missed

Ace your homework & exams now with Quizwiz!

Dion Training is building a new computer for its video editor to use. The new computer will use an octa-core Intel processor, 3 TB of DDR4 memory, and a RAID 0 with two 4 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer's memory properly?

Enterprise

Which of the following macOS features is used to backup and restore files to an external hard disk?

Time Machine

Which of the following types of wireless encryption uses a 40-bit encryption key with an RC4 encryption cipher?

WEP

Guest account

a Microsoft Windows user account with limited capabilities, no privacy, and is disabled by default

Which Linux command is used to print the full contents of a file to the screen at once?

cat

An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this?

dictionary

You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe why the change will be installed during this maintenance window?

purpose

You recently built a new gaming PC for a customer. The system has an octa-core 64-bit processor, 32 GB of DDR4 RAM, 1 TB SSD, a PCI x16 video card with 8 GB of RAM, and Windows 10 Pro (x86) installed. When you turn on the system, you notice that Windows only recognizes 3.5 GB of RAM. Which component should be upgraded to correct this issue?

replace the OS with Windows 10 Pro (x64) edition

Which of the following types of backups generates the recovered files from a complete copy of a file created at some point in time and one or more partial backups created at later times to merge them into the recovered data?

synthetic

A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?

-.sh

What is the minimum processor required to install Windows 10 (x86) on a device?

1 GHz dual core processor

Dion Training uses DHCP to assign private Class C IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class C address?

192.168.3.5

A network administrator needs to allow employees to upload files to a remote server securely. What port must be allowed through the firewall?

22

Which of the following backup rotation schemes requires at least one monthly full backup to be stored safely off-site?

3-2-1 backup

What is the minimum amount of storage space required to install Windows 10 (x64) on a device?

32 GB

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the "Operating System Not Found" error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?

An incompatible partition is marked as active

AutoRun

Automatically launches external devices (vulnerability)

Which of the following BEST describes how a DHCP reservation works?

By matching a MAC address to an IP address within the DHCP scope

Which of the following data types would be used to store the user's middle initial?

Character

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue?

Check the status of the print server queue

A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

Clear the browser's cookies and history, enable the pop-up blocker, and scan the system for malware

A user is having an issue with a specific application on their Android device. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue?

Clear the local application cache

Your organization has recently suffered a data breach due to a server being exploited. As a part of the remediation efforts, the company wants to ensure that the default administrator password on each of the 1250 workstations on the network is changed. What is the easiest way to perform this password change requirement?

Deploy a new group policy

A small business network was recently infected by a piece of malware from a USB drive that copied sensitive data from a computer, infected the system, and then spread across the network by infecting other systems. Which of the following actions could have prevented this type of attack from occurring?

Disable AutoRun

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)

Disable the system restore in settings Disconnect the laptop from the network Update the anti-malware software

A system administrator has noticed that an employee's account has been attempting to log in to multiple workstations and servers across the network. This employee does not have access to these systems, and the login attempts are unsuccessful. Which of the following actions should the administrator do to this employee's account in Active Directory?

Disable the user's account

Which of the tools should a technician NOT use with a solid-state device on a workstation?

Disk defragment

Which of the following types of software CANNOT be updated via the Windows Update program?

Firmware updates

Which of the following backup rotation schemes uses a three-tiered approach to ensure at least one monthly full backup is conducted?

Grandfather-Father-Son

You are working in a doctor's office and have been asked to set up a kiosk to allow customers to check in for their appointments. The kiosk should be secured, and only customers to access a single application used for the check-in process. You must also ensure that the computer will automatically log in whenever the system is powered on or rebooted. Which of the following types of accounts should you configure for this kiosk?

Guest

Your supervisor has requested remote access to a particular server to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do before granting remote access to the server to your supervisor?

Install the latest security updates and patches to the server

What type of structure is a "Do While" in scripting?

Loop (the computer repeats the task until a condition is met)

An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?

Mark each email as spam or junk

Which type of antivirus scan provides the best protection for a typical home user?

