a call from one of your customers. He informs you that after turning his computer on, he recieved the following error: Error loading operating system BOOTMGR is missing Press Ctrl+Alt+Del to restart. Every time he restarts his computer, the same error is shown. Which of the following tools is best for fixing this issue?

bootrec

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidently delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would BEST protect Lily's files?

back up her files using file history

While developing a network application, a programmer adds functionally that allows her to access the running program, without authentication, to capture debugging. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. What type of security weakness does this represent?

backdoor

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?

boot the computer from the windows installation disc and run startup repair

You have just received a call from one of your customers. He informs you that after turning his computer on, he received the following error: Error loading operating system BOOTMGR is missing Press Ctrl+Alt+Del to restart Every time he restarts his computer, the same error is shown. Which of the following tools is BEST for fixing this issue?

bootrec

If maintaining confidentiality is of the utmost importance to your organization, what is the best response when an intruder is detected on your network?

disconnect the intruder

You are troubleshooting a windows 10 system that won't boot. The system appears to initialize just fine and post completes correctly. However, Windows doesn't load, and an error message is displayed on the screen, indicating the operating system couldn't be found. You determine that the master boot record (MBR) is corrupt. To fix the issue, you do the following: 1: Boot the system from the windows 10 installation DVD. 2. Access the recovery environment 3. Open a command window. Enter the command you can run at command prompt to address this issue.

bootrec /fixmbr

Power supply can be turned on by.. (multimeter)

bridging (shunting) pin 16 and a ground pin (i.e., pin 15 or 17) with a bent paperclip

Which of the following topologies connects all devices to a trunk cable?

bus

What is a typical goal of MAC spoofing?

bypassing 802.1x port-based security

Random Access Memory (RAM)

can be classified as one of two types: DRAM SRAM

Who needs to approve a change before it is initiated? (Select TWO.)

change board client or end user

Which of the following disk maintenance utilities optimizes the performance of your hard drive by verifying the file system integrity of a hard disk and fixing the errors it detects?

check disk

Which of the following utilities checks the disk for bad clusters?

chkdsk

You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?

circuit level

Identifies a set of rules or standards that define personal behaviors.

code of ethics

You have just installed a new video card in Mark's computer. When you power on the computer, Windows automatically detects the new device and tries to locate an applicable device driver. Unfortunately, Windows cannot locate the required driver. Which of the following would be the BEST administrative tool to fix Mark's computer?

computer mangement

Which of the following is privilege escalation?

creeping privileges

Which utility would you use to view current connections and active sessions and ports on a computer?

netstat

Nathan, a long-time Mac user, has been using his Mac computer for some time now with no issues. Recently, however, he reported that his Mac will unexpectedly tell him that his computer must be restarted by holding down the Power button for several seconds or by pressing the Restart button. Assuming that this is a symptom of kernel panic, which of the following steps would be the BEST first step for troubleshooting this issue?

do a safe boot

Since it has no moving parts, a CPU will usually work properly for several years. Which of the following is a common factor that MIGHT cause a CPU to fail prematurely?

electrostatic discharge (ESD)

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?

email filtering

You have configured a NIDS to monitor network traffic. Which of the following describes an attack that is not detected by a NIDS device?

false negative

hyper threading

feature of some Intel processors that allows a single processor to run threads(instructions) in parallel, as opposed to processing threads linearly. enables a processor to execute two threads at the same time for example a quad core intel system that supports hyper threading, can execute 8 threads at a time

When you print from your laser printer, the paper contains faint images from previous print-outs. Which componentsshould you check? (Select two.) Primary corona wire transfer roller fluorecent lamp secondary corona wire rubber scraper

fluorecent lamp rubber scraper

The trim functionality has not been automatically enabled on the drive bay. Which of the following must you use to enable this feature? bootrec /rebuildcd fsutil behavior set DisableDeleteNotify 0 fsutil behavior query DisableDeleteNotify chkdsk E: /R

fsutil behavior set DisableDeleteNotify 0

A mobile device user is comparing methods for securing the device. Which of the following methods for securing a mobile device can affect the device's performance?

