a+ prac exam 1102 JD #6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You have discovered that an employee has been conducting illegal activities using his workplace computer. You have taken possession of the employee's laptop according to your company's procedures and are waiting to give it to law enforcement authorities. What should you do when turning over the laptop to the police? Maintain the chain of custody Preserve the evidence Quarantine the system Document the changes

Maintain the chain of custody

What anti-malware solution is installed as a dedicated on-premise appliance to scan all incoming traffic and prevent malware from being installed on any of your clients without requiring the installation of any software on your clients? Network-based anti-malware Host-based anti-malware Cloud-based anti-malware Signature-based anti-malware

Network-based anti-malware

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used? WPS RADIUS WPA2 WEP

RADIUS. EX: uta mymav wifi login at the library. sign in to the wifi and you get access to eveything

Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation? Telnet RDP SSH VNC

RDP

Which partition of the hard drive is concealed from the user in the File Explorer within Windows 10 and is only used when imaging the computer back to its factory default state? Recovery Primary Swap Extended

Recovery

What is the FOURTH step of the seven-step malware removal process? Enable System Restore and create a restore point in Windows Quarantine the infected system Update the applications and the operating system Remediate the infected systems

Remediate the infected systems

Fail To Pass Systems has just been the victim of another embarrassing data breach. Their database administrator needed to work from home this weekend, so he downloaded the corporate database to his work laptop. On his way home, he left the laptop in an Uber, and a few days later, the data was posted on the internet. Which of the following mitigations would have provided the greatest protection against this data breach? Require a VPN to be utilized for all telework employees Require data at rest encryption on all endpoints Require data masking for any information stored in the database Require all new employees to sign an NDA

Require data at rest encryption on all endpoints

Dion Training has recently replaced the batteries in their rack-mounted UPS in their data center. Which of the following should their technicians do to dispose of the depleted batteries? Place the batteries in the recycle bin behind their office building Wrap the batteries in plastic and place them in the trash Review the material safety data sheet for disposal instructions Research local regulations for toxic waste disposal in their area

Research local regulations for toxic waste disposal in their area

You are troubleshooting a user's laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which of the following actions should you attempt to fix the problem in Windows 10? Restart the print spooler service Restart Windows Defender Rollback the USB drivers Disable/enable the wireless network adapter

Restart the print spooler service

After a company rolls out software updates, Ann, a lab researcher, can no longer use the lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest version of the drivers. Which of the following should the technician perform to get the researcher back to work as quickly as possible? Reset Ann's equipment configuration from a backup Downgrade the PC to a working patch level Restore Ann's PC to the last known good configuration Rollback the drivers to the previous version

Rollback the drivers to the previous version

You are working as a desktop repair technician for a large corporation. The company uses the exact same desktop hardware for all of its user's workstations. Today, you have received multiple calls from users complaining that their screen becomes filled with static when moving their mouse. You noticed that the systems all received a security patch and other updates from the Microsoft Endpoint Configuration Management (MECM) server last night. Which of the following actions should you take to resolve this issue? Reboot the system into Safe Mode and allow the user to continue their work Rollback the video card driver and wait for a new driver to be released Use SFC to ensure all system files are correct and not corrupted Disable the DirectX service in services.msc

Rollback the video card driver and wait for a new driver to be released

Which of the following technologies would you use to securely access the command line interface of a network's switches and routers remotely for configuration? RDP Telnet HTTPS SSH

SSH

Which of the following features allows a Linux server to provide file-sharing services to a company's Windows 10 workstations? Samba Yum Keychain Pathping

Samba

You are working as a forensic investigator for the police. The police have a search warrant to capture a suspect's workstation as evidence for an ongoing criminal investigation. As you enter the room with the policeman, he arrests the suspect and handcuffs him. What should you do FIRST? Implement the chain of custody Secure the area Turn off the workstation Document the scene

Secure the area

An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives? Security Groups Home Folder Credential Manager Group Policy

Security Groups

Dion Training utilizes a federation authentication model for all of its internal and external services. If an employee needs to access one of the company's web applications from their smartphone, they use a username and password to log in to the main website. They then are transferred and authenticated to all of the other sites and services automatically. Which of the following type of authentication is this known as? FaceID TouchID SSO MFA

Single Sign-on (SSO)

You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented? Cable lock Biometric reader Smart card Key fob

Smart card

A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be? VLAN hopping Spoofing Social engineering Zero-day attack

