Dion Practice Test 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You are configuring a SOHO network and only denying specific IP addresses from accessing the network while allowing any IP addresses not found on the list. Which of the following should be implemented?

Blacklist

Which of the following file types are commonly used by network administrators to perform repetitive tasks using a Microsoft proprietary programming language?

.vbs

A customer is complaining that her laptop is too slow. You have thoroughly checked the device but cannot find anything wrong with it. Which of the following is the best thing to say NEXT?

"Can you tell me more about the problem? What do you mean by 'it is acting slow'?"

A user contacts the help desk and complains they are getting an error when they attempt to open a 4 GB .DMG file on their Windows 10 workstation. Which of the following should you tell them?

"You need to use macOS to open DMG files"

A coworker is creating a file containing a script. You look over their shoulder and see "net use s:\\fileserver\videos" in the file. Based on this, what type of file extension should this script use?

.bat

Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during the initial tests. You decided to check the firewall's ACL to see if the server's outgoing email is being blocked. Which of the following ports should you ensure is open and not blocked by the firewall?

25

You are installing a new file server at the offices of Dion Training. The entire building has a diesel generator installed to protect it from power outages. The file server must have zero downtime once placed into production. Which of the following power sources should the file server utilize?

An uninterruptible power supply (UPS)

You are a member of a project team contracted to install twenty new wireless access points (WAPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is still finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the SOW and change request before its approval?

Backout plan

Molly enjoys playing an online MMORPG each day after work. To access the game, she simply enters the website address and logins in to begin playing. Today, she tried to access the game from her laptop at work, but she couldn't launch the game. What is most likely causing the issue?

Blacklisted by firewall

Which of the following data types would be used to store the value of TRUE?

Boolean

Dion Training is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this small company to purchase?

Business

Which of the following file system formatting types should be used with older recordable optical discs?

CDFS The CD File System (CDFS or ISO 9660) is a legacy file system used for CD optical disc media (CD-ROM and CD-R). CDFS supports two main data writing modes: mode 1 has better error correction, whereas mode 2 allows more data to be written to the disc. Joliet is an extension to CDFS that enables long file name support and Unicode characters in file names.

Which of the following is a document used in cyber forensics that lists everywhere evidence has been?

Chain of custody

Which of the following data types would be used to store the user's middle initial?

Character

A user attempted to go to their favorite social media website this morning from their laptop. When they typed in Facebook.com, their browser redirected them to MalwareInfect.com instead. You asked the user to clear their cache, history, and cookies, but the problem remains. What should you do NEXT to solve this problem?

Check the host.ini. file

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue?

Check the status of the print server queue

Your Android device's battery is advertised to last 12 hours, but it drains almost completely within 90 minutes. What should you do FIRST to try and solve this problem?

Check which apps are using the most battery life

A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

Clear the browser's cookies and history, enable the pop up blocker and scan the system for malware

Your smartphone just displayed a notification stating that a new pair of headphones has connected to your device. Which of the following threats is this an example of?

Defragment the hard drive Remove unnecessary application from startup

Your company works as a contractor to the military and has just finished replacing about 500 workstations across its secure network. You have been asked to properly dispose of the workstations and destroy the data on their hard disk drives. Which of the following methods would be the MOST effective?

Degauss each of the hard drives

A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of their location settings, which are summarized below: * Storage (49 GB Used, 15 GB Free, 64 GB Total)* Mail Client (Corporate account set to push, Personal account set to pull hourly)* Display (Auto brightness, Lock after 30 minutes, Night mode disabled)* Calls (33 minutes used during last 24 hours)* Data (52 MB used during last 24 hours)* Location (All apps set to "allow while using") Based on the information provided, what should be changed to resolve this client's problem?

Display settings

A cybersecurity analyst is applying for a new job with a penetration testing firm. He received the job application as a secured Adobe PDF file, but unfortunately, the firm locked the file with a password so the potential employee cannot fill in the application. Instead of asking for an unlocked copy of the document, the analyst decides to write a script in Python to attempt to unlock the PDF file by using passwords from a list of commonly used passwords until he can find the correct password or attempts every password in his list. Based on this description, what kind of cryptographic attack did the analyst perform?

Dictionary attack

Dion Training will be hiring 10 college students as interns to work over the summer. Each year, the same interns will work for the company for 8 weeks, but then they will return to school. Next summer, they will return to the company and will need to reaccess their accounts. What is the BEST policy to use so that the interns can use the accounts during the summer but cannot log in during the school year?

Disable the user accounts at the end of each summer

You have been asked to replace a computer's hard drive. Which of the following steps should you take FIRST to prevent an electrical hazard while working on the computer?

Disconnect the power prior to serving the computer

Which of the following tools should you utilize to ensure you don't damage a laptop's SSD while replacing it?

ESD strap

A business owner's smartphone contains a lot of her customer's PII. Unfortunately, the business owner refuses to set up the phone to automatically wipe the data if the phone is lost or stolen because the data is precious. Based on the business owner's refusal to allow automatic wiping of the data, which of the following is the next BEST method of securing the phone?

