c394 (Dion training)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The four forms of regulated data covered by the CompTIA A+ (220-1002) exam are as follows: PII (Personally Identifiable Information), PCI (Payment Card Industry), GDPR (General Data Protection Regulation), and PHI (Protected Health Information).

1) PII (Personally Identifiable Information), 2) PCI (Payment Card Industry), 3) GDPR (General Data Protection Regulation), and 4) PHI (Protected Health Information).

When dealing with a difficult customer or situation, you should follow five key principles.

(1) Do not argue with customers and/or become defensive. (2) Avoid dismissing customer problems. (3) Avoid being judgmental. (4) Clarify customer statements (ask open-ended questions to narrow the problem's scope, restate the issue, or question to verify understanding). (5) Do not disclose experiences via social media outlets.

What are the four forms of regulated data covered by the CompTIA A+_ (220-1002) exam?

1) PII (Personally Identifiable Information) 2) PCI (Payment Card Industry) 3) GDPR (General Data Protection Regulation) 4) PHI (Protected Health Information)

A customer is complaining that her laptop is too slow. You have thoroughly checked the device but cannot find anything wrong with it. Which of the following is the best thing to say NEXT?

Ans: "Can you tell me more about the problem? What do you mean by "it is acting slow?"

You are trying to locate a protected .dll file to edit, but you cannot see it under the System32 folder. Which Control Panel utility should you use to find the file?

Folder options -The "View hidden files" option is located under the Folder Options utility in the Windows Control Panel. Control Panel==> File Explorer Option ==> View ==> Hidden files and folders

To protect against a brownout

Line conditioner

Which of the following workstation operating systems are Ubuntu and Redhat considered?

Linux

You have been asked to help a user upgrade their laptop from Windows 8 to Windows 10. The user has asked that all of their applications, user profiles, documents, and PST files be preserved during the upgrade. Which of the following types of upgrades or installations should you perform on this laptop? a. Clean installation b. In-place upgrade c. Unattended installation d. Reset upgrade

b. In-place upgrade -An in-place upgrade will preserve all of the user's files and applications during the upgrade process from Windows 8 to Windows 10. -A clean installation will completely format the hard drive (losing all of the files and applications) and install a new copy of Windows 10. -A reset upgrade will keep the user's data files, but not the applications on the system.

You have been asked to install a new hard drive in a Windows 10 system. You have already installed the hard drive and booted the system up. Which tool should you use to create the new partitions on the hard drive? a. DxDiag b. Disk Defragmenter c. Disk Management d. Data Sources

c. Disk Management -used to display the drive status, mount the drive, initialize the drive, and create/split/extend/shrink drive partitions.

recovery partition

When u install the OS, windows will also install a recovery partition automatically. -This makes copies of all the installation files into hidden partition. Which can be used during repair installation without needing to find the original installation media. -Choose refresh/restore option and windows will restore all the installation files from the recovery partition.

You are concerned that your servers could be damaged during a blackout or brownout. Which TWO devices would protect against blackouts and brownouts? a. Battery backup b. Surge Suppresser c. Grounding the server rack d. Line conditioner

a. Battery backup d. Line conditioner -A blackout is a total loss of power in a particular area. -A brownout is a reduction in or restriction on the availability of electrical power in a particular area. -To protect against brownout, you can either use a battery backup or a line conditioner. -To protect against a blackout, a battery backup should be used.

Whenever you reboot your domain controller, you notice it takes a very long time to boot up. As the server is booting, you hear noises that sound like a steady series of clicks coming from the hard drive. Which of the following is the BEST action to help speed up the boot time of the server? a. Defragment the hard drive b. Terminate processes in the Task manager c. Perform a Disk Cleanup d. Remove unnecessary applications from startup

a. Defragment the hard drive. -Defragging is a simple process when file fragments are put together to speed up file access. -File fragments are put together, and quality defragmentation utilities also assemble the free space into a single block to prevent future fragmentation.

Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the WPA2 password? a. Disable WPS b. Enable WPA c. Disable SSID broadcast d. Disable WPA2

a. Disable WPS. -WPS was created to ease the setup and configuration of new wireless devices by allowing the router to automatically configure them after a short eight-digit PIN was entered. -Unfortunately, WPS is vulnerable to a brute-force attack and is easily compromised.

Which of the following is used to communicate data and preferences to child processes within a script or batch file? a. Environmental variables b. Variables c. Constants d. Comments

a. Environmental variables. -Shell scripts and batch files use environment variables to communicate data and preferences to child processes. -They can also be used to store temporary values for reference later in a shell script.

Gina just installed a 4 TB HDD into her Windows 10 computer and wants to assign the drive letter "M" to store her media files. Which type of partition should Gina use if she wants to use all of the drives for a single partition? a. GPT b. MBR c. ISO d. FAT32

a. GPT -GPT (GUID partition table) is a newer way to partition disks that allow for partition sizes over the 2 TB limit imposed by MBR.

Dion Training has an open wireless network called "InstructorDemos" for its instructors to use during class, but they do not want any students connecting to this wireless network. The instructors need the "InstructorDemos" network to remain open since some of their IoT devices used during course demonstrations do not support encryption. Based on the requirements provided, which of the following configuration settings should you use to satisfy the instructor's requirements and prevent students from using the "InstructorDemos" network? a. MAC filtering b. NAT c. QoS d. Signal Strength

a. Mac filtering. -the BEST option is to implement MAC filtering to prevent the students from connecting to the network while still keeping the network open. -Reducing the signal strength would not solve this issue since students and instructors are in the same classrooms. Using Network Address Translation and Quality of Service will not prevent the students from accessing or using the open network. -MAC filtering based whitelist of devices that are allowed to use the open network and reject any other devices not listed.

Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to "click here" to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack? a. Phishing b. Spear Phishing c. Whaling d. Brute Force

a. Phishing -Untargeted emails are sent pretending to be from a reputable company to trick users into revealing personal information, such as passwords and credit card numbers. -In this case, email appears to be untargeted since it was sent to both customers and non-customers of this particular bank, it is best classified as phishing. -Spear phishing requires attack to be targeted and less widespread. -Whaling exclusively targets high-ranking individuals while spear phishing usually goes after a category of individuals with a lower profile.

Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as? a. Power surge b. Brownouts c. Blackouts d. Power Spikes

a. Power surge -A power surge is basically an increase in your electrical current. -A power surge often has levels of 10-30% above the normal line voltage and last from 15 milliseconds up to several minutes. -Power spikes are very short pulses of energy on a power line and contain very high voltages. -Typically surges have less voltage than spikes, however they last much longer and sometimes can surges are preceded by spikes.

