Week 5 domain quizzes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the minimum amount of free space recommended for updating a 64-bit machine?

20 GB

Which of the following BEST describes a Security Policy?

A document or collection of documents that provide information about an organization's network security.

Which partition type identifies the partition as one that holds the boot loader program that is used to start the operating system?

Active

Your computer has a single NTFS partition that is used for the C: drive with the folders below. C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow the Full Control permission for the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions. You: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Allow Full Control for both.

Which of the following is an important aspect of evidence gathering in response to a security incident?

Back up all log files and audit trails.

Match each backup method on the left with the correct description on the right.

Backs up all files (even those that have not changed). Full Backs up every file that has changed since the last full or incremental backup. Incremental Backs up every file that has changed since the last full backup. Differential Compares the data found in the last full backup with the current content and uploads only the changes. Synthetic

Which of the following is designed to provide a Linux command line interface?

Bash

Which of the following Windows programs uses integrity checking early in the boot process to ensure that the drive contents have not been altered?

BitLocker

You need to use a common USB flash drive to transport important sensitive information for your organization. Which of the following would be the BEST program for protecting the data on the flash drive with encryption?

BitLocker To Go

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions for the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission for the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file.

One day, while trying to start your Windows 11 computer, the system displays the following error: Windows could not start. Could not read from the selected boot disk. Check boot path and disk hardware. Which of the following solutions will MOST likely fix the problem?

Boot into the Recovery Environment and run the bootrec /rebuildbcd command.

Which stage of a legacy BIOS startup loads the boot code in the Master Boot Record (MBR) and then uses the partition table to identify the active disk partition?

Boot loader

You have decided to install a new Ethernet network adapter in your Windows 11 desktop computer. After installing the card and booting to Windows, you notice that you have no network connection. After looking in Device Manager, you see that the new network card was detected, but Windows doesn't know what it is. After doing a quick search on the internet, you find what looks like the correct driver and install it. A reboot of Windows is performed, but almost immediately after logging on, your computer crashes. Thinking this must be a fluke, you reboot again with the same result. Which of the following is the BEST method in this scenario to get Windows to load properly?

Boot to Safe Mode and uninstall the network driver.

You have just created an account for your web browser, and you want to be able to access the bookmarks you create on your home laptop with the same web browser on your company workstation. Which of the following can you use to make these bookmarks accessible on both computers?

Browser synchronization

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take as you implement this configuration? (Select two. Each option is part of the complete solution.)

Configure the browser to send HTTPS requests through the VPN connection. Configure the VPN connection to use IPsec.

You have a workstation running Windows 10 Home. However, you want to install Windows 11 Professional as a separate instance in order to boot into either operating system. Which of the following installation types will meet your needs?

Custom/clean installation

Which hard drive destruction method uses a strong magnetic pulse to destroy data?

Degaussing

Candace is a purchasing manager for a large metropolitan hospital and is responsible for making purchasing decisions for millions of dollars worth of equipment each year. The hospital board has recently decided that many of the older hospital devices need to be upgraded to IoMT (Internet of Medical Things) equipment to become more efficient and effective in their procedures. Candace has decided to start by ordering new IoMT heart-monitoring devices that track a patient's heart information remotely. She immediately talked to her equipment sales representative and ordered several new IoMT heart-monitoring devices. However, after deploying them, she finds that they do not provide all the data that nurses and doctors were expecting. Which of the following steps did Candance fail to complete during the asset management Procurement phase that led to this issue?

Determine goods and services required

You have been tasked with removing malware from an infected system. You have confirmed that there is an infection, and you continue running scans and removing the malware, but every time the system is rebooted, the malware comes back. Which of the following should you do to help prevent this from happening?

Disable Windows System Restore

You are an IT technician for your company. Vivian, an employee, has been receiving error messages, indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian called again because she is still having the same issue. You now suspect that a corruption or a renaming of the system files is being caused by malware. Which of the following is the FIRST step you should take to remove any malware on the system?

Disconnect Vivian's computer from the network.

Which of the following disk maintenance utilities optimizes the performance of your hard drive by joining parts of files that are in different locations into a single location?

Disk Defragmenter

Which Windows sign-in feature automatically locks your device while you are away?

