A+ 1002 Review Questions

Ace your homework & exams now with Quizwiz!

A coworker is creating a file containing a script. You look over their shoulder and see "net use s:\\fileserver\videos" in the file. Based on this, what type of file extension should this script use? ​ .bat ​ .js ​ .py ​ .vbs

.bat

Which of the following file types are commonly used by management and administrative tasks in Windows using the Integrated Scripting Environment? ​ .ps1 ​ .js ​ .py ​ .sh

.ps1

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the file be in? ​ .ps1 ​ .bat ​ .py ​ .sh

.ps1

A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use? ​ .vbs ​ .sh ​ .py ​ .bat

.sh

What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system? ​ 4 GB ​ 2 GB ​ 1 GB ​ 8 GB

1 GB

What is the minimum amount of hard drive space needed to install Windows 8.1 on a 32-bit system? ​ 16 GB ​ 10 GB ​ 32 GB ​ 20 GB

16 GB

What is the minimum amount of RAM needed to install Windows 8.1 on a 64-bit system? ​ 1 GB ​ 4 GB ​ 8 GB ​ 2 GB

2 GB

What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system? ​ 20 GB ​ 10 GB ​ 32 GB ​ 16 GB

20 GB

What is the maximum amount of memory used in a 32-bit version of the Windows operating system? ​ 2 GB ​ 4 GB ​ 8 GB ​ 1 GB

4 GB

Every new employee at Dion Training must sign a document to show they understand the proper rules for using the company's computers. This document states that the new employee has read the policy that dictates what can and cannot be done from the corporate workstations. Which of the following documents BEST describes this policy? ​ SLA (Service Level Agreement) ​ AUP (Acceptable Use Policy) ​ MOU (Memorandum of Understanding) ​ SOW (Statement of Work)

AUP (Acceptable Use Policy)

Judith is trying to install Windows 10 (64-bit) on a virtual machine on her Mac OS X laptop. The installation is continually failing and producing an error. You look at the virtual machine's specifications and see that Judith has configured a VM with a dual-core 1 GHz processor, 2 GBs of memory, a 15 GB hard drive, and a 1024x768 screen resolution. What would you recommend increasing to fix the installation issues being experienced? ​ Amount of hard drive space ​ Amount of memory ​ The screen resolution ​ Number of CPU cores

Amount of hard drive space

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not Found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error? ​ The MBR bootloader was installed accidentally ​ An unsupported version of Linux is installed ​ Windows Startup services are not properly running ​ An incompatible partition is marked as active

An incompatible partition is marked as active

A user's computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do? ​ Ask another Tier 2 technician to answer the call since it will take too long to solve ​ Answer the phone, put the user on hold, and help them after their scheduled break ​ Troubleshoot the issue for the user regardless of how long it takes ​ Answer the phone and politely ask the user to call back later

Ask another Tier 2 technician to answer the call since it will take too long to solve

You are helping to set up a backup plan for your organization. The current plan states that all of the organization's servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend? ​ Frequently restore the server from backup files to test them ​ Set up scripts to automatically reattempt any failed backup jobs ​ Attempt to restore a test server from one of the backup files to verify them ​ Create an additional copy of the backups in an off-site datacenter Explanation

Attempt to restore a test server from one of the backup files to verify them

Your Windows 10 machine has just crashed. Where should you look to identify the cause of the system crash and how to fix it? ​ BSOD ​ MITM ​ MAC ​ DDOS

BSOD

A web server has a planned firmware upgrade for Saturday evening. During the upgrade, the power to the building is lost, and the firmware upgrade fails. Which of the following plans should be implemented to revert to the most recent working version of the firmware on the webserver? ​ Alternative plan ​ Backout plan ​ Contingency plan ​ Backup plan

Backout plan

You are a member of a project team contracted to install twenty new wireless access points (WAPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is still finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the SOW and change request before its approval? ​ Backout plan ​ End-user acceptance ​ Risk analysis ​ Plan for change

Backout plan

You are concerned that your servers could be damaged during a blackout or brownout. Which TWO devices would protect against blackouts and brownouts? ​ Battery backup ​ Line conditioner ​ Grounding the server rack ​ Surge suppressor