Your mother just heard that you passed your certification exam and became CompTIA A+ certified. She is so proud of you and needs your help. There is something wrong with her computer, but unfortunately, she doesn't know how to fix it. She asks if you can remotely connect to her computer and see if you can fix it. Which of the following technologies would BEST allow you to remotely access her computer and interact with her Windows 10 laptop? a. RDP b. Telnet c. SSH d. VPN

a. RDP -RDP (remote desktop protocol) is a Microsoft protocol designed to facilitate application data transfer security and encryption between client user devices and a virtual network server. -It enables a remote user to add a graphical interface to the desktop of another computer.

One of your Windows services is failing to start when you boot up your laptop. You have checked the service in the Windows Services tool and verified it is set to Automatic. What should you attempt to do NEXT to get the service to startup? a. Reboot into Safe Mode and see if the service starts b. Run chkdsk on the system c. Restore from backup d. Update the operating system

a. Reboot into Safe Mode and see if the service starts -Windows Services are applications that typically start when the computer is booted and run quietly in the background until it is shut down. -For the Windows operating system to run smoothly, Windows Services must start when required. -Many times, non-Microsoft services or Drivers can interfere with the proper functioning of System Services.

Susan is installing several updates on a Windows computer. Nine of the updates were installed without any issues, but one update produced an error and failed to install. Susan restarts the computer as part of the troubleshooting process, and the computer automatically attempts to install the failed update again. Again, the update fails to install. What should Susan do NEXT? a. Research the error number for the failed update and determine if there is a known issue with this update b. Manually download and install the failed update c.. Review the Event Viewer to determine the cause of the failure d. Download the update from a third-party website like Source Forge and install it

a. Research the error number for the failed update to determine if the issue is a known error. -If an automated system update fails to install, you should research the error number for the failed update to determine if the issue is a known error. -Based on the error code, you can then determine the best method to overcome the issue. For example, a common cause of errors is inadequate space on the hard disk. -If a technician needs to determine how to solve this issue best, researching the error code at Microsoft.com can help.

Which of the following describes the security method used when a user enters their username and password only once and gains access to multiple applications? a. SSO b. Permission propagation c. Inheritance d. Multifactor authentication

a. SSO -SSO or single sign on is an authentication process that allows users to access multiple applications with one set of login credentials. -SSO is a common procedure in enterprises, where a client accesses multiple resources connected to a local area network (LAN).

You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented? a. Smart card b. Key fob c. Biometric reader d. Cable Lock

a. Smart card -A smart card is used in applications that need to protect personal information and/or deliver fast, secure transactions, such as transit fare payment cards, government, and corporate identification cards, documents such as electronic passports and visas, and financial payment cards. Often, smart cards are used as part of a multifactor authentication system where the smart card and a PIN needs to be entered for system authentication to occur. -PIV device : Personal Identity Verification

Christina recently purchased a new Android smartphone and is going on a trip. At the airport, she found a public wireless network called "FreeAirportWiFi" and connects to it. She noticed a question mark (?) icon showing in the toolbar next to the Wi-Fi icon. Christina attempts to open a webpage but gets an error of "The page cannot be displayed." She begins to troubleshoot the device by verifying that the airplane mode is disabled, Bluetooth is enabled, and tethering is enabled. Next, Christina attempts to make a phone call, which works without any issues. Which of the following is MOST likely the issue with Christina's smartphone? a. The smartphone is connected to the FreeAirportWifi but is not authenticated yet.

a. The smartphone is connected to the FreeAirportWifi but is not authenticated yet. -The ? mark is the hint here that there is lack of internet connectivity on the current wireless network. -These types of public wireless networks often have a captive portal or redirect page with the Acceptable Use Policy that must be accepted before giving the smartphone full connectivity to the internet. Once the acceptance is made to the captive portal, the smartphone is logically connected to the internet, and the question mark will be removed.

Which type of installation would require an answer file to install the operating system? a. Unattended b. Repair c. Clean d. Upgrade

a. Unattended -Unattended installations use an answer file that contains user input to various GUI dialog boxes that would otherwise appear during the installation process. -This is a traditional method of deploying a Windows operating system in a large enterprise environment. -Most practical way to install Windows when the client computers have different hardware components, and an image file cannot be used. -Save deployment time and can be used either for clean installs or in-place upgrades.

You noticed that your personal files in your Dropbox had been accessed while you were sleeping. Which of the following threats is this an example of? a. Unauthorized account access b. Unauthorized location tracking c. Unauthorized microphone activation d. Unintended Bluetooth pairing

a. Unauthorized account access -Unauthorized account access can give users access to personal files and data they should not have access to. Therefore, you should closely monitor your account usage.

Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won't open. What should you do? a. Verify the digital certificate is installed on the device b. Ask your boss to resend the email to your Gmail account instead c. Ask your boss to resend the email in an unencrypted format d. Open the email using your device's web browser and your corporate webmail

a. Verify the digital certificate is installed on the device. -If an encrypted email does not open in your mail app, you most likely need to verify that your digital certificates are properly installed on the device as these are used to decrypt encrypted emails.

You are working as a penetration tester and have discovered a new method of exploiting a vulnerability within the Windows 10 operating system. You conduct some research online and discover that a security patch against this particular vulnerability doesn't exist yet. Which type of threat would this BEST be categorized as? a. Zero day b. DDOS c. Brute Force d. Spoofing

a. Zero-day -A zero-day attack happens once that flaw, or software/hardware vulnerability, is exploited, and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability, hence the term zero-day.

You are working on a Windows 10 workstation that is operating much too slowly. Which TWO of the following commands should you use to speed up the system? a. chkdsk b. diskpart c. ipconfig d. dism e. dir f. format

a. chkdsk d. dism -The Deployment Image Servicing and Management (DISM) is a command-line tool used to mount and service Windows images before deployment. -The dism command with the /Restore Health option can run a scan to identify and repair any corruption of an image or virtual hard drive. If you have a physical hard drive operating slowly, the the chkdsk command could be used instead.

Which command on a macOS or Linux system is used to change the permissions of a file? a. chmod b. sudo c. chown d. pwd

a. chmod -Chown is used to change the owner of the file, but not its permissions. -The sudo command allows a command to be executed as the superuser (root) instead of the current user. -The pwd is used to display the path to the present working directory (current directory) to the terminal or display.

