A+ 1002

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the file be in?

.ps1

Which of the following file types are commonly used to create applications that can be run on Linux, macOS, and Windows?

.py (python)

What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system

1 GB RAM, 1GHZ processor, 16 GB hard drive

Your Windows 10 system is booting up very slowly. Which of the following should you do to speed up the boot process?

1. disable unnecessary applications 2. rebuild profile

Malware Removal Process

1. identify and research malware symptoms 2. Quarantine the infected systems 3. Disable System Restore in Windows 4. Remediate infected systems 5. Schedule scans and run updates 6. Enable System Restore 7. Educate end user

GPT partition

2 TB greater partition sizes, MMR is only up to 2TB

windows os requirements

32 bit, 1 ghz processor, 1 gb ram, 16 gb hard drive 64 bit 1,ghz, 2gb ram, 20 gb same for 7/8/8.1/10

physical network diagram

A document that shows all of the physical connections on a network. Cabling type, protocol, and speed are also listed for each connection.

logical network diagram

A document that shows the broadcast domains and individual IP addresses for all devices on the network. Only critical switches and routers , firewalls, routing protocols, subnets,

differential backup

A type of partial backup that involves copying all changes made since the last full backup. Thus, each new differential backup file contains the cumulative effects of all activity since the last full backup.

what is traceroute

A utility used to discover information about the routers between you and the destination address.

You are partitioning a 1 TB hard drive on a new workstation. The hard disk has been partitioned into four different partitions with 100 GB, 150 GB, 250 GB, and 500 GB. How many different file system types could you support on this 1 TB hard drive?

Each partition can support its own file system.

What permissions would be represented by the octal 517?

In Linux, you can convert letter permissions to an octal by giving 4 for each R, 2 for each W, and 1 for each X. So, R-X is 5, --X is 1, and RWX is 7 0 = ---

pii

Personally Identifiable Information

wireless pin

WPS is enabled = security concern = easier to spread malware

Data Loss Prevention (DLP)

Data loss prevention (DLP) is a technology that reduces the risk of data loss even when the data is in use, in motion, or at rest. It identifies, monitors, and protects data through deep content inspection, contextual security analysis of transaction, and with a centralized management framework. DLP detects and prevents the unauthorized use and transmission of confidential information.

Your company works as a contractor to the military and has just finished replacing about 500 workstations across its secure network. You have been asked to properly dispose of the workstations and destroy the data on their hard disk drives. Which of the following methods would be the MOST effective?

Degaussing, Degaussing is the process of erasing/wiping a hard disk drive or magnetic tape. When exposed to the powerful magnetic field, the magnetic data on a hard disk is neutralized or erased

window 10 64big requirements

For the Windows 10 (64-bit) operating system, the minimum requirements are a 1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space.

GDPR

General Data Protection Regulation that applies to companies that do business in EU. They cover PII PCI payment card indutry PHI protected health information

Which command would be used to display the IP address and subnet mask for the wired network connection on a macOS or Linux system?

IFCONFING

Protected Health Information (PHI)

Individually identifiable health information like medical records and labs

PXE (preboot execution environment)

It allows a workstation to boot from a server on a network before booting the local hard drive's operating system. It is usually used to install an image to the computer over the network.

dism

Make changes to a windows imaging format (WIM)

home computers threat management vs company

Most companies require any machines suspected of malware infection to be scanned/analyzed by the cybersecurity department before remediating or reimaging them on your own

pci dss

Payment Card Industry Data Security Standard

secure SSO solution for accessing both the corporate wireless network and its network resources

RADIUS( sers on the network can provide their user credentials one time (when they initially connect to the wireless access point or another RADIUS client) are automatically authenticated to all of the network's resources.)

