Certmaster Flashcards

(106 cards)

1
Q

Which explanation best describes the maximum password age policy?

When the password reaches its time limit; the user is forced to change the password

When the user account setting enforces password complexity rules

When the user account setting stops the user from
changing his or her account password

When the user account setting requires a unique password must be used when the user changes the password

A

When the password reaches its time limit; the user is forced to change the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What method of malware delivery can be marginalized by using email filtering?
Spim
Spam
Viruses
Trojan horses
A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the recommended command to use when copying an entire folder structure to a new location?

move
xcopy
copy
robocopy

A

robocopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What term refers to submitting the authorization as proof that the user is authenticated?

Biometric Authentication
Mutual Authentication
Software Token
Single Sign-On (SSO)

A

Software Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following boot methods is commonly set as highest priority in order to perform a repair or install?

Hard drive
Optical drive
USB
Network/PXE

A

Optical drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify the best physical security method for network access points from the following choices.

Sit on top of a filing cabinet
Add a cable lock.
Position on a high ceiling.
Place in a remote wiring closet.

A

Add a cable lock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is NOT a reason for Windows to display an invalid certificate warning?

Expiration of the certificate
Issued by an untrusted root
Bypassing the certificate requirement
Certificate issued to a host other than the one being accessed

A

Bypassing the certificate requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What loads only basic drivers and services required to start the system?

Startup Repair
Safe Mode
Startup Settings
The Advanced Boot Options menu

A

Safe Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to create a basic script to perform some administrative tasks on a Windows PC. Which script type would you NOT use?

.ps1
.vbs
.sh
.bat

A

.sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which mobile device plan addresses many of the concerns with bring your own device (BYOD) programs, but still provides some flexibility for users?

Restricted BYOD
Corporate-Owned, Business Only (COBO)
Corporate Owned, Personally Enabled (COPE)
Choose Your Own Device (CYOD)

A

Corporate Owned, Personally Enabled (COPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The corporate security team found that someone has broken into the network using a local Internet Protocol (IP) address and an allowed Media Access Control (MAC) address. Using an IP address and MAC address in this way is known as which type of attack?

Spimming
Impersonation
Spoofing
Spamming

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are headed to a customer site to meet with a sales manager. You have met in the past to discuss repetitive technical issues the department has been experiencing. In order to best present the sales manager a clear understating of the suggested remedies, what customer service communication technique should you practice?

Do not argue
Avoid jargon and acronyms
Be culturally sensitive
Narrow the scope of the problem

A

Avoid jargon and acronyms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is false about troubleshooting wireless configuration issues?

Try removing the network from the device list then reconnecting to it.
Verify that the access point supports the same 802.11 standard as the device.
Verify the device is turned on then click on random apps.
Research any known issues between the access point and the model of device.

A

Verify the device is turned on then click on random apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are troubleshooting an Application on a Windows 10 PC. You need to check if a service is running. How can you accomplish this?

Startup tab in tskmgr
General tab in msconfig
Services tab in msconfig
Boot tab in msconfig

A

Services tab in msconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

There has been an incident at work. A possible data breach has occurred on a workstation that is critical to the business. Upon arrival to work, you find the workstation untouched by anyone other than the usual user who says the system doesn’t seem right. They have stopped using the system. Which investigative approach should you take first?

Identify the issue
Report through proper channels
Preservation of the data
Chain of custody

A

Identify the issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which is the best reason for slow data speeds?

Trojan
Malware
Worm
Virus

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of these is a Windows event type?

Security log and Application log
Setup
Failure Audit
System log

A

Failure Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network diagrams can show logical and physical relationships between different elements. What is this relationship called?

Topology
Configuration
Schematic
Schema

A

Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following can cause a weak signal in a mobile device?

App Log Errors
Low battery charge
Slow performance
Apps not loading

A

Low battery charge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You are working on a Linux system and need to edit a file. Which command do you use?

grep
vi
apt-get
ls

A

vi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an Internet service provider (ISP)?

