CMIT 202 Practice B

Ace your homework & exams now with Quizwiz!

Which security measure must be enabled for a directly connected printer to be visible across a network?

File and Print Sharing For files, folders, and printers to be shared through the Windows environment, the File and Print Sharing option must be enabled. Anti-malware, VPN, and Windows Firewall are not related to printer sharing.

echo Your system will be rebooted in 60 Which of the following scripting files would contain the given command?

.bat A batch file uses the command echo followed by whatever you wanted to display on the screen. Files with a . bat extension are commonly used to execute system operations and they often include echo lines that let the user know what is happening.

FAt what point in the malware removal process should you create a restore point in Windows?

After removing the malware. A restore point should be created only after the malware has been removed; otherwise the restore point will contain the malware and may reinfect the system if it is used.

A sales representative travels with a Windows laptop and uses wireless networks in both customer sites and the hotel. On one of the wireless networks, the user cannot access locally shared printers. What is most likely the issue?

The network location profile is set to public There are several possible network location profiles that can be selected, depending on the Windows operating system version in use. When connecting to a guest or public network, the profile protects the computer by turning off file sharing and network discovery. The user could change to a different network profile, such as private, and see/use the shared printer.

A technician is copying files from an NTFS partition to a FAT32 partition. What happens to the permissions assigned to the files?

They are lost NTFS permissions are specific to the NTFS file system. A FAT32 partition does not support NTFS permissions. If files are copied from an NTFS partition to a FAT32 partition, NTFS permissions are lost.

In what instance would a PC technician need to use Task Manager?

When controlling programs that launch when the computer boots Task Manager's Startup tab enables you to choose which programs launch at startup. It does not have any of the other purposes listed.

When would a technician use RDP?

When remotely accessing a Windows computer Remote Desktop Protocol (RDP) is used to connect to a remote Windows computer.

A user reports that her PC doesn't work. Which of the following would be the best question to ask the user?

What isn't working on the computer? "Not working" is very vague; the first step is to get more details, using language that the user will understand. The user may not understand terms such as UPS, BYOD, motherboard, or power supply.

An IT intern from a local college has been given the assignment of installing IP phones. What will the intern need to know which iacks to connect the phones to?

A network topology diagram A network topology diagram would direct the intern to specific network jacks and devices. Standard operating procedures might tell how to do it, but not where. An IP address chart would provide logical locations but not physical ones. A change management plan is not needed for this scope of activity.

A company is planning to go to a cloud-based wireless AP controller. The network manager over the wireless networks has put together a plan that includes the reasons to upgrade, the scope of the project, a budget, and a risk analysis. What else should the manager include as part of this network request?

A rollback plan The design phase of a change management plan includes the scope of the change with a rollback plan that details what to do if things go wrong during the implementation.

What is an administrative share?

A share that is automatically created by Microsoft for drive volumes and folders Administrative shares are shares created by Microsoft for drive volumes and folders.Examples of administrative shares are C$, ADMINS, IPCS, and printS. These shares are automatically created and not accessible by normal user accounts across a network. The ADMIN$ share, for example, is a share to quickly access the folder that contains the Windows operating system files. Administrative shares and hidden shares have a dollar sign ($) at the end of each share name.

A technician is new to working in a large company domain-based environment. A new computer has been delivered, imaged, and added to the domain for a new employee. What should the technician do next?

Add a user account to Active Directory The Active Directory (AD) service on a Windows server is used to manage users and devices on the network. Technicians are required to add users to the domain and set security parameters associated with the user account before the user can log in to a network device such as a computer.

Which security technology is used to limit the number of users allowed to use a scanner attached to the network?

ACL Access control lists (ACLs) are implemented in servers and firewalls. An ACL can permit or deny the type of traffic flowing into a device, out of a device, or toward a particular network; specific people from a network location or device; or specific types of network traffic.

Which technology is used as part of an inventory management system?