Battery backup ​ Line conditioner

Your company's Security Operations Center (SOC) is currently detecting an ongoing DDoS attack against your network's file server. One of the cybersecurity analysts has identified forty internal workstations on the network conducting the attack against your network's file server. The cybersecurity analyst believes these internal workstations are infected with malware and places them into a quarantined network area. The analyst then submits a service desk ticket to have the workstations scanned and cleaned of the infection. What type of malware was the workstation likely a victim of based on the scenario provided? ​ Ransomware ​ Botnet ​ Rootkit ​ Spyware

Botnet

What type of structure is "IF THEN ELSE" in scripting? ​ Constant ​ Variable ​ Loop ​ Branch

Branch

Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as? ​ Brownouts ​ Power spikes ​ Blackouts ​ Power surge

Brownouts

Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as? ​ Power spikes ​ Power surge ​ Blackouts ​ Brownouts

Brownouts

A cybersecurity analyst notices that an attacker is trying to crack the WPS pin associated with a wireless printer. The device logs show that the attacker tried 00000000, 00000001, 00000002 and continued to increment by 1 number each time until they found the correct PIN of 13252342. Which of the following type of password cracking was being performed by the attacker? ​ Dictionary ​ Rainbow table ​ Hybrid ​ Brute-force

Brute-force

Which of the following is required for evidence to be admissible in a court of law? ​ Legal hold ​ Order of volatility ​ Right to audit ​ Chain of custody

Chain of custody

A user is having an issue with a specific application on their Android devices. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue? ​ Clear the local application cache ​ Reinstall the malfunctioning application ​ Roll back the application to the previous version ​ Update the operating system of the two smartphones

Clear the local application cache

You have just set up a Minecraft server on a spare computer within your network and want your friends to connect to it over the internet. What do you need to configure in your SOHO router to allow your friends to connect to the new Minecraft server you created? ​ Configure port forwarding ​ Configure your Wi-Fi to use Channel 11 ​ Enable DHCP ​ Update the firmware

Configure port forwarding

Your company recently suffered a small data breach caused by an employee emailing themselves a copy of the current customer's names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which of the following logical security concepts should you implement to prevent a trusted insider from stealing your corporate data? ​ Strong passwords ​ DLP ​ Firewall ​ MDM

DLP

Whenever you reboot your domain controller, you notice it takes a very long time to boot up. As the server is booting, you hear noises that sound like a steady series of clicks coming from the hard drive. Which of the following is the BEST action to help speed up the boot time of the server? ​ Remove unnecessary applications from startup ​ Perform a Disk Cleanup ​ Defragment the hard drive ​ Terminate processes in the Task Manager

Defragment the hard drive

Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the WPA2 password? ​ Disable SSID broadcast ​ Disable WPA2 ​ Enable WPA ​ Disable WPS

Disable WPS

You are configuring a wireless access point (WAP) in a large apartment building for a home user. The home user is concerned that their neighbor may try to connect to their Wi-Fi and wants to prevent it. Which THREE of the following actions should you perform to increase the wireless network's security? ​ Reduce the channel availably (Incorrect) ​ Disable the SSID broadcast (Correct) ​ Enabled WEP encryption ​ Disable the DHCP server ​ Enable WPA2 encryption (Correct) ​ Reduce the transmission power (Correct) Explanation

Disable the SSID broadcast ​ Enable WPA2 encryption Reduce the transmission power

You have been asked to replace a computer's hard drive. Which of the following steps should you take FIRST to prevent an electrical hazard while working on the computer? ​ Place the computer and its components on an ESD mat ​ Connect an ESD strap to yourself to prevent shock ​ Place the computer on a grounded workbench ​ Disconnect the power prior to serving the computer

Disconnect the power prior to serving the computer

The network administrator noticed that the border router has high network capacity loading during non-working hours. This load is causing web services outages. Which of the following is the MOST likely cause of the issue? ​ Evil twin ​ Session hijacking ​ Distributed DoS ​ ARP cache poisoning

Distributed DoS

An increased amount of web traffic to an e-commerce server is observed by a network administrator but without increasing the number of financial transactions. Which kind of attack might the company be experiencing? ​ DoS ​ ARP cache poisoning ​ Bluejacking ​ Phishing

DoS

You have just run an anti-virus scan on a workstation, discovered about 25 different malicious items, and successfully removed them. You have scheduled a daily scan of the workstation, enabled the System Restore function, and created a new restore point. What is the NEXT step in the malware removal process? ​ Educate the end-user ​ Remediate the infected systems ​ Quarantine the infected system ​ Update the applications and the operating system

