Section C
You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?
/y
Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?
3389
A technician is assisting Ann, who reports that the display on her company-issued smartphone is too dim to read in a dark room, even after she adjusts the brightness setting. Which of the following actions should the technician perform FIRST? (Choose TWO).
Adjust the adaptive or automatic brightness control. Adjust the battery saver setting.
Which tool would you use to configure the paging file location and size on a Windows system?
Advanced System Settings in Control Panel
Which of the following describes a man-in-the-middle attack?
An attacker intercepts communications between two network hosts by impersonating each host.
Bob calls and complains that he has suddenly started getting a lot of unwanted email. Which of the following is the BEST type of software to install to help solve Bob's problem?
Anti-spam
A technician suspects that data is being leaked from a tablet. Which of the following is the BEST tool to troubleshoot this issue?
App scanner
One of your users suspects that the battery in their notebook computer is failing. You test it by using a known good power adapter to plug it in long enough to receive a full charge. The battery reads that it is fully charged in Windows. You then disconnect the laptop from its power source and wait to see how long the battery lasts. The battery dies after only about 15 minutes. Which of the following actions would MOST likely cix this problem?
Assume the battery is failing and replace it.
As you arrive on-site to fix an issue, you are met by a frantic employee who immediately details how critical the issue is and how important it is to fix it as quickly as possible. Having seen this same issue many times, you say to the customer, "Stop worrying. I know what I'm doing." Which of the following professionalism principles is the technician failing to follow?
Avoid dismissing customer problems.
Which of the following are safe methods of lifting heavy objects? (Select TWO.)
Bend your knees with your back straight. Lift with your legs.
A user has configured his mobile device to unlock using facial recognition. Which of the following methods for securing a mobile device is being used?
Biometric authentication
Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission to the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?
Bob can open, read, and write changes to the file.
Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?
Boot the computer from the Windows installation disc and run Startup Repair.
You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions to take next? (Select TWO).
Configure both share and NTFS permissions. Place the files on an NTFS partition.
A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take when implementing this configuration? (Select TWO. Each option is part of the complete solution.)
Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.
You work for a company that offers their services through the internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial of service attack. As a first responder, which of the following is the next BEST step to perform?
Contain the issue.
Windows 10 features a storage solution called Storage Spaces. What is the name of the Storage Spaces feature that allows you to allocate space for redundant information using options that include two-way mirroring, three-way mirroring, and parity?
Data resiliency
Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?
Deny Read to Reports.doc; Allow Full Control to Costs.doc.
What is your top priority when responding to emergencies and hazardous situations?
Ensure the safety of people in the area.
Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select TWO).
Exploiting DHCP servers to deliver the IP address of poisoned DNS servers Changing the hosts file of a user's computer
Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select THREE).
IPSec L2TP PPTP
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 Which of the following is the MOST likely cause of the problem?
Incorrect default gateway
You are a PC technician for a company. An employee needs you to install some software on his computer over his lunch break. When you log on to the computer, you notice the employee's desktop has so many shortcuts and files that you can hardly see the desktop background. Which of the following actions should you take?
Install the software and leave the employee's computer exactly how you found it.
You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer?
Local Group Policy Editor
You are in the process of preparing a storage device and must determine which file system to use. Which of the following BEST describes the advantage of using the exFAT file system rather than NTFS?
Lower memory and processor resource use
Maisy reports that her machine is behaving erratically. She suspects something is wrong because a firewall alert keeps indicating that some programs are trying to access the internet. In addition, several files have disappeared or have been renamed. Which of the following is the MOST likely cause of Maisy's computer problems?
Malware infection
You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?
Mesh
To prevent ESD when replacing internal computer components, you attach an anti-static wrist strap to your wrist. Where should the other end be fastened? (Select TWO.)
Metal area on the computer case Anti-static mat
You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which of the following policies are BEST to configure? (Select TWO).
Minimum password length Account lockout threshold
Which of the following networking devices or services is LEAST likely to be compatible with VPN connections?
NAT
Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?
Peer-to-peer
Match each security policy on the left with the appropriate description on the right. Each security policy may be used once, more than once, or not at all.
Provides a high-level overview of the organization's security program. - Organizational Security Policy Defines an employee's rights to use company property. - Acceptable Use Policy Identifies the requirements for credentials used to authenticate to company-owned systems. - Password Policy Identifies a set of rules or standards that define personal behaviors. - Code of Ethics Sets expectations for user privacy when using company resources. - Acceptable Use Policy Specifies that user accounts should be locked after a certain number of failed login attempts. - Password Policy
Arrange the standard change order form information on the left in its standard presentation order on the right. (Not every answer will be used.)
Purpose of the change Scope of the change Plan for the change Risk analysis Backout plan
A user is unable to read their computer files. A pop-up explains that the files have been encrypted and gives instructions on how to purchase a decryption key. Which of the following BEST describes this malware?
Ransomware
The chain of custody is used for what purposes?
Retaining evidence integrity by identifying people coming into contact with evidence
While browsing the internet, a pop-up browser window is displayed warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the next BEST actions to take? (Select TWO).