Social engineering

Which of the following types of attacks involves changing the system's MAC address before it connects to a wireless network? DDoS Botnet Zombie Spoofing

Spoofing

What is the name of a program that monitors user activity and sends that information to someone else? Keylogger Spyware Virus Rootkit

Spyware. SPYING_ON_SOMEONE_ware

You just installed a flat panel television in a conference room in your office building. The facilities manager is concerned that a lightning strike could damage it. The company is not worried about the threat of power outages because the conference room is only used a few times per week. Which of the following should be installed to BEST mitigate the facilities manager's concerns without spending too much money? Line conditioner Power strip Surge suppressor UPS

Surge suppressor. defends against possible voltage spikes that could damage your electronics, appliances, or equipment

A user contacts the service desk and states a hardware conflict error is showing in their Device Manager. Which of the following log files should you review to determine the source of the conflict? Application log System log Security log Setup

System log

An employee at Dion Training is complaining that every time they reboot their Windows 10 workstation a music application is loaded. Which of the following commands would you use to disable the program from starting up each time Windows reboots? User account control System information Event viewer Task manager

Task manager

Which of the following is TRUE about the GPT schema? The GPT uses BIOS instead of UEFI. The GPT runs up to a limit of 4 partitions on a 2 TB disks. The GPT uses the first 512 byte sector to hold the master boot record. The GPT is a more up to date partitioning schema.

The GPT is a more up to date partitioning schema in comparison to MBR schema

A co-worker just sent you a macro-enabled Microsoft Word document. After you opened the file, your computer began to delete the photos stored in your c:\photos directory. What type of malware did you MOST likely receive? Virus Trojan Worm Rootkit

Virus. A virus is malicious software designed to infect computer files or disks when it is activated.

Which of the following wireless technologies allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button? WPS WEP WPA2 WPA

WPS

Tamera trying to install Windows 11 (64-bit) on an older laptop she found in her closet. The installation is continually failing and producing an error. The laptop has a dual-core 1.2 GHz processor, 2 GB of memory, a 250 GB hard drive, and a 1280 x 720 screen resolution. Which item in the laptop must be upgraded to meet the minimum requirements for installing Windows 11? Amount of memory Number of CPU cores The screen resolution Amount of hard drive space

Amount of memory

Which of the following MacOS features allows the user to create a user account that is used to sign in to the App Store, iCloud, and iTunes? Keychain Apple ID Passwd Spotlight

Apple ID

You need to move a 75-pound box with a rack-mounted UPS in it. Which of the following actions should you take? Lift with your legs and not your back Ask a coworker to team lift it with you Lift with your back and not your legs Open the box and carry up the UPS in pieces

Ask a coworker to team lift it with you

A small business recently experienced a catastrophic data loss due to flooding from a recent hurricane. The customer had no backups, and flooding destroyed all of the hardware associated with the small business. As part of the rebuilding process, the small business contracts with your company to help create a disaster recovery plan to ensure this never reoccurs again. Which of the following recommendations should you include as part of the disaster recovery plan? Local backups should be verified weekly to ensure no data loss occurs Backups should be conducted to a cloud-based storage solution Local backups should be conducted Purchase waterproof devices to prevent data loss

Backups should be conducted to a cloud-based storage solution

You are configuring a SOHO network and only denying specific IP addresses from accessing the network while allowing any IP addresses not found on the list. Which of the following should be implemented? Blocklist MAC filtering Allow list Port forwarding

Blocklist

Which of the following types of wireless connections requires a pin to be entered as part of the pairing process before it is utilized? Radiofrequency Bluetooth NFC Infrared

Bluetooth

Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence? Financial responsibility Legal hold Chain of custody Secure copy protocol

Chain of custody

A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of several settings: Email (never), Maps (always), Calender (while using), Messages (while using), Photos (never), App Store (while using), Bank (while using), and Weather (while using). Based on the information provided, what should be changed to resolve this client's problem? Change the Weather setting to always Change the Maps setting to while using Change the Email setting to while using Change the App Store to never

Change the Maps setting to while using

A user is complaining that the touchscreen on their smartphone is not responding to their touch. What is the FIRST step you recommend to solve this issue? Have the user restart the device Enable and disable airplane mode Replace the defective touchscreen Reinstall the OS

Have the user restart the device

Which low power mode is used with Windows 10 laptops to save power, but it takes longer to turn back on and resume where the user left off? Sleep Hibernate Balanced Power saver