A device used to translate a cable signal coming into the house into a wireless signal
A protocol used to facilitate data transfer between different operating systems
An address used to identify a host or client endpoint
A company that provides Internet access to homes or businesses

A

A company that provides Internet access to homes or businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You notice that your computer is running slowly and you think it is due to an errant process. Using the command line and command line tools, how do you view the list of running applications?

FSUTIL
NET VIEW F
DIR /S
TASKLIST

A

TASKLIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

To ensure maximum compatibility with all wired networks that you might connect to, how should you configure transmission on your wired Ethernet network interface card (NIC)?

1 Gbps
Auto negotiate
Half duplex
Full duplex

A

Auto negotiate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the common solution to defragment the hard drive?

msconfig
sata
hdd
defrag

A

defrag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which technique can be used in case of a mobile device theft or loss to protect any confidential data stored on the device? Remote power off Remote wipe Remote Wi-Fi disable Remote lock
Remote wipe
26
Which of these is a common symptom of infection by spyware or adware? Disappearing files Slow performance Security alerts Application crash
Slow performance
27
You have a small office of six employees and you want to have a network to enable file and printer sharing and to add a bit of security. Which type of Windows network should you select for this scenario? HomeGroup Workgroup Client/server Active Directory domain
Workgroup
28
Which of the following boot methods involves using the network adapter to obtain boot settings? Network/PXE USB Optical drive Hard drive
Network/PXE
29
A user’s Windows 10 computer is not able to communicate with the Internet but is able to access a network printer. Which of the following network settings do you need to modify? Subnet mask MAC address IP address Gateway address
Gateway address
30
How would you protect a browsing session when using a public hotspot? Secure Sockets Tunneling Protocol (SSTP) WPA2 IPSec Virtual Private Network (VPN)
Virtual Private Network (VPN)
31
What is the greatest danger of rootkit malware? They install pop-up browser ads. They collect browser history and send it to the developer. They are difficult to detect. They corrupt the hard drive boot sector.
They are difficult to detect.
32
A user has been receiving errors when using an application. They send you a screenshot, but the errors are not very detailed. Which of the following logs should you examine in Event Viewer to see more verbose error output? Application Security Setup System
Application
33
How can you detect if a hacker has unauthorized access to the camera on your device? By checking the installed apps By the amount of send/receive activity By checking your phone directory By checking to see if the camera is working
By the amount of send/receive activity
34
Which of the following is a regulation of data within and exported outside of the European Union? PCI PII GDPR PHI
GDPR
35
What is the possible consequence of forcing users to change passwords too often? Frequent changes might overburden domain controllers when updating the Active Directory forest permissions. Some users will experience access denials because of the frequent changes. Mapped network drives will have to be remapped with each password change. They might write down their passwords because they cannot remember them.
They might write down their passwords because they cannot remember them.
36
You are creating a documentation repository. You need to submit documentation for critical tasks including, restoring a production server and process nightly firewall log reports. What type of documents will you be creating? Regulations Configuration item (CI) Standard operating procedure (SOP) Configuration management database (CMDB)
Standard operating procedure (SOP)
37
You have a removable drive that needs to hold large files and be read/write capable in both Windows and macOS environments. Which of the following file systems should you use to format the drive? NTFS (New Technology File System) FAT32 (File Allocation Table 32-bit) CDFS (CD File System) exFAT (extended File Allocation Table)
exFAT (extended File Allocation Table)
38
What is the reason for using Wi-Fi Protected Access version 2 (WPA2) instead of Wired Equivalent Privacy (WEP) on a router? Improved transmission rates Improved connection stability Improved wireless signal range Improved data security
Improved data security
39
You need to implement a backup storage security plan for the company backups. Which of the following is NOT considered a security best practice? Data encryption Role-based access Redundant connectivity Backup and restore logging