Run a full system scan using the anti-malware software installed on your system. Update the virus definitions for your locally-installed anti-malware software.
What is name of the utility that is (1 similar to Telnet and (2 used to establish a secure remote server management session?
SSH
An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following?
Scheduled backups
Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her MAC?
Screen Sharing
You're troubleshooting a computer that runs Windows 10. The operating system has halted and a blue screen is displayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue?
Search for the error in Microsoft's knowledge base or using an internet search engine.
Which of the following are common forms of social engineering attacks?
Sending hoax virus information emails.
You are the PC technician for a company. You received the following email from an employee: My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think that the email program has ever worked well. When you arrive at the employee's desk, you observe how the employee accomplishes normal email tasks. You quickly determine that the problem is not with the email program, but that the employee needs to learn how to use the program. You have several high-priority tasks that need to be completed by the end of the day. What is the BEST way for you to respond?
Set an appointment to train the employee on how to complete common email tasks.
Which of the following security technologies stores identification information in a magnetic strip, radio frequency transmitter, or hardware contact to authorize access to a computer?
Smart card
Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?
Spamming
After receiving several complaints from the employees in your company, you start to troubleshoot a laser printer. After a short while, you have concluded that the most probable cause is a dirty drum. Which of the following is the MOST logical reasons for this conclusion?
Spots at regular intervals on the page
Sound isn't coming from the internal speaker on a tablet device, even after a user checks its volume settings and makes sure it not muted. Which of the following is MOST likely reason?
The audio output is being directed to a Bluetooth speaker.
You work for a large company that has over 1000 computers. Each of these computes uses a wireless mouse and keyboard. Therefore, your company goes through a lot of alkaline batteries. When these batteries can no longer power the intended device, you must decide what to do with them. Unless otherwise dictated by your local authorities, which of the following would be the EASIEST way to deal with these batteries?
They can be thrown in the trash.
After Joe, a user, installs a new game app on his mobile phone, downloads and webpage loads become slower than usual. Which of the following actions would BEST address this issue?
Uninstall the new app and scan for malware.
Maria, a smartphone user, has recently installed a new app. She now experiences a weak signal and sometimes a complete signal loss at locations where she had a good cell signal in the past. Her phone battery is fully charged. Which of the following actions would BEST address this issue?
Uninstall the new app and scan for malware.
Joe, a user, is walking through a shopping mall. His phone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of these messages?
Unintended Wi-Fi connections
What is the best countermeasure against social engineering?
User awareness training
Which of the following is most helpful in keeping a computer cool? (Select TWO).
Vacuum dust from the system regularly. Verify that cooling fans are not circulating air in the wrong directions.
Which of the following paper types should not be used in inkjet printers?
Very glossy paper
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal
You need to protect the user data on a Windows 10 system. Which tools could you use to do this?
Windows 7 (Backup and Restore) File History
While using a Windows 10 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to a point in time before the malware infection occurred. Given this information, which of the following are true? (Select TWO).
You must reinstall any applications that were installed after the restore point was taken. Your user files were not affected when the system was reverted to the restore point.
In which of the following situations would driver rollback be the BEST tool to use?
You recently installed a new video driver, and now the system behaves erratically.
Which type of authentication would require a user fingerprint or facial recognition for a user to get past the screen lock on a mobile device and gain access to the device?
biometric authentication
You are troubleshooting a Windows 10 system that won't boot. The system appears to initialize just fine and post completes correctly. However, Windows doesn't load, and an error message is displayed on the screen, indicating the operating system couldn't be found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you do the following: Boot the system from the Windows 10 installation DVD. Access the Recovery Environment. Open a Command window. Enter the command you can run at the command prompt to address this issue.
bootrec /fixmbr
You are an IT administrator troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed. Which of the following is the BEST command line tool to run to accomplish this task?
gpupdate
You are troubleshooting network connectivity issues on a Windows workstation. Which command would you use to view the MAC address of the network adapter?
ipconfig /all
You are the computer specialist in a small business. Your company server is named FS1 and has an IP address of 10.0.0.2. The hardware in your company server started to experience intermittent failures, so you transferred the shares on the server to a spare server and took the main server offline. The spare server has an IP address of 10.0.0.3. You edit the existing A record for FS1 on your company's DNS server and redirect the hostname to the spare server's IP address of 10.0.0.3. Afterward, most users are able to access the shares on the spare server by hostname, but several users cannot. Instead, they see an error message indicating that the FS1 server could not be found. Enter the command you can run from the command prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart.
ipconfig /flushdns
What command lets you see a list of valid command parameters for the net use command?
net use /?
You need to duplicate a large number of files from your PC to a network server. Due to the number of files, you start the process and go home for the evening. When you return the next day, you find that only part of the files were duplicated to the server due to the router being temporarily unplugged by the janitor while cleaning. To prevent this type of glitch from happening again, which of the following Windows command line tools would have been BEST to use?
robocopy
You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?
su -
Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?
xcopy /e