On-access scans

Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to "click here" to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack?

Phishing

Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server phone what condition is this known as?

Power surge

Jason is working in Microsoft Word, but the application appears to have become frozen and unresponsive. Which of the following features in the Task Manager should he use to terminate the unresponsive program?

Processes

Jason has an old 2017 Dell Laptop that he uses to connect to his office network while traveling. The computer is slow and is running Windows 7. The laptop's screen was recently cracked and needs replacement. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?

Purchase a new laptop as the cost to repair might be more than a new laptop

You are configuring a wireless access point (WAP) in a large apartment building for a home user. The home user is concerned that their neighbor may try to connect to their Wi-Fi and wants to prevent it. Which THREE of the following actions should you perform to increase the wireless network's security?

Reduce the transmission power Enable WPA3 encryption Disable SSID

Samuel's computer is taking a very long time to boot up, and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense?

Remove unnecessary applications from startup Defragment the hard drive

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing?

Remove, quarantine, or erase the infected files

The video editor at Dion Training is having issues with her workstation. The workstation is running Windows 10 and is failing to boot up properly. A technician wants to replace the existing operating system files with a new copy of the same version. The technician has been told to ensure the user's data and applications are not modified or deleted during the upgrade or installation. Which types of upgrades or installations should the technician use?

Repair installation

Dion Training is concerned with the possibility of employees accessing another user's workstation in secured areas without their permission. Which of the following would BEST be able to prevent this from happening?

Require biometric identification for user logins

Susan is installing several updates on a Windows computer. Nine of the updates were installed without any issues, but one update produced an error and failed to install. Susan restarts the computer as part of the troubleshooting process, and the computer automatically attempts to install the failed update again. Again, the update fails to install. What should Susan do NEXT?

Research the error number for the failed update and determine if there is a known issue with this update

Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com." What should Michelle do to fix this problem?

Reset the web browser's proxy setting

A macOS user is browsing the internet in Google Chrome when they see a notification that says, "Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!" What type of threat is this user experiencing?

Rogue anti-virus

Dion Training wants to implement a new wireless network using WPA3 in their offices. Which of the following features of WPA3 is used to provide a password-based authentication using the dragonfly handshake instead of the older WPA 4-way handshake?

SAE

Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?

SOP

A user contacts the service desk, stating their account is locked out, and they are unable to login to their local workstation. Which of the following log files should you review to determine the source of the lockout on the local workstation?

Security log

Jason's company issued him an old 2018 laptop with an internal hardware security key that he uses to connect to his office network over a VPN while traveling. Without this laptop, Jason cannot access his company's internal servers, email, or share drive files. The Windows 10 laptop is extremely slow, and the screen recently cracked and needs to be replaced. When Jason returns to the company's headquarters, the company will provide him with a new laptop due to the broken screen. Until then, he is working out of his hotel room during a 45-day business trip and needs to continue using this laptop. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?

Sell him an external 15" tablet/monitor to connect to the laptop as a workaround

Dion Training has an open wireless network so that their students can connect to the network during class without logging in. The Dion Training security team is worried that the customers from the coffee shop next door may be connecting to the wireless network without permission. If Dion Training wants to keep the wireless network open for students but prevents the coffee shop's customers from using it, which of the following should be changed or modified?

Signal strength or power level

Mark's laptop is running Windows 10 and appears to become slower and slower over time with use. You decide to check the current CPU utilization and observe that it remains in the 95% to 100% range fairly consistently. You close three of Mark's open applications and recheck the CPU utilization. You notice the utilization dropped to the 30% to 35% range. A week later, Mark calls you again and says the computer is extremely slow. Which of the following tools can you use to check the CPU utilization and manage any high-resource processes?

Task Manager

You are troubleshooting a user's workstation that is operating extremely slowly. You open the Task Manager and see that only Microsoft Word is currently running, but the CPU and network utilization is consistently running between 95-100%. Which of the following is MOST likely causing this issue?