What is the minimum amount of RAM needed to install Windows 8.1 on a 64-bit system? a. 1 GB b. 2 GB c. 4 GB d. 8. GB

b. 2 GB -the minimum requirements are a 1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space.

Every new employee at Dion Training must sign a document to show they understand the proper rules for using the company's computers. This document states that the new employee has read the policy that dictates what can and cannot be done from the corporate workstations. Which of the following documents BEST describes this policy? a. MOU b. AUP c. SOW d. SLA

b. AUP -AUP (acceptable use policy) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the internet. -For e.g: it may state that they must not attempt to break the security of any computer network, user, or prohibits visiting pornographic websites from their work computer.

You are working on a customer's computer when your cellphone begins to ring. What should you do? a. Apologize to the customer and answer the phone b. Apologize to the customer and send the call to the voicemail c. Answer the phone while continuing to work on the customer's computer d. Ignore the phone and let it continue ringing until it goes to voicemail

b. Apologize to the customer and send the call to the voicemail -When working on a customer's computer, you should avoid distractions. You should not take personal calls, check your text messages, talk to coworkers, or partake in other personal interruptions. It is important to remain professional.

A user's computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do? a. Answer the phone and politely ask the user to call back later b. Ask another Tier 2 technician to answer the call since it will take too long to solve. c. Troubleshoot the issue for the user regardless of how long it takes d. Answer the phone, put the user on hold, and help them after their scheduled break

b. Ask another Tier 2 technician to answer the call since it will take too long to solve. -Since the Tier 2 technician already knows that this will take some time to resolve, it would be best to ask another technician to help the user since they are scheduled for their break. -It would be improper to either ask the user to call back later or put them on a long hold.

A small business recently experienced a catastrophic data loss due to flooding from a recent hurricane. The customer had no backups, and all of the hardware associated with the small business was destroyed during the flooding. As part of the rebuilding process, the small business contracts with your company to help create a disaster recovery plan to ensure this never reoccurs again. Which of the following recommendations should you include as part of the disaster recovery plan? a. Local backups should be conducted b. Backups should be conducted to a cloud-based storage solution c. Local backups should be verified weekly to ensure no data loss occurs d. Purchase waterproof devices to prevent data loss

b. Backups should be conducted to a cloud-based storage solution -While losing the hardware is a problem for the small business, their insurance will replace the hardware if destroyed in a flood. The data involved is more of a concern. Therefore, backups should be the primary concern. -Local backups are risky since they would be destroyed in another flood; therefore, using a cloud-based storage solution would be ideal and prevent future data loss.

Your Windows 10 system is booting up very slowly. Which of the following should you do to speed up the boot process? a. Reboot the system into Safe Mode b. Disable unnecessary programs from automatically starting up c. Reinstall Windows d. Rebuild you Windows profile

b. Disable unnecessary programs from automatically starting up. -While many of these solutions may decrease boot time, the BEST (and first) thing to attempt is to disable unnecessary applications from automatically starting up. -This can be configured from the MSCONFIG tool under the Startup tab.

A small business network was recently infected by a piece of malware from a USB drive that copied sensitive data from a computer, infected the system, and then spread across the network by infecting other systems. Which of the following actions could have prevented this type of attack from occurring? a. Enforcing the use of complex passwords b. Disabling AutoRun on the computer c. Replacing the default credentials on the system d. Enabling full disk data encryption

b. Disabling AutoRun on the computer. -The Windows AutoRun feature is turned on by default on most Windows versions, allowing programs to run from an external device as soon as it is attached to a computer. -Malware can exploit the AutoRun feature and allow it to spread its payload from your external USB device to a computer. -For this reason, users should disable the AutoRun feature.

Two weeks ago, David's computer was infected with a virus. A technician performed the malware removal process on the machine and removed the infection from the system. Now, many of the symptoms have returned on David's computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation? a. Enable System Restore and create a restore point (in Windows) b. Educate the end-user about how to avoid malware in the future c. Update the anti-virus software and run a full system scan d. Quarantine the infected system by removing its network connectivity

b. Educate the end-user about how to avoid malware in the future -If a technician neglects to educate the end-user about avoiding malware in the future, they will likely get their computer infected again. -For example, educating the user on best practices like being cautious when opening an attachment or clicking a link in an email, instant message, or post on social networks can prevent future infections.

You have just run an anti-virus scan on a workstation, discovered about 25 different malicious items, and successfully removed them. You have scheduled a daily scan of the workstation, enabled the System Restore function, and created a new restore point. What is the NEXT step in the malware removal process? a. Quarantine the infected system b. Educate the end-user c. Remediate the infected systems d. Update the applications and the operating system

b. Educate the end-user. (1) Identify and research malware symptoms, (2) Quarantine the infected systems, (3) Disable System Restore (in Windows), (4) Remediate the infected systems, update the anti-malware software, scan the system, and use removal techniques (safe mode, pre-installation environment), (5) Schedule scans and run updates, (6) Enable System Restore and create a restore point (in Windows), and (7) Educate the end-user.

A user is complaining that their touchscreen on their smartphone is not responding to their touch. What is the FIRST step you recommend to solve this issue? a. Replace the defective touchscreen b. Have the user restart the device c. Reinstall the OS d. Enable and disable airplane mode

b. Have the user restart the device. -If a smartphone's touchscreen is unresponsive, the first step is to restart (or reboot) the device. This will cause the operating system and its device drivers to be reloaded and normally restore the touchscreen's functionality if it is a software issue.

Which low power mode is used with laptops to save power, but it takes longer to turn back on and resume where the user left off? a. Sleep b. Hibernate c. Balanced d. Power saver

b. Hibernate -Hibernate mode uses less power than sleep mode and is usually available for laptops. -It takes a bit longer to resume than sleep mode does, but it will resume everything where you left off once the laptop is powered back on. -Hibernate mode should be used when you won't be using your laptop for an extended period of time.

Chris just downloaded a new third-party email client for his smartphone. When Chris attempts to log in to his email with his username and password, the email client generates an error messaging stating that "Invalid credentials" were entered. Chris assumes he must have forgotten his password, so he resets his email username and password and then reenters them into the email client. Again, Chris receives an "Invalid credentials" error. What is MOST likely causing the "Invalid credentials" error regarding Chris's email client? a. His email account is locked out b. His email account requires multifactor authentication c. His email account requires a strong password to be used. d. His smartphone has full device encryption enabled.

b. His email account requires multifactor authentication.

