Week 6 Domain Quizzes

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

While Advanced Encryption Standard (AES) keys can be either 128, 192, or 256 bits in length, AES encrypts everything in one-size data chunks. Which of the following is the size of those AES data chunks?

128

Which of the following is true of a domain controller?

A domain controller is a Windows server that holds a copy of the Active Directory database.

As the system administrator, you have just purchased a proprietary license for a software program that your organization needs. Which of the following BEST describes a proprietary software license?

A license that gives you the right to use software owned by someone else.

While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer. Which of the following is the MOST professional way to handle the situation?

Ask the customer if it is okay to take the call, and then step into the hallway to briefly talk on the phone.

You want a security solution that protects your entire hard drive, preventing access even when it is moved to another system. Which of the following is the BEST method for achieving your goal?

BitLocker

You experience startup errors after you install a new device. What should you do FIRST to resolve the issue?

Boot in Safe Mode and roll back the driver.

Which stage of a legacy BIOS startup loads the boot code in the Master Boot Record (MBR) and then uses the partition table to identify the active disk partition?

Boot loader

Which of the following forms of shell scripting is most commonly used?

Bourne shell

A public library has purchased new laptop computers to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should they use to physically secure the new laptops?

Cable locks

A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is MOST likely to restore internet connectivity?

Configure the SOHO router for NAT.

You want to set up a service on your company network that can be configured with a list of valid websites. The service should give employees a certificate warning if they try to visit a version of an untrusted site. Which of the following services is designed to provide this functionality?

DNS server

Which of the following are the FIRST settings you should check if you suspect that a malware attack has impacted your internet connection? (Select two.)

DNS settings Proxy settings

You have been troubleshooting startup errors on your Windows 11 computer by undoing recent changes, such as rolling back device drivers for a local printer and new graphics card while in Safe Mode. However, the changes you are making are not resolving the startup errors. Which of the following steps will MOST likely help you to find the specific cause of the error without the need to re-install Windows?

Disable and then enable devices and services one by one.

Which of the following are procedures that should be included when offboarding (ending a relationship with) an employee? (Select two.)

Disable electronic access for the employee. Collect physical access items from the employee.

You've just installed a new device on your Windows system. After installation, you can't use the device. You check Device Manager and find an icon with a yellow exclamation mark. What is the BEST first step for resolving the device issue?

Download the latest driver from the manufacturer's website.

After upgrading to the newest version of Windows, an important application is no longer running. Which of the following is the BEST option for troubleshooting the problem?

Enable Hyper-V to run the program on the previous version.

You want to use hibernation on your Windows notebook. What does it need to have for this to work?

Enough free hard disk space

You have been troubleshooting services on your system. Where is the best place to check to make sure that they are now running properly?

Event Viewer

Match each backup method on the left with the correct description on the right. Drop Backs up all files (even those that have not changed). Backs up every file that has changed since the last full or incremental backup. Backs up every file that has changed since the last full backup. Compares the data found in the last full backup with the current content and uploads only the changes.

Full Incremental Differential Synthetic

Which of the following is a feature of a sheep dip computer?

Has port monitors and file monitors.

Which formatting method leaves data on a drive in a state that can be recovered using special software?

High-level formatting

Which of the following terms describes a Windows 11 operating system patch for a desktop that targets a specific problem and is released on a short-term, periodic basis?

Hotfix

Which of the following are risks of implementing a BYOD policy? (Select three.)

Improper disposal Number of different devices Data leakage

Where in Windows can you allow an application to use the computer's location?

In Settings under Privacy (Windows 10) or Privacy and security (Windows 11).

Which of the following hard drive destruction methods runs the risk of releasing toxic by-products?

Incineration

You are using the vi editor to manage a text file on a Linux system. You want to type new text into the file. When you type, you want the existing text that comes after the cursor to be pushed down. Which mode provides this function?

Insert Mode

Which of the following device types should be plugged into a surge-protected-only outlet on a UPS unit and not a battery backup outlet?

Laser printer

You are in the process of preparing a 128-GB flash drive and must determine which file system to use. Which of the following BEST describes the advantages of using the exFAT file system rather than NTFS on the flash drive? (Select two.)

Lower overhead and risk of corruption

Which of the following should be installed inside the entrance to the building to prevent weapons or unauthorized equipment being brought into the building?

