Practice 3 Flashcards

1
Q

Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?

WPS
WPA
WEP
WPA2

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of structure is IF THEN ELSE in scripting?

Loop
Variable
Constant
Branch

A

Branch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?

Notepad
MMC
Services
RegEdit

A

Notepad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What command is used on a Linux system to convert and copy files from one hard disk to another?

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. What tool should be used to allow both operating systems to exist on their MacBook Pro?

A

Boot Camp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following types of backup would require the MOST time to complete?

Full
Differential
Incremental
Synthetic

A

Full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A customer is complaining that there are intermittent problems with their PC. As a technician, you don’t know exactly what the errors are, so which tool should you use to determine what errors have previously occurred?

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What tool shows a log of application and system messages, including errors, information messages, and warnings?

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What tool is used to only monitor the activities on the CPU and memory on a computer?

A

Performance Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What utility gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues?

A

System Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following concepts is the MOST important for a company’s long-term health in the event of a disaster?

Vulnerability Scanning
Uninterruptible Power Supplies
Off-Site Backups
Implementing an acceptable use policy

A

Off-Site Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a placeholder in a script containing a number, character, or string of characters?

A

Variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DMZ

A

Demilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

aka Demilitarized Zone (DMZ)

A

Screened Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A perimeter network that protects an organization’s internal local area network from untrusted traffic

A

Screened Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your mother says there is something wrong with her computer, but unfortunately, she doesn’t know how to fix it. She asks if you can remotely connect to her computer and see if you can fix it. Which technology would BEST allow you to remotely access her computer and interact with her Windows 10 laptop?

A

RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the steps of the seven-step malware removal process?

A
  1. Investigate and verify malware symptoms
  2. Quarantine the infected systems
  3. Disable System Restore in Windows
  4. Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques
  5. Schedule Scans and Run Updates
  6. Enable System Restore and create a restore point in Windows
  7. Educate the end user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won’t open. What should you do?

A

Verify the digital certificate is installed on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How would you represent r-xrw-r– in octal notation?

A

564

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Convert these letter permissions to their octal form
R
W
X

A

R = 4
W = 2
X = 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Dion Training wants to upgrade its employees’ workstations from Windows 10 to Windows 11. All of the employees’ data and files are saved to the company’s shared drive. The technician has been told to choose an installation type that will delete all of the existing data, settings, and applications on the workstations during the upgrade. Which of the following types of upgrades or installations should you perform on the workstations?

Clean Install
Refresh Installation
Repair Installation
In-Place Upgrade

A

Clean Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An installation of a new operating system on a new computer or a computer that has been recently formatted

A

Clean Install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An installation of a new operating system on top of an existing version of the operating system. This will reserve the applications, user settings, and data files that already exist on the computer

A

In-Place Upgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A type of installation that will recopy the system files and revert most system settings to their default configuration while preserving user personalization settings, data files, and applications installed through the Windows Store