A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds? a. Upgrade to a new smartphone b. Increase the Wi-Fi signal being transmitted by their WAP c. Turn off Wi-Fi and rely on their cellular data plan d. Enable MAC filtering in their WAP

b. Increase the Wi-Fi signal being transmitted by their WAP -Slow data speeds can be caused by too much interference or a weak signal. -Try changing the channel on Wi-Fi routers to less-used channels or boost the signal being transmitted, and the performance should increase. -Alternatively, if the cellular signal is too low, you can install a signal booster or microcell in the home or office.

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this type of issue from occurring again in the future. Which of the following would BEST prevent this from reoccurring? a. Install a host-based intrusion detection system on all of the corporate workstations. b. Install an anti-virus or anti-malware solution that uses heuristic analysis. c. Install a Unified Threat Management system on the network to monitor for suspicious traffic d. Monitor all workstations for failed login attempts and forward them to a centralized SYSLOG server.

b. Install an anti-virus or anti-malware solution that uses heuristic analysis. -Heuristic analysis is a method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild.

You are setting up the Remote Desktop Services on a Windows 2019 server. To increase the security of the server, which TWO of the following actions should you take? a. Disable log on time restriction on the server b. Logically place the Windows 2019 server into the network's DMZ c. Change the default access port for the terminal server d. Enforce password complexity on the server e. Force the use of a local client certificate for authentication with the server f. Block all unused ports on the switch, router and firewall

b. Logically place the Windows 2019 server into the network's DMZ f. Block all unused ports on the switch, router and firewall -Since the server will allow remote connections from across the internet to access the server directly, the server must be placed into the De-Militarized Zone (DMZ) of the network and not in the internal trusted portion of the network. -Additionally, any server or services that will be forward-facing to the internet (like a Remote Desktop Services server) should have all of the unused ports blocked on the switch, router, and firewall to minimize the footprint of the network. -By blocking unused ports, there are fewer ways for an attacker to get into the network and attack the server.

You are cleaning out the closet in your office and find several bottles of cleaner that need to be disposed of. Which of the following should you consult to determine the proper method of disposal? a. SOW b. MSDS c. MITM d. MOU

b. MSDS -MSDS (Material Safety Data Sheet) is a document that contains information on the potential hazards (health, fire, reactivity, and environmental) and how to work safely with the chemical product. It is an essential starting point for the development of a complete health and safety program. -The MSDS also includes the directions for proper handling and disposal of the chemicals. -SOW (statement of work) -MOU (Memorandum of understanding)

You have discovered that an employee has been conducting illegal activities using his workplace computer. You have taken possession of the employee's laptop according to your company's procedures and are waiting to give it to law enforcement authorities. What should you do when turning over the laptop to the police? a. Preserve the evidence b. Maintain the chain of custody c. Document the changes d. Quarantine the system

b. Maintain the chain of custody -Chain of custody or CoC, in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. -The chain of custody must be maintained from when you arrived at the laptop until you turn it over to law enforcement officials.)

Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards? a. PHI b. PCI c. GDPR d. PII

b. PCI -PCI DSS (Payment Card Industry Data Security Standard) applies to companies of any size that accept credit card payments. -If your company intends to accept card payment and store, process, and transmit cardholder data, you need to securely host your data and follow PCI compliance requirements.

When using an MBR, which of the following types of partitions can only have a limit of four partitions? a. Extended b. Primary c. Swap d. logical

b. Primary Primary partitions are limited to only four primary partitions on a system using MBR. To overcome this limitation, extended partitions can be used.

Samantha works in the human resource department in an open floorplan office. She is concerned about the possibility of someone conducting shoulder surfing to read sensitive information from employee files while accessing them on her computer. Which of the following physical security measures should she implement to protect against this threat? a. Biometric lock b. Privacy screen c. Hardware token d. Badge reader

b. Privacy screen -A privacy screen is a filter placed on a monitor to decrease the viewing angle. This prevents the monitor from being viewed from the side and can help prevent shoulder surfing. -The standard type of anti-glare filter consists of a coating that reduces the reflection from a glass or plastic surface.

Your company recently suffered a small data breach caused by an employee emailing themselves a copy of the current customer's names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which of the following logical security concepts should you implement to prevent a trusted insider from stealing your corporate data? a. Firewall b. MDM c. DLP d. Strong passwords.

c. DLP (Data Loss Prevention) DLP software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in use (endpoint actions), in-motion (network traffic), and at rest (data storage). Since the user was an authorized user (employee), changing your password policy, reconfiguring the firewall, or setting up an MDM solution would not solve this problem. Instead, a DLP solution must be implemented. exfiltration meaning: withdrawing from a dangerous position. For e.g: US troops have been exfiltrated from IRAN.

When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are abysmal, and the browser creates numerous pop-ups. Jonathan asks for your assistance in fixing this issue. Which TWO of the following actions do you recommend Jonathan perform first? a. Delete the web browser's cache, temporary files, and cookies b. Reset the web browser to the default settings and configuration c. Tell Jonathan to switch to a different web browser d. Uncheck any unapproved applications from the Startup tab in MSCONFIG e. Reboot Jonathan's computer and install a second anti-virus program f. Update Jonathan's web browser to the latest version

b. Reset the web browser to the default settings and configuration. d. Uncheck any unapproved applications from the Startup tab in MSCONFIG. -Browser redirection and pop-ups are a common symptom of malware being installed on a computer. -It is recommended that the web browser be reset to its default settings and configurations to remove any redirection settings that the malware may have made to the browser. -Additionally, any unapproved applications should be unchecked from the Startup tab in MSCONFIG to ensure the malware isn't reloaded during the next reboot.

A macOS user is browsing the internet in Google Chrome when they see a notification that says, "Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!" What type of threat is this user experiencing? a. Phishing b. Rogue anti-virus c. Pharming d. Worm

b. Rogue anti-virus -Rogue anti-virus is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer). -It is a form of scareware that manipulates users through fear and a form of ransomware. -Since the alert is being displayed on a macOS system but appears to be meant for a Windows system, it is obviously a scam or fake alert and most likely a rogue anti-virus attempting to infect the system.

A Windows laptop is malfunctioning, and you believe that some system files are missing or corrupted. Which of the following commands should you use to verify this and, if needed, repair the files? a. chkdsk b. sfc c. gupdate d. xcopy

b. SFC If some Windows functions aren't working or Windows crashes, then you can use the System File Checker (SFC) to scan Windows and restore your system files.