Asset tags An asset tag has a unique identifier that corresponds to an inventory database. That database would include the manufacturer name, model number, serial number, and possibly a MAC address of a device. Technicians are commonly involved with inventory of computers and network devices and must interact with the inventory management system as devices are moved.

Which of these is a method of booting into the Windows Recovery Environment (RE)?

At the login screen, hold down Shift and click Power > Restart. If you can get to the login screen, you can enter the RE by first holding down the Shift key and then by clicking Power > Restart. There are no keyboard shortcuts during startup for entering Windows RE. However, Windows RE may load automatically after a failure to boot normally.

A smartphone that is four years old can barely keep a charge in its battery for a single day. The phone runs hot, and the case is slightly swollen. What do you suspect is wrong with it?

Battery has reached end-of-life Leaving apps open uses very little extra battery power. Incorrect settings may be a factor, and malware can cause a battery to drain quicker than normal, but since the battery is 4+ years old, the most likely problem is that the battery needs to be replaced, especially because it is running hot and it is swollen.

What security measure would prevent a hard drive from being accessed by someone who removes it from the computer in which it is installed?

BitLocker Bitlocker encrypts the entire drive so that it cannot be accessed outside of the computer on which it was installed and encrypted. Various types of authentication are not relevant in this case because removing the hard drive from the PC is an attempt to bypass the need for authentication.

An iPhone will not connect to the wireless headset that it has formerly connected with automatically. A technician might start troubleshooting to ensuring that the appropriate wireless transmitter/receiver is enabled. Which one should they check?

Bluetooth Most wireless accessories for mobile devices connect via Bluetooth. WiFi is used for connecting to other network devices such as routers and access points. NFC is used for close-range connections such as credit card terminals. AirDrop is an Apple technology for transferring files between nearby Apple mobile devices. Lesson

You are attempting to remove a virus from a PC, but the antivirus app won't run because the virus is blocking it. What might help it to be able to run?

Boot into safe mode Booting into Safe Mode may bypass the virus, which may be set to load at startup. Safe Mode bypasses all startup apps except the essential ones. Disconnecting from the Internet or LAN will not help. Removing and reinstalling the antivirus app will not help because the virus already has a foothold that prevents the antivirus app from running.

Which method does a hacker use to find a password by relentlessly making guesses?

Brute force attacks A brute force attack occurs when a hacker attempts to guess a password by the sheer number of attempts-in other words, by brute force. Spoofing occurs when an Ethernet frame is sent with a fake source MAC address. TCP/IP hijacking is a technique in which a stolen IP address is used to gain access. A zombie is a device that has been hacked and is controlled by someone else.

You download a new application, but instead of an executable install file, it comes as an ISO file. How can you access this file's content to perform the installation?

Burn it to an optical disc Mount the file as a volume An ISO file is a representation of an optical disc's content. You can burn the file to an actual optical disc, or you can mount the ISO file to tell the OS to treat the file as a volume. Double-clicking the ISO file accomplishes this in Windows. It is not a ZIP file so unzipping it is not possible. It does not open in a web browser or in Computer Management.

What should an organization require when an outside company provides a service for shredding and disposal of sensitive corporate documents?

Certificate of Destruction An outside company should provide a certificate of destruction or proof of incineration (when the documents have been destroyed by fire) as part of the service of sensitive document disposal.

A help desk technician receives a call from a user who thinks someone else is accessing her e-mail and sending messages using her account. What should the technician recommend doing first?

Changing the user's e-mail password If a user suspects that her e-mail has been hacked, the user should immediately change her e-mail password and then ensure that all operating system, antivirus, and anti-malware updates are applied.

Which of the following is relevant to a EULA?

Commercial license An end user license agreement (EULA) is relevant to commercial licenses for software applications. A commercial license is purchased software for a specific number of users or for a specific number of machines. Commercial software is purchased by and tied to a particular organization or business. A personal license is the type of license for software that is commonly used by individuals or small businesses. It is tied to the individual who purchased the software.

