Testout Master Study Questions

Ace your homework & exams now with Quizwiz!

You are troubleshooting an email server. You would like to check to see if the SMTP (Simple Mail Transfer Protocol) server is available and listening on port 25. Which remote utility could you use to remote to this port? A- SSH (Secure Shell) B- Remote Desktop C- Telnet D- Remote Assistance

C- Telnet

Which of the following is typically NOT a specified system requirement for a word processing software application? A- Memory B- Disk space C- Video card D- Operating system

C- Video card

You are installing a 32-bit application on a Windows 10 64-bit computer. What is the special environment where a 32-bit application runs on a 64-bit system? A- %systemroot%\syswow64 B- Program Files (x86) C- WOW64 (Windows on Windows 64-bit) D- Program Files

C- WOW64 (Windows on Windows 64-bit)

Which of the following mobile device components degrades over time? A- Battery B- Processor C- Screen D- Operating system

A- Battery

Which of the following power issues is known as a complete power failure? A- Blackout B- Surge C- Sag D- Spike

A- Blackout

It is common for some organizations and government locations to disallow the use of mobile devices while on premise for which two reasons? (Select all that apply.) A- Camera B- Wi-Fi C- Email D- Microphone

A- Camera D- Microphone

An incident has happened with a user's workstation. Several technicians have been investigating the problem and have used the system and tampered with possible evidence. Nothing has been documented. What has been compromised? A- Chain of Custody B- Detection and Analysis C- Preparation D- Forensics

A- Chain of Custody

Which of the following are examples of instruction sets that can be used for automating tasks? (Select TWO) A- Compiled program B- Script C- Interpreter D- Identifier

A- Compiled program B- Script

Which of the following is required for membership in a Windows Active Directory (AD) domain (choose two)? A- Computer account B- User account C- Organizational unit D- Group policy

A- Computer account B- User account

You are troubleshooting a Windows 10 computer that is having difficulty browsing the Internet. You decide to view the DNS (Domain Name System) cache on the computer to see what names have recently been resolved. What command line utility do you use? A- nslookup B- netstat C- ipconfig D- netsh

C- ipconfig

Users are mentioning that a file share on a Windows server is no longer accessible. You check the server and see the share is still in place. You decide to check to see if any related ports are currently blocked on the server. What command can you use to investigate the ports? A- tracert B- netsh C- netstat D- ipconfig

C- netstat

You are preparing a workstation as a Linux system for a user. You have created multiple partitions, each with differing file systems. Which file system is only accessed by the memory manager? A- ext3 B- ext4 C- swap D- FAT

C- swap

A mobile device is not able to connect to any networks. What should be checked? A- Airplane mode B- Resource utilization C- Location tracking D- Root access

A- Airplane mode

Windows networking supports two types of accounts. Local accounts are used for the local system and domain accounts are used for access to Windows servers. Where are domain accounts stored? A- Active Directory (AD) B- Security Account Manager (SAM) C- HKEY_LOCAL_MACHINE registry key D- HKEY_CURRENT_USER registry key

A- Active Directory (AD)

Which of the following Windows networking technologies pertains to the security control of authentication? A- Active Directory B- Organizational Unit C- Access Control List (ACL) D- Security Group

A- Active Directory

The NIST (National Institute of Standards and Technology) Computer Security Incident Handling Guide identifies stages in an incident response lifecycle. What stage is concerned with reporting the incident to stakeholders? A- Detection and Analysis B- Preparation C- Post-incident Activity D- Containment, Eradication, and Recovery

A- Detection and Analysis

A user needs to download a file from a website. The site displays as unsecure in the web browser. Which of the following may be the problem (choose all that apply)? A- Digital certificate B- Certificate Authority (CA) C- Performance symptoms D- Application crashes

A- Digital certificate B- Certificate Authority (CA)

Which of the following poses a security concern when using a mobile device camera? A- Geotagging B- Wi-Fi signal strength C- Slow performance D- App errors

