Cyber Class Flashcards

(77 cards)

1
Q

Which of the following is a valid distinguished way of writing a website URL?

A

MarketSpace.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is true?
a. Group members have the access rights that are assigned to the group.
b. Users can log on as the group and have all the assigned access rights.

A

a.Group members have the access rights that are assigned to the group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following must be set up before you can register a facial or fingerprint scan for your account?
Pin
Security Key
Picture password
Password

A

Pin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Domain

A

A collection of network resources that share a common directory database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Organizational Unit

A

A folder-like container that organizes network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Built-in Containers

A

Default containers used to organize Active Directory objects that cannot be deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which remote access solution is built into macOS?
Quick Assist
Remote Assistance
Screen Sharing
Remote Desktop.

A

Screen Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You want to use a VPN tunneling protocol that can encapsulate other LAN protocols and carry the data securely over an IP Network. Which of the following protocols is suitable for this task?
PPTP - Point to point tunneling Protocol
NetBeui - Net Bios Extended User Interface
PPP - Point to point Protocol
SLIP - Serial Line Internet Protocol

A

PPTP - Point to point tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a VPN’s primary purpose?
Support the distribution of public web documents
Allow use of network-attached printers
Support secure communications over an untrusted network
Allow remote systems to save on long-distance charges.

A

Support secure communications over an untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which user type is the Windows beta channel recommended for?
Administrators
The average user
Highly technical users
Commercial users

A

The average user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Full Backup

A

Backs up all files (even those that have not changed).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incremental Backup

A

Backs up every file that has changed since the last full or incremental backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Differential Backup

A

Backs up every file that has changed since the last full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Synthetic Backup

A

Compares the data found i the last full backup with the current content and uploads only the changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why should you store backup media offsite?
To reduce the possibility of theft
To prevent the same disaster from affecting both the system and it’s associated backup media.
To improve the efficiency of the restoration process
It is required by government regulations in the USA.

A

To prevent the same disaster from affecting both the system and it’s associated backup media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What tool can you use to create a full system image of your windows drive?
Backup and Restore
System Repair
Recovery Drive
Windows Installation Media

A

Backup and Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

While running a presentation editor on your Windows 11 laptop, your computer locks up. When you try powering the computer, Windows 11 will not start up.
Which of the following tools should you use FIRST to try and resolve the issue?
Backup and Restore
Recovery Drive
Startup Repair
Restore files

A

Startup Repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following actions occur during the Pre-EFI Initialization (PEI) stage of the UEFI boot process? (Pick 2)
Device drivers are loaded into memory.
The CPU and chipset are verified and fully initialized.
Power is supplied to the CPU
The EFI boot manager initializes.
System memory is initialized, verified, and allocated.

A

The CPU and chipset are verified and fully initialized.
System memory is initialized, verified, and allocated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

EFI

A

Extensible Firmware Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

UEFI

A

Unified Extensible Firmware Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is the first process that runs once a computer is powered on and the CPU loads the BIOS?
Boot Loader
POST - Power On Self Test
Winload.exe
WININIT