Dynamic Lock

You have just completed a successful installation of Windows 11 on your hard drive using a disc that you purchased from a local retail outlet. What is the next task that you should complete?

Edit the BIOS/UEFI settings to boot from the hard drive first.

A user complains that his USB scanner no longer works. You check Device Manager and see an icon with a black down arrow through it. What should you do?

Enable the device in Device Manager.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the device driver over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What is the BEST method for resolving the user's issue?

Establish a Remote Desktop connection and update the driver.

As a systems engineer for a large retail corporation, you have filled out a change order form to replace the laptop computers that sales reps use on the road with business tablets that are much more durable, provide both touch and keyboard options, and are more portable and easier to use when working with clients. The request has been forwarded to the change board, which is reviewing the change order form with you. One of the board members asks if this change will impact plans to move more of the business online to reach customers directly. Which of the following questions does the board member really want answered?

How does this change fit with company's current strategic focus?

Which of the following Windows upgrade installation methods requires you to mount the installation media before starting the upgrade?

ISO file`

Which of the following is a myth regarding electrostatic discharge (ESD)?

If you can't feel ESD, the surge is not sufficient to harm computer components.

Which of the following is the No operating system found error likely caused by?

Incorrect boot order

Which of the following is a common malware symptom?

Increase in pop-up ads

Which of the following is an open-source operating system?

Linux

What are the security measures that are implemented through the operating system and software known as?

Logical security

Which of the following is a benefit of BYOD?

Lower costs

To prevent ESD when replacing internal computer components, you attach an anti-static wrist strap to your wrist. Where should the other end be fastened? (Select two.)

Metal area on the computer case Anti-static mat

To protect user data on a Windows 11 system, you've configured System Restore to automatically create restore points for the C: volume. Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your users' data? (Select two.)

No. You need to create a backup of your user data as well. No. You need to enable File History.

Which tool can you use to gather data and display statistics (in counters) that help you monitor the operation of a Windows system?

Performance Monitor

You have been hired to evaluate your client's building security. In your walkthrough, you notice the following: A high fence is installed around the property. Visitors are able to enter the building and are checked in by a receptionist. Security cameras are installed on all buildings. Server racks are locked and have alarms. Which of the following would you MOST likely recommend that your client do to increase security based on this information?

Place a security guard at the entrance gate with an access list to control who comes on the property.

Which of the following are characteristics specific to the Python programming language? (Select two.)

Popular with the scientific community. Focuses on code readability.

Which remote access solution provides you with full remote access to the graphical desktop of a Windows system, including the ability to run programs, manipulate files, and restart or power down the computer?

Remote Desktop

Your computer is not performing properly; an update was recently installed. Which of the following actions from the Windows 10 Settings app is the BEST troubleshooting choice to try first for this situation?

Remove the installed Windows update.

Which tool can you use to display hardware utilization statistics that tell you about your computer's operation?

Resource Monitor

You are an IT technician for your company. Fred calls you to complain that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware?

Restore Fred's computer back to a previous restore point.

While browsing the internet, a pop-up browser window comes up, warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the BEST next actions to take? (Select two.)

Run a full system scan using the anti-malware software installed on your system. Update the virus definitions for your locally installed anti-malware software.

You are working on your Windows 10 computer during a fierce thunder storm. Lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools is MOST likely to rectify this issue?

SFC

Which section of a change order form would include the desired outcomes of a project?

Scope of change

One of the Windows workstations you manage has three user accounts defined on it. Two of the users are Limited users, while the third (your account) is an Administrative user. Each Limited and Administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likely increase this system's security? (Select two.)

Set a screen saver password. Disable Autorun on the system.

Which of the following is the name for a special computer that is used for malware analysis?

Sheep dip computer

You are working as a junior network technician at the local hospital. The security administrator has just finished rolling out a new security policy that requires users to log in to workstations using a fingerprint scanner. Which authentication category does this fall under?

Something you are

Which authentication category does a username and password fall under?

Something you know

You want to perform a Windows update on your Windows 11 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update. Which of the following Control Panel utilities is BEST to enable and use prior to the update?

System protection

Which user type is the Windows Beta channel recommended for?

The average user

Which of the following BEST describes the primary role of Tier 1 support operators?