Magnetometer

Which of the following are devices categorized as part of the Internet of Things (IoT)? (Select two.)

Medical sensors Smartwatches

Which of the following must be included in a hard drive's Certificate of Destruction?

Method of destruction

Which file system is required to control access using file and folder permissions on a Windows-based computer?

NTFS-formatted partition

To protect a Windows 11 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No. You need to enable File History.

You have booted your Windows workstation in Safe Mode and enabled boot logging. To which log file is the boot logging information now written?

Ntbtlog.txt

Which of the following Microsoft services can you use to access the files associated with your account's user profile from other computers?

OneDrive

During which asset management phase would you perform maintenance tasks, such as installing updates and patches or upgrading a hard drive?

Operations

Which of the following must be set up before you can register a facial or fingerprint scan for your account?

PIN

You upgraded your Windows 10 workstation to Windows 11 several months ago. Recently, however, you notice that the operating system is often behaving strangely, especially when creating files or accessing certain features. What can you do as a FIRST step to try and resolve these issues?

Perform an in-place upgrade.

What Windows tool do you use to connect to another Windows computer with Remote Desktop Protocol?

RDC

You are an IT technician for your company. Fred calls you to complain that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware?

Restore Fred's computer back to a previous restore point.

Which of the following is the name for a special computer that is used for malware analysis?

Sheep dip computer

Which of the following Windows 11 options lets you associate your local user account with an online Microsoft account?

Sign in with a Microsoft account instead

A macOS user has forgotten the location of an important spreadsheet document. Which macOS feature could they use to find the spreadsheet?

Spotlight

Hard drives are best stored in which of the following?

Static shielding bag

A security incident is currently occurring on your company's network. You discover that the attack involves a computer system that is attached to the network. You are unsure what kind of damage is being done to the network systems or data. Which of the following actions should you take FIRST?

Stop the attack and contain the damage by disconnecting the system from the network.

Which user type is the Windows Beta channel recommended for?

The average user

A Help Desk technician receives a call from a user who is unable to download new messages from the company's email server. The technician tells the user to open a command prompt, ping the email server, and check the SMTP and POP3 server IP addresses. Which of the following mistakes did the technician make?

The technician used jargon that the user probably didn't understand.

What is the purpose of an MSDS?

To document how to safely handle and dispose of hazardous materials.

Why should you store backup media offsite?

To prevent the same disaster from affecting both the system and its associated backup media.

Mobile device applications fall into two categories. Some are reviewed, approved, and signed with a certificate by the app service, while others are not. Which category do apps fall into if they have been reviewed, approved, and signed with a certificate? What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

Trusted untrusted

What is the FIRST step you should take if an error occurs during startup and your system continually reboots?

Use the Disable automatic restart on system failure option.

Which of the following statements about an SSL VPN are true? (Select two.)

Uses port 443. Encrypts the entire communication session.

While on a business trip, an employee accesses the company's internal network and transfers files using an encrypted connection. Which of the following digital security methods is the employee MOST likely using?

VPN

Which of the following wireless security methods uses a common shared key that is configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

Which of the following Windows Update features allows you to register to receive pre-release builds of the operating system?

Windows Insider Program

Which programs run during the startup process to allow user logon? (Select two.)

Winlogon Wininit`

As the IT administrator for a small consulting firm, you want all the computers in the company office to be able to share files, printers, and local network resources. There are currently 15 computers in the office. Which of the following Windows features could you implement that would MOST closely match your network requirements?

Workgroup

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select two.)

You risk losing your job. You expose your company to litigation by violating the software license agreement.

You have just received a call from one of your customers. She informs you that after turning her computer on, she received the following error: Error loading operating systemBOOTMGR is missingPress Ctrl+Alt+Del to restart Every time she restarts her computer, the same error appears. Which of the following tools will work BEST to fix this issue?

bootrec

You are troubleshooting a Windows 11 system that won't boot. The system appears to initialize just fine, and POST completes correctly. However, Windows does not load, and an error message is displayed on the screen, indicating that the operating system is not found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you perform the following steps: Boot the system from the Windows 11 installation DVD. Access the Recovery Environment. Open a Command Prompt window. Enter the command that you should run at the Command Prompt to address this issue.

bootrec /fixmbr

Which of the following file systems on Linux uses checksums to verify a journal's integrity?

ext4

You are troubleshooting network connectivity issues on a workstation. Which command would you use to request new IP configuration information from a DHCP server?

ipconfig /renew

Which commands can you use to create a new directory? (Select two.)

mkdir md

As a system administrator, you are responsible for maintaining network files. Your IT manager wants you to copy an entire file folder structure from one server to another across the network and recommends that you simply use the robocopy command. However, you have never used the robocopy command. Which of the following commands can you use at Command Prompt to find detailed information about how to use the robocopy command?

robocopy /?

