ITC 191 Exam II

Ace your homework & exams now with Quizwiz!

What tool is best to use when destroying data on an SSD?

ATA Secure Erase

What is the best way to determine if an email message warning about a virus is a hoax?

Check websites that track virus hoaxes

Where in Group Policy can you locate the policy that requires a smart card to be used to authenticate a user to Windows?

Computer Configuration, Windows Settings, Security Settings, Local Policies, Security Options

Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows.How can the settings be configured with the least effort by the admin?

Configure Group Policy to run a logon script

You have set up a user group named Accounting and have put all employees in the Accounting department in this group, which has been given permission to use the Financial folder on a file server. You are now asked to create a subfolder under Financial named Payroll. Megan, the payroll officer, is the only employee in the Accounting department allowed to access this folder. What is the best way to configure the new share?

Create a new user group named Payroll, put Megan in the group, and assign the group read/write permissions to the Payroll folder

You sign in to your personal computer with your Microsoft account and then you want to set up your computer as a trusted device to make changes to the account settings. Microsoft sends a code to your cell phone in a text message. You enter the code on a Windows screen. This type of authentication is called:

Multifactor authentication

Which of the following is true about NTFS permissions and share permissions? a. Share permissions do not work on an NTFS volume. b. NTFS permissions work only on an NTFS volume. c. If share permissions and NTFS permissions are in conflict, NTFS permissions win. d. If you set NTFS permissions but do not set share permissions, NTFS permissions apply.

NTFS permissions work only on an NTFS volume

A technician needs to boot macOS over the network using an image stored on a server.What Apple technology will best assist the technician? a. NetBoot b. Swap partition c. HFS+ d. Key Chain

NetBoot

At a restaurant, you overhear people discussing an interesting case they treated while working in a dental office that day. Which type of regulated data policies are most likely to have been violated?

PHI

Alexandria works for a non-for-profit company that asks for donations to help the homeless people in her community. Recently the database that holds all the contact information about the donners was hacked, and all the data was copied.What type of data was taken?

PII

When setting up OUs in a new domain, why might it be useful to put all computers in one OU and all users in another?

Policies generally apply to either computers or users

Which type of server can function as a firewall?

Proxy Server

As a bank employee, you often work from home and remotely access a file server on the bank's network to correct errors in financial data. Which of the following services is most likely the one you are using to authenticate to the network and track what you do on the network?

RADIUS

What type of employee badge does not have to be swiped by a card reader in order to allow the employee through a door?

RFID badge

A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes and you see a blue screen of death. You have important document files on the drive that are not backed up and you cannot afford to lose. What do you do first?

Remove the hard drive from the computer case and install it in another computer

Your boss asks you to work through the weekend to install new software on the applications server that serves up applications to 20 users. The following Monday, all users report they cannot open their data files. After speaking with technical support for the new application, you discover it is not compatible with the old data files. Which type of documentation should you refer to first to address this problem?

Risk analysis documents

Recently, Frank's computer has slowed down dramatically. He has also noticed that the time on the computer is not accurate. Frank has run several antivirus scans, but has not found an issue. Today while surfing the web, he was redirected several times to a website that he did not request. Then a BSOD error occurred on his computer, and when he turned on his computer, the antivirus software was disabled.What kind of malware could be causing the issues on Frank's computer?

Rootkit

While visiting a coffee shop, you see a poster advertising a concert for a music group you'd love to see. You notice there's an NFC tag at the bottom with additional information about the concert. Which of the following devices would likely be able to read the NFC tag?

Smartphone

You are helping your friend troubleshoot a problem with his Linux server. You enter a common Linux command and discover it doesn't work exactly as you expected. What might be the problem and what do you do next?

The Linux shell is not the one you expected; use the echo $0 command.

What is the first thing you should do when you discover a computer is infected with malware? The second thing?

Update installed anti-malware software; Quarantine the computer

Which of these network connections would allow your smartphone to sync your photos to your online account? Choose all that apply. a. Wi-Fi b. Bluetooth c. GPS d. Cellular

Wi-Fi, cellular

Which of the following best describes a variable when implemented in a script? a. A container for storing data values that can be assigned, referenced, and manipulated. b. A portion of a script that executes multiple times until a condition is met. c. A line or portion of a script that the interpreter does not process. d. The part of a filename used to designate a file's association with a particular script language.

a. A container for storing data values that can be assigned, referenced, and manipulated.

Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs? a. Disable AutoRun. b. Disable AutoPlay. c. Disable the Guest account. d. Enable screen lock.

a. Disable AutoRun

A scanner connected to your Mac is giving problems and you suspect corrupted device drivers. What should you do first? Second? a. Download and install drivers from the scanner manufacturer. b. Back up the macOS startup disk using Time Machine. c. Update macOS. d. Uninstall the scanner and install it again

a. Download and install drivers from the scanner manufacturer. c. Update macOS.

A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability.Which of the following should be included in securing the user accounts? (Select THREE.) a. Require user account passwords. b. Require strong passwords. c. Set failed logon restrictions. d. Add each user to the Guests group. e. Change each account type to Administrator. f. Disable password complexity requirements.

a. Require user account passwords b. Require strong passwords c. Set failed logon restrictions

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use.Which of the following tabs will you suggest to the coworker? a. Security tab b. Privacy tab c. General tab d. Programs tab

a. Security tab

The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016.Which of the following is the first step in implementing this data share? a. Share the folder or volume on the file server that will store the shared data files. b. Map a network drive to the shared folder or volume on the file server on the sales computers. c. Run a system image backup of the file server, including all data folders. d. Create a system restore point on the server and all sales computers.

a. Share the folder or volume on the file server that will store the shared data files

Which of the following are natively supported by the Windows, Mac, and Linux operating systems? a. Support for reading and writing to FAT32 partitions b. Support for reading and writing to NTFS partitions c. Support for reading and writing to ext4 volumes d. Support for reading and writing to APFS volumes

a. Support for reading and writing to FAT32 partitions

Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen? a. TPM b. NIC c. EFS d. MFA

a. TPM

A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed.What is the most likely reason for this message? a. The command needs to be preceded by sudo. b. The command syntax needs to be verified. c. The user account is not assigned a password. d. The software repository is out of date and needs to be updated.

a. The command needs to be preceded by sudo.

A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results.Which of the following is the most likely reason the technician is having difficulties? a. The technician should be setting NTFS permissions instead of using Group Policy. b. The technician should be using Local Security Policy instead of Group Policy. c. The technician is not signed in as a Domain Admin. d. The users in the sales department are in a different domain than the accounting department users.

a. The technician should be setting NTFS permissions instead of using the Group Policy

How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers? a. Use a third-party remote access app that uses a browser. b. Enable Remote Disc on both computers. c. Disable encryption on both ends of the Screen Sharing session. d. Enable the Screen Sharing service in the Sharing window.

a. Use a third-party remote access app that uses a browser.

A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory.Which of the following commands will perform this function? a. chown b. ps c. cd d. clear

a. chown

A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change.Which of the following steps should the technician take to make this change? a. Click the Advanced button to open Advanced Security Settings for the file. b. Click the Administrator user name and click the Edit button. c. Click the Sharing tab and click Advanced Sharing. d. Click the Previous Versions tab, highlight the file, and click Restore.

a. click the Advanced button to open Advanced Security Settings for the file

You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks.What is best practice for the remaining unused account?

a. disable the account until the employee is ready to use it

You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.)1- ECHO This batch file deletes the temp files2-DEL %TEMP%\*.* /Q3-REM The temp files were deleted4-PAUSEWhich of the lines is a comment? a. Line 3 b. Line 2 c. Line 1 d. Line 4 e. There are no comments in this file.

a. line 3

A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD.Which of the following describes the most likely reason for the lost data files? a. The user had previously encrypted her data files and folders using EFS. b. The user attempted to enter an incorrect password too many times. c. The technician erased all the data files while resetting the password. d. The user lost access to the network shared drive when her password was reset.

a. the user had previously encrypted her data files and folders using EFS

Derek's supervisor is concerned that the company's security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network.What does the computer or server use to verify the access to a specific resource on the network?