A- Geotagging

You are managing a small business network with several Windows 10 computers and one Windows 2016 server. You want to create password policies that will be pushed out to the client computers. Which management snap-in will you use? A- Group Policy B- Local Security Policy C- Local Group Policy D- Resultant Set of Policy

A- Group Policy

In Windows 10, network location settings determine what firewall configurations are applied. Which of the following is NOT a network location in Windows 10 (choose two)? A- Home B- Private C- Public D- Work

A- Home D- Work

Which of the following is a solution to the vulnerability of tailgating? A- Mantrap B- Biometrics C- Multifactor D- Metal detector

A- Mantrap

You have several old computers that you need to dispose of. By following best security practices, you employ remnant removal. Which of the following are you NOT concerned with? A- Memory B- Hard disks C- Flash drives D- Solid state drives

A- Memory

A user is having problems with a PC after clicking an attachment in an email message. Which of the below would categorize high CPU utilization and threatening messages appearing on the screen? A- Performance symptoms B- Application crashes C- Service problems D- File system errors

A- Performance symptoms

Data must be organized based on the sensitivity of the information. In the military, creators of sensitive information would officially label data as which of the following? (Select all that apply.) A- Secret B- Non-classified C- Classified D- Top Secret

A- Secret D- Top Secret

A third-party, 64-bit application is causing problems on a Windows 10 computer and requires troubleshooting. In which of the following areas does an installed application typically NOT install or modify during installation? A- The c:\windows\system32 folder B- The c:\program files folder C- The registry D- The user profile

A- The c:\windows\system32 folder

A Windows 10 PC was not resolving local server names correctly. You discovered that the network card properties on the PC had an incorrect DNS (Domain Name Server) address specified. You have corrected the address and would now like to clear the DNS cache. Which command do you use to do so? A- ipconfig B- netsh C- netstat D- nslookup

A- ipconfig

A problematic Windows system needs to be restarted. You decide to use a command prompt window that is open. Which command do you use? A- shutdown B- exit C- reboot D- w32tm

A- shutdown

A Windows 10 PC on the network is only able to connect to local resources. It will not connect to a remote network or any Internet websites. What setting needs to be checked on the NIC (Network Interface Card) properties? A- IP (Internet Protocol) address B- Gateway address C- Primary DNS (Domain Name System) address D- Secondary DNS (Domain Name System) address

B- Gateway address

You have configured a new Windows 10 PC, and for some reason it will not communicate properly on the network. You decide to ping the loopback address to test the PC's TCP/IP (Transmission Control Protocol/Internet Protocol) settings. Which of the below is the loopback address? A- 169.254.1.1 B- 127.0.0.1 C- 255.255.255.0 D- 8.8.8.8

B- 127.0.0.1

You are configuring a wireless access point for the office you work in. You are configuring both 2.4 GHz (Gigahertz) and 5 GHz for users. Which wireless standard will only use the 5 GHz spectrum? A- 802.11b B- 802.11ac C- 802.11n D- 802.11g

B- 802.11ac

You have just created a new local user on a Windows 10 computer. The user has requested that you ensure that the system will prompt if a change to any important setting is required during software installation. Which link do you use in the user accounts applet in control panel to check this setting? A- Make changes to my account in PC settings B- Change User Account Control settings C- Change your account type D- Change my environment variables

B- Change User Account Control settings

Which of the following is put in place to reduce the risk of service disruption? A- Configuration management B- Change management C- Configuration Item (CI) D- Configuration Management System (CMS)

B- Change management

Which of the following is considered to be a security concern when using a mobile device in a public setting? A- Unresponsive touchscreen B- Connection type C- Battery Life D- Signal interference

B- Connection type

A known user is trying a biometric device to gain access to a computer. The user should be allowed access, but the system is denying it. What is occurring? A- False positive B- False negative C- Two-factor authentication D- Replay attack

B- False negative

A user is looking to customize the dock on a Mac computer. Which two system icons can be found on the dock by default? (Select all that apply.) A- Flash Player B- Finder C- Trash D- iCloud