Educate the end-user

Two weeks ago, David's computer was infected with a virus. A technician performed the malware removal process on the machine and removed the infection from the system. Now, many of the symptoms have returned on David's computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation? ​ Quarantine the infected system by removing its network connectivity ​ Update the anti-virus software and run a full system scan ​ Enable System Restore and create a restore point (in Windows) ​ Educate the end-user about how to avoid malware in the future

Educate the end-user about how to avoid malware in the future

Your company failed a recent security audit. The IT Directory has issued a new policy dictating that all workstations must be locked when not in use for more than 2 minutes. A password must be entered before booting up the operating system, and that the hard drive is fully encrypted. You have been asked to configure the corporate workstations to enforce these new security measures. Which THREE of the following should you configure FIRST? ​ Enable a UEFI password ​ Require multifactor authentication (Incorrect) ​ Enable a screen lock ​ Enable BitLocker ​ Enable strong passwords ​ Require the use of smart cards

Enable a UEFI password Enable a screen lock Enable BitLocker

Your company failed a recent security audit. The IT Directory has issued a new policy dictating that all workstations must be locked when not in use for more than 2 minutes. A password must be entered before booting up the operating system, and that the hard drive is fully encrypted. You have been asked to configure the corporate workstations to enforce these new security measures. Which THREE of the following should you configure FIRST? ​ Require the use of smart cards ​ Enable BitLocker ​ Enable a UEFI password ​ Enable a screen lock ​ Enable strong passwords ​ Require multifactor authentication

Enable a screen lock Enable a UEFI password ​ Enable a UEFI password

SecureCorp is worried about the security of the data on their corporate smartphones if they are lost or stolen. The Chief Security Officer has instructed that the devices be configured so that unauthorized users cannot access the data. Which TWO of the following settings would provide the BEST security and protection for the corporate smartphones' data? ​ Enable full device encryption ​ Disable the installation of application from untrusted sources ​ Require complex passwords ​ Enable device lockouts after 3 failed attempts ​ Configure the ability to perform a remote wipe ​ Enable a pattern lock

Enable full device encryption ​ Configure the ability to perform a remote wipe

Which of the following is used to communicate data and preferences to child processes within a script or batch file? ​ Environmental variables ​ Constants ​ Comments ​ Variables

Environmental variables

Which file system type is most commonly used on a macOS (OS X) system? ​ NTFS ​ NFS ​ FAT32 ​ HFS

HFS

Barbara received a phone call from a colleague asking why she sent him an email with lewd and unusual content. Barbara doesn't remember sending the email to the colleague. What is Barbara MOST likely the victim of? ​ Spear phishing ​ Phishing ​ Hijacked email ​ Ransomware

Hijacked email

Chris just downloaded a new third-party email client for his smartphone. When Chris attempts to log in to his email with his username and password, the email client generates an error messaging stating that "Invalid credentials" were entered. Chris assumes he must have forgotten his password, so he resets his email username and password and then reenters them into the email client. Again, Chris receives an "Invalid credentials" error. What is MOST likely causing the "Invalid credentials" error regarding Chris's email client? ​ His smartphone has full device encryption enabled ​ His email account requires multifactor authentication ​ His email account requires a strong password to be used ​ His email account is locked out

His email account requires multifactor authentication

A user's workstation is running slowly and cannot open some larger program files. The user complains that they often get a warning that states memory is running low on their Windows 10 workstation. Which of the following should you configure until more memory can be installed to help alleviate this problem? ​ Disable the visual effects ​ Defragment the hard disk ​ Enable the swap file ​ Increase the pagefile size

Increase the pagefile size

A corporate workstation was recently infected with malware. The malware was able to access the workstation's credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this type of issue from occurring again in the future. Which of the following would BEST prevent this from reoccurring? ​ Monitor all workstations for failed login attempts and forward them to a centralized SYSLOG server ​ Install a host-based intrusion detection system on all of the corporate workstations ​ Install an anti-virus or anti-malware solution that uses heuristic analysis ​ Install a Unified Threat Management system on the network to monitor for suspicious traffic

Install an anti-virus or anti-malware solution that uses heuristic analysis

Which type of malware is used to actively attempt to steal confidential information by capturing a user's data when typed into a web browser or other application? ​ Spyware ​ Keylogger ​ Rootkit ​ Trojan

Keylogger

Which version should you use when installing a Linux operating system and are concerned with end-of-life support? ​ Beta release ​ Developer release ​ Rolling release ​ LTS release

