Practice Final Exam Ch 10 -14

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

permissions assigned with 600

-rw------- group name directory name directory and file owner permissions assigned with 544 permission assigned with 600 permissions assigned with 755

Reset this PC

A Windows 10 computer suddenly started experiencing network connectivity issues after the latest Windows updates completed a week ago. What option can be used to address this issue without loss of data or applications? Use Advanced Start-up. Go back to the initial Windows build. Restart the Windows Update services. Reset this PC.

Determine whether the customer would prefer to receive the instructions in another form, such as emailed, illustrated written instructions.

A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do? Explain to the customer that it is a simple task and ask the customer to try it again. Ask the customer to find someone with more experience to perform the task. Determine whether the customer would prefer to receive the instructions in another form, such as emailed, illustrated written instructions. Tell the customer that another technician will explain the task .

degaussing equipment & data wiping software (Data wiping software overwrites data multiple times. A degaussing wand or degaussing device uses magnetism to destroy data on a hard drive)

A company has a security policy that permits the reuse of wiped drives in other computers. The wiped drives are often used for additional storage or as a replacement drive. What are two methods that could be used to wipe data? (Choose two.) multifactor erasure EFS encryption biometric scanner degaussing equipment data wiping software

The computer has a virus. & An update has corrupted the operating system.

A computer repeatedly locks without any error message. Which two conditions may be the cause of the problem? (Choose two.) The computer has a virus. The UAC has been turned off. The CPU needs to be upgraded. The index service is not running. The user has breached the user security policy. An update has corrupted the operating system.

to attack other computers & to transmit viruses or spam to computers on the same network (Botnets can be used to perform DDoS attacks, obtain data, or transmit malware to other devices on the network)

A help desk technician notices an increased number of calls relating to the performance of computers located at the manufacturing plant. The technician believes that botnets are causing the issue. What are two purposes of botnets? (Choose two.) to attack other computers to record any and all keystrokes to transmit viruses or spam to computers on the same network to withhold access to a computer or files until money has been paid to gain access to the restricted part of the operating system

Sysprep.exe

A network administrator is tasked with deployment of Windows 10 Pro for a large number of new PCs in the company. The administrator uses a PC to perform a base installation together with standard company applications. The PC is tested to be fully functional. Which tool must the administrator use to remove all computer and user specific information before building a deployable image from the disk? Ntoskrnl.exe Unattended.bat Sysprep.exe Windows Easy Transfer

The code in the boot sector is executed and the control of the boot process is given to Windows Boot Manager.

A network analyst is booting a PC that has Windows 8 installed. The boot process is currently working on the following step: The BIOS boots the computer using the first drive that contains a valid boot sector. What is the next step that will happen in the boot process? NTOSKRNL.EXE starts the login file called WINLOGON.EXE. The code in the boot sector is executed and the control of the boot process is given to Windows Boot Manager. The Windows kernal takes over the boot process. WINLOGON.EXE displays the Windows Welcome screen

antimalware

A technician has been asked by a manager to recommend a security solution for protecting a computer against firmware viruses. Which security technique should the technician recommend? TPM dual authentication antimalware encryption

Trojan (A proxy Trojan is a type of malware that uses one computer as a source device to launch attacks to other devices. Malware evolves quickly so it is important to obtain the most recent antimalware updates as a protective measure)

A technician has been notified of a problem on the network. After investigation, the technician determines that a specific internal company computer is launching an attack on other company computers. Which type of malware is being used? Trojan DoS spoofing rootkit

ethically wrong and illegal

A technician has copied several commercial movies to a company server to be shared with colleagues. How would this behavior be classified? acceptable ethically wrong but legal illegal but ethical ethically wrong and illegal

gpupdate

A technician has just configured the security policy on a Windows 10 PC and wants to ensure the policy is implemented immediately. Which administrative command-line tool or command can be used to address this? mstsc chkdsk gpupdate diskpart

4

A technician is attempting to create multiple partitions on a hard disk that is using the boot sector standard that supports a maximum partition size of 2TB. What is the maximum number of primary partitions allowed per hard drive? 1 2 128 16 32 4