Enable a fingerprint lock on the device

You are working as a defense contractor for the U.S. Army. The Army is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this sized organization to purchase?

Enterprise

Which of the following is used to communicate data and preferences to child processes within a script or batch file?

Environmental variables

Which of the following types of screen locks uses a biometric authentication mechanism that relies upon mapping the geography of a user's eyes, nose, mouth, and other features before granting access to a mobile device?

FaceID

Which of the following MacOS features is the equivalent of the Windows Explorer or File Explorer?

Finder

A company wants to ensure that its mobile devices are configured to protect any data stored on them if they are lost or stolen. Which of the following should you enable and enforce through their MDM?

Full storage encryption

Which of the following should be configured on a macOS system to enable the Smart Zoom feature on a user's MacBook trackpad?

Gestures

Barbara received a phone call from a colleague asking why she sent him an email with lewd and unusual content. Barbara doesn't remember sending the email to the colleague. What is Barbara MOST likely the victim of?

Hijacked email

Which version of Windows 10 does not support BitLocker for full disk encryption? ​ Enterprise

Home

Which of the following password policies defines the types of alphanumeric characters required to be utilized in a user's password?

Password complexity

You have been asked to help a user upgrade their laptop from Windows 8 to Windows 10. The user has asked that all of their applications, user profiles, documents, and PST files be preserved during the upgrade. Which of the following types of upgrades or installations should you perform on this laptop?

In-Place upgrade An in-place upgrade will preserve all of the user's files and applications during the upgrade process from Windows 8 to Windows 10. A clean installation will completely format the hard drive (losing all of the files and applications) and install a new copy of Windows 10. A reset upgrade will keep the user's data files, but not the applications on the system. An unattended installation is used to perform a clean install and use the configurations from an answers file instead of an interactive session with the installer

You are working at the service desk when you receive a call from an upset user because their workstation cannot receive any emails. Which of the following should you use to document this phone call?

Incident database

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?

Install an anti-virus or anti-malware solution that uses heuristic analysis

The paparazzi have found copies of pictures of a celebrity's new baby online. The celebrity states they were never publicly released but were uploaded to their cloud provider's automated photo backup. Which of the following threats was the celebrity MOST likely a victim of?

Leaked personal files

What does the command "shutdown /l" do on a Windows workstation?

Log off the workstation

A printing company uses an isolated Windows XP workstation to print out large format banners for its customers on a custom printer. Unfortunately, the printer does not support newer versions of Windows and would cost $50,000 to replace it. To mitigate this risk, the workstation is not connected to the internet or a local area network. When a customer needs a banner printer, the technician takes a copy of their PDF file and moves it to the Windows XP workstation using a USB thumb drive. The workstation recently became infected with malware when printing a customer's file. The technician remediated the issue, but the workstation became infected again three weeks later. Which of the following actions did the technician forget to perform?

Manually update the antivirus on the workstation and set it to perform on access scans

A cybersecurity analyst is auditing your company's network logs and identifies that a USB mass storage device was previously inserted into many of the company's servers. The logs also showed dozens of failed login attempts before a successful login occurring on the servers. Which TWO of the following actions are recommended to eliminate the vulnerabilities identified by the cybersecurity analyst?

Modify the AutoRun settings Lockout the account after 3 failed login attempts

What is the default file system format used by Windows 10 during installation?

NTFS

Which of the following is considered a form of regulated data?

PII

You are troubleshooting a computer that is operating slowly. Which of the following tools should you use to troubleshoot this workstation?

Performance monitor

Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to "click here" to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack?

Phishing

You are working at the service desk and just received the following email from an end-user who believes it is suspicious: ***********************From: [email protected]: [email protected]: You won a free iPhone! You have won a brand new iPhone!Just click the following link to provide your address so we can ship it out to you this afternoon: (http://www.freephone.io:8080/winner.php) *********************** How should you classify this email?

Phishing

Your mother just heard that you passed your certification exam and became CompTIA A+ certified. She is so proud of you and needs your help. There is something wrong with her computer, but unfortunately, she doesn't know how to fix it. She asks if you can remotely connect to her computer and see if you can fix it. Which of the following technologies would BEST allow you to remotely access her computer and interact with her Windows 10 laptop?

RDP

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

Proximity cards

Jason has an old 2015 Dell Laptop that he uses to connect to his office network while traveling. The computer is slow and is running Windows 7. The laptop's screen was recently cracked and needs replacement. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?

Purchase a new laptop as the cost to repair might be more than a new laptop

Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation?

RDP

An attacker is using a precomputed table of values to attempt to crack your Windows password. What type of password attack is this?

Rainbow table

A hospital's file server has become infected with malware. The files on the server all appear to be encrypted and cannot be opened. The network administrator receives an email from the attacker asking for 20 bitcoin in exchange for the decryption key. Which type of malware MOST likely infected these computers?

Ransomware

What does the command "shutdown /r" do on a Windows workstation?

Reboot the workstation

A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?

Reduce the transmission power Enable WPA2 encryption

You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. Which of the following should you do FIRST to attempt to solve this problem?