B- Finder C- Trash

You have been troubleshooting a user's smartphone. Due to numerous applications freezing during use, you decide to restore the phone to factory defaults. What action will you be performing? A- Soft resetting the device B- Hard resetting the device C- Clearing all listed device administrator apps D- Force stopping all apps

B- Hard resetting the device

You are implementing a disaster recovery plan. The plan includes backing up mission critical servers. Which of the following backup types will require the longest time to restore? A- Full B- Incremental C- Weekly D- Differential

B- Incremental

Which computer virus type is usually targeted at Microsoft Office documents? A- Boot Sector B- Macro C- Firmware D- Program

B- Macro

When troubleshooting a problem for a user, what type of questioning is best to use in order to gather more details about the problem? A- Closed B- Open C- Active listening D- Problem management

B- Open

Which of the following Windows user groups is used to support legacy applications but has been deprecated? A- Guests B- Power users C- System Groups D- Users

B- Power users

Which one of the following can restrict the use of a mobile device camera to certain areas within an organizations facilities? A- Trusted app source B- Profile of security requirements C- Authenticator application D- Global positioning system

B- Profile of security requirements

You have arrived 30 minutes late at a customer site to address a technical issue. Which area of customer service has been impacted the most? A- Flexibility B- Punctuality C- Prioritizing D- Attitude

B- Punctuality

A user believes that malware has impacted the web browser that they use. What is a common symptom that affects a web browser? A- Rootkit B- Redirection C- Digital certificate D- Email filtering

B- Redirection

You would like to give a user the ability to request help and allow a connection from the support team to a Windows computer. Which setting do you configure? A- SSH (Secure Shell) B- Remote Assistance C- Remote Desktop D- Telnet

B- Remote Assistance

You are implementing mobile security in the workplace. To help protect mobile devices in the event they are lost or stolen, which policies do you propose (choose two)? A- Multifactor authentication B- Remote wipe C- Device lockout D- Remote backup

B- Remote wipe C- Device lockout

Which one of the following terms is defined as the likelihood and impact or consequence of a threat actor exercising a weakness? A- Vulnerability B- Risk C- Threat D- Counteractive measure

B- Risk

Which of the following power issues can lead to a brownout? A- Surge B- Sag C- Spike D- Blackout

B- Sag

Which one of the following is a vulnerability concern with physical security? A- Privacy screen B- Tailgating C- Multifactor D- Shredding

B- Tailgating

You have installed a new software application on a Windows 10 PC. The user has mentioned that the PC now runs very slow. Which utility can be used to view the resources that are being used by the new application? A- Services B- Task Manager C- Windows Features D- Programs and Features

B- Task Manager

You are installing a wireless access point. Rather than manually configure security settings, you decide to use the Wi-Fi Protected Setup (WPS) feature. Which security mechanism will be used for wireless access? A- WEP (Wired Equivalent Privacy) B- WPA2 (Wi-Fi Protected Access 2) C- WPA (Wi-Fi Protected Access) D- RADIUS (Remote Authentication Dial-in User Service)

B- WPA2 (Wi-Fi Protected Access 2)

You are browsing a user folder while using the command prompt window in Windows 10. The current directory is c:\users\david. You would like to navigate to the documents subdirectory. Which of the following two commands could you use? (Select all that apply.) A- cd \documents B- cd c:\users\david\documents C- cd documents D- cd.. documents

B- cd c:\users\david\documents C- cd documents

Which of the following commands are used on a Linux system to check a disk for errors? A- dd B- fsck C- vi D- ps

B- fsck

Which Windows utility command can be used to create a custom management console? A- mstsc B- mmc C- cmd D- msconfig

B- mmc

A user has mentioned that many free apps that have been installed on an Android mobile device are no longer opening. You are troubleshooting the device. Which of the following likely happened? A- The app store account is not the correct account on the device. B- The user does not have the correct permissions on the mobile device. C- A memory card where the applications were installed has been removed. D- The mobile device has installed applications for the incorrect device architecture.

C- A memory card where the applications were installed has been removed.