An attacker is using a precomputed table of values to attempt to crack your Windows password. What type of password attack is th

Rainbow Table (speeding up attacks against Windows passwords by precomputing possible hashes. A rainbow table is used to authenticate users by comparing the hash value of the entered password against the one stored in the rainbow table)

Maria is trying to log in to her company's webmail and is asked to enter her username and password. Which type of authentication method is Maria using?

SFA single factor authentication

sso

Single Sign-on (SSO) is an authentication technology that allows users to authenticate once and receive authorizations for multiple services. The advantage of single sign-on is that each user does not have to manage multiple user accounts and passwords.

Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?

Spear phishing ( directed to certain group vs random people (phishing))

Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?

TACACS+

chmod

The chmod (change mode) command will modify the read, write, and execution permissions for a file system object. The mode of a file or folder would not commonly need to be modified during an upgrade.

What anti-malware solution should be implemented to deter attackers from loading custom files onto a distributed target platform?

The network-based anti-malware can keep the system secure by testing all communications to/from a distributed target platform.

A user contacts the service desk after they just finished attempted to upgrade their laptop to Windows 10. The upgrade failed, and the user asks you to explain why. Which of the following log files should you review to determine the cause of the upgrade failure?

The setup log contains a record of the events generated during the Windows installation or upgrade process.

Which of the following file system formatting types should be used with a DVD?

UDF

Which of the following must be enabled to allow a video game console of VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?

UPnP (universal plug and play)

gpresult

Verify group policy settings for a user

Which of the following types of wireless encryption uses a 40-bit encryption key?

WEP

During a disaster recovery, which of the following statements is true?

a virtual machine has less downtime than a physical server

Which of the following commands is used on a Linux system to perform installations of new software packages?

apt-get (advanced packaging tool to remove, update or install new software packages)

You are helping to set up a backup plan for your organization. The current plan states that all of the organization's servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?

attempt to restore a test server from one of the backup files to verify them

Only an authorized user should use the computer. Which of the following security requirements should you implement to prevent unauthorized users from accessing the network with this computer?

authentication on wake up

Your company wants to increase the security of its server room. Which TWO of the following should they install or use?

badge reader + biometric lock

BOOTMGR is missing; Press Ctrl+Alt+Del to restart.

bootrec /fixboot

Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the EFI/BIOS of the system

bootrec /fixboot

Which command-line tool is used on a Windows system to move upward in a directory within the system's directory structure?

cd .. (cd. stays in the same structure)

Which of the following file system formatting types should be used with older recordable optical discs?

cdfs

cd

change directory

A user attempted to go to their favorite social media website this morning from their laptop. When they typed in Facebook.com, their browser redirected them to MalwareInfect.com instead. You asked the user to clear their cache, history, and cookies, but the problem remains. What should you do NEXT to solve this problem?

check host ini file

Which command on a macOS or Linux system is used to change the permissions of a file? or change directory permissions

chmod

Which of the following commands is used on a Linux system to change a file's permissions or directory on a system?

chmod

Which of the following commands is used on a Linux system to change the ownership of a file or directory on a system?

chown

Which of the following commands is used on a Linux system to perform an overwrite of an entire hard disk with zeros?

dd

Your network is currently under attack from multiple hosts outside of the network. Which type of attack is most likely occurring?

ddos ( dos is only from single point of origin)

risk analysis

describes any uncertainty or adverse effects that may occur during the installation process

A network consulting firm is creating a proposal to upgrade the Internet firewalls for a large corporation. The proposal includes a description of the project and the network topology changes that would be required to support the upgrade. The proposal also describes the risks involved in the process of making this upgrade. Which of the following should be covered NEXT in the proposal?

detailed upgrade plan, this will also provide decision making info for backout plan

Which of the following Windows 10 system utilities would be used to test the functionality of the DirectX subsystem for video and sound-related problems?

dxdiag

best protection of data

enable full disk encryption and configure ability to perform remote wipe

What is the term for a piece of software which no longer has technical support, software updates, or security updates?

end of life

after installation or change has been implemented, which of the following is necessary before closing the change request?