LTS release

You are setting up the Remote Desktop Services on a Windows 2019 server. To increase the security of the server, which TWO of the following actions should you take? ​ Force the use of a local client certificate for authentication with the server ​ Disable log on time restrictions on the server ​ Change the default access port for the terminal server ​ Logically place the Windows 2019 server into the network's DMZ ​ Block all unused ports on the switch, router, and firewall ​ Enforce password complexity on the server

Logically place the Windows 2019 server into the network's DMZ ​ Block all unused ports on the switch, router, and firewall

What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card's hardware address? ​ MAC filtering ​ WEP ​ WPS ​ Disable SSID broadcast

MAC filtering

A user is complaining that every time they reboot their Windows 8 computer, a music application loads up. Which of the following commands would you use to disable the program from starting up each time Windows reboots? ​ MSCONFIG ​ Event Viewer ​ Services.msc ​ Task Manager

MSCONFIG

You are cleaning out the closet in your office and find several bottles of cleaner that need to be disposed of. Which of the following should you consult to determine the proper method of disposal? ​ MSDS ​ SOW ​ MITM ​ MOU

MSDS (Material Safety Data Sheet)

What anti-malware solution should be implemented to deter attackers from loading custom files onto a distributed target platform? ​ Signature-based anti-malware ​ Cloud-based anti-malware ​ Host-based anti-malware ​ Network-based anti-malware

Network-based anti-malware

Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue? ​ Services ​ MMC ​ Regedit ​ Notepad

Notepad

Michael, a salesman, is on a business trip and is trying to access his corporate email over the hotel's Wi-Fi network. Michael's laptop appears to be connected to the hotel's wireless network, but his email client cannot download any new messages and states, "Network Offline." Michael contacts the help desk for assistance. What action should the help desk technician tell Michael to perform to solve the issue? ​ Perform a full system scan for malware on his laptop ​ Disable and reenable the wireless network adapter on his laptop ​ Open a web browser, enter google.com, and see if a redirect page is displayed ​ Disconnect and reconnect to the hotel's wireless network

Open a web browser, enter google.com, and see if a redirect page is displayed

You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window? ​ Plan ​ Purpose ​ Risk analysis ​ Scope

Plan

Your company is concerned about the possibility of power fluctuations that may occur and cause a large increase in the input power to their server room. What condition is this known as? ​ Brownouts ​ Blackouts ​ Power spikes ​ Power surge

Power spikes

Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as? ​ Brownouts ​ Blackouts ​ Power spikes ​ Power surge

Power surge

When using an MBR, which of the following types of partitions can only have a limit of four partitions? ​ Swap ​ Extended ​ Logical ​ Primary

Primary

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue? ​ SSL certificates ​ RADIUS ​ WPA2 security key ​ CSMA/CA

RADIUS

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used? ​ WPA2 ​ WPS ​ WEP ​ RADIUS

RADIUS

A user receives the following error message: "Windows Update cannot currently check for updates because the service is not running." The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT? ​ Reboot the computer ​ Register the Windows Update service's DLL files ​ Restart the network services ​ Rollback the device drivers

Reboot the computer

A user is complaining that their profile is taking too long to load on their Windows 10 system. Which of the following is the BEST solution to this problem? ​ Disable unnecessary programs from automatically starting up ​ Reinstall Windows ​ Reboot the system into Safe Mode ​ Rebuild your Windows profile

Rebuild your Windows profile

You have been asked to install a computer in a public workspace. Only an authorized user should use the computer. Which of the following security requirements should you implement to prevent unauthorized users from accessing the network with this computer? ​ Remove the guest account from the administrators group ​ Issue the same strong and complex password for all users ​ Require authentication on wake-up ​ Disable single sign-on

Require authentication on wake-up

Your companies share drive has several folders that have become encrypted by a piece of ransomware. During your investigation, you found that only the Sales department folders were encrypted. You continue your investigation and find that a salesperson's workstation was also encrypted. You suspect that this workstation was the original source of the infection. Since it was connected to the Sales department share drive as a mapped S:\ drive, it was also encrypted. You have unplugged the network cable from this workstation. What action should you perform NEXT to restore the company's network to normal operation? ​ Schedule a full disk anti-malware scan on the workstation ​ Restore the Sales department folders from backups ​ Schedule weekly scans and enable on-access scanning ​ Disable System Restore on the workstation