A company is reviewing its data protection plan. Which of the following should be done on a regular basis to prevent data loss if a hard disk fails?

Create a backup When a hard disk fails, a backup that was performed before the failure can be used to prevent data loss.

A computer cannot reach any device on the Internet or within a browser for any web-based app within the company. When a technician troubleshoots this computer, he discovers that the computer can reach all devices by IP address. What configuration does the technician need to investigate?

DNS A Domain Name Service (DNS) server provides translation of Internet names into IP addresses. WPS is Wi-Fi Protected Setup, a way of connecting wireless devices to a WAP. If the proxy server were an issue, it would fail on both domain names and IP addresses. DHCP is a server that automatically assigns IP addresses to clients.

LA technician has tested a display adapter, and it works fine. However, when the adapter is placed in a computer, it doesn't work. What Windows tool should the technician use to troubleshoot the adapter?

Device Manager The Device Manager tool is used for troubleshooting devices and adapters in Windows. System Restore is used to restore a system to a previous point in time. regedit is used to edit the Windows registry. Task Manager is to view and possibly stop processes and services as well as view system performance.

What Windows command is used to list files and subdirectories?

Dir The dir command is used to list files and subdirectories in Windows. In Linux, use ls. There is no Windows show command. pwd is used in Linux to display the current working directory path.

Which type of network environment would be best for a company that has 30 computers and wants the following capabilities: wired and wireless access, file server, networked printer, centralized authentication to be able to sign on to any computer, shared folders across the network, and a networked scanner?

Domain Workgroup networks are used for small networks of 2 to 20 computers. Files, printers, and other devices can be shared across these networks, but for a larger network that has a file server and needs everyone to authenticate to a server, a network domain is used. VPNs are used to securely connect to a company from a remote location across an insecure connection such as the Internet. RADIUS is not a network type.

After fixing a hard drive problem by replacing the drive and data, the technician asks the customer to verify that the system is working. The customer says the computer now seems to have a sound problem, and the system volume cannot be increased. The technician tells the customer that this is not important because they don't use sound very often. What operational procedure is the technician failing to meet?

Don't dismiss a customer problem technician should never tell a customer that their concerns are unimportant, even if they privately think so.

Which of the following would be the best options for preventing the theft of laptops?

Door locks Equipment locks An equipment lock is used to lock a laptop to a desk when it is in use to mitigate the risk of someone walking by and taking the laptop. When laptops are not in use, they should be locked away in locking cabinets or behind locked doors to prevent theft. Motion sensors and CCTV (closed-circuit TV), which are helpful, don't prevent anything; rather, they provide detection. USB locks prevent USB ports from being used.

Which of these is important to avoid installing apps containing malware on an Android smartphone?

Download only from trusted sources Most malware apps are Trojan horse apps-apps that appear to do something useful but actually are harmful. By limiting downloads to trusted sources, you avoid most malware apps. Getting root access is counterproductive to avoiding malware; it increases the chances of it. Turning off Wi-Fi or Bluetooth has no effect on avoiding malware apps.

Which technique would most likely be used on a hard drive being removed from a corporate computer that a technician is going to use as a replacement drive for another computer in the future?

Drive wipe Some hard drive manufacturers have a utility that rewrites the drive with all 1s or all Os to prevent data remnants from being recovered. A drive wipe utility could use a number of techniques to remove data. Not all drive wipe utilities are guaranteed to be effective on drives that contain highly sensitive data.

After a technician sets up a computer share for an administrative assistant, the next day the assistant calls the technician to report that the share is no longer accessible. What can the technician do so that this doesn't happen every day?

Enable the Reconnect at Logon option For users, network shares are commonly mapped to drive letters for easy access. A battery backup and the Sleep power option will not help, because at some point the user is going to have to restart their PC and the mapping will be lost again. Anti-malware will not help because this issue is not caused by malware.