Redundant connectivity
40
When it comes to using remote access methods, what is the prevalent concern? Security Regulations Data speed Specifications
Security
41
What should you suspect if a handheld device becomes unusually hot? The backlight setting is too low. There is a problem with the battery. The mute switch is activated. There are hardware issues such as dirt, grease, or cracks.
There is a problem with the battery.
42
Which of the following is referred to as ‘fake anti-virus’? Spyware Keyloggers Scareware Ransomware
Scareware
43
What common issue happens when the user sets the backlight on their mobile device to its lowest setting? A dim display Sound issues External monitor issues An unresponsive touchscreen
A dim display
44
A user needs to work remotely and access network resources. What type of connection allows the user to connect remotely and securely to the internal network? Wired VPN WWAN Wireless
VPN
45
You are troubleshooting a Windows 10 PC that runs very slowly after the user logs on. You want to check how many programs are configured to start. How can you accomplish this? Boot tab in msconfig General tab in msconfig Startup tab in tskmgr Services tab in msconfig
Startup tab in tskmgr
46
What is the common solution to disable application startup? Performance Monitor Close Session Resource Monitor System Configuration Utility
System Configuration Utility
47
Which of these is NOT associated with troubleshooting wireless configuration issues? A low battery The device stuck in airplane mode Wi-Fi adapter and AP compatibility standards Bluetooth pairing information
A low battery
48
Why do administrators insist on disabling the autorun feature for inserted media and removable devices? It speeds up access to media when disabled. It prevents Java-based programs from loading into memory. It prevents scanning by antivirus software to disable autorun. It prevents the automatic launching of malware.
It prevents the automatic launching of malware.
49
Updating anti-virus and anti-malware software is extremely important in preventing security compromises on systems. How often should you apply updates? Anti-malware updates should be applied quarterly with other rollup updates. Anti-malware updates should be applied as soon as they are available. Monthly updates for all malware are sufficient to protect most systems. Anti-malware updates should be applied weekly, or as time permits.
Anti-malware updates should be applied as soon as they are available.
50
The current directory is "C:\Users\David\Documents" and you want to move into a sub-directory called “Tech_files.” It is the only sub-directory. Which of the following commands could you enter to move into that directory? cd T* cd\ cd ..\.. cd ..
cd T*
51
Your organization uses images to deploy Windows to laptops on the network. You are responsible for creating a new image. You run Microsoft’s System Preparation Tool (sysprep) before imaging the disk. Which of the following is NOT a reason to use sysprep before creating an image? Sysprep updates all drivers. Sysprep removes the Windows Security ID (SID) from the machine. Sysprep preserves all data from the machine. Sysprep preserves the Windows updates that have been applied.
Sysprep updates all drivers.
52
Which of the following network card transmissions settings only allows 1-way data communication? 1 Gbps Full duplex Half duplex Auto negotiate
Half duplex
53
Where can you set the programs you wish to use for particular tasks or to configure individual file associations? The System Properties applet The Computer Manager applet The Program and Features applet The Default Programs applet
The Default Programs applet
54
You will be documenting a customer’s network with several network diagrams. One diagram you will be creating will show the actual connectivity of devices. Which type of diagram will you be creating? Regulatory Asset Logical Physical
Physical
55
An administrator suspects that a user who arrives early, stays late, and sometimes works weekends might be stealing data. How can the administrator limit this user without raising the user's suspicion? Lock down the user's access on their workstation and the network to a small subset of the standard accessible areas. Set up strict file permissions on sensitive files using file attributes. Restrict login hours to standard working hours. Disable the user's Active Directory account.
Restrict login hours to standard working hours.
56
You will be creating a diagram for the research and development department. The diagram will document the business flow of a web development process. What type of diagram will you be creating? Regulatory Logical Physical Policy
Logical
57
You have decided to roll out Microsoft Office to all users using a single license that covers all users. Which type of license will be used? OEM Open source Volume Retail
Volume
58
