Certmaster Flashcards
(106 cards)
Which explanation best describes the maximum password age policy?
When the password reaches its time limit; the user is forced to change the password
When the user account setting enforces password complexity rules
When the user account setting stops the user from
changing his or her account password
When the user account setting requires a unique password must be used when the user changes the password
When the password reaches its time limit; the user is forced to change the password
What method of malware delivery can be marginalized by using email filtering? Spim Spam Viruses Trojan horses
Spam
What is the recommended command to use when copying an entire folder structure to a new location?
move
xcopy
copy
robocopy
robocopy
What term refers to submitting the authorization as proof that the user is authenticated?
Biometric Authentication
Mutual Authentication
Software Token
Single Sign-On (SSO)
Software Token
Which of the following boot methods is commonly set as highest priority in order to perform a repair or install?
Hard drive
Optical drive
USB
Network/PXE
Optical drive
Identify the best physical security method for network access points from the following choices.
Sit on top of a filing cabinet
Add a cable lock.
Position on a high ceiling.
Place in a remote wiring closet.
Add a cable lock.
Which of the following is NOT a reason for Windows to display an invalid certificate warning?
Expiration of the certificate
Issued by an untrusted root
Bypassing the certificate requirement
Certificate issued to a host other than the one being accessed
Bypassing the certificate requirement
What loads only basic drivers and services required to start the system?
Startup Repair
Safe Mode
Startup Settings
The Advanced Boot Options menu
Safe Mode
You need to create a basic script to perform some administrative tasks on a Windows PC. Which script type would you NOT use?
.ps1
.vbs
.sh
.bat
.sh
Which mobile device plan addresses many of the concerns with bring your own device (BYOD) programs, but still provides some flexibility for users?
Restricted BYOD
Corporate-Owned, Business Only (COBO)
Corporate Owned, Personally Enabled (COPE)
Choose Your Own Device (CYOD)
Corporate Owned, Personally Enabled (COPE)
The corporate security team found that someone has broken into the network using a local Internet Protocol (IP) address and an allowed Media Access Control (MAC) address. Using an IP address and MAC address in this way is known as which type of attack?
Spimming
Impersonation
Spoofing
Spamming
Spoofing
You are headed to a customer site to meet with a sales manager. You have met in the past to discuss repetitive technical issues the department has been experiencing. In order to best present the sales manager a clear understating of the suggested remedies, what customer service communication technique should you practice?
Do not argue
Avoid jargon and acronyms
Be culturally sensitive
Narrow the scope of the problem
Avoid jargon and acronyms
Which is false about troubleshooting wireless configuration issues?
Try removing the network from the device list then reconnecting to it.
Verify that the access point supports the same 802.11 standard as the device.
Verify the device is turned on then click on random apps.
Research any known issues between the access point and the model of device.
Verify the device is turned on then click on random apps.
You are troubleshooting an Application on a Windows 10 PC. You need to check if a service is running. How can you accomplish this?
Startup tab in tskmgr
General tab in msconfig
Services tab in msconfig
Boot tab in msconfig
Services tab in msconfig
There has been an incident at work. A possible data breach has occurred on a workstation that is critical to the business. Upon arrival to work, you find the workstation untouched by anyone other than the usual user who says the system doesn’t seem right. They have stopped using the system. Which investigative approach should you take first?
Identify the issue
Report through proper channels
Preservation of the data
Chain of custody
Identify the issue
Which is the best reason for slow data speeds?
Trojan
Malware
Worm
Virus
Malware
Which of these is a Windows event type?
Security log and Application log
Setup
Failure Audit
System log
Failure Audit
Network diagrams can show logical and physical relationships between different elements. What is this relationship called?
Topology
Configuration
Schematic
Schema
Topology
Which of the following can cause a weak signal in a mobile device?
App Log Errors
Low battery charge
Slow performance
Apps not loading
Low battery charge
You are working on a Linux system and need to edit a file. Which command do you use?
grep
vi
apt-get
ls
vi
What is an Internet service provider (ISP)?
A device used to translate a cable signal coming into the house into a wireless signal
A protocol used to facilitate data transfer between different operating systems
An address used to identify a host or client endpoint
A company that provides Internet access to homes or businesses
A company that provides Internet access to homes or businesses
You notice that your computer is running slowly and you think it is due to an errant process. Using the command line and command line tools, how do you view the list of running applications?
FSUTIL
NET VIEW F
DIR /S
TASKLIST
TASKLIST
To ensure maximum compatibility with all wired networks that you might connect to, how should you configure transmission on your wired Ethernet network interface card (NIC)?
1 Gbps
Auto negotiate
Half duplex
Full duplex
Auto negotiate
What is the common solution to defragment the hard drive?
msconfig
sata
hdd
defrag
defrag