Hibernate

Which of the following allows users to save their current session to disk and before powering down their Windows 10 laptop? Sleep Lock Hibernate Shutdown

Hibernate

Your son just attempted to start up three programs at once on his Windows 10 Home laptop. The application appears to be unresponsive, and a spinning circle has replaced his mouse cursor on the screen. What is the BEST solution to this problem? Reboot the system Disable the application startup Kill the unresponsive task Restart the network services

Kill the unresponsive task

Which version should you use when installing a Linux operating system and are concerned with end-of-life support? LTS release Rolling release Beta release Developer release

LTS (Long-Term Support)

Your Windows 10 workstation is attempting to boot up when it receives the following error, "BOOTMGR is missing; Press Ctrl+Alt+Del to restart." To fix this, you insert your Windows installation disc and reboot into the Command Prompt under the System Recovery Options. Which of the following commands should you enter in the command prompt? sfc /fixboot diskpart /repair chkdsk /repair bootrec /fixboot

bootrec /fixboot

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to add the Windows installation to the boot manager? bootrec /rebuildbcd bootrec /fixboot diskpart list bootrec /fixmbr

bootrec /rebuildbcd

Which of the following operating systems cannot be run on a laptop? Windows Linux Android iOS

iOS

Which command would be used to display the network address and subnet mask for the wired network connection on a Linux system? ip nslookup ipconfig netstat

ip

Which of the following operating systems are NOT used in modern smartphones or tablets? Android iOS macOS iPadOS

macOS

Which of the following Windows tools can a technician use to gather information about a workstation and create a comprehensive list of hardware, system components, and the software environment used by that workstation? msinfo32.exe devmgmt.msc resmon.exe dxdiag.exe

msinfo32.exe m=microsoft s=system info=information.

You are troubleshooting an issue with a Windows desktop and need to display the machine's active TCP connections. Which of the following commands should you use? netstat net use ping ipconfig

netstat

Which of the following commands is used on a Linux system to change a user's password on the system? passwd pwd chmod chown

passwd

Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system's filesystem? rm / rm -rf *.* rm *.* rm -rf /

rm -rf /

What is the symbolic representation of the octal numeric permission 644? rw-r--r-- rwx-r-xr-x rw------- r--rw-rw-

rw-r--r--

Which of the following file system formatting types should be used with a DVD? CDFS UDF FAT32 NTFS

UDF

Which of the following file types are commonly used to create simple scripts in the Windows command-line environment? .py .sh .js .bat

.bat writing scripts in WINDOWS command line, u use batch. writing scripts in macOS or linux command line, u use .sh

What is the minimum processor required to install Windows 11 (x64) on a device? 1 GHz single-core processor 2 GHz dual-core processor 2 GHz single-core processor 1 GHz dual-core processor

1 GHz dual-core processor

Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class A address? 192.168.3.5 10.1.2.3 172.18.21.252 169.254.1.52

10.1.2.3

Which of the following is an APIPA or link-local address? 127.0.0.1 169.254.64.23 192.168.1.34 33.52.7.83

169.254.64.23

An offsite tape backup storage facility is involved with a forensic investigation. The facility has been told they cannot recycle their outdated tapes until the conclusion of the investigation. Which of the following is the MOST likely reason for this? A data transport request A chain of custody breach The process of discovery A notice of a legal hold

A notice of a legal hold. A legal hold is a process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated.

Which of the following policies should be created to provide employees with the guidelines and limitations they must follow when using company-provided email, computers, and network access? Local security policy Acceptable use policy Password policy Group policy

Acceptable use policy

Which of the following Control Panel sections contains various tools like computer management, disk cleanup, print management, and the registry editor? System Devices and Printers Device Manager Administrative Tools

Administrative Tools

John is a PC technician. To perform his job, he needs to be able to install and remove programs, modify system files, and change user permissions on the Windows workstation in his office. Which of the following types of user account types should he have to perform his role? Power User Guest Remote Desktop User Administrator

Administrator

Which of the following backup rotation schemes uses a complex mathematical puzzle to extend the number of unique days of backups stored with the least amount of tapes? 3-2-1 backup Grandfather-father-son FIFO Backup Tower of Hanoi

Tower of Hanoi

You just received your monthly smartphone bill. As you review your charges, you notice that this month shows three times as much data usage as a normal month. You don't remember changing your usage pattern, so there should not have been a large increase in data used. Which of the following should you do FIRST to determine the source of the increased usage? Conduct a factory restore of the smartphone and reload your applications Enable biometric login for the lock screen to ensure no one else uses your device Check network permissions and data usage for any applications installed within the last month Configure your applications to only download large files over WiFi