The computer has become a zombie

Jason took home a company-issued Windows 10 laptop home to do some work. He successfully connected it to his home's wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network's shared files from his home network's media server. Which of the following may be why Jason cannot access the network shares in his home network?

The laptop must join the network as private

A salesperson uses their smartphone as a hotspot while traveling. The first week of their trip, their smartphone could download files at 24 Mbps and stream online videos without any problems. Unfortunately, this week their smartphone is only operating at 256 Kbps when they attempt to download a file. Additionally, they are having difficulty watching online videos due to excessive buffering. Which of the following is MOST likely the problem?

The smartphone's data connection is being throttled

You are troubleshooting an issue with multiple workstations that are having network connectivity issues. The network also has two servers connected to the network, but they do not have any connectivity issues. You look at the network configuration of the two servers and notice they are using static IP addresses. Based on what you know so far, what is most likely the cause of the workstation's network connectivity issue?

The workstations are most likely configured to use dynamically assigned IP addresses and the DHCP is not working properly

You are configuring a Windows 10 Professional workstation to connect to the Dion Training domain. To provide additional security to its users, Dion Training requires that all uses route their internet traffic through a server located at 10.0.0.15 for inspection before it is sent to the internet. Once inspected, the server will route the traffic to the WAN router whose IP is 10.0.0.1. Which of the following settings should be configured on the workstation to achieve this?

Under Internet Options, configure the proxy server address as 10.0.0.15

A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system's web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then perform the remediation to remove the malware. You have scanned the machine with several anti-virus and anti-malware programs and determined it is now cleaned of all malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated anti-virus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers?

Verify the hosts file has not been maliciously modified

Dion Training wants to implement a new wireless network in their offices. Which of the following types would support encryption for traffic being sent and received over the network while still allowing users to connect to the open network without a password, passphrase, or digital certificate?

WPA3

Which of the following types of attacks occurs when an attacker specifically targets the CEO, CFO, CIO, and other board members during their attack?

Whaling

A user with an older laptop running Windows 7 that has only 2 GB of RAM, 32 GB of SSD, and a 1.7 GHz 64-bit processor. The user would like to upgrade to a newer OS since Windows 7 is now considered end-of-life. Which of the following operating systems should the technician recommend to ensure the BEST performance on this computer?

Windows 10

Low level formatting

a hard disk operation that should make recovering data from your storage devices impossible once the operation is complete

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk?

bootrec /fixboot

A technician needs to add new features to an existing router on the network. Which of the following should be performed to add the new features?

firmware update

Which command-line tool is used on a Windows system to erase all the data on a hard disk and ensure it is ready to accept new Windows files?

format /fs:NTFS

A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?

loop

What type of structure is "For Next" in scripting?

loop

You have been asked to recycle 20 of your company's old laptops. The laptops will be donated to a local community center for underprivileged children. Which of the following data destruction and disposal methods is MOST appropriate to allow the data on the drives to be fully destroyed and the drives to be reused by the community center?

low level formatting

Your boss has asked you to write a script that will copy all of the files from one hard drive to another each evening. This script should mirror the directories from one drive to the other and ensure they are synchronized each evening. Which command-line tool should you use in your script?

robocopy

During the reconnaissance phase of a penetration test, you have determined that your client's employees all use Android smartphones that connect back to the corporate network over a secure VPN connection. Which of the following methods would MOST likely be the best method for exploiting these?

use social engineering to trick a user into opening a malicious APK

firmware updates

will upgrade your device with advanced operational instructions without needing a hardware upgrade. (like new features and patches)

A cybersecurity analyst from BigCorp contacts your company to notify them that several of your computers were seen attempting to create a denial of service condition against their servers. They believe your company has become infected with malware, and those machines were part of a larger botnet. Which of the following BEST describes your company's infected computers?

zombie


Related study sets

Marketing Research Exam 1 and 2 (Comprehensive)

View Set

APUSH Midterm Practice Questions and Answers

View Set

Questions Implied by the Universal Structures of Thought

View Set