A customer wants to be able to connect remotely to his work PC from home. Which Windows editions would allow him to do this?

Enterprise Pro The Enterprise, Pro, and Education editions support remote desktop protocol (RDP). The Home edition does not. There is no Office or International edition.

A first-level telephone tech support worker is unable to solve a customer's problem. What is his next step?

Escalate the customer's ticket to the next level of support Escalating to the next level enables a more experienced and skilled support person to take over. Dismissing a customer without solving their problem is not acceptable. A tech support person would not be authorized to give a refund.

Which user authentication type would be most secure for a mobile device?

Facial recognition Facial recognition, a form of biometric authentication, is currently one of the best security measures for mobile devices. A privacy filter prevents shoulder surfing. A numeric passcode lock is a four- or six-digit PIN used to unlock a screen. A swipe lock (in other words, just swiping to unlock the device) is not secure at all.

If a salesperson has a corporate smartphone that contains customer data, and the company is concerned about unauthorized access if the phone were to be lost, what security measure would be the best choice?

Facial recognition Facial recognition ensures that the only person who can unlock the phone is the user (and, optionally, some people in IT). A Trusted Platform Module (TPM) chip stores encryption keys for software apps. A key fob is used for remote entry or to generate a one-time password. A USB lock is not used on cell phones but prevents any USB devices from being inserted into a laptop or desktop.

Which type of partition would a technician deploy on a 4 TB drive?

GPT GUID partition table (GPT) allows partition sizes greater than 2 TB, which is the limit for master boot record (MBR) disks. In Windows-based systems, GPT allows up to 128 partitions with volume sizes up to 9.4 ZB. Use the Disk Management tool to create a GPT. If any MBR partitions (primary, extended, and logical drives) are converted to GPT, back up the data first because all data is lost during the conversion.

A technician is listening to a user explain a problem. The technician sees another technician waiting near the door and gesturing frantically for the technician to come to the door. What should the technician do?

Gesture to the technician to wait and allow the user to finish explaining the problem Actively listening to a customer is important, and it includes avoiding distractions such as phone calls, personal calls, texting, social media sites, personal interruptions, and talking to coworkers while interacting with customers.

Which Linux command is used to search text or a specific file for lines that match a specific text string?

Grep The grep command is used to search for a specified search term, text, or string of text. search is not a Linux command. The ls command lists files contained in a directory. The apt-get command launches a utility for managing application packages.

A network administrator has been tasked with preventing all users from signing into a domain on the weekends. Where would they configure this?

Group Policy Editor Group Policy Editor can be used to set policies for groups of users, which is the task at hand. Local Security Policy sets policies for individual workstations. Windows Firewall and User Accounts would not be helpful in this situation.

Which Disk Management status should a technician expect for a volume that is functioning properly?

Healthy The Disk Management Windows utility is used to view the status of installed drives and their volumes. A working volume should show a status of Healthy. Offline, Foreign, and Unallocated are statuses that indicate the volume is not ready for use for some reason.

Which laptop power management option stores the computer's saved state on the hard drive, and doesn't require any power to maintain it indefinitely?

Hibernate mode Hibernate mode, also called S4, is the lowest-power sleep mode and takes the longest to resume work because data stored in RAM is saved to the hard drive or flash media. Sleep mode (also known as suspend mode) uses reduced power from the power supply to refresh the information temporarily stored in RAM so that work can be resumed quickly. There is no such mode as Drowse mode. Airplane mode disables all communication channels on mobile devices.

if your device were being used as a zombie in a DDoS attack, what would be a likely symptom?

High network traffic A DDoS attack involves flooding a target with network traffic, so higher network traffic would be a likely symptom. A ransom note is a symptom of ransomware. Fake security warnings could mean a virus; so could a high number of ads.

Which of the following does social engineering use to bypass or manipulate corporate security policies?