They gather information about a problem and perform basic troubleshooting.

Mobile device applications fall into two categories. Some are reviewed, approved, and signed with a certificate by the app service, while others are not. Which category do apps fall into if they have been reviewed, approved, and signed with a certificate? ------ What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

Trusted Untrusted

Your company is creating a financial application that you want to first test on mobile devices. Several customers have asked to be part of the beta testing process. What do the employees need to do on their mobile devices in order to be able to participate in the beta test?

Turn on Developer Mode.

In which of the following Windows 10 Settings app categories can you find reports on your device's health?

Update & Security

Which of the following are most helpful in keeping a computer cool? (Select two.)

Verify that cooling fans are not circulating air in the wrong direction. Vacuum dust from the system regularly.

Which of the following tasks does Windows Storage Spaces eliminate the need for? (Select two.)

Volume resizing Drive repartitioning

Which programs run during the startup process to allow user logon? (Select two.)

Winlogon winnit

Which of the following are advantages of using an online Microsoft account? (Select two.)

You have automatic access to the Microsoft Store. Your account profile information is synchronized to other computers.

In which of the following situations would driver rollback be the BEST option to use?

You recently installed a new video driver, and now the system behaves erratically.

What would you enter at the Command Prompt on a Linux system to display the IP addresses and subnet masks that are assigned to each network interface?

ip

What would you enter at the Command Prompt on a Linux system to display a list of files and subdirectories that exist within the present working directory?

ls

Which operating system uses the Time Machine backup program?

macOS

You need to specify hich location File History should use to store backup data. Click the Control Panel option you would use to do this.

select drive

As you are working on your Windows 10 computer during a fierce thunder storm, lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools is MOST likely to rectify this issue?

sfc

You suspect a corrupt or missing system file. Which command would you use to scan the integrity of a specific file and repair it?

sfc /scanfile

You are at a Command Prompt and want to display the Remote Shutdown Dialog to restart a remote server that is having issues. Which of the following commands displays the Remote Shutdown Dialog?

shutdown /i

You use a Linux distribution that uses RPM for package management. Which command would you use to install httpd (the Apache HTTP Server package) and all its dependencies?

yum install httpd

Which of the following is a troubleshooting step to try when troubleshooting application conflicts?

Check for application driver updates.

Which of the following stores user accounts, groups, and their assigned rights and permissions?

Domain controller

You've just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. Since the installation, the system frequently crashes when you try to access the new device. Which of the following steps would MOST likely resolve this issue?

Download and install the latest driver from the manufacturer's website.

You have been hired to help assess the security of your client's organization. During your assessment, you have found a rogue wireless access point that is configured to look identical to the legitimate wireless network. Which of the following attacks was MOST likely being carried out?

Evil twin attack

You have just visited a website on your mobile device when your web browser locks up, and you receive a warning that your device has a virus. You are given a phone number to call to remove the virus. Which of the following describes the type of malware symptom that you are MOST likely experiencing?

False security warning

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select two.)

Keep the operating system up to date. Lock the screen with some form of authentication.

Which of the following are requirements for Windows Remote Desktop to work properly? (Select two.)

Know the credentials for the remote system's administrator account. Know the remote system's IP address.

You have been hired to assess a client's security. During your testing, you discover that users have access to other departments' files. Which of the following should you recommend that the company implement?

Principle of least privilege

You are an IT technician for your company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctioning application. To help troubleshoot Rachel's computer, you run Task Manager. Which of the following tabs would be the MOST helpful in determining any issues with how the computer is running? (Select two.)

Processes Performance

During which asset management phase would you consider whether an asset would replace an existing one and whether it will have any impact on the existing network and users?

Procurement

Which part of the change management process asks how the project will align with the organization's current mission and strategy?

Purpose of the change

You need to find out which kind of laws might apply to your network's operations. Which document type would you consult?

Regulation


Ensembles d'études connexes

Chapter 6 Values, Ethics, And Advocacy

View Set

Ch. 12 Analyzing Genomic Variation

View Set

CET 215- Lesson 12 Network cables and connectors (Quiz)

View Set

nur 116 - Davis Advantage / Edge - Guillain-Barré Syndrome

View Set

75 Free NCLEX Questions - c/o BrilliantNurse.com

View Set