A flat panel television was just installed in a conference room in your office building. The facilities manager is concerned that it could be damaged during a lightning strike. The conference room is only used a few times a week, so the company is not concerned about the threat of power outages. Which of the following should be installed to BEST mitigate the facilities manager's concerns without spending too much money? a. UPS b. Surge protector c. Line conditioner d. Power Strip

b. Surge protector -A surge protector defends against possible voltage spikes that could damage your electronics, appliances, or equipment. -A power strip will not protect against voltage spikes. -A UPS or line conditioner could protect against voltage spikes, but they cost much more than a surge protector. -That's why Surge protector is the best answer.

Mark's laptop is running Windows 10 and appears to become slower and slower over time with use. You decide to check the current CPU utilization and observe that it remains in the 95% to 100% range fairly consistently. You close three of Mark's open applications and recheck the CPU utilization. You notice the utilization dropped to the 30% to 35% range. A week later, Mark calls you again and says the computer is extremely slow. Which of the following tools can you use to check the CPU utilization and manage any high-resource processes? a. MSTSC b. Task Manager c. MSCONFIG d. PerfMon

b. Task Manager -The Task Manager is an advanced Windows tool that provides several tabs that allow users to monitor the applications, processes, services, and CPU utilization on a computer. -Especially the Processes Tab lets you quickly see how system resources are utilized, which can help troubleshoot applications or find out why the computer is suddenly performing slowly. ##Remember that MSTSC is for RDP

Jason took home a company-issued Windows 8.1 laptop home to do some work. He successfully connected it to his home's wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network's shared files from his home network's media server. Which of the following may be why Jason is unable to access the network shares in his home network? a. The laptop has an IP confict b. The laptop must join the HomeGroup c. The laptop's gateway is not properly configured d. The laptop's DNS configuration is not properly setup.

b. The laptop must join the HomeGroup. The HomeGroup for the home network must be joined for the laptop to access the local network's shared files from the network's media server. The rest of the options can be dismissed since the laptop can access the internet successfully and browse the web.

Janice called the help desk to report that her computer will not boot up. The technician begins troubleshooting the issue, but after 20 minutes, the computer is still not booting up. Janice is getting frustrated with the technician, and she tells the technician that she feels that they are wasting her time since the issue isn't resolved yet. How should the technician respond to Janice's frustration? a. The technician should recommend that Janice call back to the help desk for more assistance when she has more time available b. The technician should ask open-ended questions to properly identify the issue by narrowing down the possible symptoms or causes. c. The technician should tell Janice that they are required to follow a specific troubleshooting procedure to identify the issue and solve the problem d. The technician should "accidentally" hang up the call so that Janice gets a different technician when she calls the help desk again

b. The technician should ask open-ended questions to properly identify the issue by narrowing down the possible symptoms or causes. -Technicians should also avoid arguing with customers, becoming defensive, dismissing customer problems, or becoming judgmental.

Your smartphone's battery has been draining quickly. You have looked at the applications that are causing the drain and notice that a free game runs in the background, collecting GPS data even when you aren't using it. Which of the following threats is this an example of? a. Unauthorized account access b. Unauthorized location tracking c. Unauthorized microphone activation d. Unintended Bluetooth pairing

b. Unauthorized location tracking - It clearly says GPS data. -You can optimize your battery life and protect yourself by turning off Location Services. On an iPhone, turn off in Settings > Privacy > Location Services. There you will see each app listed along with its permission setting. Apps that recently used location services have an indicator next to the on/off switch, and you can configure them accordingly.

You are working as a technician for a small company and recently moved some files from one server to another to free up some storage capacity on the existing server. Now, multiple users have begun reporting that they cannot access some of their previous shares on the file server. If a user attempts to open one of the shares, they get an "Access Denied" error. You have verified that all users are located in the correct security groups, and their access permissions are correct. Still, the users cannot access the network shares. Which of the following is MOST likely causing the issue with the users accessing the network shares? a. The network shares require administrative permissions b. Users are trying to access the shares via their previously mapped drive letters. c. The users are trying to access the shares during Group Policy restricted hours. d. The proxy settings on the user's computers are disabled.

b. Users are trying to access the shares via their previously mapped drive letters. -Since the data is moved from one network share to another, the users will need to remap their network drive letters to the new file paths. -Using the existing drive mapping, they will still be pointing to the old server (which no longer has the files and is presenting an "Access Denied" error message).

A small doctor's office has asked you to configure their network to use the highest levels of wireless security and desktop authentication. The office only uses cloud-based SaaS applications to store their patient's sensitive data. Which TWO of the following protocols or authentication methods should you implement for the BEST security? a. WPS b. WPA2 c. WEP d. RADIUS e. SSO f. Multifactor

b. WPA 2 f. Multifactor authentication Since everything is being stored in a cloud-based SaaS application, the doctor's office needs to ensure network connection uses the highest level of encryption which is WPA2, and their desktop authentication should use a multifactor authentication system. Multifactor authentication relies on using at least 2 of the following factors: something you know (password or pin), something you have (smart card or key fob), something you are (fingerprint or retinal scan), or something you do (draw a pattern or how you sign your name).

A user recently bought a used Windows laptop. When they booted up the computer, they were not greeted with a normal desktop but instead will a screen filled with tiles. Which version of Windows is the laptop MOST likely running? a. Windows 7 b. Windows 8 c. Windows 8.1 d. Windows 10

b. Windows 8 -Microsoft did not support setting Windows 8 to boot straight to the Desktop and skip the new Start screen that displays the tiles. Windows 8 was not widely accepted by end-users, and Microsoft quickly added the Desktop back in Windows 8.1 and Windows 10. -ONLY WINDOWS 8 has tiles!!!!

You are writing a script that will take an employee's name as the input. Which of the following data types would the employee's name be store in? a. Integer b. String c. Boolean d. Float

b. string -A string is a data type used in programming used to represent text rather than numbers. -It is comprised of a set of characters that can also contain spaces and numbers. For e.g: the word "hamburger" and the phrase "I ate 3 hamburgers" are both strings. -boolean : binary

Which of the following types of remote access technologies should NOT be used in a network due to its lack of security? a. RDP b. telnet c. SSH d. VPN

b. telnet -Telnet should not be used in a network due to its weak security posture. Telnet transmits all of the data in plain text (without encryption), including usernames, passwords, commands, and data files. -For this reason, it should NEVER be used in production networks and has been replaced by SSH in most corporate networks. SSH : port 22, telnet : port 23, RDP : port 3389

What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system? a. 10 GB b. 16 GB c. 20 GB d. 32 GB

c. 20 GB -For the Windows 10 (64-bit) operating system, the minimum requirements are a 1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space.