Check network permissions and data usage for any applications installed within the last month

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue? Check that the printer is not offline Cancel all documents and print them again Check the status of the print server queue Check to ensure the printer selected is the default printer

Check the status of the print server queue

You are configuring a new printer for a small real estate office. There are only 4 computers in the network, and they are all connected to a single 4-port switch/router/cable modem device. There are no additional open ports on the device and no servers configured within the network. All the computers operate as part of a single workgroup with no domain controller. You need to configure the printer to allow all 4 computers to print to it as long as they are connected to the switch. Which of the following methods would BEST allow the users to print to the printer based on this network's configuration? Configure the printer to support cloud printing Configure it as a shared printer connected to one of the four workstations Configure a print server and connect the printer to it Configure the printer to support Bluetooth printing

Configure it as a shared printer connected to one of the four workstations

You have just set up a Minecraft server on a spare computer within your network and want your friends to connect to it over the internet. What do you need to configure in your SOHO router to allow your friends to connect to the new Minecraft server you created? Enable DHCP Configure your Wi-Fi to use Channel 11 Update the firmware Configure port forwarding

Configure port forwarding

Tamera just purchased a Wi-Fi-enabled Nest Thermostat for her home. She has hired you to install it, but she is worried about a hacker breaking into the thermostat since it is an IoT device. Which of the following is the BEST thing to do to mitigate Tamera's security concerns? (Select TWO) Configure the thermostat to use a segregated part of the network by installing it into a screened subnet Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password Disable wireless connectivity to the thermostat to ensure a hacker cannot access it Configure the thermostat to use the WEP encryption standard for additional confidentiality Enable two-factor authentication on the device's website (if supported by the company) Upgrade the firmware of the wireless access point to the latest version to improve the security of the network

Configure the thermostat to use a segregated part of the network by installing it into a screened subnet, Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password. screened subset: refer to a subset of data, a specific group of hosts on a network, or a portion of a larger system that is isolated or protected in some way.

Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure? Content Privacy General Connections

Connections

What is the THIRD step of the seven-step malware removal process? Enable System Restore and create a restore point in Windows Update the applications and the operating system Quarantine the infected system Disable System Restore in Windows

Disable System Restore in Windows

You are troubleshooting a workstation and want to check if any S.M.A.R.T. errors are being reported. Which of the following tools should you use to troubleshoot this workstation? Performance monitor DxDiag Task scheduler Disk management

Disk management. SMART is used primary for checking on long term memory

A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of their location settings, which are summarized below: * Storage (49 GB Used, 15 GB Free, 64 GB Total) * Mail Client (Corporate account set to push, Personal account set to pull hourly) * Display (Auto brightness, Lock after 30 minutes, Night mode disabled) * Calls (33 minutes used during last 24 hours) * Data (52 MB used during last 24 hours) * Location (All apps set to "allow while using") Based on the information provided, what should be changed to resolve this client's problem? Mail settings Location settings Display settings Storage settings

Display settings

You have just finished installing a new workstation for a user in your office. They need to be able to see the other workstations on the company's workgroup. Which of the following settings should you ensure is enabled? Enable network discovery Enable file and folder sharing Enable an RDP connection Enable BitLocker

Enable network discovery

Which of the following backup rotation schemes overwrites the oldest media with the current backup being performed? FIFO Backup Grandfather-father-son 3-2-1 backup Tower of Hanoi

FIFO Backup

You have been asked to help a user upgrade their laptop from Windows 10 to Windows 11. The user has asked that all of their applications, user profiles, documents, and PST files be preserved during the upgrade. Which of the following types of upgrades or installations should you perform on this laptop? In-place upgrade Clean installation Unattended installation Repair upgrade

In-place upgrade

Which of the following types of backup requires the LEAST time to complete a backup? Differential Incremental Synthetic Full

Incremental

Jason wants to configure his Windows 10 laptop to more quickly find files when he is searching its hard drive. Which of the following Control Panel sections should he use to configure his laptop for optimal searching performance? File Explorer Options Internet Options Power Options Indexing Options

Indexing Options

You work for Dion Training as a physical security manager. You are concerned that the physical security at the entrance to the company is not sufficient. To increase your security, you are determined to prevent piggybacking. What technique should you implement first? Install an RFID badge reader at the entrance Install an access control vestibule at the entrance Require all employees to wear security badges when entering the building Install CCTV to monitor the entrance

