Practice Test 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following commands can be used to install software on a Linux system?

yum

Dion Training uses DHCP to assign private Class B IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class B address?

172.16.13.12

What is the minimum amount of memory required to install Windows 10 (x64) on a device?

2GB

What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system?

32 GB

How would you represent the Linux permissions rwxr-xr-- in octal notation?

754

You want to ensure that only one person can enter or leave the server room at a time. Which of the following physical security devices would BEST help you meet this requirement?

Access control vestibule

Jason checks the Dion Training server room and finds that it currently has only 10% humidity. Which of the following risks to the servers could occur due to this low humidity level?

Accidental static discharge

Bradley has been authorized to work from home every Friday. Normally, he can use his work laptop home from home while still accessing the company's internal network shares, but for some reason, it isn't working today. What is MOST likely the cause of Bradley's issue today?

An inactive VPN connection

You are installing a new file server at the offices of Dion Training. The entire building has a diesel generator installed to protect it from power outages. The file server must have zero downtime once placed into production. Which of the following power sources should the file server utilize?

An uninterruptible power supply (UPS)

John is setting up 100 Windows 10 computers for a new corporate office. He wants to ensure that no one can change the boot order and boot from an unauthorized operating system. What feature should he ensure is enabled?

BIOS password required

Fail to Pass Solutions has requested that its employees have a mobile device so that they can respond to questions when they are out of the office. Each employee is responsible for buying their Android smartphone and cellular plan service. To access the corporate network and its data, the employees need to install a company-provided APK on their device. This app contains access to their company-provided email, cloud storage, and customer relationship management (CRM) database. Which of the following policies BEST describes Fail to Pass's mobile device deployment model?

BYOD

Sally just purchased a new iPhone and AirPods to listen to her music. After setting up the new iPhone, she can get online and watch YouTube, but her wireless headphones aren't working. Which of the following is MOST likely the problem?

Bluetooth is not enabled

Which of the following components presents the largest risk of electrical shock to a technician?

CRT monitor

A user attempted to go to their favorite social media website this morning from their laptop. When they typed in Facebook.com, their browser redirected them to MalwareInfect.com instead. You asked the user to clear their cache, history, and cookies, but the problem remains. What should you do NEXT to solve this problem?

Check the host.ini file

A user's Android smartphone is becoming sluggish and slow to load applications. Which of the following should you perform FIRST to fix this problem?

Close all of the running applications

Which of the following commands would you use to duplicate the file c:\Users\Jason\Downloads\newfile.docx to c:\Users\Jason\Desktop\newfile.docx from the command line?

Copy

You have connected your laptop to the network using a CAT 5e cable but received an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is most likely the cause of this issue?

DHCP failure

Your company recently suffered a small data breach caused by an employee emailing themselves a copy of the current customer's names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which of the following logical security concepts should you implement to prevent a trusted insider from stealing your corporate data?

DLP (Data Loss Prevention)

David is troubleshooting a new Android application his company is creating. He has installed the app on an Android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. Which of the following should David enable on the device?

Developer mode

During the reconnaissance phase of a penetration test, you have determined that your client's employees all use iPhones that connect back to the corporate network over a secure VPN connection. Which of the following methods would MOST likely be the best method for exploiting these?

Identify a jailbroken device for easy exploitation

An increased amount of web traffic to an e-commerce server is observed by a network administrator but without increasing the number of financial transactions. Which kind of attack might the company be experiencing?

DoS A DoS attack or Denial-of-Service attack works by overloading a server with multiple requests (more than it can handle), thus eventually knocking the server offline.

You are assisting a network administrator with updating the firmware of a Cisco iOS-based router. This router is the only border router for your organization, and it connects them to the internet. A request for change (RFC) is being written and contains the purpose, plan, scope, and risk analysis of the proposed change. Which of the following should be added to the RFC before its approval?