A user carries a laptop between a home network and a business network. While on the business network the user requires a static IP (Internet Protocol) address. When at home, DHCP (Dynamic Host Configuration Protocol) is used to obtain an address. The user often forgets how to switch the laptop settings between the two, and then has trouble using the laptop online. What type of configuration can be used to help the user? A- APIPA (Automatic Private IP Addressing) address B- Loopback address C- Alternate address D- Gateway address

C- Alternate address

A new Windows 10 PC is configured to obtain an IP (Internet Protocol) address using DHCP (Dynamic Host Configuration Protocol). You notice that the PC has an address of 169.254.1.20 and cannot connect to network resources. This computer is used on multiple networks and should have a static IP on this network only. What could be configured via the NIC (Network Interface Card) to remedy the PC's connectivity? A- Gateway address B- Subnet mask C- Alternate configuration D- IP (Internet Protocol) address

C- Alternate configuration

Which of the following poses a security concern when using a mobile device in close proximity to other devices? A- Unresponsive touchscreen B- Battery life C- Bluetooth pairing D- Signal interference

C- Bluetooth pairing

Which of the following is NOT considered a security incident? A- Prohibited material B- Unlicensed software C- Confidential reporting D- Denial of Service (DoS) Attack

C- Confidential reporting

Mobile device security has two principal challenges: portability and capacity. What does capacity refer to in this context? A- Storage for apps B- Resource capacity C- Data storage D- Battery life

C- Data storage

Which one of the following data destruction methods involves electromagnetic disruption? A- Shredding B- Incineration C- Degaussing D- Overwriting

C- Degaussing

You are looking to implement power saving features on an older Windows PC. You know that three compatible components are required for power management to work as defined by the ACPI (Advanced Configuration Power Interface) specification. Which of the below is NOT one of the three components? A- Hardware B- Firmware C- Drivers D- Operating System

C- Drivers

Which of the following is NOT an example of PII (Personally Identifiable Information)? A- Email address B- Social security number C- Dynamic IP (Internet Protocol) address D- Static IP (Internet Protocol) address

C- Dynamic IP (Internet Protocol) address

You would like to create a new user account on a Mac computer. Which one of the below is NOT an account type option? A- Administrator B- Standard C- Guest D- Sharing Only

C- Guest

You are modifying a script that automates a task on a computer. Which of the following basic data types is used for whole numbers? A- Boolean values B- Strings C- Integers D- Floating point

C- Integers

Which Windows 10 power-saving mode uses an ACPI (Advanced Configuration and Power Interface) S0 low-power idle mode to maintain a network connection while saving energy? A- Standby B- Hibernate C- Modern Standby D- Suspend

C- Modern Standby

A user receives an email stating that a credit card has been locked from use and requires verification by providing an account number. The attempt at acquiring this information from the user is known as which type of attack? A- Dumpster diving B- Impersonation C- Phishing D- Shoulder surfing

C- Phishing

What are the two principal security challenges when it comes to mobile device security (choose two)? A- Screen lock B- Wi-Fi C- Portability D- Capacity

C- Portability D- Capacity

The NIST (National Institute of Standards and Technology) Computer Security Incident Handling Guide identifies stages in an incident response lifecycle. Which of the below is concerned with improvement of procedures or systems as a result of a review? A- Preparation B- Detection and Analysis C- Post-incident Activity D- Containment, Eradication, and Recovery

C- Post-incident Activity

A user is receiving an error when trying to run a newly installed application on a Windows 10 PC. You decide to look at the application installation directory. At minimum, which two permissions does the user need to run the application from this directory? (Select all that apply.) A- Modify B- Write C- Read D- Execute

C- Read D- Execute

A user has reported that a Windows 10 computer often freezes. Which management tool can be used to investigate applications that stop responding frequently? A- Performance Monitor B- Task Manager C- Reliability Monitor D- Resource Monitor

C- Reliability Monitor

Which of the following would not be applicable to an electrostatic discharge (ESD) workstation? A- Common ground point B- Wrist strap C- Safety goggles D- Work mat

C- Safety goggles

A keylogger is what type of a malicious risk? A- Virus B- Worm C- Spyware D- Ransomware