Judith is trying to install Windows 10 (64-bit) on a virtual machine on her Mac OS X laptop. The installation is continually failing and producing an error. You look at the virtual machine's specifications and see that Judith has configured a VM with a dual-core 1 GHz processor, 2 GBs of memory, a 15 GB hard drive, and a 1024x768 screen resolution. What would you recommend increasing to fix the installation issues being experienced? a. Number of CPU cores b. Amount of memory c. Amount of hard drive space d. The screen resolution.

c. Amount of hard drive space. -For the Windows 10 (64-bit) operating system, the minimum requirements are a 1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space.

Your Windows 10 machine has just crashed. Where should you look to identify the cause of the system crash and how to fix it? a. MAC b. DDOS c. BSOD d. MITM

c. BSOD -A stop error, commonly called the blue screen of death, blue screen, or BSOD, is an error screen displayed on a Windows computer system following a fatal system error. -It indicates a system crash, in which the operating system has reached a condition where it can no longer operate safely.

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue? a. Check that the printer is not offline b. Check to ensure the printer selected is the default printer c. Check the status of the print server queue d. Cancel all documents and print them again

c. Check the status of the print server queue -When this issue occurs, it is often because the system properly sent the print job to the print queue, but the print queue has become stuck. -If no error is shown in the taskbar's printer icon, the user should open the print queue to determine if the print job has become stuck. If it is, then the print queue can be emptied or reset.

Your Android device's battery is advertised to last 12 hours, but it drains almost completely within 90 minutes. What should you do FIRST to try and solve this problem? a. Dim your phone's display b. Enable airplane mode to save battery c. Check which apps are using the most battery life d. Reboot your phone

c. Check which apps are using the most battery life -If your battery is dying faster than in the past, see whether apps are using too much battery -You can force stop or uninstall problem apps. If your device is infected with malware, this can also drastically reduce your battery life, and the malware should be removed.

A business owner's smartphone contains a lot of her customer's PII. Unfortunately, the business owner refuses to set up the phone to automatically wipe the data if the phone is lost or stolen because the data is precious. Based on the business owner's refusal to allow automatic wiping of the data, which of the following is the next BEST method of securing the phone? a. Enable a swipe lock on the device b. Enable a PIN lock on the device c. Enable a fingerprint lock on the device d. Enable a passcode lock on the device

c. Enable a fingerprint lock on the device. -Out of the options provided, the use of a fingerprint lock would be considered the best or strongest protection. This would ensure that only the user who owns the phone can unlock it since the swipe, PIN, or passcode lock could be compromised since they rely only on the knowledge of a secret pattern or code.

A Windows 2019 server is crashing every evening at 2:35 am, but you are not sure why. Which of the following tools should you use to identify the cause of the system crash? a. Windows Firewall b. Advanced Security c. Event Viewer d. Explorer

c. Event Viewer -Event Viewer shows a log of application and system messages, including errors, information messages, and warnings. -It's a useful tool for troubleshooting all kinds of different Windows problems. -Event viewer helps to identify what is occurring at around 2:35 am each day before the server crashed and use this to troubleshoot the problem. -Control panel ===> Administrative Tools ===> Event Viewer ===> Windows logs ===> Applications, Security, Setup, System, Forwarded events.

An Android user recently cracked their screen and had it replaced. If they are in a dark room, the phone works fine. If the user enters a room with normal lights on, then the phone's display is dim and hard to read. What is MOST likely the problem? a. Defective display b. Auto-brightness is disabled c. Faulty ambient Light Sensor d. Low Battery

c. Faulty ambient light sensor. -The ambient light sensor may be too sensitive as it is taking in more light than usual. -This can occur if the sensor is faulty or if the screen was replaced incorrectly, and the technician forgot to install the black gasket around the ambient light sensor.

Your company is expanding its operations in the European Union and is concerned about additional governmental regulations that may apply. Which of the following regulations applies when processing personal data within the European Union? a. PHI b. PCI c. GDPR d. PII

c. GDPR -GDPR (General Data Protection Regulation) is a regulation that applies to companies that do business in the European Union.

Which file system type is most commonly used on a macOS (OS X) system? a. NTFS b. NFS c. HFS d. FAT32

c. HFS -The macOS system uses HFS and HFS+. -Since shifted to OS X, Apple's computers all support HFS+ by default. -Modern Windows systems use NTFS by default, and older Windows systems used FAT32. -NFS is the network file system and was created by Sun Microsystems for network file shares.

Your company has just installed 50 new LCD monitors to replace some ancient CRT monitors. How should you properly dispose of the old CRT monitors? a. Recycle them b. Haul them to the landfill c. Give them to charity c. In accordance with local government regulations and handling procedures.

c. In accordance with local government regulations and handling procedures. -When disposing of a CRT monitor, cellphone, tablets, toner, and batteries, you should follow your local government regulations for the proper disposal of these items as they are considered "toxic waste." -They may be recycled or reused, but consult your local regulations before making that decision.

You have been asked to recycle 20 of your company's old laptops. The laptops will be donated to a local community center for underprivileged children. Which of the following data destruction and disposal methods is MOST appropriate to allow the data on the drives to be fully destroyed and the drives to be reused by the community center? a. Standard formatting of the HDDs b. Drill/hammer the HDD platters. c. Low-level formatting of the HDDs d. Degaussing of the HDDs.

c. Low-level formatting of HDDs Low-level formatting is a hard disk operation that should make recovering data from your storage devices impossible once the operation is complete. Perfect if you're giving away the hard disk. Standard formatting of the drives could allow the data to be restored and make the data vulnerable to exposure. Quick format: won't erase data Regular format: erases data Degaussing the drives would render the drives useless to the community center. Therefore, the safest method is a low-level format since it fully destroys the data and allows the drives to be reused by the community center.

A user is complaining that every time they reboot their Windows 8 computer, a music application loads up. Which of the following commands would you use to disable the program from starting up each time Windows reboots? a. Services. msc b. Task Manager c. MSCONFIG d. Event Viewer

c. MSCONFIG -The msconfig utility has 5 tabs: General, Boot, Services, Startup, and Tools. -If you click on the Startup tab, you will see every program configured to start up when Windows is booted up. -This can be used to disable unwanted programs from launching during the boot-up process. -For Windows 8/8.1, you should use msconfig to disable the program from starting up each time. -For a Windows 10 machine, you should use task manager.