end user acceptancce

Which of the following is used to communicate data and preferences to child processes within a script or batch file?

environmental variables

you are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend's Windows 10 desktop. Which file format should you use?

exFAT

Linus file system formart

ext4 - 64 bit

Which of the following MacOS features is the equivalent of the Windows Explorer or File Explorer?

finder

Which of the following commands is used on a Linux system to search for lines that match a pattern within a file?

grep (The grep is a command-line utility for searching plain-text data sets for lines that match a regular expression. The grep command works on Unix, Linux, and macOS operating systems. Grep is an acronym that stands for Global Regular Expression Print.)

what does system log contain

he system log contains information about service load failures, hardware conflicts, driver load failures, and other common issues. If the driver was recently updated and is now causing issues, it will most likely be documented in the system log.

Which of the following allows users to save their current session to disk and before powering down the computer?

hibernate - saves the session to desk before powering off

Instead of asking for an unlocked copy of the document, the analyst decides to write a script in Python to attempt to unlock the PDF file by using passwords from a list of commonly used passwords until he can find the correct password or attempts every password in his list. Based on this description, what kind of cryptographic attack did the analyst perform? ​

if list is mentioned, it is a dictionary attack.

A user's workstation is running slowly and cannot open some larger program files. The user complains that they often get a warning that states memory is running low on their Windows 10 workstation. Which of the following should you configure until more memory can be installed to help alleviate this problem?

increase the pagefile size ( also known a virtual memory)

Which of the following types of backup requires the LEAST time to complete a backup?

incremental

power loss

install battery backup

key fob

is a hardware token that generates a random number code synchronized to a code on the server, that constantly changes

worm

is a self-replicating type of malware that does not require user intervention or another application to act as a host for it to replicate

zero day vulnerability

is an unknown vulnerability, so a patch or virus definition has been release yet. something new that the upto date firewall does not catch

Least privilege

is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities. Privilege itself refers to the authorization to bypass certain security restraints.

.sh file

is used for a shell script in linux, mac os and unix, #!/bin/bash is the identifier.

dir

list the contents of a windows directory

diskpart

list the volume names on a storage drive

Which version should you use when installing a Linux operating system and are concerned with end-of-life support?

lts support = long term support

virus

may be programmed to carry out other malicious actions/ delete or change files

Which of the following MacOS features allows you to use multiple desktops or spaces on a single system?

mission control

cd..

move up in a directory

windows 8 startup tools is

msconfig , task manager for windows 10

Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory?

mv

Which command-line tool could you use on a Windows system to enable an inactive administrator account?

net user ( part of net command line)

Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure?

onnections

Which of the following commands is used on a Linux system to change a user's password on the system?

passwd

Which of the following would NOT be included in a company's password policy?

password style

Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window?

plan

Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during the initial tests. You decided to check the firewall's ACL to see if the server's outgoing email is being blocked. Which of the following ports should you ensure is open and not blocked by the firewall?

port 25 smtp, outbound

large increase in power

power spike ( power surge is small increase in power that lasts longer)

When using an MBR, which of the following types of partitions can only have up to four partitions?

primary, to resolve this issue use extended partitions

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue?

print q

Which of the following commands is used on a Linux system to list the system's currently running processes? ​ ls (Incorrect)

ps

A user is complaining that their profile is taking too long to load on their Windows 10 system. Which of the following is the BEST solution to this problem?

rebuild your windows profile

standard formatting

regular style of formatting, data can be recovered.