Personalization & User Accounts (The User Accounts Windows Control Panel is used to create and manage local user accounts and configure passwords for each account. The Personalization Windows Control Panel is used to access the Screen Saver Settings window where the computer can be configured to display the logon screen if there is no use for a preconfigured amount of minutes)

A technician is configuring a SOHO computer. The technician wants to create a local account that requires a password and wants a screen saver to appear if the person using the computer steps away for a period of time. Which two Windows Control Panels will the technician use to accomplish these tasks? (Choose two.) Hardware and Sound Network and Internet Personalization Ease of Access User Accounts Programs

regsvr32

A technician is troubleshooting a Windows 10 PC. The PC has an application that displays an error message about a missing DLL. The technician has located the DLL file on the PC and wants to register it. Which command line tool can the technician use for the task? regsvr32 sfc dism regedit

Change the boot order in the UEFI/BIOS settings to select the drive that has the operating system installed as the first boot device.

A technician is troubleshooting a Windows 10 computer that displays an "Invalid Boot Disk" error message. What should be the first action the technician should take to troubleshoot the issue? Run the command chkdsk . Use the last known good configuration to boot the computer. Boot the computer in Safe Mode and run sfc / scanno w . Change the boot order in the UEFI/BIOS settings to select the drive that has the operating system installed as the first boot device.

Implement an Alternate Configuration IPv4 address on the laptop.

A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the internet when used inside the office but cannot connect to the network when used in a research lab. The company uses DHCP in the office but does not use DHCP in the research lab. How can the technician address this issue? Implement an Alternate Configuration IPv4 address on the laptop. Adjust the default gateway IPv4 address on the laptop. Modify the DNS server IPv4 address on the laptop. Modify the proxy settings used on the laptop.

Web credentials are not saved for sites accessed by browsers other than Explorer and Edge.

A technician is visiting a website and is using Google Chrome on a Windows 10 PC. The technician is trying to view the password for the website. The technician uses the Credential Manager to view the password but cannot see it. What could be the cause? Web credentials are not saved for sites accessed by browsers other than Explorer and Edge. The Credential Manager will only store system passwords. The website visited placed a cookie disallowing the storage of the password. The browser had crashed after accessing the website.

Shrink the existing partition and create a new partition from the unallocated space.

A technician wants to split a large partition on a drive in a Windows 10 PC without loss of any data. How can this be accomplished? Delete the existing partition and create two new partitions. Shrink the existing partition and create a new partition from the unallocated space. Delete the existing partition and format the disk with two new partitions. Reinitialize the disk and create new partitions.

Run the bootrec command.

A user calls the help desk and reports that invalid system disk or invalid boot disk error messages display on the workstation when it is powered on. When a technician comes to the office, the user mentions that the workstation was working well the day before. The technician suspects that the MBR is corrupted. Which process can the technician use to check and repair the MBR? Run the chkdsk command. Run the sfc command. Boot the workstation in Safe Mode. Run the bootrec command.

An app is using too many resources. The display is set to a high level of brightness. & The device is roaming between call towers.

A user notices that a mobile device is draining power faster than is normal. What are three causes of quick battery drain? (Choose three.) An app is using too many resources. The display is set to a high level of brightness. The device is roaming between call towers. The airplane mode is turned on. An app is not compatible with the device. The device is connecting over a VPN.

32-bit version of Windows 10 Pro & 64-bit version of Windows 10 Pro

A user wishes to upgrade a PC to Windows 10 from a PC that is running a 32-bit version of Windows 7. Which two editions of Windows 10 will support this upgrade? (Choose two). 64-bit version of Windows Home 64-bit version of Windows 10 Enterprise 32-bit Windows Home 32-bit version of Windows 10 Pro 64-bit version of Windows 10 Pro

Boot from a Windows 7 installation media and access the System Restore utility.

After a computer is powered on, Windows 7 fails to start. What initial procedure would a technician use to deal with this failure? Access the Control Panel and choose Restore Files from Backup from the System and Security menu. Create a System Repair Disc and restore the image. Press the F12 key during the boot process and start the computer in Safe Mode. Boot from a Windows 7 installation media and access the System Restore utility.