Document a blackout plan if the update is not successful

Last week, a technician remediated a malware infection on Karen's laptop. Today, she shows up at the service desk, frustrated because her laptop appears to have been infected again. What step of the malware remediation process did the technician MOST likely forget to complete?

Educating the end user

What is the SIXTH step of the seven-step malware removal process?

Enable System Restore and create a restore point (in Windows).

A Windows 2019 server is crashing every evening at 2:35 am, but you are not sure why. Which of the following tools should you use to identify the cause of the system crash?

Event Viewer

Your company has just installed 50 new LCD monitors to replace some older CRT monitors. How should you properly dispose of the old CRT monitors?

Follow local government regulations and handling procedures

Your company is expanding its operations in the European Union and is concerned about additional governmental regulations that may apply. Which of the following regulations applies when processing personal data within the European Union?

GDPR

Dion Consulting Group has been hired by a small real estate office to build its network. The office has 4 computers running Windows 10 Professional edition configured in a workgroup to access a shared file server. Which of the following types of network models is being used by this real estate office?

Peer-to-peer

Which of the following installation types would allow a single technician to quickly install Windows 10 Enterprise on 50 workstations simultaneously?

Image Deployment

The Chief Financial Officer has asked Maria for a recommendation on how the company could reduce its software licensing costs while still maintaining the ability to access its application server remotely. Which of the following should Maria recommend?

Install and deploy thin clients without an operating system for each user

When Jason needs to log in to his bank, he must use a hardware token to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to log in?

Key fob

Dion Training's offices are frequently experiencing brownouts and sags. Which of the following solutions would protect all of their workstations and servers from these under-voltage events?

Line conditioner

Which of the following workstation operating systems are Ubuntu and Red Hat considered?

Linux

What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card's hardware address?

MAC filtering

A printing company uses an isolated Windows XP workstation to print out large format banners for its customers on a custom printer. Unfortunately, the printer does not support newer versions of Windows and would cost $50,000 to replace it. To mitigate this risk, the workstation is not connected to the internet or a local area network. When a customer needs a banner printer, the technician takes a copy of their PDF file and moves it to the Windows XP workstation using a USB thumb drive. The workstation recently became infected with malware when printing a customer's file. The technician remediated the issue, but the workstation became infected again three weeks later. Which of the following actions did the technician forget to perform?

Manually update the antivirus on the workstation and set it to perform on-access scans

You are configuring a SOHO network that will contain 7 devices, but you only have a single public IP address. Which of the following concepts should be configured to allow the 7 devices to share that single IP when connecting to the internet?

NAT ( Network address translation)

You are installing a new firewall for Dion Training's corporate network. Which of the following documents should you update FIRST?

Network topology diagrams

Eduardo is installing Windows 11 (64-bit) in a virtual machine on his macOS desktop. The installation is continually failing and producing an error. Eduardo has configured the virtual machine with a 2.2 GHz processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

Number of CPU cores

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as challenge/response and password encryption?

TACACS+

Which of the following types of encryption should be selected on a SOHO access point if you are running a coffee shop and want all of your customers to be able to join it by default?

Open

Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards?

PCI DSS

During a penetration test of your company's network, the assessor came across a spreadsheet with the passwords being used for several servers. Four of the passwords recovered are listed below. Which one is the weakest password and should be changed FIRST to increase the password's complexity?

Pa55word

Your company is concerned about the possibility of power fluctuations that may occur and cause a large increase in the input power to their server room. What condition is this known as?

Power spikes

Dion Training is building a new computer for its video editor to use. The new computer will use four physical Intel Xeon processors, 128 GB of DDR4 memory, and a RAID 0 with two 2 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer's resources properly?

Pro for Workstations

Which of the following Control Panel sections would allow a technician to turn on Hyper-V on a Windows 10 Pro workstation?

Programs and Features

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have directly observed symptoms that indicate the system is infected with malware. Which of the following actions should you perform NEXT?