A cybersecurity analyst is auditing your company's network logs and identifies that a USB mass storage device was previously inserted into many of the company's servers. The logs also showed dozens of failed login attempts before a successful login occurring on the servers. Which TWO of the following actions are recommended to eliminate the vulnerabilities identified by the cybersecurity analyst? a. Change the default credentials on the servers b. Remove administrative permissions c. Modify the AutoRun settings d. Install the operating system security updates. e. Lockout the account after 3 failed login attempts f. Install a host-based firewall on the servers.

c. Modify the AutoRun settings. e. Lockout the account after 3 failed login attempts. -Since the USB mass storage device was used to connect to the servers, it is recommended to modify the AutoRun settings. -To prevent the password guessing attacks used, the servers should be configured to lock out any account after 3 failed login attempts.

Which of the following operating systems are NOT used in modern smartphones or tablets? a. iOS b. Android c. OS X d. Chrome OS

c. OS X -OS X is only supported on Apple desktops, laptops, and servers. It is not available on smartphones or tablets since Apple uses the iOS operating system on those devices.

Which of the following should be configured if a user wants to allow another computer to connect to their system using a Remote Desktop Connection? a. Sync center b. HomeGroup c. Remote Settings d. System Protection

c. Remote settings -With Remote Desktop Connection, you can connect to a computer running Windows from another computer running Windows that's connected to the same network or the internet. -For e.g: you can use all of your work computer's programs, files, and network resources from your home computer, and it's just like you're sitting in front of your computer at work. To enable it, the Remote Desktop must be enabled, and the "Remote settings" must be properly configured on the computer you want to allow remote connections into.

A computer is infected with malware that has infected the Windows kernel to hide. Which type of malware MOST likely infected this computer? a. Ransomware b. Trojan c. Rootkit d. Botnet

c. Rootkit -A rootkit is generally a collection of tools that enabled administrator-level access to a computer or network. -They can often disguise themselves from detection by the operating system and anti-malware solutions. -If a rootkit is suspected on a machine, it is best to reformat and reimage the system. -A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence.

Dion Training has an open wireless network so that their students can connect to the network during class without logging in. The Dion Training security team is worried that the customers from the coffee shop next door may be connecting to the wireless network without permission. If Dion Training wants to keep the wireless network open for students but prevents the coffee shop's customers from using it, which of the following should be changed or modified? a. Default SSID b. Firewall c. Signal Strength or power level d. MAC filtering

c. Signal strength or power level. -the BEST option is to reduce the signal strength of the network's power level. This will ensure the wireless network can only be accessed from within its classrooms and not from the coffee shop next door. While MAC filtering could be used to create an approved whitelist of MAC addresses for all of Dion Training's students, this could also require it to be continuously with each class of students that is very time-intensive and inefficient.

A smartphone user notices that their phone gets very hot, and their battery is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem? a. The touchscreen is faulty b. The battery is depleted c. The smartphone is infected with malware and using a lot of processing power d. The charging port is faulty

c. The smartphone is infected with malware and using a lot of processing power -When a smartphone is being heavily used (runaway processes, GPS, heavy data transfer), it generates more heat. -If the device is generating a lot of heat and the battery is draining quickly, even with the phone in "sleep mode" in your pocket, this could indicate that the phone is infected with malware. -If the phone is powered down and still generates a lot of heat, this could be a faulty battery.

Natalie's iMac has been infected with malware. The malware has caused numerous files to be deleted from the system, and the operating system is now corrupted. Natalie needs to access some of her files from the computer that have been deleted by the malware. Which of the following built-in utilities should be used to restore access to those files? a. Boot Camp b. System Restore c. Time Machine d. Snapshot

c. Time Machine -Time Machine is the built-in backup feature of the Mac OS X operating system. -It can be used to automatically back up all of the system's files, including apps, music, photos, email, documents, and system files. -Once a user has a valid backup in Time Machine, they can restore files from the backup if the original files are ever corrupted or deleted on their Mac or if the hard disk (or SSD) is erased or replaced.

A user has reported that their workstation is running very slowly. A technician begins to investigate the issue and notices a lot of unknown processes running in the background. The technician determines that the user has recently downloaded a new application from the internet and may have become infected with malware. Which of the following types of infections does the workstation MOST likely have? a. Rootkit b. Keylogger c. Trojan d. Ransomware

c. Trojan -A trojan is a type of malware that looks legitimate but can take control of your computer. -A Trojan is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network. -The most common form of a trojan is a Remote Access Trojan (RAT), which allows an attacker to control a workstation or steal information remotely. -To operate, a trojan will create numerous processes that run in the background of the system.

A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system's web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then performed the remediation to remove the malware. You have scanned the machine with several anti-virus and anti-malware programs and determined it is now cleaned of all malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated anti-virus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers? a. Perform a System Restore to an earlier date before the infection b. Install a secondary anti-malware solution on the system c. Verify the hosts.ini file has not been maliciously modified d. Reformat the system and reinstall the OS

c. Verify the hosts.ini file has not been maliciously modified -Browser redirection occurs if the browser's proxy is modified or the hosts.ini file is modified. -If the redirection occurs only for a small number of sites or is occurring in all web browsers on a system, then it is most likely a maliciously modified hosts.ini file. -The hosts.ini file is a local file that allows a user to specify specific domain names to map to particular addresses.It works like a very basic DNS server and can be used to redirect a system's internet connection.

A user has asked you for a recommendation for a word processing program for their home computer. The user doesn't want to pay for a license to be able to use the word processor. Based on this, what type of license would you recommend to the user? a. Personal license b. Corporate license c. Enterprise license d. Open license

d. Open license -An open license or free license is the legal statement that allows free content and free software to be free. -Since the customer doesn't want to pay for a license, the user must get a word processing program that uses an open license to not pay for their software. For e.g: OpenOffice is an open license-based software that provides a word processor that can be used on Windows, Linux, or OS X for free.

Nicole's smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is at home. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue? a. Reset the data usage statistics on the smartphone b. Update the smartphone's applications on OS c. Verify the smartphone is connected to the correct SSID d. Reset the smartphone's wireless network settings

c. Verify the smartphone is connected to the correct SSID -Most likely, Nicole's smartphone is connecting to a neighbor's wireless network instead of her own. -This network likely has a lower signal strength since it is outside her home, and this is causing the limited or slow bandwidth. -Therefore, you should first verify that Nicole is connected to the proper wireless network before conducting any additional troubleshooting.