You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. Which of the following should you do FIRST to attempt to solve this problem? ​ Reinstall the email app (Correct)

reinstall

Which of the following types of installations would you use on a system with slow performance or one that you cannot isolate a single cause of the system's issues?

repair installation

chkdsk

repair logical file system errors and locate and recover data from bad sectors on a hard drive

browser direction

reset browser to default settings uncheck from the startup tab in msconfig

A macOS user is browsing the internet in Google Chrome when they see a notification that says, "Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!" What type of threat is this user experiencing?

rogue anti virus

Which TWO of the following devices should have a grounding wire attached to them when installed per the manufacturer's recommendations?

server rack and UPS

An attacker uses the nslookup interactive mode to locate information on a Domain Name Service (DNS). What command should they type to request the appropriate records for only name servers?

set type = ns

You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented?

smart card

EULA

software cam be used on one computer and one copy can be stored for backup purposes.

cd.

stay in the same directory

credential manager

stores usernames and passwords for server and web sites in windows vault. remember my credential checkbox and credentials to the windows vault.

Which of the following network configurations is used to identify your computer's individual host identifier and your computer's network identifier?

subnet mask

A Linux administrator has been asked to upgrade the web server software on a device. Which of the following would provide the administrator with the appropriate rights and permissions for this upgrade?

sudo

Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?

swap partition ( portion of the hard disk formatted with minimal file system for when os runs of physical memory and needs more)

su command

switch to another users account on linux

You are troubleshooting a network printer when a document is printed with sensitive employee data on it. Which of the following actions should you take

take it to supervisor

You are trying to connect to another server on the network but are unable to do so. You have determined that the other server is located on the 10.0.0.1/24 network, but your workstation is located on the 192.168.1.1/24 network. Which of the following tools should you use to begin troubleshooting the connection between your workstation and the server?

traceroute

What can be issued from the command line to find the layer 3 hops to a remote destination?

traceroute (will determine every hop between the host and the destination using ICMP. Traceroute is used for Linux and UNIX systems. Tracert is used for Windows systems.)

social engineering

type of attacking which attacker uses confidence and victims' gullibility to gain access.

low level formatting

type of formatting that makes recovering data from your impossible once the operation is complete

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. Which of the following would BEST prevent this from reoccurring?

use an anti-virus or anti-malware solution with heuristic analysis.Heuristic analysis is a method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild.

A user needs to access a file located on the \\gate-room server. The file is located in a share called ship-diagnostics. Use the command line to connect to this share using drive g:.

use net use to map a network drive.

dd command

used to convert and copy files on linux

line conditioner

used to protect an entire power circuit from brown outs/sags. also known as voltage regulars

wpa personal verus wpa2 enterprise

uses PSK - preshared key wpa2 enterprise uses RADIUS authentication server

Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won't open. What should you do?

verify the digital certificate is installed on the device

Which of the following commands is used on a Linux system to edit a text file on a server?

vi (visual utility)

The router cannot get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router's configuration to ensure it is set up to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address?

whitelist mac addresses are enabled

A user recently bought a used Windows laptop. When they booted up the computer, they were not greeted with a normal desktop but instead will a screen filled with tiles. Which version of Windows is the laptop MOST likely running?

windows 8

ifconfig

wired config for linux wireless and wired for macOS

iwconfig

wireless config for macOS

A user has reported that all Google search results in their Internet browser are displaying a non-Google website. This redirection occurs each time a Google search is attempted. Which of the following would be the BEST way to prevent this issue in the future?

Anti malware utility.

Any installation or upgrade should include a backout plan as part of the change request and change plan. That way, if something goes wrong with the installation, then the team can "backout" and restore service on the legacy/previous system.

Any installation or upgrade should include a backout plan as part of the change request and change plan. That way, if something goes wrong with the installation, then the team can "backout" and restore service on the legacy/previous system.

Users connecting to an SSID appear to be unable to authenticate to the captive portal.

Captive portals usually rely on 802.1x, and 802.1x uses RADIUS for authentication.


Set pelajaran terkait

Personal Finance Ch. 6-10 Exam 2 Prep

View Set

EDE 3223: Test 1: Middle School Development & Diversity

View Set

Research: Demographic basics and generational cohorts

View Set

study review ela text structures

View Set