Install an access control vestibule at the entrance

Jason's iPhone has not received any emails or SMS messages in the few 4 hours. Which of the following is the most cause of these issues? Mail client error OS update failure Internet connectivity failure Bluetooth connectivity failure

Internet connectivity failure

Michael, a salesman, is on a business trip and is trying to access his corporate email over the hotel's Wi-Fi network. Michael's laptop appears to be connected to the hotel's wireless network, but his email client cannot download any new messages and states, "Network Offline." Michael contacts the help desk for assistance. What action should the help desk technician tell Michael to perform to solve this issue? Disconnect and reconnect to the hotel's wireless network Perform a full system scan for malware on his laptop Disable and reenable the wireless network adapter on his laptop Open a web browser, enter google.com, and see if a redirect page is displayed

Open a web browser, enter google.com, and see if a redirect page is displayed

A user's SOHO wireless network appears to have significantly slowed down today. Normally, they can download files at 900 Mbps or more, but today, they only averaged 23 Mbps when downloading. You check their wireless settings and see the following: Network SSID: DionTraining Security: WPA2 Password: diontraining Mode: AC ISP: Fiber1Gbps Which of the following is MOST likely the problem? The WAN type needs to be upgraded to DSL or cable Other users have connected to the WiFi due to a weak password WPA2 reduces download speeds and the user should switch to WPA3 Additional transmission power is needed for the wireless signal

Other users have connected to the WiFi due to a weak password

Which of the following password policies defines the number of previous passwords that cannot be reused when resetting a user's password? Password expiration Password history Password length Password complexity

Password history

Which of the following would NOT be included in a company's password policy? Password history Password age Password style Password complexity requirements

Password style

A network technician must allow HTTP traffic from the Internet over port 80 to an internal server running HTTP over port 81. Which of the following is this an example of? Dynamic NAT Static NAT Dynamic DNS Port forwarding

Port forwarding

Jason wants to configure his Windows 10 laptop to suspend individual USB ports when not in use. Which of the following Control Panel sections should he use to set the USB selective suspend feature? Internet Options Indexing Options Power Options File Explorer Options

Power Options

David is a brand new help desk technician. To perform his job, he needs to install programs and printers but should not have full access to change everything on a Windows workstation. Which of the following types of user accounts should David be given to perform his job as a help desk technician? Remote Desktop User Administrator Power User Guest

Power User

Your company is concerned about the possibility of power fluctuations that may occur and cause an immediate loss of power for several minutes to their server room. To prevent this condition, they are installing a large rack-mounted UPS to protect the server. Which type of condition are they trying to prevent using this UPS? Under-voltage event Power surge Power failure Power spikes

Power failure

Which of the following components presents the largest risk of electrical shock to a technician? Power supply Solid-state device LCD monitor Laptop battery

Power supply

Which of the following devices should you NEVER disassemble during troubleshooting due to the risk of electrocution? Printer LCD display Tablet Power supply

Power supply

Which editions of Windows 10 can you connect to using Remote Desktop? Pro Enterprise Education Home

Pro Enterprise Education

A customer is complaining that they cannot connect to the local network share drive. You run the command 'ipconfig /all' from their workstation, and it returns an IP of 169.254.34.12. Which of the following is the problem with this workstation? The workstation couldn't reach the gateway The workstation couldn't reach the proxy server The workstation couldn't reach the DNS server The workstation couldn't reach the DHCP server

The workstation couldn't reach the DHCP server

Every new employee at Dion Training must sign a document to show they understand the proper rules for using the company's computers. This document states that the new employee has read the policy that dictates what can and cannot be done from the corporate workstations. Which of the following documents BEST describes this policy? AUP SLA MOU SOW

acceptable use policy (AUP)


संबंधित स्टडी सेट्स

Triangle Classification Theorems Assignment

View Set

Dr. Nelson, Diseases of the Immune System - D2

View Set

Entrepreneurial Management Chapter #18

View Set

Chapter 16: The Nervous System IV - Autonomic Nervous System and Visceral Reflex

View Set

PEDS: Chapter 20 Nursing Care of the Child With an Alteration in Bowel Elimination/Gastrointestinal Disorde

View Set

Ch 1 MGT 3332 Operations and Supply Chain Management

View Set

final for biology (exams 4 and 5)

View Set