C- Spyware

You are configuring a Windows desktop to allow remote desktop sessions. For security purposes, you want to configure an alternate RDP (Remote Desktop Protocol) port. Which of the below is the default RDP port? A- 22 B- 8080 C- 443 D- 3389

D- 3389

Which one of the following is NOT one of the three properties that defines secure information? A- Confidentiality B- Integrity C- Availability D- Authorization

D- Authorization

You have configured a new user in Active Directory. You created a new user account, assigned the user to a group, and given the user access to any appropriate shared network resources. Which of the following logical security controls pertains to accessing a shared resource? A- Authentication B- Accounting C- Availability D- Authorization

D- Authorization

You are thinking about configuring a Data Loss Prevention (DLP) solution at work. This will help to prevent sensitive files from being distributed outside of the workplace. Which one of the following is NOT a component of Data Loss Prevention (DLP)? A- Policy server B- Endpoint agent C- Network agent D- Client access license

D- Client access license

Which of the following is NOT included in a request for change (RFC) document? A- Backout plan B- Scope C- Purpose D- Configuration

D- Configuration

A Windows 10 PC on the network is only able to connect to other resources, both public and private, by using IP addresses. What setting needs to be checked via the NIC (Network Interface Card) properties? A- IP (Internet Protocol) address B- Subnet Mask C- Gateway address D- DNS (Domain Name System) address

D- DNS (Domain Name System) address

You are using a Windows 10 computer. When you open a webpage, it is not using your favorite web browser. Where can you change this behavior in Windows Control Panel? A- File History B- Programs and Features C- File Explorer D- Default Programs

D- Default Programs

A user̍s Windows 10 PC is experiencing problems with a video card. The user states that it was working fine until a recent driver update. Which Control Panel applet would you use to roll back the video card driver? A- File History B- Devices and Printers C- Recovery D- Device Manager

D- Device Manager

By using Windows Device Manager, a user can view a device and see configuration information that is used for proper communication with the CPU (Central Processing Unit). Which of the following is NOT a viewable hardware resource? A- IRQ (Interrupt Request) address B- I/O (Input/Output) address C- Memory address D- Device driver

D- Device driver

A user is having problems with a PC after visiting a website and downloading a file. Which of the below would categorize problems accessing a folder after downloading this file? A- Performance symptoms B- Application crashes C- Service problems D- File system errors

D- File system errors

Which of the following poses a security concern after installing a new application on a mobile device? A- Sound issues B- Wi-Fi signal strength C- Signal interference D- High resource utilization

D- High resource utilization

Which of the following does NOT need special care and handling when it is being disposed of? A- Tablet B- Tube monitor C- Toner kit D- Keyboard

D- Keyboard

Which of the following is NOT a government regulation that would affect technology installation and maintenance? A- Health and safety laws B- Building codes C- Environmental regulations D- Personal safety equipment

D- Personal safety equipment

When practicing good customer service, which of the below is NOT an element of respect? A- Avoiding distractions B- Cultural sensitivity C- Maintain confidentiality D- Problem management

D- Problem management

You need to view system log files on an Android device. How can this be accomplished? A- Make the app a device administrator. B- Soft reset the device. C- Hard reset the device. D- Put the device in developer mode.

D- Put the device in developer mode.

While configuring a Windows 10 workstation for a new high priority project, you decide to mirror the operating system disk drive for redundancy. Which type of RAID (Redundant Array of Independent Disks) will you be configuring in Windows disk management? A- RAID 0 B- RAID 5 C- RAID 6 D- RAID 1

D- RAID 1

Which of the following file extensions is NOT associated with a popular scripting language? A- bat B- ps1 C- sh D- dll

D- dll

Which application is used to factory reset an iOS device and install the latest iOS software? A- iCloud B- Finder C- Time Machine D- iTunes

D- iTunes


Related study sets

Paragraph Comprehension Practice Test

View Set

History of Television and media midterm

View Set

UNIT 12- Civil Rights Movement, 1960s, & the Vietnam War Ch. 25,26,27

View Set

Liste de pays et capitales pour géo

View Set