Quarantine the affected system

Which of the following remote access tools is a command-line terminal emulation program operating on port 23?

Telnet

A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, and the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

Quarantine the machine and report it as infected to your company's cybersecurity department for investigation

On your lunch break, you walked down to the coffee shop on the corner. You open your laptop and connect to their wireless network. After a few minutes of surfing the Internet, a pop-up is displayed on your screen. You close the pop-up, finish your lunch break, shut down the laptop, and put it back into your backpack. When you get back to the office, you take out the laptop and turn it on, but instead of your normal desktop background, you are greeted by a full-screen image with a padlock and a message stating you have to pay 0.1 BTC to regain access to your personal files. What type of malware has infected your laptop?

Ransomware

Which of the following commands is used on a Linux system to copy a file from one directory to another directory?

cp The cp command will copy your file(s) while the mv one will move them.

The customer service manager at Dion Training is having issues with her Windows 10 laptop. A technician believes that the operating system may have been corrupted by a piece of malware. The technician has removed the malware and wants to perform an installation or upgrade that will recopy the system files and revert most of the system settings to their default configurations while still preserving the user's personalization settings, data files, and any applications installed through the Windows store. The technician has been told that they may delete any applications installed by the user, though, since they may have been infected by the malware. Which of the following types of upgrades or installations should the technician use?

Refresh installation

A user is complaining that when they attempt to access Google's homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT?

Remove any proxy servers configured in their web browser

A user's smartphone has become unresponsive since installing the latest iOS update. Which of the following should a technician do to restore the smartphone's performance?

Rollback the iOS update

A Windows laptop is malfunctioning, and you believe that some system files are missing or corrupted. Which of the following commands should you use to verify this and, if needed, repair the files?

SFC

You need to connect to a Linux server to conduct some maintenance. The server is located in a remote office about 50 miles away. You decide to connect the server remotely instead of driving to the location to save some time, but you want to ensure you do this securely. The Linux server has VNC installed, but it isn't configured to provide an encrypted connection. Which of the following should you use to secure the VNC connection to the remote server?

SSH in Tunnel Mode

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have finished remediating the infected system. Which of the following steps should you NEXT?

Schedule scans and run updates

Which attack method is MOST likely to be used by a malicious employee or insider trying to obtain another user's passwords?

Shoulder surfing

Which of the following techniques would be the most appropriate solution to implementing a multi-factor authentication system?

Smartcard and PIN

Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?

Spear phishing

You are writing a script that will take an employee's name as the input. Which of the following data types would the employee's name be stored in?

String

Which of the following is a connectionless protocol that utilizes on UDP?

TFTP

An ethical hacker has been hired to conduct a physical penetration test of a company. During the first day of the test, the ethical hacker dresses up like a plumber and waits in the building's main lobby until an employee goes through the main turnstile. As soon as the employee enters his access number and proceeds to go through the turnstile, the ethical hacker follows them through the access gate. What type of attack did the ethical hacker utilize to access the restricted area of the building?

Tailgating

Jennifer decided that the licensing cost for a piece of video editing software was too expensive. Instead, she decided to download a keygen program to generate a license key and install a pirated version of the editing software. After she runs the keygen, a license key is created, but her system performance becomes very sluggish, and her antimalware suite begins to display numerous alerts. Which type of malware might her computer be infected with?

Trojan

Christina is attempting to install Windows 10 (32-bit) on an older netbook-style laptop. The installation is continually failing and producing an error. The device has a 1.1 GHz processor, 1 GB of memory, an 8 GB hard drive, and a 720p display. Which component would need to be fixed to allow Windows 10 (32-bit) to be installed on this device?

The screen resolution

You recently moved 1.5 TB of data from your office's file server to a new 16 TB NAS and decommissioned the old file server. You verified all users had been given the same permissions to the new file shares on the NAS as they had on the old server. The users are receiving an error stating, "Windows cannot access \\server10\shared\" every time they click the Share drive icon on their desktop. What is MOST likely the source of this error?

