Final Exam 8-10
Peggy found a freely distributed software package for her small business that will allow its sales to be tracked into a database for inventory purposes. Can Peggy install this software on all the computers in her store?
. Yes, this is open source software.
What is the value of X when execution ends in the following pseudocode? Set X As Integer For X = 100 to 0 Step -1 ' This is a comment Next X X = 100
100
A technician is troubleshooting a mobile device that is experiencing very slow performance, and the decision has been made to perform a factory reset. Which of the following actions should the technician take before starting the reset process?
Back up all user data.
During an upgrade for a new web server, Glen's company experienced a power surge. The power surge hit the new server, and now the company must troubleshoot the server. What can the company implement that will get the website up and running without the new server?
Back-out plan
James travels for business and is always worried that his laptop will be taken from his room. Which type of device will ensure that James's laptop will not be stolen while he travels?
Cable lock
An operating system is responsible for validating certificates used to secure communication. For Windows, Microsoft maintains a database of trusted root certificates issued by Certificate Authorities (CAs). A root certificate is the original certificate issued by the CA. When a Windows system opens a secure email or visits a secure website and encounters a new digital certificate, it requests Microsoft's trusted root certificate, which is downloaded to the computer. The download happens seamlessly without the user's knowledge unless there's a problem. If Windows cannot obtain the root certificate to validate the email or website, an error is displayed. Where do you go in the Windows operating system to view and delete root certificates
Certificate Manager
A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install. Which of the following steps should the user take next?
Check for sufficient available storage space.
A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades. Which of the following is the best action to take to resolve this issue?
Close or disable all unused running apps.
Danny received this email message today. What happened to Danny's computer?
Danny has received a fake security alert pop-up.
When working with a security consultant that your company has hired, you notice that he is running software on one of the machines. He explains that the program is running a brute force attack that is using every word in the English language to see if the Administrator password can be cracked. What type of attack is he attempting?
Dictionary
The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN. What can you recommend to the company?
Digital certificate
Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore. What does Victoria need to do to run the antivirus software on System Restore?
Disable System Protection.
Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled several browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point. What should Jackson do to complete the malware removal process?
Educate the end user.
Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet. What can Dennis do that will allow the children to watch a video on the Internet while in the car?
Enable a hotspot on his smartphone.
Your company's email server has been filling up employee's email boxes with advertisements for things they did not request. You have been asked to research how to stop these types of messages from getting to your coworker's email client software. What will you recommend to your supervisor?
Enable the spam filter.
Zach believes someone is trying to log in to a computer system in order to gain access to the company's network. He wants to use Windows to determine if that is the case. Where can Zach go to check the security logs?
Event Viewer
Lana has just taken a job as an IT professional in Europe and would like to get a head start on what to expect. What regulated data would you recommend that she research?
GDPR
Which of the following describes the macOS feature that lets you use finger motions to perform functions, for example, spreading two fingers to zoom in?
Gestures
Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone. Which commercial email provider should Angela use for her new Android phone?
Gmail
Your company has decided that security is very important and wants to add a second security check when workers are logging in to their computers. The company issued key fobs to all the employees. The key fob generates a code for them to enter when logging in to the computer. What type of security is your company using?
Hardware token
Jerry was recently contacted by a coworker who received an email that seemed suspicious. Jerry investigated her email account and noticed that she had been sending hundreds of emails every day for a week. He also noticed that this problem started after the coworker sent a reply email agreeing to participate in a contest to win a free car wash. What happened to the coworker's email account?
Her email was hijacked.
Mark has been asked to set up several smartphones to connect to his company's email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices. What protocol should Mark use to set up the company smartphones?
IMAP
Which of the following is best practice to minimize the chance of infecting your mobile device with malware?
Install apps only from trusted sources.
John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same. What type of cable will John need to purchase to replace the iPad's charger cable?
Lightning
You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.) 1- ECHO This batch file deletes the temp files 2- DEL %TEMP%\*.* /Q 3- REM The temp files were deleted 4- PAUSE Which of the lines is a comment?
Line 3
A customer has several mobile device users who have a habit of misplacing their devices during the workday. Which of the following security methods will most benefit these users?
Locator applications
Dylan is working on a system that has been having issues with files. Recently, Dylan has noticed that some of the filenames have strange characters, and the file sizes seem to be excessively large. File have been disappearing and Windows system files have been changed. What might be the problem with the computer?
Malware is corrupting the files.
A technician needs to boot macOS over the network using an image stored on a server. What Apple technology will best assist the technician?
NetBoot
While researching a network issue, Randy discovered a diagram that he can use to see the design of the network. What type of documentation did Randy discover?
Network topology
Becky has been assigned to help with a major change to her company's accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor causes the change to fail. What is Becky's mistake called?
Out of scope modification
Alexandria works for a non-for-profit company that asks for donations to help the homeless people in her community. Recently the database that holds all the contact information about the donners was hacked, and all the data was copied. What type of data was taken?
PII
Roger's company is trying to increase the level of security for its network. Roger is researching ways to increase the security by making passwords more complex. What can Roger change in Windows to require more complex passwords?
Password Policy
One of your clients at work calls and is irate because he had to change his password and now he can't seem to find one that will match the strength needed for the company server. After he finishes venting, you tell him you will send him the document that explains why he needs to have a strong password. What document will you send the client?