Check for the latest OS patches and updates. (After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to. Documenting the issue and solution is the final step, whereas gathering information from the user and other sources are earlier steps in the troubleshooting process)

After confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of the system? Check for the latest OS patches and updates. Talk with the user to determine the cause of the problem. Document the problem and the procedures performed to solve it. Gather information from a number of sources to clearly identify the problem.

Call the employee and ask the employee to come to the IT department to enter the necessary credentials.

An IT technician is troubleshooting a file error on an employee laptop. While working in the system files directory, the technician notices that the User Account Control (UAC) box appears requesting a password. What should the IT technician do next? Call the employee and apologize for the delay in repairs and request the administrator password over the phone. Shutdown the laptop, boot it from a bootable CD/USB, and modify the system files to complete the repair. Shutdown the laptop and email the employee with a request for the administrator account password of the supervisor. Call the employee and ask the employee to come to the IT department to enter the necessary credentials.

both

An instructor is discussing facts about different mobile device operating software. The instructor states: "The user interface can be extensively customized using rooting or jailbreaking into a mobile device." To which OS does this relate: iOS, Android, or both? Android iOS both

Document the reason the customer called and create a support ticket. & Escalate the customer to a level two technician.

Chad, a level one call center technician, receives a customer phone call. The customer has an issue that Chad does not have the knowledge to answer. The customer is irritated that Chad cannot provide immediate assistance. Which two things should Chad do next? (Choose two.) Place the customer on hold until the customer has time to cool down. Document the reason the customer called and create a support ticket. Escalate the customer to a level two technician. Ask the customer further questions to diagnose and attempt to fix the problem. Inform the customer of the need to call back later.

username/password

Credentials are sent to the SSH server which are then verified against a local user database or sent to a centralized authentication server. username/password Kerberos host-based authentication public key authentication

.js

JavaScript .py .sh .js .bat .vbs .ps1

.sh

Linux Shell Script .py .sh .js .bat .vbs .ps1

.ps1

PowerShell .py .sh .js .bat .vbs .ps1

.py

Python .py .sh .js .bat .vbs .ps1

host-based authentication

The SSH server generates a challenge with the public key of the client and the client must decrypt the challenge with the matching private key to complete the authentication. username/password Kerberos host-based authentication public key authentication

public key authentication

The SSH server generates a challenge with the public key of the client and the user must enter a passphrase to access the matching private key which decrypts the challenge to complete the authentication. username/password Kerberos host-based authentication public key authentication

False

True or False? Windows 10 64-bit version can be installed on as little as 1GB of hard drive space.

not properly creating or maintaining sandboxing features & enabling app access to the root directory

What are two potential risks that could result from rooting or jailbreaking a mobile device? (Choose two.)​ allowing the user interface to be extensively customized not properly creating or maintaining sandboxing features enabling app access to the root directory improving device performance enabling features that are disabled by a cellular carrier

Use a standard account with limited permissions, and then use the Run as Administrator option to perform the task that requires elevated privileges.

What is a recommended best practice for a technician who must perform tasks that require administrative access? Prevent the computer from contacting the network authentication server by disabling the network card and then log in with an administrator account. Log off the computer and then log in with an account with administrator privileges. Ask the current user to log off, restart the computer, and then log in with the administrator account. Use a standard account with limited permissions, and then use the Run as Administrator option to perform the task that requires elevated privileges.

Data that is collected by businesses to distinguish identities of individuals.

What is the best definition of personally identifiable information (PII)? Data that is collected from servers and web browsers using cookies in order to track a consumer. Data that is collected by businesses to distinguish identities of individuals. Data that is collected from servers and websites for anonymous browsing. Data that is collected by businesses to track the digital behavior of consumers.

Test the theory to determine cause.

What is the next troubleshooting step after a theory of probable cause has been established? Identify the exact problem. Test the theory to determine cause. Document findings and outcomes. Establish a plan of action.

