1002 Questions Dion #3-6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You are configuring a SOHO network and only allowing specific IP addresses to access the network while blocking any IP addresses not on the list. Which of the following should be implemented? (Dion #3)

Whitelist

An offsite backup service is involved in an investigation currently. Because of this, they are not recycling outdated tapes. Which of the following is the MOST likely reason for this? (Dion #4)

A notice of a legal hold

What type of structure is "IF THEN ELSE" in scripting? (Dion #3 )

Branch

Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as? (Dion #3)

Brownouts

A user is having an issue with a specific application on their Android devices. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue? (Dion #3)

Clear the local application cache.

You are troubleshooting a user's workstation that is operating extremely slowly. You open the Task Manager and see that only Microsoft Word is currently running, but the CPU and network utilization is consistently running between 95-100%. Which of the following is MOST likely causing this issue? (Dion #5)

Computer has become a zombie

Which of the following types of backup requires the LEAST time to complete a backup? (Dion #4)

Differential

Which of the following devices would you configure an ACL to implement a security policy within your network? (Dion #4)

Firewall

Which of the following data types would be used to store the number 3.14? (Dion #4)

Floating-point

Which of the following allows users to save their current session to memory and before powering down the computer? (Dion #5)

Hibernate

Which of the following types of installations would require the use of an XML text file containing the instructions that the Windows Setup program would need to complete the installation? (Dion #4)

Image Installation

You recently read a news article about a new crypto-malware worm that is causing issues for corporate networks. Today, you noticed that four of your company's workstations had their files encrypted. You are worried about the rest of the network's workstations. What should you do FIRST? (Dion #5)

Immediately quarantine the affected workstation.

Which command would be used to display the IP address and subnet mask for the wireless network connection on a macOS or Linux system? (Dion #5)

Iwconfig

You are troubleshooting a user's computer. As part of your efforts, you want to install a new login with administrative privileges. Which of the following utilities should you use? (Dion #5)

Local Users and Groups

A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script? (Dion #4)

Loop

What type of structure is "For Next" in scripting? (Dion #3 )

Loop

An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses ending in spamyou.com. Which of the following actions should the user take to help reduce the amount of spam they receive? (Dion #4)

Mark each email as spam or junk

Which file system type is used to mount remote storage devices on a Linux system? (Dion #3 )

Network File System

Your network administrator has handed you some documentation showing you which switch ports on a patch panel you need to connect with a CAT 5e patch cable for an upcoming network upgrade. What document are you MOST likely holding? (Dion #4)

Physical Network Diagram

The server administrators have asked you to open the default port on the firewall for their new DNS server. Which of the following ports should you set as ALLOW in the ACL? (Dion #3)

Port 53

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue? (Dion #4)

RADIUS

An attacker is using a precomputed table of values to attempt to crack your Windows password. What type of password attack is this? (Dion #4)

Rainbow Table

Which of the following should be configured if a user wants to allow another computer to connect to their system using a Remote Desktop Connection? (Dion #3)

Remote Settings

A user is complaining that when they attempt to access Google's homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT? (Dion #4)

Remove any proxy server configuration in their web browser

A user's workstation is infected with malware. You have quarantined it from the network. When you attempt to boot it to the Windows 10 desktop, it fails. Which of the following should you do NEXT to begin remediating this system? (Dion #5)

Restart into Safe mode and conduct an antivirus scan.

Your company's share drive has several folders that have become encrypted by a piece of ransomware. During your investigation, you found that only the Sales department folders were encrypted. You continue your investigation and find that a salesperson's workstation was also encrypted. You suspect that this workstation was the original source of the infection. Since it was connected to the Sales department share drive as a mapped S:\ drive, it was also encrypted. You have unplugged the network cable from this workstation. What action should you perform NEXT to restore the company's network to normal operation? (Dion #5)

Restore the Sales Department folders from backup

Jason's company issued him an old 2015 Dell Laptop with an internal hardware security key that he uses to connect to his office network over a VPN while traveling. Without this laptop, Jason cannot access his company's internal servers, email, or share drive files. The Windows 7 laptop is extremely slow, and the screen recently cracked and needs to be replaced. When Jason returns to the company's headquarters, the company will provide him a new laptop due to the broken screen. Still, he is currently on a 45-day business trip and needs to continue working until then. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend? (Dion #3)

Sell him an external 15" tablet/monitor to connect to the laptop as a workaround.

You are troubleshooting a workstation and need to run some diagnostic tools as an administrator on this Windows 10 workstation. Which of the following keys should you hold while right-clicking the mouse to open the Command Prompt as an administrator? (Dion #4)

Shift

Which of the following Linux command-line options would shutdown a Linux server in 11 minutes from now? (Dion #4)

Shutdown +11

A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be? (Dion #5)

Social Engineering

Which of the following MacOS features allows the user to search all of the hard drives, network shares, and files for a keyword or phrase? (Dion #3)

Spotlight

You are troubleshooting a user's laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which log in Windows 10 would you review to determine if the print spooler service is causing this issue? (Dion #4)

System Logs

What anti-malware solution should be implemented to deter attackers from loading custom files onto a distributed target platform? (Dion #5)

The network-based anti-malware can keep the system secure by testing all communications to/from a distributed target platform.

Which of the following file system formatting types should be used with a DVD? (Dion #4)

UDF

Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device? (Dion #3 )

Unified Threat Management

You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. Which of the following should you do FIRST to attempt to solve this problem? (Dion #5)

Update the OS (If the app doesn't work on one model, but it does on another, it may be an operating system issue.)

Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard? (Dion #3)

Virtual Network Computing

A co-worker just sent you a macro-enabled Microsoft Word document. After you opened the file, your computer began to delete the photos stored in your c:\photos directory. What type of malware did you MOST likely receive? (Dion #5)

Virus

A technician is troubleshooting a newly-installed WAP that is sporadically dropping connections to devices on the network. Which of the following should the technician check FIRST during troubleshooting? (Dion #5)

WAP Placement

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented? (Dion #4)

WPA2 Enterprise

Ted, a file server administrator at Dion Training, has noticed that many sensitive files have been transferred from a corporate workstation to an IP address outside of the local area network. Ted looks up the IP address and determines that it is located in a foreign country. Ted contacts his company's security analyst, verifying that the workstation's anti-malware solution is up-to-date and the network's firewall is properly configured. What type of attack most likely occurred to allow the exfiltration of the files from the workstation? (Dion #4)

Zero Day

You are currently building a Linux server. Which of the following file system formats should you use for the server? (Dion #5)

ext4

Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system's filesystem (Dion #3 )

rm -rf/


संबंधित स्टडी सेट्स

Chapter 14- Temporomandibular Joint

View Set

Types of Ownership (Property Ownership)

View Set

MGT 371 ch3 - solving problems analytically and creatively

View Set

Chapter 10 quiz (the gastrointestinal tract and abdominal wall)

View Set

Ochem 301: Ch 4 problems. read definitions first

View Set

Illinois Statutes and Requirements Pertinent to Life Only

View Set

Section 1.1: Set builder and Interval Notation

View Set