A

POST - Power On Self Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIOS

A

Basic Input output system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed? %systemdrive%\Program Files (x86) %systemdrive%\Applications (32-bit) %systemdrive%\Applications %systemdrive%\Program Files
%systemdrive%\Program Files (x86)
26
You have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11? C: Users\Profiles\username C: Documents and Settings \username C:\Users\username C:\Users \Documents and Settings\username
C:\Users\username
27
Which of the following statements are true regarding administrative shares? (select Two.) Adding a ! sign to the end of a share name creates an administrative share. If you are a member of the Administrators group, the administrative shares are visible to you when you browse the network. By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path. Default administrative shares grant access to the Administrators or Power Users group.
By default, Windows automatically creates an administrative share for every volume. To connect to an administrative share, you must use the UNC path.
28
A help desk technician determines that a user’s issue is caused by a corrupt file on their computer. Which of the following would be the FASTEST way to transfer a good file to the computer? Use the C$ administrative share to copy the file. Have the user share the folder as a local share and copy the file to the share. Attach the file to an email and have the user copy the file to the correct folder.
Use the C$ administrative share to copy the file.
29
EFS
Encrypting File System
30
You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are traveling to an industry conference. What is the result of copying the file to the thumb drive? aThe file becomes inaccessible. The file will no longer be encrypted. The file is compressed and remains secure. The file remains secure and accessible.
The file will no longer be encrypted.
31
Which of the following security solutions would prevent you from reading a file that you did not create? BitLocker EFS IPSec VPN
EFS
32
Which command would you enter at the shell prompt to start a new Bourne-Again Shell (Bash) session?
BASH
33
What would you enter at the Command Prompt on a Linux system to display the IP addresses and subnet masks that are assigned to each network interface?
IP
34
A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use? Ps Grep Ls Chmod - Change Mode (Change permissions on Unix machine)
Chmod - Change Mode (Change permissions on Unix machine)
35
Jamie has been tasked with designing a solution for the paralegals in his office. They need to review old documents that are on paper files and create word processor documents from them that can be searched and cross referenced. Which of the following devices should Jamie use to create the solution? Projector Printer Scanner Biometric scanner Digitizer
Digitizer
36
Which component is designed to let you use a notebook system as a desktop system by making it possible to connect a normal-sized external mouse, keyboard, monitor, and speakers? a. Docking station b. Built-in Bluetooth c. USB ports d. Infrared wireless e. Firewire ports
a. Docking station
37
What do these keys do?
Fn1- Touchpad Fn2- Screen Orientation Fn3- Wifi/Cellular Data Fn4- Bluetooth Fn5- Dual Display Fn6- Pause and Play
38
You need to replace the video card in a laptop. Which of the following is the first step? a. Remove the access panel at the bottom of the laptop. b. Remove the bezel. c. Remove the keyboard. d. Remove the display wires if the video card is integrated into the motherboard. e. Find a service manual with correct disassembly procedure
e. Find a service manual with correct disassembly procedure
39
You are troubleshooting a malfunctioning notebook computer system. The user has indicated that the LCD screen suddenly became dark and difficult to read while they were downloading a large file through the wireless network while the system was plugged in at their desk. You have checked the system and determined that the backlight has stopped working. Which of the following are the MOST likely causes?(Select two.) The extended download placed high demands on the system DC power, causing the BIOS to shut off the backlight. The cold cathode fluorescent lamp (CCFL) has burned out and needs to be replaced. The inverter in the LCD assembly has malfunctioned. The wireless network card is emitting radio signals that interfere with the backlight, causing it to stop functioning. Malware was installed as part of the download that targeted the backlight circuitry.
The cold cathode fluorescent lamp (CCFL) has burned out and needs to be replaced. The inverter in the LCD assembly has malfunctioned.
40
Which of the following mobile device components are often installed under the bezel of a mobile device display? (Select three.) Microphone OLED OEM Wi-Fi antenna wires Inverter Webcam Touch Screen digitizer
Microphone Wi-Fi antenna wires Webcam
41
Which ACPI power state allows a system to start where it left off, but turns all other components off? a. Working b. Standby c. Off d. Hibernate
Hibernate
42
You want to use hibernation on your Windows notebook. What does it need to have for this to work? a. 1 gigahertz (GHz) or faster processor b. Enough free hard disk space c. A minimum of 1 GB of RAM d. A UPS