Restore the Sales department folders from backups

A computer is infected with malware that has infected the Windows kernel to hide. Which type of malware MOST likely infected this computer? ​ Rootkit ​ Botnet ​ Trojan ​ Ransomware

Rootkit

A computer is infected with malware that has infected the Windows kernel to hide. Which type of malware MOST likely infected this computer? ​ Trojan ​ Rootkit ​ Ransomware ​ Botnet

Rootkit

Dion Training utilizes a federation authentication model for all of its internal and external services. If an employee needs to access one of the company's web applications from their smartphone, they use a username and password to login to the main website. They then are transferred and authenticated to all of the other sites and services automatically. Which of the following type of authentication is this known as? ​ FaceID ​ TouchID ​ SSO ​ MFA

SSO

You have submitted an RFC to install a security patch on some of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe which servers will receive the patch during this maintenance window? ​ Risk analysis ​ Plan ​ Purpose ​ Scope

Scope

Which of the following allows a user to save their current session to memory and put the computer into a minimal power state? ​ Hibernate ​ Sleep ​ Lock ​ Shutdown

Sleep

Which of the following types of attacks are usually used as part of a man-in-the-middle attack? ​ DDOS ​ Spoofing ​ Brute force ​ Tailgating

Spoofing

Which of the following types of attacks involves changing the system's MAC address before it connects to a wireless network? ​ DDoS ​ Spoofing ​ Botnet ​ Zombie

Spoofing

Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router cannot get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router's configuration to ensure it is set up to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address? ​ The administrator has enabled DHCP snooping on the network ​ The Administrator has implemented a feature that only allows whitelist MAC addresses to connect to the network ​ The administrator is blocking DHCP requests that originate from access points ​ The administrator is blocking the wireless router's MAC address using MAC filtering

The Administrator has implemented a feature that only allows whitelist MAC addresses to connect to the network

Jason took home a company-issued Windows 8.1 laptop home to do some work. He successfully connected it to his home's wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network's shared files from his home network's media server. Which of the following may be why Jason is unable to access the network shares in his home network? ​ The laptop has an IP conflict ​ The laptop's DNS configuration is not properly setup ​ The laptop's gateway is not properly configured ​ The laptop must join the HomeGroup

The laptop must join the HomeGroup

Which TWO of the following devices should have a grounding wire attached to them when installed per the manufacturer's recommendations? ​ Modem ​ UPS ​ Desktop printer ​ VOIP device ​ Server rack ​ Patch panel

UPS Server rack

A laptop is running Windows 10 with Windows Defender on it. A user believes their laptop may have become infected with malware, so they install a second antivirus program that supposedly includes real-time protection. Now, the laptop is sluggish and sometimes non-responsive. Which of the following should you do FIRST to resolve this problem? ​ Install and run Spybot Search & Destroy on the laptop ​ Run the Windows Update utility ​ Enable real-time protection in Windows Defender ​ Uninstall the real-time protection antivirus

Uninstall the real-time protection antivirus

A factory worker suspects that a legacy workstation is infected with malware. The workstation runs Windows XP and is used as part of an ICS/SCADA system to control some industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation. After its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent reinfection? ​ Remediate the infected systems ​ Quarantine the infected system ​ Identify and research malware symptoms ​ Disable System Restore (in Windows) ​ Enable System Restore and create a restore point (in Windows) ​ Update the anti-malware solution

Update the anti-malware solution

Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard? ​ Telnet ​ VNC ​ SSH ​ RDP

VNC

A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming needs to store the amount of disk space in a temporary place holder within the program that can be updated and changed during the script's execution. Which of the following would be used to store the value of the disk space needed? ​ Comment ​ Loop ​ Constant ​ Variable

Variable

Sam and Mary both work in the accounting department and use web-based software as part of their job. Sam cannot log in to the website using his credentials from his computer, but Mary can log in with her credentials on her computer. Sam asks Mary to login into her account from his computer to see if the problem is with his account or computer. When Mary attempts to log in to Sam's computer, she receives an error. Mary noticed a pop-up notification about a new piece of software on Sam's computer when she attempted to login to the website. Which TWO of the following steps should Mary take to resolve the issue with logging in from Sam's computer? ​ Verify Sam's computer has the correct web browser configuration and settings ​ Ask Sam about the pop-up notification and determine what new programs he installed on his computer ​ Have Sam clear his browser cache on his computer and then attempt to log on to the website again ​ Ask Sam for his username/password in order to log on to the website from Mary's computer ​ Have Sam attempt to log on to another website from Sam's computer to see if it works ​ Install a new web browser, reboot Sam's computer, and attempt to log on to the website again from Sam's computer