Human interaction Social engineering is a technique used to trick people into divulging personal and corporate information through human interaction, a letter, a phone call, a website, and so on. Malware, Trojans, and on-path attacks are all hacking techniques that do not involve social engineering.

On a corporate mobile device, the user can reach neither internal network resources nor external ones. Which problems would most likely be causing this issue?

Incorrect or no IP address Disabled NIC When a device has no network connectivity at all, check to ensure that the NIC is enabled, that the device has an IP address, and that Airplane Mode is not enabled. An invalid or missing default gateway and improper proxy server settings prevents connectivity on remote networks. A browser misconfiguration prevents just web-based issues.

fin a particular city, the power provided by the power company fluctuates, sometimes undervoltage and sometimes overvoltage. What would help with this?

Line conditioner A line conditioner is used to stabilize the power input into the computer. A surge protector does not provide power conditioning but simply protects in an overvoltage situation. An auto save feature on an application does not help with conditioning power. A phone line isolator is used to protect an analog voice device from a power surge that comes through the phone line.

What mobile technology is used to display a map showing where a stolen device is currently located?

Locator app A locator app is a mobile device feature that allows tracking. Many apps and social media platforms rely on tracking locator app data to publish a device's current location or the locations of friends or places.

Which macOs feature enables a user to view and switch among virtual desktops and open applications?

Mission Control Access Mission Control by pressing the F3 key to manage all application windows and virtual desktops. Both Launchpad and the Dock are used to launch applications. The Control Panel is used to configure the Microsoft Windows environment.

A small company that provides background checks for the government wants to make the sign-in to its web-based interface as secure as possible, but they are on a limited budget. Which authentication method would be the most secure without requiring them to set up an authentication server?

Multifactor Multifactor authentication requires a minimum of two digital methods of identifying someone, such as a password and a SMS message code. It is effective and doesn't require an authentication server. TACACS+ and RADIUS both use authentication servers. WPA3 is an encryption type for wireless network access.

What should a technician do if the Windows installation process shows no storage devices, but the BIOS/UEFI shows a hard drive?

Obtain third-party drivers If a drive is recognized in the BIOS/UEFI, the BIOS/UEFI does not need to be flashed. If the Windows installation process does not see the drive, then a driver must be downloaded on another machine and installed during the installation process. Restarting the Windows installation process will not help detect a drive that Windows does not recognize.

A technician is working on a Linux-based computer from a terminal window. Which Linux command can be used to display the current directory?

PWD The pwd command is used to show the current working directory path. The touch command is used to create a file. The dir command is a Windows command. The ls command is used to list directory contents of files and subdirectories.

Which security tool would help prevent a zero-day attack?

Patch management A zero-day attack takes advantage of a vulnerability in an operating system or application that is found by hackers before it is known or fixed by the software developer. Patch management ensures that the operating system and applications are up-to-date with the latest security patches that are provided after the developers become aware of a situation.

What is the most secure way for a technician to get rid of personal data on several hard drives that were removed from employee computers and are no longer wanted?

Physical destruction Physically destroying the hard drives is the best and most secure option. Repartitioning a drive or formatting it is not a secure method of getting rid of the data on the drives. A magnet is not strong enough to remove the data from a mechanical hard drive. A strong degausser (which can be expensive) could be used.

Which type of server acts as an intermediary between a client or an application seeking resource and another server that would require configuration by the technician?

Proxy A proxy server acts as an intermediary between a client or an application such as a browser and another server such as a web server. Implementing a proxy server is a security measure meant to protect the network. Proxy servers can also cache frequently accessed web pages, thus reducing retrieval time.

What is the main drawback of using a 32-bit version of Windows, as opposed to a 64-bit version?

RAM limited to 4GB A 32-bit version of Windows supports only 4GB of RAM. Connecting to a domain, using EFS, and using BitLocker are all differences between the Home and Pro/Education/Enterprise editions, not a factor involved in 32-bit vs. 64-bit.