full device encryption

After removing the printed paper from your laser printer, the toner smudges and can be wiped off in places. Which of the following is the MOST likely problem?

fuser rollers

Roll back

going back to an older software

You are an IT administrator troubleshooting a windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed. Which of the following is the best command line tool to run to accomplish this task?

gpupdate

Which TCP/IP utility gives you the following output?

netstat -r

What do host based intrusion detection systems often rely upon to perform their detection activities?

host system auditing capabilities

What characteristic of hubs poses a security threat?

hubs transmit frames to all hosts on all ports

continued--

hyper threading is not the same as multi threading. Multi threading is a feature of an application that allows it to send multiple threads at the same time. applications are typically written to support multithreading to take advantage of multiple cores or hyper threading features.

You are in the process of configuring an iSCSI storage area network (SAN) for your network. You want to configure a Windows Server 2012 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use?

iSCSI Initiator

Which of the following utilities can you use from the command line on a Linux system to see the list of the installed network interfaces along with their current statuses and configurations?

ifconfig

Your wireless network consists of multiple 802.11n access points that are configured as follows... what should you do

implement antenna diversity

You need to place a wireless access point in your two-story building. While trying avoid interference, which of the following is the best location for the access point?

in the top floor

A user reports that he can't browse to a specific Web site on the Internet. From his computer, you find that a ping test to the Web server succeeds. A trace route test shows that 17 hops to the destination Web server. What is the most likely cause of the problem?

incorrect DNS server address

You are troubleshooting network connectivity on a Windows workstation. Which command would you use to view the MAC address of the network adapter?

ipconfig /all

You need to enumerate the devices on your network and display the network's configuration details. Which of the following utilities should you use?

nmap

DDR

no longer used in modern motherboards, you might encounter DDR memory in older systems.

You are the computer specialist in a small business. Your company server is named FS1 and has an IP address of 10.0.0.2. The hardware in your company server has started to experience intermittent failure, so you transferred the shares on the server to a spare server and took the main server offline. The spare server has an IP address of 10.0.0.3. You edit the existing A record for FS1 on your company;s DNS server and redirect the hostname to the spare server's IP address of 10.0.03. Afterward, most users are able to access the shares on the spare server by hostname, but several users cannot. Instead, they see an error message indicating the FS1 server could not be found. Enter the command you can run from the command prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart.

ipconfig /flushdns

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs?

network share

Which command would you use to have a workstation stop using an IP address that it obtained from a DHCP server?

ipconfig/release

Which of the following describes a false positive when using an IPS device?

legit traffic being flagged as malicious

64-bit

limit of 16.8 TB

32- bit

limit of 4 GB.

You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use?

load tester

A series of used clusters on the hard disk drive that are not associated with a specific file.

lost clusters

You have a workstation running Windows 10, 64-bit edition. A local printer connected to a USB port is shared so that other users can print to that printer. Users running 32-bit versions of Windows report that they can't install the driver for the shared printer. Users running a 64-bit version of Windows do not have any problems. Which of the following actions will MOST likely fix this problem? (Select TWO).

manually install the correct driver on each computer that is having a problem on your computer, add the x86 drivers

A customer needs to use several applications. Currently, the computer cannot keep all the necessary applications open at the same time. Which of the following components should you consider upgrading?

memory

cache

memory that the processor can access directly without using the system RAM. there are three types of processor cache --L1- integrated on the processor die itself and stores instructions for the processor. on multi core systems, each processor typically has it own L1 cache. some processors might have two L1 caches, one for instructions and one for data --L2- additional cache used for both instructions and data. depending on the processor, L2 cache might be shared between two or more cores, or exclusive to a single core. --L3- additional cache beyond the level 2 cache. for multi core systems, L3 cache is shared between all cores.

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?

mesh

You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for its customers who want Internet access. You decide to check your e-mail before the meeting begins, but when you open the browser you cannot gain Internet access. Other customers are on the Internet and because you use a wireless connection at work, you are sure your laptops wireless adapter works. What is the likely cause of this problem?

mismatched SSID

mobile processors

mobile CPUs are used in notebook computers where portability are a concern. special versions of processors are built to minimize power consumption and the amount of heat generated.