Verify Sam's computer has the correct web browser configuration and settings ​ Ask Sam about the pop-up notification and determine what new programs he installed on his computer

Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won't open. What should you do? ​ Ask your boss to resend the email in an unencrypted format ​ Verify the digital certificate is installed on the device ​ Open the email using your device's web browser and your corporate webmail ​ Ask your boss to resend the email to your Gmail account instead

Verify the digital certificate is installed on the device

A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system's web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then perform the remediation to remove the malware. You have scanned the machine with several anti-virus and anti-malware programs and determined it is now cleaned of all malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated anti-virus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers? ​ Verify the hosts.ini file has not been maliciously modified ​ Perform a System Restore to an earlier date before the infection ​ Install a secondary anti-malware solution on the system ​ Reformat the system and reinstall the OS

Verify the hosts.ini file has not been maliciously modified

Nicole's smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is at home. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue? ​ Verify the smartphone is connected to the correct SSID ​ Update the smartphone's applications or OS ​ Reset the smartphone's wireless network settings ​ Reset the data usage statistics on the smartphone Explanation

Verify the smartphone is connected to the correct SSID

You are configuring a SOHO network and only allowing specific IP addresses to access the network while blocking any IP addresses not on the list. Which of the following should be implemented? ​ MAC filtering ​ Port forwarding ​ Whitelist ​ Blacklist

Whitelist

A user with an older laptop running Windows XP has only 2 GB of RAM, 32 GB of SSD, and a 1.7 GHz 64-bit processor. The user would like to upgrade to a newer OS since Windows XP is now end-of-life. Which of the following operating systems should the technician recommend to ensure the BEST performance on this computer? ​ Windows 7 ​ Windows 8 ​ Windows 10 ​ Windows 8.1

Windows 10

Which version of Windows supports Virtual Desktops? ​ Windows 8.1 ​ Windows 7 ​ Windows 10 ​ Windows 8

Windows 10

You are working as a penetration tester and have discovered a new method of exploiting a vulnerability within the Windows 10 operating system. You conduct some research online and discover that a security patch against this particular vulnerability doesn't exist yet. Which type of threat would this BEST be categorized as? Brute force ​ Spoofing ​ Zero-day ​ DDOS

Zero-day (Correct)

A cybersecurity analyst from BigCorp contacts your company to notify them that several of your computers were seen attempting to create a denial of service condition against their servers. They believe your company has become infected with malware, and those machines were part of a larger botnet. Which of the following BEST describes your company's infected computers? ​ Zero-day ​ Monsters ​ Zombie ​ Bugs

Zombie

You are working on a Windows 10 workstation that is operating much too slowly. Which TWO of the following commands should you use to speed up the system? ​ chkdsk​ dir ipconfig​ diskpart​ dism​ format

chkdsk dism

Which of the following commands is used on a Linux system to perform an overwrite of an entire hard disk with zeros? ​ rm ​ cp ​ mv ​ dd

dd

You are working on a Windows 10 workstation that is operating much too slowly. Which TWO of the following commands should you use to speed up the system? ​ dir ​ format ​ ipconfig ​ dism ​ diskpart ​ chkdsk

dism ckdsk

Which command-line tool and option on a Windows system is used to force a background refresh of all group policy settings on a system? ​ gpresult /force ​ sfc /force ​ gpupdate /force ​ dism /force

gpupdate /force

Which of the following commands is used on a Linux system to search for lines that match a pattern within a file? ​ apt-get ​ grep ​ pwd ​ vi

grep

Which command would be used to display the IP address and subnet mask for the wireless network connection on a macOS or Linux system? ​ netstat ​ ifconfig ​ iwconfig ​ ipconfig

iwconfig

Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory? ​ mv ​ rm ​ cp ​ ls

mv

ou are trying to open your company's internal shared drive from your Windows 10 laptop but cannot reach it. You open your web browser and can connect to DionTraining.com without any issues. Which of the following commands should you use to determine if the internal shared drive is mapped to your computer properly? ​ net use ​ chkdsk ​ ping ​ tracert