Reinstall the email app

Which of the following types of installations would you use on a system with slow performance or one that you cannot isolate a single cause of the system's issues?

Repair installation

You recently built a new gaming PC for a customer. The system has an octa-core 64-bit processor, 32 GB of DDR4 RAM, 1 TB SSD, a PCI x16 video card with 8 GB of RAM, and Windows 10 (x86) installed. When you turn on the system, you notice that Windows only recognizes 3.5 GB of RAM. Which component should be upgraded to correct this issue?

Replace the OS with Windows 10 (x64)

Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com." What should Michelle do to fix this problem?

Reset the web browser's proxy setting

A computer is infected with malware that has infected the Windows kernel to hide. Which type of malware MOST likely infected this computer?

Rootkit

Which of the following describes the security method used when users enter their username and password only once and can access multiple applications?

SSO

A user contacts the service desk, stating their account is locked out, and they are unable to login to their local workstation. Which of the following log files should you review to determine the source of the lockout on the local workstation?

Security log

An administrator arrives at work and is told that network users are unable to access the file server. The administrator logs into the server and sees the updates were automatically installed last night, and the network connection shows "limited" with no availability. What rollback action should the technician perform?

Server's NIC drivers

You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented?

Smart card

You are troubleshooting a network printer when a document is printed with sensitive employee data on it. Which of the following actions should you take?

Take the document to the office manager

Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem?

The data speeds are insufficient with only one bar of signal

Jason took home a company-issued Windows 8.1 laptop home to do some work. He successfully connected it to his home's wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network's shared files from his home network's media server. Which of the following may be why Jason cannot access the network shares in his home network? ​

The laptop must join the HomeGroup The HomeGroup for the home network must be joined for the laptop to access the local network's shared files from the network's media server. The rest of the options can be dismissed since the laptop can successfully access the internet and browse it.

A user with an older laptop running Windows XP has only 2 GB of RAM, 32 GB of SSD, and a 1.7 GHz 64-bit processor. The user would like to upgrade to a newer OS since Windows XP is now end-of-life. Which of the following operating systems should the technician recommend to ensure the BEST performance on this computer?

Windows 10

Your friend is concerned that someone might be listening to her daily conversations when her smartphone is still in her purse. Which of the following threats is this an example of?

Unauthorized microphone activation

Your smartphone just displayed a notification stating that a new pair of headphones has connected to your device. Which of the following threats is this an example of?

Unintended Bluetooth pairing

Upon booting up a Windows 10 machine, you see an error message stating, "One or more services failed to start." Which of the following actions should you take?

Verify that disabling one service has not affected others

A user's computer was running out of storage space, so they decided to install a new second 1 TB hard disk drive (HDD) into their Windows 10 computer. Whenever they attempt to boot up the computer, an error of "No Operating System Found" is displayed on their screen. You unplugged the new 1 TB HDD, and then the computer boots up without any errors. You have just reconnected the 1 TB HDD. What step should you attempt NEXT to fix this issue?

Verify the boot order in the BIOS/UEFI

Your boss has asked you to write a script that will copy all of the files from one hard drive to another each evening. This script should mirror the directories from one drive to the other and ensure they are synchronized each evening. Which command-line tool should you use in your script?

robocopy

Which of the following commands is used on a Linux system to safely turn off a server?

shutdown

Nicole's smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is at home. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue?

verify the smartphone is connected to the correct SSID

A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?

worm

A file currently has permissions of 755. Which of the following commands would change file permission to r-xr--r--? ​ chmod u-rx,go-r filename

chomd 544 filename To change permission, you use the chmod command. You can either use u+ to add user permission and g+ to add group permissions, or you can use the octal value. In this case, the octal value of r-wr--r-- is 544.

What is the term for a piece of software which no longer has technical support, software updates, or security updates?

end-of-life

What does the command "shutdown /h" do on a Windows workstation?

enter sleep mode

Which of the following commands is used on a Linux system to search for lines that match a pattern within a file?

grep

Which of the following is an online storage solution provided by Apple that natively works with macOS and iOS devices?

iCloud

Which command is used on a macOS or Linux system to change their password?

passwd

Tim, a help desk technician, receives a call from a frantic executive who states that their company-issued smartphone was stolen during their lunch meeting with a rival company's executive. Tim quickly checks the MDM administration tool and identifies that the user's smartphone is still communicating with the MDM, and displays its location on a map. What should Tim do next to ensure the stolen device's data remains confidential and inaccessible to the thief?

perform a remote wipe of the device

Which command-line entry would be used on a Windows system to test if your system can reach diontraining.com?

ping

Which of the following commands is used on a Linux system to list the system's currently running processes?

ps


संबंधित स्टडी सेट्स

IS 300 Technology Guide 2: Software

View Set

Patho/Pharm Exam 1 Study Guide-- Patho

View Set

Chapter 38: Agents to Control Blood Glucose Levels

View Set

Algebra 2 Test Review: Trigonometric Functions

View Set

med surg Chapter 59: Nursing Management: Chronic Neurologic Problems

View Set