To access the internet through the publicly switched telephone network (PSTN), what kind of connectivity device must you use?

modem

Which utility allows you to choose Selective Startup in Windows?

msconfig

What command lets you see a list of valid command parameters for the net use command?

net use /?

Displays active sessions, ports, sockets, and the local routing table.

netstat

Displays current connections and incoming and outgoing connections.

netstat

You have received an order of various system components from an order you placed several weeks ago. One of the components is labeled as SODIMM memory. For which of the following was this memory MOST likely purchased?

notebook computers

A user is having problems connecting to other computers using host names. Which of the following commands will help you troubleshoot this problem?

nslookup

A user is having problems connecting to other computers using hostnames. Which of the following commands will BEST help you troubleshoot this problem?

nslookup

A user is having problems connecting to other computers using hostnames. Which of the following commands will best help you troubleshoot this problem?

nslookup

Examine the following output: Server: helicuplar.xct.takro.net What command produced this output?

nslookup

Resolves (looks up) the IP address of the specified hostname.

nslookup

Device manufacturers are constantly finding bugs, vulnerabilities, or better ways for their devices to communicate with the operating system. Because of this, which of the following is the BEST practice to do before installing a new device?

obtain the latest driver from the manufacturer's website

AGP Slots

old, Video slot, connects to northbridge directly

Where is a WiFi antenna commonly located on a laptop?

on top or near the LCD

Files that exist on the hard drive but are not associated with a directory in the index.

orphaned files

Identifies the requirements for credentials used to authenticate to company-owned systems.

password policy

Specifies that user accounts should be locked after a certain number of failed login attempts.

password policy

A few simple replies to this request from the remote host indicates that a connection exists between sender and receiver.

ping

Examine the following output. Reply from 64.78.193.84: bytes=32 time=86ms TTL=115 Reply from 64.78.193.84: bytes=32 time=43ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Which of the following utilities produced this output?

ping

Performs a continuous connection test when used with the -t option.

ping

Sends an ICMP echo request/reply packet to a remote host.

ping

what tcp/ip utility gives you the following output?

ping

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation and an application you are using is unable to connect to a Windows server named FileSrv2. Which commands can you use to test network connectivity between your workstation and the server? (Select two)

ping tracert

You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose?

switch

You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

yum install httpd

You suspect large packets are being dropped on your network because of their large size. Which utility can you use to confirm your suspicion?

ping -l

An end user clams they are unable to connect to the internet and has called the company's help desk for a solution. Having been assigned to this issue, you decide to first test whether or not TCP/IP is working correctly on the local computer. Which of the following is the best command to use for this test?

ping 127.0.0.1

End user cannot connect to the internet. You decide to first test whether or not TCP/IP is working correcntly. Which is the BEST command to use for this test? nslookup localhost ping -a localhost netstat ping 127.0.0.1

ping 127.0.0.1

*You are troubleshooting connectivity between your computer and the www.widgets.com server whose IP address is 192.168.1.1. Which of the following commands tests connectivity to the device as well as name resolution?

ping www.widgets.com

You are troubleshooting connectivity between your computer and the www.widgets.com server, whose IP address is 192.168.1.1. Which of the following command tests connectivity to the device as well as name resolution?

ping www.widgets.com

You manage a network that uses switched. In the lobby your building are three RJ-45 ports connected to a switch. You want to make sure that vistors cannot plug in their computers to the free network jacks and connect to the netowrk. However, employees who plug into those same jacks should be able to conect to the network. What feature should you configure?

port authentication

A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?

principle of least privilege

During an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information. Which of the following would make it difficult for other passengers to view this information on the laptop display?

privacy filter

A relatively new employee in the data entry cubical farm was assigned a user account similar to that of all of the other data entry employees.

privilege escalation

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions?

privilege escalation

An intruder waits near an organization's secured entrance until an employee approaches the entrance and unlocks it with a security badge. The intruder falls in line behind the employee, who assumes the intruder is another employee and holds the door open for her. What kind of attack just occurred?