Which security feature does Windows BitLocker provide for computer systems and for users? Encrypted communications link Full disk encryption Single sign-on capability Kerberos
Full disk encryption
59
While typing in your debit card personal identification number (PIN) at a grocery store terminal, you notice someone watching you press the numbers for your card. What is this method of stealing information known as? Spoofing Phishing Shoulder surfing Spear phishing
Shoulder surfing
60
Which of the following is NOT a ‘red flag’ for malware infection? Date stamps and file sizes of infected files change. Permissions attributes of files change, resulting in “Access Denied” errors. The file system or individual files are updated. The file system or individual files are corrupted or deleted.
The file system or individual files are updated.
61
A company hesitates to upgrade to the latest version of an operating system (OS). Which of the following is NOT a concern for the company? Cost Network compatibility Web application compatibility Software compatibility
Web application compatibility
62
Which is the worst-case scenario for unauthorized location tracking? Tailgating Domestic burglary Piggybacking Advertisements
Domestic burglary
63
What is one of the most notable differences between iOS and Android? iOS apps are only compatible with iOS. Android is open source. Handset vendors can make their own Android version. Android releases major and minor versions.
Android is open source.
64
What setting should you enable if you wanted to configure a host to automatically and dynamically forward inbound traffic received on specific ports to other ports? Media access control (MAC) filtering Universal Plug and Play (UPnP) Dynamic Network Address Translation (DNAT) Port triggering
Port triggering
65
What term refers to a small section of a private network located between two firewalls and made available for public access? Demilitarized zone (DMZ) Domain Subnet Local area network (LAN)
Demilitarized zone (DMZ)
66
Instead of searching for the Windows Device Manager, how do you start it from the Run dialog box? compmgmt. msc control. exe devmgmt. msc taskmgr. exe
devmgmt.msc
67
You will be virtualizing a Linux workstation on a Linux host system. The hypervisor you will be using is available freely on the Internet for any type of use. What type of license does the hypervisor likely use? OEM Retail Open source Volume
Open source
68
Which form of wireless encryption introduced the Temporal Key Integrity Protocol (TKIP) security protocol? 802.11i Wi-Fi Protected Access (WPA) Wired Equivalent Privacy (WEP) Wi-Fi Protected Access version 2 (WPA2)
Wi-Fi Protected Access (WPA)
69
Where are 32-bit application files stored in a 64-bit Windows environment? Program Files %SystemRoot%\system32 %SystemRoot%\syswow64 Program Files (x86) folder
Program Files (x86) folder
70
Which Windows version imposed significant user interface changes to provide better support for touchscreens? Windows XP Windows 10 Windows 7 Windows 8
Windows 8
71
Identify which virus becomes active when the application is executed? Firmware virus Script virus Program virus Boot sector virus
Program virus
72
You have installed a new Windows 2016 server. You need to monitor this server over the next 6 months for performance. What is the first step that should be taken? Perform a bare metal installation. Create a standard operating procedure (SOP). Record a baseline. Diagram the topology.
Record a baseline.
73
You install a second hard drive into your computer to store data on and, after a bit of preliminary setup, you have to perform which of the following actions to prepare the drive for file storage? BOOTREC CHKDSK FORMAT GPRESULT
FORMAT
74
Which of the following is NOT part of patch management? Segregating updates into urgent, important, and non-critical categories prior to deployment Evaluation of fixes on various operating systems and in different user environments Replacing hardware components on a break/fix schedule Delivery of approved urgent software fixes
Replacing hardware components on a break/fix schedule
75
What is the most likely cause of Windows booting but not displaying the login dialog or failing to load the desktop? A corrupt user profile Update installs A malware infection or corrupt drivers A network service or configuration problem
A malware infection or corrupt drivers
76
You were notified that a data breach occurred on a social media site that you visit frequently. What should be the first action you take once you receive notification about the breach? Delete your account immediately. Check your account from your mobile device. Change your password as soon as possible using your mobile device. Change your password as soon as possible using a clean uncompromised device.
Change your password as soon as possible using a clean uncompromised device.
77