A cybersecurity analyst from BigCorp contacts your company to notify them that several of your computers were seen attempting to create a denial of service condition against their servers. They believe your company has become infected with malware, and those machines were part of a larger botnet. Which of the following BEST describes your company's infected computers? a. Monsters b. Zero-day c. Zombie d. Bugs

c. Zombie -A zombie is a computer connected to the internet that has been compromised by a hacker, computer virus, or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction. -Botnets of zombie computers are often used to spread email spam and launch denial-of-service attacks (DoS attacks).

Which command is used to create a new disk partition on a Windows system? a. chkdsk b. format c. diskpart d. dd

c. diskpart -DiskPart is a command-line disk-partitioning utility available for Microsoft operating systems. You can use it to view, create, delete, and modify a computer's disk partitions. -dd is a command-line utility for Unix and Unix-like operating systems whose primary purpose is to convert and copy files.

A technician wants to conduct a vulnerability scan on a server every morning at 3:00 am. Which of the following tools should the technician use? a. Data Sources b. Event Viewer c. Task Schedular d. Services.msc

c. task scheduler -The Task Scheduler is a tool included with Windows that allows predefined actions to be automatically executed whenever a certain set of conditions is met. -For e.g, you can schedule a task to run a backup script every night or send you an email whenever a certain system event occurs. -Control panel ===> Administrative Tools ===> Task schedular

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the file be in? a. .bat b. .sh c. .py d. .ps1

d. .ps1 -If you want to save a series of PowerShell commands in a file to rerun them later, you effectively create a PowerShell script. -This is simply a text file with a .ps1 extension. The file contains a series of PowerShell commands, with each command appearing on a separate line.

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not Found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error? a. The MBR bootloader was installed accidentally b. Windows Startup services are not properly running c. An unsupported version of Linux is installed d. An incompatible partition is marked as active

d. An incompatible partition is marked as active -This issue may occur if one or more of the following conditions are true: (1) the basic input/output system (BIOS) does not detect the hard disk, (2) the hard disk is damaged, (3) sector 0 of the physical hard disk drive has an incorrect or malformed master boot record (MBR), (4) an incompatible partition is marked as Active, or (5) a partition that contains the MBR is no longer active. No. 4: an incompatible partition is marked as Active is the only option that matches this situation.

You are helping to set up a backup plan for your organization. The current plan states that all of the organization's servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend? a. Create an additional copy of the backups in an off-site datacenter b. Set up scripts to automatically reattempt any failed backup jobs. c. Frequently restore the server from backup files to test them d. Attempt to restore a test server from one of the backup files to verify them.

d. Attempt to restore a test server from one of the backup files to verify them. The only way to fully ensure that a backup will work when needed is to restore the files from the backups. To do that, it is best to restore them to a test server since this will not affect your production environment.

A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. Which of the following tools should be used to allow both operating systems to exist on their MacBook Pro? a. Terminal b. Mission Control c. Image recovery d. Boot Camp

d. Boot Camp -Boot Camp is used to allow dual booting on a Macintosh computer. It allows the user to boot into either macOS (OS X) or Windows as the computer is rebooted. -Requires apple device drivers i.e run Windows on Apple's Intel CPU architecture.

Your company works as a contractor to the military and has just finished replacing about 500 workstations across its secure network. You have been asked to properly dispose of the workstations and destroy the data on their hard disk drives. Which of the following methods would be the MOST effective? a. Physically destroy the drives by drilling each HDD's platter b. Fully format each hard drive with a series of Os c. Conduct a low-level format of each hard drive d. Degauss each of the hard drives.

d. Degauss each of the hard drive. -Degaussing is the process of erasing/wiping a hard disk drive or magnetic tape. -When exposed to the powerful magnetic field, the magnetic data on a hard disk is neutralized or erased. -Formatting is time consuming since each drive must be formatted or destroyed individually. -With an industrial degausser, multiple hard drives can be destroyed at once, and they take less than a minute to degauss the hard drives.

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used? a. WPA2 b. WEP c. WPS d. RADIUS

d. RADIUS -With RADIUS and SSO configured, users on the network can provide their user credentials one time (when they initially connect to the wireless access point or another RADIUS client) are automatically authenticated to all of the network's resources. -Combines Authentication, Authorization and Accounting(AAA), UDP, Password Encryption.

Your company wants to ensure that users cannot access USB mass storage devices. You have conducted some research online and found that if you modify the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor key, it will prevent USB storage devices from being used. Which of the following tools should you use to modify this key? a. MSCONFIG b. MSTSC c. MMC d. RegEdit

d. RegEdit - The Registry Editor (RegEdit) allows you to view and make changes to system files and programs that you wouldn't be able to access otherwise. -The registry is a database made up of hives and keys that control various settings on a Windows system. Incorrectly editing the Registry can permanently damage your computer, so it is important to be very careful when modifying the registry using RegEdit.

A factory worker suspects that a legacy workstation is infected with malware. The workstation runs Windows XP and is used as part of an ICS/SCADA system to control some industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation. After its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent reinfection? a. Quarantine the infected system b. Disable System Restore (in Windows) c. Remediate the infected systems d. Update the anti-malware solution e. Enable System Restore and create a restore point (in Windows) f. Identify and research malware symptoms

d. Update the anti-malware solution -Since the workstation is isolated from the internet, the anti-malware solution will need to be manually updated to ensure it has the latest virus definitions. Without the latest virus definitions, the system can easily become re-infected.

Which version of Windows supports Virtual Desktops? a. Windows 7 b. Windows 8 c. Windows 8.1 d. Windows 10

d. Windows 10 Windows 10 added support for Virtual Desktops like those long seen on Linux and Mac OS X. These allow users without multi-monitor setups to create multiple virtual desktops that are handy for splitting usage between work and leisure work into projects, or whatever you require.


संबंधित स्टडी सेट्स

Networking - Chapter 3: Network Cabling and Hardware Devices

View Set

Fahrenheit 451 Figurative Language

View Set

Identity Development in Adolescence and Young Adulthood

View Set

Physical Agents Final Exam Review

View Set

Fundamentals of Success Infection Control

View Set

Chapter 17: Freedom's Boundaries, at Home and Abroad Questions

View Set

The Rise of Islam Global History I,Quiz 03-29-22

View Set

Chapter 4 - Life Policy Provisions and Options

View Set