tailgating

throttling

process of modifying the operating characteristics of a processor based on current conditions --often used in mobile processors to change the operating frequency to minimize power consumption and heat output --also used in low memory conditions to slow down the processing of I/O memory requests, processing one sequence at a time in the order the request was received. --processors or the operating system can shut down unused cores in multi core systems to conserve energy. some Intel processors include a Turbo Boost feature which allows the processor to dynamically run above its rated speed to improve performance.

speed

processors operate using an internal clock that is the same as, or is a multiple of, the motherboard bus speed. speed is represented in MHz, also referred to as the frequency. --you can buy processors of the same type but with different speed ratings --when selecting a processor, make sure the motherboard supports the processor speed by reading the motherboard documentation list --most motherboards automatically detect the processor speed. if not, you might need to use jumpers or edit the CMOS to configure the processor speed

cooling

processors require some form of heat dissipation system to function properly. --without a heat dissipation system, a processor will overheat and burn out in less than a minute. --most modern CPUs require a heat sink and a fan. -- between the CPU and the heat sink, thermal paste or a thermal pad helps in the transfer of heat from the CPU to the cooling unit.

Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM of dpkg for package management?

ps -e

process size

refers to the manufacturing process used to etch transistors onto the silicon wafer that will become the CPU. small process size means smaller transistors, which translates into a smaller CPU die with more transistors and less power consumption. process size is expressed in microns or nanometers (10 nm is .010 microns)

You work for a company that provides technical support for customers. One customer calls wanting to know how to adjust their monitor so they can have the sharpest and most detailed images, words, and icons. Which Control Panel setting should you adjust to BEST meet the customer's needs?

resolution

An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following?

scheduled backups

You have a computer that runs Windows 10. Where would you go to verify that the system has recognized the anti- malware software installed on the system?

security and maintenence

As you are working on your windows 10 computer during a fierce thunderstorm, lightning strikes the nearby transformer, and your office loses all power. Since your laptops battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools is most likely to rectify this issue?

sfc

While troubleshooting, you notice that one of the folders required for your project is missing. What command line tool would allow you to quickly create the missing folder? cd md rd del sfc

sfc

You want to scan the integrity of all protected system files on your Windows 10 system, but not repair them. Which command should you use?

sfc /verifyonly

Which IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a database?

signature based

Kerberos and Secure European System for Applications in a MultiVendor Environment (SESAME) are ____ ___ protocols.

single signon

144-Pin, 200-Pin Small Outline-DIMM (SO-DIMM)

smaller DIMM used in laptops

Which of the following is not a form of biometrics?

smart card

Extensible Authentication Protocol (EAP) supports a number of authentication methods including ___ and ___

smartcards and digital certificates.

Dynamic RAM (DRAM)

stores data using a single transistor for every bit of data (a 0 or a 1)

A service running on your Windows system has hung badly and will not respond when you try to use the Services console to restart it. You run the tasklist command at the command prompt and find that the service's process has a PID of 1234 assigned to it and that it has an image name of telecom.exe. Which commands could you run to shut down the service? (Select TWO.)

taskkill /F /PID 1234 taskkill /F /IM telecom.exe

An employee complains that every time they turn their computer off, the computer's time is set to 12:00 am and the date is set back. What is the cause? The CMOS chip is failing the CMOS settings are not being saved before powering off the computer. the CMOS chip on the motherboard is loose The CMOS battery has failed

the CMOS battery has failed

Amps

the current, how much (river=low, ocean= high)

Platters

the disks

64

the operating system and applications must be written for 64-bits to take full advantage of 64-bit processing.