Password policy
The touch screen on a mobile device is not responding to input. Which of the following is the best step to take to resolve this issue?
Perform a factory reset on the device
Dillion's company has decided it wants to find a way to do a better job of tracking clothing inventories. Dillon has been asked to research ways to use the wireless network and IoT devices to help when tracking the clothing inventories. What should Dylan recommend to his company to help track the inventories?
RFID tags
The computer that you are working on is not able to complete a Windows update. The update process begins to download the file, but then you receive an error message saying that the Windows update was unable to download. You have checked your Internet connection, and it is working. You have tried the update on your other computer, and it worked. What should you do first to fix the problem with the Windows update?
Remove malware.
If you are working on a client's computer and you believe that you have found a violation of the AUP, what is your next step?
Report the incident through the proper channels.
You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets. Which of the following is the first step you will take to resolve this issue?
Reset the network settings in the mobile device Settings app.
Hector is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. When he opens the Action Center, Hector realizes that Windows Defender has been disabled and another antivirus software is running. Hector does not recognize the other antivirus software. What type attack has infected Hector's computer?
Rogue antivirus
Which of the following is a major advantage to using SSH over Telnet for remotely accessing a Linux system?
SSH is a secure, encrypted alternative to Telnet.
Your company has asked you to do research how it can provide smartphones to its employees. The company wants to give employees access to OneDrive in order to synchronize data. What type of synchronization will you recommend to the company?
SSH is a secure, encrypted alternative to Telnet.
Sara wants to set up her lights to turn on when she arrives home. She has heard that she might be able to do this using IoT. What should Sara be concerned about when setting up her IoT lights?
Security
James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files. How can James select what to synchronize from his phone to Google storage?
Settings app
Holly is trying to use Windows Defender to run an antivirus scan. Windows Defender refuses to run. She notices a problem when she tries to update Windows Defender and it fails. When Holly opens the Action Center she sees this screen. What has happened to Holly's computer?
She has downloaded a rogue antivirus.
Lance works for a company that allows users to bring their own devices to work. Last week Lance purchased a software package from a company that allows him to change fonts on pictures that he uses in his work presentations. Lance wants to share the program with his coworker Susan. Is Lance allowed to share the software with Susan?
Susan would need to purchase the software from the company.
Your company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. What will you recommend as an upgrade to RADIUS?
TACACS+
Sam cannot figure out why he can't get sound from his tablet's internal speakers and calls you asking for advice. You ask him to check to see if anything is stuck in the aux port. Sam assures you nothing is in the aux port. He also checks to make sure the sound is not muted. What might prevent Sam from getting sound from his tablet?
The audio output is being directed to a Bluetooth speaker.
Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to research a new product when his computer emitted an alarm accompanied by a warning that a site had blocked his computer and that information was being stolen from the computer. The message included a phone number and a note to call the number within five minutes so that engineers could walk him through the removal process. What has happened to the customer computer?
The client received a fake security alert.
A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message?
The command needs to be preceded by sudo.
One of Kyle's clients called to complain that his computer was running really slow. Kyle went to the client's work area and started troubleshooting the problem. Kyle ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger and noticed that the SVC host was running several processes. While Kyle was looking at Task Manager, the computer crashed. Kyle restarted the computer and noticed a long load time for Windows. He checked Task Manager and saw several processes that he did not recognize. What might be the issue with Kyle's client's computer?
The computer might have a virus.
A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer's technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors. How can the technician retrieve the requested information from the user's device?
The method for retrieval is dependent on the specific app or device's operating system.
You are preparing to give a presentation at a client's location using your mobile device and a large screen TV. You have successfully connected to the company's guest Wi-Fi network, and you tap the screen mirroring option on your device but cannot locate an available TV, monitor, or projector. The previous presenter finished her presentation a few minutes earlier and had no issues using the TV. Which of the following is the most likely reason for this behavior?
The mobile device is on a different Wi-Fi network than the TV.
Christian has malware that is preventing him from installing anti-malware on his laptop. What can Christian try if he does not have another computer available to run the anti-malware program?
Try to install in Safe Mode.
Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the software they purchase and giving it to others who have not purchased the software. What can Sharon's company do to make sure a customer who purchases the program does not give it to someone else?
Use DRM.
Jerry recently purchased a new iPad. He needs guidance on setting it up and wants to find documentation to help with the setup. Where can Jerry find detailed steps on how to connect to a network, configure email, update the OS, sync, and back up settings and data, as well as what to do when things go wrong with his iPad or an iPhone?
User guide for the device
Joe works for a company that has a traveling sales force. The company has asked Joe to research a way for the sales force to have real-time information on the availability of its salable products. The company has an intranet application that allows it to see up-to-the minute information. The company does not want to make this information public. What should Joe recommend?
VPN
You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs. What type of malware is on your computer?
Virus
A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device. Which of the following steps should the user take first?
Wait a few minutes for the phone to automatically unlock.
A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory. Which of the following commands will perform this function?
chown
A Linux user needs to find all instances of the word admin in /var/log/auth.log. Which of the following commands will perform this function?
grep
A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?
macOS Recovery
A user is complaining about sluggish performance on her Linux system, and the technician suspects a running process is consuming excessive processor resources. Which of the following commands will the technician most likely use to locate the offending process?
ps