A customer is frustrated with ongoing problems with Windows 10 and wants to reinstall Windows from scratch. In what section of the Settings app is the command that will enable him to do that?

Recovery The Recovery section contains a Reset this PC command that will do what the customer wants to do. The Backup section accesses a backup utility. The Activation section activates the copy of Windows and reviews the activation status. Advanced Startup enables the user to boot into a variety of special modes for troubleshooting.

How do you dispose of a toner cartridge?

Recycle it Toner is not earth friendly, and a toner cartridge must be properly recycled, not incinerated. Toner does not evaporate. An EULA does not provide disposal information.

What Windows utility enables a technician to remotely access a user's computer and does not prompt the user for permission before the technician is allowed to connect?

Remote Desktop Windows has two utilities for supporting Windows computers remotely: Remote Desktop Connection and Remote Assistance. Remote Assistance shows a prompt to the user, asking permission for the computer to be viewed remotely. Remote Desktop Connection does not ask permission and blanks the remote computer so the user cannot see what actions the technician is taking. Zoom is not a Windows utility. Disk Management does not have any remote access capabilities.

A user's smartphone has been stolen, and it contains sensitive information. What can a technician use to ensure the data is not compromised?

Remote wipe A person who has had a mobile device stolen can access a website to initiate a remote wipe to delete data, perform a factory reset, remove everything from the device to render it unusable, or overwrite data storage. Biometrics is a form of authentication; that is not relevant in this situation. A locator app might help find the laptop but it would not protect its data. A GPS chip might work with a locator app to find the laptop, but it also would not protect its data.

After a user reports suspicious activity on a desktop corporate computer, the technician determines that malware is on the computer. What should the technician do next?

Remove the computer from the network Quarantining a system by removing it from the network is an important step in removing malware. Reporting is useful, but does not need to be done before remediating the situation. Re-imaging the computer is a last resort after all efforts to remove the malware have failed.

What is an effective way to correct sluggish performance on a laptop PC, after troubleshooting has shown there is no software-based reason for it to be happening?

Replace RAM or add more RAM If software is not the problem, then hardware must be. Sluggish performance is most often caused by RAM. Either some of the RAM is defective or you don't have enough of it. CPU also affects performance but CPUs have limited upgrade options without replacing the motherboard. The display adapter and network adapter are unlikely to affect the speed of operation.

A user reports seeing an error message which says that Windows updates did not install properly. The technician tries to do the updates but gets the same message. What should the computer technician do next?

Research the number associated with the failed update Whenever a Windows update fails to install, research the error code given to find the cause. Windows updates may have to be installed individually in a particular order to be installed properly.

A familiar app on your smartphone has stopped responding, and the OS won't let you shut it down. What is the first thing to try as you begin troubleshooting?

Restart the phone (soft reset) A soft reset will not erase any of your apps and data, and is likely to solve most minor problems with apps. Booting into recovery mode (Android) enables you to do a hard reset, which is not the first thing to try because you lose all data and apps. Checking for malware is always helpful, but the problem is more likely to be solved via a reboot.

After installing a display driver update, a certain game doesn't work as well anymore. How can you fix this?

Roll back the driver Rolling back the driver will restore the previously used version. Removing and reinstalling the display adapter, either physically or in Device Manager, will not change its driver. Removing and reinstalling the game will not help because the game is not the problem. Lesson

What is the administrator account in Linux known as?

Root In Unix/Linux operating systems, the administrator account is known as root.

What term is associated with a compromised mobile operating system?

Rooting People sometimes do not like the apps or oversight provided by Apple, Google, or Microsoft on mobile devices. Some of them prefer to jailbreak (iOS) or root (Android) a mobile device and substitute a different operating system that allows the user increased privileges. Rooting or jailbreaking a device may void the manufacturer's warranty, cause some apps not to operate properly, and make the device more susceptible to security threats.