b. Enough free hard disk space
43
You have just purchased a smartwatch to track your fitness statistics and health. To change the interface or update the firmware, you need to use an app on your smartphone. Which of the following connection technologies will you MOST likely use to communicate between your watch and the app? a. E Ink b. Bluetooth c. USB cable d. Wi-Fi
Bluetooth
44
Which of the following components allows a tablet to provide a screen interface that recognizes multiple finger touches at the same time? a. Capacitive touchscreen b. E Ink c.OLED display d. Bluetooth
a. Capacitive touchscreen
45
Which of the following protocols can encrypt emails on a mobile device? a. IMAP b. РОРЗ c. SMTP d. SSL
SSL
46
You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following technologies is being used in these phones? a. Bluetooth transmitters b. Near-Field Communication (NFC) chips c.Virtual Private Network (VPN) d.Fared transmitters
b. Near-Field Communication (NFC) chips
47
Which of the following are devices categorized as part of the Internet of Things (IoT)? (Select two.) a. Smartwatches b. Routers c. Tablets d. Laptops e. Medical sensors
Smartwatches e. Medical sensors
48
You are comparing methods for securing your mobile device. Which of the following is the BEST method to secure your device's storage? a. Remote backup applications b. Locator applications c.Full device encryption d. Biometric authentication
c.Full device encryption
49
Your laptop's LCD screen is beginning to flicker and dim. You have checked the brightness setting to make sure that it is configured correctly. Which of the following is the MOST likely cause of your screen issue? a. The LCD screen is failing. b. The system is configured to use an external display port. c. The LCD screen inverter is failing. d. The video ribbon cable to the screen is disconnected.
c. The LCD screen inverter is failing.
50
You are troubleshooting a malfunctioning laptop computer system. The customer has indicated that the screen is always dark and difficult to read, even while the system is plugged into a wall outlet. You checked the system and determined that the backlight isn't working. Which of the following is the MOST likely cause of this issue? a. The laptop battery is failing and needs to be replaced. b. The LCD cutoff switch is stuck in the Off position. c. The laptop video adapter is malfunctioning. d. The wrong AC adapter is being used with the system
b. The LCD cutoff switch is stuck in the Off position.
51
Which of the following are printer languages? (Select three.) Capture PostScript PrintDef Escape codes PCL Pascal
PostScript Escape codes PCL
52
Several employees have called you to complain about the default configuration settings on the network printer. One has asked to change the page orientation, another has wanted to change the collating setting, and another asked about duplexing. Which of the following print features would allow the employees to make the requested changes to their print jobs? a. Print server b. Print spooling c. Print queue d. Printer Properties
d. Printer Properties
53
Which of the following methods can be used to connect a printer to a network? (Select two.) Plug an Ethernet cable into the printer's network port. Plug a network cable into your printer's serial port. Connect your printer to an external print server device that is connected to the network. Plug a network cable into your printer's USB port. Plug a USB-to-Ethernet adapter into your printer's USB port.
Plug an Ethernet cable into the printer's network port. Connect your printer to an external print server device that is connected to the network.
54
In order to edit print server properties in Windows 11. Which section do you need to select from the settings menu? Accessibility Bluetooth and devices Bluetooth Network and internet
Bluetooth and devices
55
Your company needs to print a lot of high-quality back-and-white text documents. These documents need to be printed as quickly and inexpensively as possible. The printer must also have the capacity to perform duplex printing. Which of the following printers BEST meets your company’s printing requirements? Dot matrix Laser Thermal Inkjet
Laser
56
Inkjet printers are popular for small businesses because they provide good quality printouts. However, fuzzy lines can appear in artwork, or colored areas in images can sometimes start and stop before they should. Which of the following should you do when this happens? Calibrate the printer Clear the paper jam Replace the ink supply Clean the printhead
Calibrate the printer
57
Inkjet printers spray microscopic dots of ink with precise, controlled movement . Which of the following components carries the printhead back and forth during a print job? Carriage assembly Rubber rollers Duplexing assembly Stepper motor
Carriage assembly
58
Which of the following is the feed assembly on a thermal printer that is used to move the paper through the printer? Rubber platen Unwind spindle Stepper motor Paper feeder
Rubber platen
59
Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does NOT go away. What is the MOST likely problem? The fuser assembly is damaged. The photosensitive drum is wearing out. The paper is poor quality. The corona wire is dirty.
The corona wire is dirty.
60
Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does NOT go away. What is the MOST likely problem? The fuser assembly is damaged. The photosensitive drum is wearing out. The paper is poor quality. The corona wire is dirty.
The corona wire is dirty.
61
After removing the printed paper from your laser printer, the toner smudges and can be wiped off in places. Which of the following printer components is MOST likely causing the problem? Print drum Primary corona Secondary corona Fuser rollers
Fuser rollers
62
A customer who uses a Windows computer purchased an Inkjet printer from your store. He recently called to complain that the colors in the photos he prints on his new printer do not match the colors in the original photos. Which of the following actions will MOST likely resolve the issue? (Select 2) Download and install the latest printer drivers. Run the Windows FIXCOLR utility to automatically calibrate the driver's color settings. Educate the customer on the limitations of Inkjet printers. Use the Color Management tab of the printer driver to calibrate the driver's color settings. Use Driver Rollback to restore an earlier version of the printer driver.
Download and install the latest printer drivers. Use the Color Management tab of the printer driver to calibrate the driver's color settings.
63
You have an Inkjet printer attached to the laptop computer in your home office. With a document ready to print, you select the Print option from your word processor. Unfortunately, shortly after the job has started, the printer stops printing. You turn the printer off. Which of the following actions should you perform to fix the printer? Remove the jammed paper following its regular path. Remove the jammed paper by sending another file to the printer. Remove the jammed paper by restarting the printer, which automatically attempts to clear the paper jam. Remove the jammed paper from the way it entered
Remove the jammed paper following its regular path.
64
Which Windows feature can you use to encrypt a hard drive volume? NTFS - New Technology File System EFS - Encrypting File system \ Bitlocker to Go BitLocker
BitLocker
65
Which database encryption method can you use to encrypt data at rest? Transparent data encryption Trusted Platform Module Application-level encryption Column-level encryption
Transparent data encryption
66
As part of the response to a security incident on your company network, you have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up to the time of presentation in court. Which document has been asked to draft? CPS (Certificate Practice Statement) FIPS-140 Rules of evidence Chain of custody
Chain of custody
67
A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence? Shutting down the system Copying the contents of memory to removable media Restricting physical access to the system Disconnecting the system from the network
Shutting down the system
68
Which of the following door locks provides authentication to a specific lock over a Bluetooth connection? Standard Lock Smart Lock Biometric Key fob
Key fob
69
Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents? Switch Router Hub Bridge Gateway
Hub
70
22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01 gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svI-core-03.inet.ispxy.net [205.171.205.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.17 Which command produced this output?
Tracert
71
You are troubleshooting network connectivity issues on a workstation. Which command would you use to request new IP configuration information from a DHCP server? Net config Ipconfig /renew Ipconfig /all Net use
Ipconfig /renew
72
You have just installed a wireless network, but the network is experiencing slow speeds, especially when accessing the internet from your workstation. Which action should you try FIRST to resolve the issue Add a network extender Move the wireless access point Reset your wireless router to the factory defaults. Move your workstation closer to the wireless access point
Move the wireless access point
73
Which of the following is a common cause for high latency issues on a network? Port flapping - connect and disconnect frequently Limited connectivity A bad switch or router Malware
Port flapping - connect and disconnect frequently
74
Which of the following BEST describes authorization? The process of verifying a user's identity. The policy of allowing employees to use their own devices for work purposes. The resources that a user can access. The process of giving users access to only the resources they need.
The resources that a user can access.
75
Which of the following processes is used to prove a user's identity? Authentication Authorization Logical security Certificate Manager
Authentication
76
A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following BEST describes the type of attack that just occurred? Tailgating Vishing Phishing Eavesdropping
Vishing
77
You have been tasked with removing malware from an infected system. You have confirmed that there is an infection, and you continue running scans and removing the malware, but every time the system is rebooted, the malware comes back. Which of the following should you do to help prevent this from happening? Use a different anti-malware program Quarantine the system Boot into Safe Mode Disable Windows System Restore
Disable Windows System Restore