access control list

Among the following, which is the best protection against ransomware? a. Windows File History b. Carbonite c. Keylogger software d. Authy by Twilio

b. Carbonite

Which security features are available on Windows 10 Home? Select all that apply. a. Local Group Policy b. NTFS permissions c. Active Directory d. Internet Options

b. NTFS permissions d. Internet Options

You work in the Accounting department and have been using a network drive to post Excel workbook files to your file server as you complete them. When you attempt to save a workbook file to the drive, you see the error message: "You do not have access to the folder 'J:\'. See your administrator for access to this folder." What should you do first? Second? Explain the reasoning behind your choices. a. Ask your network administrator to give you permission to access the folder. b. Check File Explorer to verify that you can connect to the network. c. Save the workbook file to your hard drive. d. Using File Explorer, remap the network drive. e. Reboot your PC.

b. check File Explorer to verify that you can connect to the network c. Save the workbook file to your hard drive

You are running a web server app in Ubuntu Server. Users complain that their browsers are loading webpages with errors. Where are you likely to find the log file where the web server reports its errors? a. /app/log b. /bin c. /var/log d. /root

c. /var/log

You have set up an FTP server in Ubuntu Server. Jason, a user, calls to say he gets an error when trying to put a file in his /home/jason/files directory. You look at the directory structure and see that you forgot to give the user ownership of the directory. Which command can fix the problem? a. chown jason:jason /home/jason/files b. sudo chmod u=rwx /home/jason/files c. sudo chown jason:jason /home/jason/files d. chmod u-rwx /home/jason/files

c. sudo chown jason:jason /home/jason/files

You are managing an FTP server installed in Ubuntu Server. The server has created a very large log file, vsftpd.log. Which command is appropriate to search the log file for activity of the user charlie? a. sudo cat /var/log/vsftpd.log b. grep "charlie" /var/log/vsftpd.log c. sudo grep "charlie" /var/log/vsftpd.log d. cat /var/log/vsftpd.log

c. sudo grep "charlie" /var/log/vsftpd.log

James travels for business and is always worried that his laptop will be taken from his room.Which type of device will ensure that James's laptop will not be stolen while he travels?

cable lock

You work at an IT help desk and have been asked to set up 25 new user accounts in Active Directory. Your boss tells you to save time by using a PowerShell script that's available on a network share. You look at several script files named CreateNewUsers that are stored on the drive. Which one is likely to be the one you want? a. The file with a .js file extension b. The file with a .bat file extension c. The file that is the largest d. The file with a .ps1 file extension

d. The file with a .ps1 file extension

Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled several browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point.What should Jackson do to complete the malware removal process?

educate the end user

Your company's email server has been filling up employee's email boxes with advertisements for things they did not request. You have been asked to research how to stop these types of messages from getting to your coworker's email client software.What will you recommend to your supervisor?

enable the spam filter

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements.Which of the following operating systems will be the best choice for the users? a. Linux b. Mac OS X c. Windows 10 Enterprise d. Windows 7 Professional

linux

A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac.Which of the following tools will the technician use to perform this task? a. macOS Recovery b. Boot Camp c. Disk Utility d. Mission Control

macOS recovery

Your macOS installation is corrupted and you want to boot from an external Thunderbolt hard drive to repair the installation. Which key(s) do you hold down at startup to boot from the external hard drive?

option key

Becky has been assigned to help with a major change to her company's accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor causes the change to fail.What is Becky's mistake called?

out of scope modification

The computer that you are working on is not able to complete a Windows update. The update process begins to download the file, but then you receive an error message saying that the Windows update was unable to download. You have checked your Internet connection, and it is working. You have tried the update on your other computer, and it worked.What should you do first to fix the problem with the Windows update?

remove malware

In Linux, when logged in as a normal user with root privileges, which command must precede the aptget command in the command line in order to install a program?

sudo

Based on her research of the symptoms, Sara believes her computer is infected with a virus. Sara has an anti-malware program on the computer.What should she do before she runs the anti-malware program?

update malware signatures

You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs.What type of malware is on your computer?

virus

You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dimmed. What is the most likely problem?

you are not using an edition of windows that supports encryption


Related study sets

Microeconomics Market Efficiency

View Set

High Rise Firefighting (RFD Probation)

View Set

Microsoft PowerPoint LinkedIn Skill Assessment

View Set

Chapter 15: Critical Thinking in Nursing Practice

View Set