The users are still mapped to the old share drive

Which of the following network configurations is used to identify your computer's individual host identifier and your computer's network identifier?

subnet mask

Which of the following types of screen locks uses a biometric authentication system to prevent access to a mobile device?

TouchID

Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as?

Under-voltage event

A user's Android smartphone is sluggish in responding when the user tries to open any of its apps. The smartphone has 2 GB of memory and a 16 GB internal storage device. The technician saw that the smartphone currently has 1.7 GB of memory in use and 412 MB of free storage space on the internal storage device. Which of the following should the technician perform to improve the device's performance?

Uninstall any unneeded apps

A factory worker suspects that a legacy workstation is infected with malware. The workstation runs Windows XP and is used as part of an ICS/SCADA system to control industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation. After its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent reinfection?

Update the anti-malware solution

A home user contacts the help desk and states that their desktop applications are running very slowly. The user also says that they have not received any emails all morning, but they normally get at least 5-10 emails each day. The help desk technician gets permission from the home user to remotely access their computer and runs some diagnostic scripts. The technician determines that the CPU performance is normal, the system can ping the local router/gateway, and the system can load websites slowly, or they fail to load completely. During the diagnosis, the technician also observes the remote connection dropping and reconnecting intermittently. Which of the following should the technician attempt to perform NEXT to resolve the user's issue?

Update the antivirus software, run a full scan of the system, and verify the web browser's and email client's settings

Jason is using a Windows 10 workstation in the Dion Training conference room. The workstation is acting extremely slow and he suspects there are other accounts logged on to the workstation. Which of the following features in the Task Manager should he use to identify if anyone else is currently logged on to the workstation?

Users

Susan, an executive at Dion Training, will be traveling to Italy for a conference next week. She is worried about remaining connected to the internet while overseas and plans to use the WiFi in her hotel room and the local coffee shop with her laptop. Which of the following should she purchase and configure before leaving for Italy to ensure her communications remain secure regardless of where she is connecting from?

VPN

Nicole's smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is in her apartment building. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue?

Verify the smartphone has adequate signal strength

You are installing a new wireless network in your office building and want to ensure it is secure. Which of the following configurations would create the MOST secure wireless network?

WPA2 and AES

A programmer is writing a script to calculate the temperature in Fahrenheit when it receives input in celsius. The conversion factor used is 5/9. Which of the following would be used to store this fixed conversion factor in the script?

constant

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the first 512-byte sector on the hard disk?

bootrec /fixmbr

Dion Training is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this small company to purchase?

business

You are working on a Windows 10 workstation with a 1 TB HDD and 16 GB of memory that is operating slowly when reading large files from its storage device. Which of the following commands should you use to speed up this workstation?

chkdsk

Which command is used in the Linux terminal to change the permissions of a file?

chmod

Which file system type should you format a 4 TB USB flash drive to use with both Windows and macOS laptops?

exFAT

Which edition of Windows 10 does not have the group policy editor enabled?

home

A network technician determines that two dynamically assigned workstations have duplicate IP addresses. What command should the technician use to correct this issue?

ipconfig /release | ipconfig /renew

Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory?

mv

Which of the following data types would be used to store a user's name?

string

Which of the following commands is used on a Linux system to switch to another user's account?

su

Which command-line entry would be used on a Windows system to test if your system can reach diontraining.com?

ping diontraining.com

Which of the following commands is used on a Linux system to display the current working directory's full pathname to the screen?

pwd

A user receives the following error message: "Windows Update cannot currently check for updates because the service is not running." The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT?

reboot the computer


Set pelajaran terkait

Urinary/Nephrology Quizzes Pathophysiology

View Set

MKTG 301 (Clubb) Chapter 10: Marketing Channels: Delivering Customer Value

View Set

Ch.3 Quiz // Adulthood and Autonomy

View Set