Android

What mobile OS does this belong? Apps are represented by shortcuts on the home screen

iOS

What mobile OS does this belong? It is closed source software.

Android

What mobile OS does this belong? The OS has an All Apps navigation icon

Android

What mobile OS does this belong? The OS uses the launcher to define the format of home screens and the look and feel of the user interface.

iOS

What mobile OS does this belong? The device has a physical Home button.

iOS

What mobile OS does this belong? deleting an app from the home screen deletes the app from the device.

Disk Utility

What tool is included in the Mac OS X for backing up disks to image files and recovering disk images? Deja Dup Disk Error-Checking System Restore Disk Utility

gathering diagnostic information from a customer computer & remotely updating drivers and software on customer computers

What two roles or tasks are associated with level two technicians? (Choose two.) escalating a trouble ticket to a higher level technician gathering diagnostic information from a customer computer gathering customer information to initiate a work order prioritizing incoming calls according to their severity remotely updating drivers and software on customer computers

Back up user data on a regular basis. & Ensure that the operating system software and applications contain the latest updates.

What two tasks should be done regularly to preserve the security and integrity of data and applications on mobile devices. (Choose two.) Password protect iTunes or Google Play accounts. Use airplane mode if you are accessing the Internet at an open Wi-Fi site. Unmount all unused disk partitions. Execute a factory reset once a month to remove all unidentified malicious software. Back up user data on a regular basis. Ensure that the operating system software and applications contain the latest updates.

least privilege (Users should have access to information on a need to know basis. When a user moves from job role to job role, the same concept applies)

When a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring? audit password network policy least privilege

Register the DLL file using the regsvr32 command. & Run sfc/scannow in Safe Mode

When a user tries to run a program a missing or corrupt DLL message is displayed. What are two possible solutions to this problem? (Choose two.) Run Windows Startup Repair. Register the DLL file using the regsvr32 command. Reinstall the correct drivers. Use the msconfig command to adjust the startup settings for the program. Run sfc/scannow in Safe Mode.

LCD screen

Which component uses the greatest amount of power on most mobile devices? media player camera CPU LCD screen

The OS will run correctly

Which statement is correct about installing a 32-bit operating system on a x64 architecture? This combination will provide better security. The OS can address more than 128 GB of memory. The OS will always make use of all the RAM available. The OS will run correctly.

Windows XP 64-bit & Windows 7 32-bit

Which two Windows operating systems cannot be upgraded to Windows 8.1 64-bit? (Choose two.) Windows 7 64-bit Windows 8 64-bit Windows Vista 64-bit Windows XP 64-bit Windows 7 32-bit

hard disk drives & solid state drives

Which two data storage locations contain persistent data that can be used by computer forensics specialists? (Choose two.) hard disk drives CPU registers solid state drives RAM cache

Disable or remove apps that allow connections to the GPS & Turn off the GPS when not in use

Which two operations can help prevent a mobile device from being tracked without permission? (Choose two.) Disable or remove apps that allow connections to the GPS. Set the device to connect only to known WiFi networks. Set the device to not store credentials. Use a VPN connection whenever possible. Turn off the GPS when not in use.

.bat

Windows Batch File .py .sh .js .bat .vbs .ps1

group name

charles group name directory name directory and file owner permissions assigned with 544 permission assigned with 600 permissions assigned with 755

permissions assigned with 755

drwxr-xr-x group name directory name directory and file owner permissions assigned with 544 permission assigned with 600 permissions assigned with 755

directory name

project group name directory name directory and file owner permissions assigned with 544 permission assigned with 600 permissions assigned with 755

directory and file owner

steve group name directory name directory and file owner permissions assigned with 544 permission assigned with 600 permissions assigned with 755


संबंधित स्टडी सेट्स

Managing People & Work: Exam 1 Study Guide

View Set

"A Roosevelt" de Rubén Darío- Vocabulario

View Set

CSEC-246: 3.01 Reading Exam Study Set.

View Set

Chpt 3 Musculoskeletal System and Connective Tissue Part 2 True/False

View Set