Hannah was relocated to a new floor. After she moved when she prints a Microsoft Word Document, the printer on her new floor prints page after page of random characters. Why? The hard drive on the print server is corrupt. The cable connecting the printer to the network is failing. The wrong print drive has been selected. The program used to create the document has a bug.

the wrong print drive has been selected

While troubleshooting a problem on a Linux system, you run a utility that generates the following output: (longass example)

traceroute

A technician located at a branch office can't communicate with a company server at the home office. Which of the following commands could be used to determine where the communication is blocked?

tracert

Examine the following output: 4 22 ms 21 ms 22 ms sttlawa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.placa01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispoxy.net [205.171.206.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.151.142.1] Which of the following produced this output?

tracert

Tests connectivity between devices and shows the routers in the path between the two devices.

tracert

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?

trunk ports

You have just installed a new network based IDS system that uses signature recognition. What should you do on a regular basis?

update signature files

One of your main goals is to avoid security holes and bugs. Which of the following tasks would you MOST likely perform on the router? Update the firmware Configure port triggering Configure the DHCP service Enable NAT

update the firmware

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a locked server closed. You use an FTP client to regularly back up the router configuration to a remote server in an encrypted file. You access the router configuration interface from a notebook computer that is connected to the router's console port. You've configured the device with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?

use SCP to backup the router configuration to a remote location

You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure Broadcast traffic sent by an accounting computer is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network. What should you do?

use a router to configure a subnet for the accounting computers

While changing the toner cartridge in your laser printer, you accidently spill toner in and around the printer. Which of the following is the BEST method for cleaning up the spilled toner?

use an anti-static micro-filtering vacuum

Aubrey, an employee in the marketing department, has told you that when she prints to her laser printer, faint ghost-like images are being printed on her new page. As an IT administrator, you check with other employees who use the same printer and find that they are not experiencing the same problem. Which of the following would be the BEST fix for this issue?

use preprinted paper that has been printed with laser-compatible printer toner

Install Heatsink and Fan

use thermal grease or a thermal pad between the processor die and the heat sink

Single In-line Memory Module (SIMM)

used in older memory (not SDRAM or DIMM) 32 bit data path, had to install in pairs in order to achieve 64 bit bus

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of?

users

DDR (DDR SDRAM)

variation of the original SDRAM, synchronized with the system clock and accepts 64 bit words Accepts a single command and two consecutive data sets per clock cycle Operating at same frequency, DDR has twice bandwidth of SDRAM Operates at 2.5 volts at bus frequencies between 100-200MHz 184 pins

You have a computer that runs Windows 7, and you want to install Windows 10. You are not concerned about keeping any of the existing data currently on the drive, and you want to do a clean install. After placing the Windows 10 installation DVD in the optical drive, you restart the computer, but it does not boot to the DVD, and you are unable to install Windows. Which of the following are the BEST methods for installing Windows from the DVD? (Select TWO. Each choice is a complete solution.)

while the computer is rebooting, press the boot menu function key from the UEFI or BIOS firmware, change the boot order

Which type of documentation would you consult to find the location of RJ-45 wall jacks and their endpoints in the intermediate distribution closet?

wiring schematic

In which of the following situations would you use port security?

you want to restrict the devices that could connect though a switch port

You're using a linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on this system?

yum list available

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed?

yum list installed httpd

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP server package, is installed?

yum list installed httpd

Match the Network Access Protection (NAP) component on the left with its description on the right.

• The NAP Client generates a Statement of Health (SoH) that reports the client configuration for health requirements. • A NAP Server runs the System Health Validator (SHV) • The Enforcement Server (ES) is the connection point for clients to the network. • The remediation server contain resources accessible to non-compliant computers on the limited-access network.


Ensembles d'études connexes

Lab: Calorimetry and Specific Heat Assignment: Reflect on the Lab

View Set

Blood Cancer + Hematological Disorders (PrepU)

View Set

PFIN: Chapter 4. Managing Your Cash and Savings

View Set

Chapter 2: Basic Aspects of Biochemistry - Organic Chemistry, Acid-Base Chemistry, Amino Acids, Protein Structure and Function, and Enzyme Kinetics

View Set

2.1.2 Quiz: Physical Fitness, Health 9 2.1.2 Physical fitness, 2.1.4 Quiz Good Nutrition, Health 9 apex 2.2.2, Health 9 2.2.4 Eating disorders, 2.4.2 Test (CST): Fitness and Nutrition, 2.3.3 Quiz: Setting Goals and Formulating a Plan, apex 2.4.2 test...

View Set

BIO 240: Skeletal System - Bone Structure & Function Textbook Questions (CH.7)

View Set