What is the purpose of Material Safety Data Sheet (MSDS) documentation? Dealing with confidential data Proper disposal of equipment Compliance to government regulations Customer expectations
Proper disposal of equipment
78
A user located in another building is having difficulty printing. The user states they receive an error message. What method would best be used to view and understand the error? VPN Telnet SSH Screen sharing
Screen sharing
79
Which of these is NOT an intent for adware and spyware? Commercial pop-ups To vandalize the computer system New toolbars, the home page changing suddenly, and faults Web page redirection
To vandalize the computer system
80
Which of the following is NOT a reasonable bring your own device (BYOD) security requirement from a company to its employees? Be sure that all apps and networks are from trusted sources Configure a local firewall on the device Install no personal apps on the device Set up a password-protected screen lock
Install no personal apps on the device
81
What is a symptom of a rootkit? Enter a secure area without authorization Disguise malicious activity by appearing to perform a useful one Take advantage of vulnerability in an application Hide the actions of other types of malicious software
Hide the actions of other types of malicious software
82
A disaster prevention and recovery process needs to be put in place for a critical Windows server. Which of the following does NOT address this process? Surge protector Backout plan Account recovery File-level backup
Backout plan
83
Over the years your company has acquired a closet full of old unused technology. You need to properly dispose of the equipment. Which of the following would NOT be considered an environmental hazard? Cell Phone Computer case CRT Toner
Computer case
84
You need to write a script to help with systems automation. You need to use comparison operators to accomplish a task within the script. What syntax would be used for less than? < >= <= >
85
Which computer component contains a glass vacuum tube that needs to be disposed of properly? LCD Panel DVD-ROM CRT Monitor Printer
CRT Monitor
86
What would most likely cause a cable fire? Too much current through a cable Improperly terminated Ethernet cable ends Non-plenum rated cable Plenum rated cable
Too much current through a cable
87
What protocol is used to provide nonsecure remote access from host terminals to various servers and network devices?
Telnet
88
What protocol is used when email is stored locally and might not synchronize if accessed from multiple locations but is available offlilne?
POP3
89
What protocol delivers administrative alerts to and from network devices?
SNMP - Simple Network Management Protocol
90
Which protocol is used to provide connectionless network service?
UDP - User Datagram Protocol
91
Which protocol offers a synchronized time service to all configured network devices?
NTP - Network Time Protocol
92
Which protocol is used to resolve IP addresses to MAC addresses for purpose of local-area message delivery?
ARP - Address Resolution Protocol
93
Which protocol manages the initiation of VOIP phone services?
SIP - Session Initiation Protocol
94
Which protocol offers a secure connection from virtual terminal to remote devices?
SSH - Secure Shell
95
Which protocol provides for the automatic assignment of IP addresses to hosts on a given network?
DHCP - Dynamic Host Configuration Protocol
96
Which protocol provides encryption for data above the transport layer and updates the SSL protocol?
TLS - Transport Layer Security
97
Which nonsecure client/server protocol is used to retrieve data from web servers to their clients?
HTTP - Hypertext Transfer Protocol
98
Which protocol is used by email servers to deliver email between server systems?
SMTP - Simple Mail Transfer Protocol
99
What protocol is used to transfer files in a connection-oriented state?
FTP - File Transfer Protocol
100
What protocol is used as a connection-oriented delivery of upper-layer datagrams using acknowledgments?
TCP - Transmission Control Protocol
101
What protocol is a network layer protocol used by programs such as ping to deliver network connection messages to requesting clients?
ICMP - Internet Control Message Protocol
102
Which protocol offers a secure authentication of clients to web servers before delivery of requested data?
HTTPS - Hypertext Transfer Protocol Secure
103
Which protocol is often used in audio/video delivery of real-time data requiring QoS and tight sequencing?
RTP - Real-Time Transport Protocol
104
Which protocol resolves fully qualified domain names to their unique IP addresses
DNS - Domain Name System
105
What protocol is used when the email is stored on the server and can be accessed from multiple locations?
IMAP - Internet Message Access Protocol
106
What network layer protocol that makes multicast connections for purposes of delivering mass datagrams simultaneously to groups of clients?
IGMP - Internet Group Management Protocol