What command-line Windows utility can you use to fix any system files that have been modified or corrupted?

SFC sfc is the System File Checker utility, which can check your system files to make sure they have not been altered. gpedit is the Group Policy Editor. msconfig is the System Configuration utility. ipconfig is the IP configuration command-line utility.

Which security technique makes it possible to use one username and password to access multiple corporate applications and resources?

SSO Single Sign-on (SSO) allows a user to authenticate with a minimum of a user ID and password to gain access to servers, apps, printers, cloud-based apps or files, and so on, sometimes through a company's enterprise resource planning (ERP) system. TPM is a security chip. EFS is Encrypted File System. WPS is Wi-Fi Protected Setup.

Which of these are reasons why a security certificate may be flagged as invalid by a browser?

Self-signed Expired A digital security certificate may be invalid if it is not issued by a trusted certificate authority, if the issuer is unknown, if it is self-signed, or if it is expired or not yet valid. All certificates contain a public key. The nationality of the certificate authority is not an issue. Certificates are independent of any operating system.

What type of software license provides the software for free at first but requires paymen to unlock more time or additional features?

Shareware Shareware provides a "free trial" of the software, and you pay for it only if you continue to use it or want additional features unlocked. Freeware requires no payment but its owner retains control of it. Commercial software requires payment. Open source software requires no payment and anyone may modify and reuse its source code.

An employee who wants to be a technician stands behind a network administrator and watches the administrator type the server password. Later, the employee uses the password to gain access to the server and create a secret administrator account. What specific security threat is this?

Shoulder surfing Shoulder surfing is looking over someone else's shoulder to get information. Privacy screens and a well-engineered workspace can help prevent this threat. With social engineering, a web page, caller, survey, or person attempts to obtain personal or corporate information by tricking the targeted person. A trojan is malware disguised as a legitimate program. Spear phishing targets an individual or a company. It is a type of social engineering that attempts to gain personal information using e-mail (or another form of correspondence) from a company that appears legitimate. The attacker usually has some information about the target that makes it appear legitimate.

Which type of security measure would be applied to sensitive corporate documents?

Shredding Shredders can be purchased at local office supply companies and can provide a measure of security for data destruction (it's better than not shredding). Still, shredders are not the only option for documents that contain sensitive corporate information. Outside companies can provide this service for a fee and should provide a certificate of destruction or proof of incineration. A mantrap is an access control vestibule. A botnet is a network attack. Phishing is a social engineering attack.

Why would you disable System Restore before attempting malware removal?

So the malware's presence will not be reflected in the saved restore point System Restore captures snapshots of system files, and if the system files are infected, restoring from that backup may re-introduce the virus into the system after its removal. System Restore does not prevent antimalware from running, and it does not affect quarantining.

What is open source software?

Software that contains core source code that is modifiable Android is an example of an open source operating system that is based on the Linux kernel and used for phones, tablets, laptops, and PCs. It contains source code that is modifiable. Apple iOS and Windows Mobile operating systems are closed source or vendor-specific operating systems. Their source code is not modifiable.

With which type of network security attack is an on-path attack associated?

Spoofing In an on-path attack, a hacker intercepts traffic between an access point, a DHCP server, a default gateway, and an end network device. The attacker uses spoofing, a technique that involves sending a frame with a fake source MAC address to trick other devices into sending traffic to the hacker instead of to the intended network infrastructure device.

What macOS tool is used to search for files,directories, or contacts?

Spotlight Spotlight is used to search files, directories, contacts, e-mail, and the web. Keychain is used to manage passwords; Keychain Access is a utility for securely managing saved passwords. Mission Control allows management of all application windows and virtual desktops. Explorer is a Windows file management application.

Which Linux command grants root access?

Sudo The sudo command gives temporary root privileges to the user. The ls command lists files and subdirectories. admin and elev are not Linux commands.

Which device protects a computer from overvoltage conditions?