You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the Command Prompt that will, by default, switch you to the root user and require you to enter the root password?

su-

You want to adopt a rotation scheme for your Windows systems that works by keeping data for 30 days and then has the data from the 31st day overwrite the data from the first day. Which of the following is the rotation backup type you should use?

FIFO

Examine the following output: 4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [205.171.205.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1] Which command produced this output?

tracert

You have just completed installing an application from the Microsoft Store on your Windows 11 workstation. Which of the following can you use to access and manage your newly-installed application? (Select two.)

Right-click the Start menu's application tile. Right-click Start and select Apps & Features.

You have decided to install a new Ethernet network adapter in your Windows 11 desktop computer. After installing the card and booting to Windows, you notice that you have no network connection. After looking in Device Manager, you see that the new network card was detected, but Windows doesn't know what it is. After doing a quick search on the internet, you find what looks like the correct driver and install it. A reboot of Windows is performed, but almost immediately after logging on, your computer crashes. Thinking this must be a fluke, you reboot again with the same result. Which of the following is the BEST method in this scenario to get Windows to load properly?

Boot to Safe Mode and uninstall the network driver.

Your company provides testing services that help customers identify and resolve performance issues with their software and e-commerce sites before they go live. To perform accurate testing, a large number of computers are required, sometimes numbering in the hundreds. Recently, you have noticed that the lights in the testing lab seem dimmer than normal and sometimes flicker. Which of the following electrical terms BEST describes the condition you are most likely experiencing?

Brownout

Timothy works in the graphic arts departments and has received approval to upgrade his video card. The card has arrived, and you are ready to begin the upgrade by replacing the old video card with the new one in his workstation. To ensure your personal safety, which of the following should you do FIRST?

Disconnect power.

A technician was able to stop a security attack on a user's computer. Which of the following actions should be performed FIRST when conducting the subsequent forensic investigation?

Document what is on the screen.

At company headquarters, several employees are having issues with their Wi-Fi access suddenly dropping and then reconnecting to the same wireless network. You decide to investigate and determine that someone has set up a rogue access point near company headquarters and is using it to capture sensitive data from the company network. Which type of social engineering attack is being used?

Evil twin

You have been hired to help assess the security of your client's organization. During your assessment, you have found a rogue wireless access point that is configured to look identical to the legitimate wireless network. Which of the following attacks was MOST likely being carried out?

Evil twin attack

Which of the following is a benefit of downloading any application through the Microsoft Store?

It is considered safe to download.

You have been hired to evaluate your client's building security. In your walkthrough, you notice the following: A high fence is installed around the property. Visitors are able to enter the building and are checked in by a receptionist. Security cameras are installed on all buildings. Server racks are locked and have alarms. Which of the following would you MOST likely recommend that your client do to increase security based on this information?

Place a security guard at the entrance gate with an access list to control who comes on the property.

You have a file which you would like other users to see, but not modify. Which file attribute should you use?

R

Which of the following is the BEST step to try first when troubleshooting a Windows operating system problem?

Reboot the system.

You are working on your Windows 10 computer during a fierce thunder storm. Lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools is MOST likely to rectify this issue?

SFC

During the Runtime (RT) stage of the UEFI boot process, system control passes to ntoskrnl.exe. Which of the following tasks does ntoskrnl.exe perform? (Select three.)

Starts services. Configures the OS environment. Loads device drivers.


संबंधित स्टडी सेट्स

((Chapter 6)) GDP: Measuring Total Production and Income

View Set

Chapter 27: Community Mental Health Nursing

View Set

Chapter 23 Holder in Due Course and Transferability

View Set

Econ 101 Ch. 2-3 Demand & Supply

View Set