net use

You are troubleshooting an issue with a Windows desktop and need to display the machine's active TCP connections. Which of the following commands should you use? ​ netstat ​ net use ​ ping ​ ipconfig

netstat

Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system's filesystem? ​ rm -rf *.* ​ rm *.* ​ rm -rf / ​ rm /

rm -rf /

A Windows laptop is malfunctioning, and you believe that some system files are missing or corrupted. Which of the following commands should you use to verify this and, if needed, repair the files? ​ xcopy ​ gpupdate ​ chkdsk ​ sfc

sfc

Which of the following commands is used on a Linux system to run a program with another user's permissions? ​ sudo ​ chown ​ passwd ​ grep

sudo

You are troubleshooting a network connectivity issue and need to determine the packet's flow path from your system to the remote server. Which of the following tools would best help you identify the path between the two systems? ​ netstat ​ ipconfig ​ tracert ​ nbtstat

tracert

You are setting up the Remote Desktop Services on a Windows 2019 server. To increase the security of the server, which TWO of the following actions should you take? ​ Block all unused ports on the switch, router, and firewall ​ Enforce password complexity on the server ​ Force the use of a local client certificate for authentication with the server ​ Change the default access port for the terminal server ​ Disable log on time restrictions on the server ​ Logically place the Windows 2019 server into the network's DMZ

​ Block all unused ports on the switch, router, and firewall Logically place the Windows 2019 server into the network's DMZ

A cybersecurity analyst is auditing your company's network logs and identifies that a USB mass storage device was previously inserted into many of the company's servers. The logs also showed dozens of failed login attempts before a successful login occurring on the servers. Which TWO of the following actions are recommended to eliminate the vulnerabilities identified by the cybersecurity analyst? ​ Install the operating system security updates ​ Remove administrative permissions ​ Lockout the account after 3 failed login attempts ​ Change the default credentials on the servers ​ Modify the AutoRun settings ​ Install a host-based firewall on the servers Explanation

​ Lockout the account after 3 failed login attempts Modify the AutoRun settings

A user receives the following error message: "Windows Update cannot currently check for updates because the service is not running." The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT? ​ Register the Windows Update service's DLL files ​ Reboot the computer ​ Rollback the device drivers ​ Restart the network services

​ Reboot the computer

When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are abysmal, and the browser creates numerous pop-ups. Jonathan asks for your assistance in fixing this issue. Which TWO of the following actions do you recommend Jonathan perform first? ​ Delete the web browser's cache, temporary files, and cookies ​ Reset the web browser to the default settings and configuration ​ Tell Jonathan to switch to a different web browser ​ Uncheck any unapproved applications from the Startup tab in MSCONFIG ​ Update Jonathan's web browser to the latest version ​ Reboot Jonathan's computer and install a second anti-virus program

​ Reset the web browser to the default settings and configuration. Uncheck any unapproved applications from the Startup tab in MSCONFIG.

Which of the following network configurations is used to identify your computer's individual host identifier and your computer's network identifier? ​ DNS ​ WINS ​ Gateway ​ Subnet mask

​ Subnet mask

Your company's wireless network was recently compromised by an attacker who utilized a brute force attack against the network's PIN to gain access. Once connected to the network, the attacker modified the DNS settings on the router and spread additional malware across the entire network. Which TWO of the following configurations were most likely used to allow the attack to occur? ​ Guest network enabled ​ WPA2 encryption enabled ​ WPS enabled ​ Default administrative login credentials ​ TKIP encryption protocols ​ Router with outdated firmware

​ WPS enabled Default administrative login credentials

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not Found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error? ​ The MBR bootloader was installed accidentally ​ An incompatible partition is marked as active ​ Windows Startup services are not properly running ​ An unsupported version of Linux is installed

​An incompatible partition is marked as active

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue? ​ Check that the printer is not offline ​ Check the status of the print server queue ​ Cancel all documents and print them again ​ Check to ensure the printer selected is the default printer

​Check the status of the print server queue

Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com." What should Michelle do to fix this problem? ​ Rollback the application to the previous version ​ Update the anti-virus software and run a full system scan ​ Reset the web browser's proxy setting ​ Restart the network services

​Reset the web browser's proxy setting


Related study sets

Medialab questions that I got wrong

View Set

AP Psych 5 Steps to a 5 Chapter 1 Schools of Thought

View Set

Chapter 1: Health Care Delivery and Evidence-Based Nursing Practice

View Set