Surge protector A surge protector protects a computer from an overvoltage situation. The computer connects to the surge protector, which provides a path of least resistance so that the excess electrical voltage is directed to the surge protector (and the electronic components inside it) and not to the computer. A UPS is a battery backup. A GPT is a GUID partition table for a drive. A power strip splits an electrical outlet. It may also provide surge protection, but it is not a given.

A company is merging with a larger company, and together they are considering authentication options. Which types of servers would be used to authenticate users in a corporate environment?

TACACS+ RADIUS When a company wants one server to provide authentication to users to access network services or even technicians accessing network devices such as switches and routers, one of two types of authentication servers might be used: Remote Authentication Dial-in User Service (RADIUS) or Terminal Access Controller Access Control System (TACACS+).

In what situation would you not use an ESD strap when servicing hardware?

Testing a power supply Do not use ESD straps when working with power supplies, CRT monitors, or laser printers because of the risk of electrocution. Working with circuit boards such as motherboards, memory, and M.2 SSDs does not involve high voltage; the risk in those cases is to the components from ESD.

What command can you use to examine the path being taken from one network node to another?

Tracert The tracert command shows each hop of the path taken between nodes. The net use command configures connections to shared resources such as mapped drives. The ping command reports whether a host is reachable. The ipconfig command reports information about IP addresses.

Which type of script ends in sh?

Unix/Linux shell The file extensions commonly used with scripting include the following: .sh for a Unix or Linux-based shell script, bat for a Windows batch file, py for a Python script, vbs for a Visual Basic script, js for a JavaScript script, and ps1 for a PowerShell script.

You just installed an old game in Windows 11, and it keeps crashing. It worked fine in Windows 7. Which of these might be likely to help?

Use Compatibility Mode The game was not written for Windows 11, so it may benefit from Compatibility Mode. Uninstalling and reinstalling is not likely to change anything, nor is updating Windows or any hardware drivers (which would be a likely fix if a newer game did not run).

What would help a department store that has experienced security breaches resulting in leaked user passwords?

User training If a list of passwords has been compromised, user training will help prevent future breaches. A locator app is a feature that locates a mobile device (or a person carrying it). The principle of least privilege involves assigning permissions so that you give people only the rights they need to do their job and no more. Airplane mode is a mobile app mode that turns off all wireless activity.

A technician has been asked to update a salesperson's laptop from Windows 8.1 to Windows 11. What should the technician do first?

Verify that the laptop meets the requirements Before performing an upgrade, the technician should verify that the computer meets the requirements and ensure that all installed applications are compatible with the new operating system. Drivers for peripherals that connect to the device should also be verified.

Which of the following wireless security protocols is least secure?

WEP WEP is the first and least secure wireless security protocol. WPA and WPA2 have been developed since WEP was created and are much better options than WEP. For encryption WPA2 uses AES, which is the strongest algorithm available.

When would a technician use the ping command?

When troubleshooting a network problem The ping command is used to troubleshoot both wired and wireless connectivity. The ping command is followed by an IP address belonging to a remote network device. A successful ping proves that the source NIC, cabling, intermediary devices, and remote NIC are all functioning properly. A failed ping response indicates there is a problem between source and destination devices.

A technician has been directed by a software app developer to modify the Registry to fix a problem with a particular application. Which Windows command would be used to edit the registry?

regedit The regedit command can be used to edit the registry. The regsvr32.exe command is used to reregister a dynamic link library (DLL) into the registry. The msconfig command is used to open the System Configuration tool, which is used to control the boot process. The edit command is used to edit text files from a command prompt.


Related study sets

Why did south carolina secede from the Union

View Set

Week 1: Maternity by Lowdermilk & Perry: Chapters 1, 2

View Set

W.3 Ixls identify run on sentences full answers

View Set

Milady capítulo 21 color parte A

View Set

MT-chapter 5 test review(body structure)

View Set

Chapter 9 Mastering Biology Study Module Q's

View Set