A

Refresh Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. This is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted.
Repair Installation
26
Joanne is having a drink at the coffee shop near her office. She takes out her Windows 10 laptop and connects it to the coffee shop’s wireless network to check her email. Which type of network should she select to hide their computer from other devices on the network and prevent file sharing with other patrons of the coffee shop?
Public
27
NFS
Network File System
28
Which file system type is used to mount remote storage devices on a Linux system?
Network File System (NFS)
29
APFS
Apple File System
30
A default file system for Mac computers using MacOS 10.13 or later.
Apple File System (APFS)
31
A file system optimized for external flash memory storage devices such as USB flash drives and SD drives
Extensible File Allocation Table (exFAT)
32
exFAT
Extensible File Allocation Table
33
Which file system supports a maximum volume size of up to 128 PB with a recommended maximum volume size of 512 TB for the best reliability?
Extensible File Allocation Table (exFAT)
34
NTFS
New Technology File System
35
A Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas
New Technology File System (NTFS)
36
A file system that can support a maximum volume size of up to 8 PB
New Technology File System (NTFS)
37
UPS
Uninterruptible Power Supply
38
An electrical apparatus that provides emergency power to a load when the input power source becomes too low or the main power fails.
Uninterruptible Power Supply (UPS)
39
GPT
Globally Unique Identification Partition Table
40
A modern disk partitioning system allowing large number of partitions and very large partition sizes
Globally Unique Identification Partition Table
41
A partitioning system that can support a maximum capacity of up to 9.7 ZB and up to 128 partitions
Globally Unique Identification Partition Table
42
ISO
Optical Disc Image
43
A disk image that contains everything that would be written to an optical disc.
ISO (Optical Disc Image)
44
A file system supported by Windows, macOS, and Linux computers that supports a maximum volume size of up to 2 TB and maximum file sizes of up to 4 GB
FAT32
45
Allows the bug driver to suspend an individual port without affecting the operation of the other ports on the hub
USB selective suspend
46
Used to save the current session to memory and put the computer into a minimal power state to save battery life when the system is not being used
Sleep/Standby mode
47
A mode between full shutdown and a hibernation mode
Fast Startup
48
Which of the following Control Panel options should a technician configure to automatically adjust the volume of different sounds when the computer is being used to place or receive telephone calls? Ease of Access Sound Program and Features USB selective suspent
Sound
49
Which section of the control panel brings together the functionality for the accessibility features in Windows?
Ease of Access
50
Which command-line tool could you use on a Windows system to enable an inactive administrator account?
Net User
51
Which command allows system administrators to manage user accounts on Windows PCs?
Net User
52
Which tool is used to mirror or synchronize directories and their contents?
Robocopy
53
Which command is used to end one or more tasks or processes on a Windows system?
Taskkill
54
RSoP
Resultant Set of Policy
55
PID
Process ID
56
Which command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer?
gpresult
57
Allows you to discover what policy settings are applied to local and remote commuters?
Resultant Set of Policy (RSoP)
58
What is used to communicate data and preferences to child processes within a script or batch file?
Environmental Variables
59
A process created by another process
Child Process
60
Which Linux command displays the present working directory oath to the terminal or display?
pwd
61
Which command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line?
SFC (System File Checker)
62
SFC
System File Checker
63
Which Windows command is used to check the file system and file system metadata of a volume for logical and physical errors?
chkdsk
64
Which of the following file types are commonly used to create applications that can run on Linux, macOS, and Windows? .ps1 .py .vbs .sh
.py
65
Which file type is used for a shell script?
.sh
66
This type of files first line always begins with #!/bin/bash
.sh (Shell Script)
67
A scripting language based on Microsoft's Visual Basic programming language
VBScript
68
What enables you to perform management and administrative tasks in Windows 7 and later?
Windows PowerShell
69
Which file type is used for PowerShell?
.ps1
70
Which file type is used for VBScript?
.vbs
71
What is used to configure the method used by Windows when searching for content within the storage devices?
Indexing Options
72
Your home network is configured with a long, strong, and complex pre-shared key for its WPA3 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the proper WPA3 password? Enable WEP Disable WPA3 Disable WPS Disable SSID broadcast
Disable WPS
73
Which macOS feature is the equivalent of the Taskbar in Windows?
Dock
74
Which Windows command is used to view, create, delete, and modify a computer's disk partitions?
diskpart
75
A Linux command that is used to copy and convert raw data from one source to another
dd
76
What message appears when a computer detects that the wireless network is present and operating, but the system cannot connect to the internet?
Limited or no connectivity
77
Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall's ACL to see if the server's outgoing email is being blocked. Which port should you ensure is open and not blocked by the firewall?
25 (Simple Mail Transfer Protocol)
78
Any technique used to prevent a user from being overwhelmed with spam or junk email is referred to as ______
Email Filtering
79
All emails from a specific URL could be blocked and prevented from being delivered to the user by creating what type of email filter?
Domain-Based
80
This occurs when someone takes over your email account and sends out messages on your behalf
Hijacked Emails
81
An email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
Phishing
82
The fraudulent practice of sending emails from a seemingly known or trusted sender to induce TARGETED individuals to reveal confidential information
Spear Phishing
83
A social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based VoIP services.
Vishing
84
While troubleshooting the reason that the File Explorer is crashing on a Windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this? gpuupdate dxdiag regedit sfc
sfc (System File Checker)
85
A command-line utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line
sfc (System File Checker)
86
This command-line allows you to view and make changes to system files and programs that you wouldn't be able to access otherwise.
RegEdit (Registry Editor)
87
A database made up of hives and keys that control various settings on a Window system
Registry
88
A command-line that is used to update the group policy settings on a Windows system
gpuupdate
89
A utility that is used to collect info about devices to help troubleshoot problems with DirectX sound and Video.
dxdiag (DirectX Diagnostic)
90
This attack mimics a legitimate hotspot provided by a nearby business, such as a coffee shop that provides free Wi-Fi access to its patrons
Evil Twin
91
An access point installed on a network without the network owner's permission
Rogue Access Point
92
An attack that is a brute force password attack conducted against a wireless network that relies on WEP for its encryption and security
WEP attack
93
A type of social engineering technique used to obtain information such as personal identification numbers, passwords, and other confidential data by looking over the victim's shoulder
Shoulder Surfing
94
You are troubleshooting a network connectivity issue and need to determine the packet's flow path from your system to the remote server. Which of the following tools would best help you identify the path between the two systems? ipconfig netstat nbtstat tracert
tracert
95
A diagnostic utility that determines the route to a destination by sending Internet Control Message Protocol (ICMP) echo achets to the destination
tracert
96
A tool that displays all current TCP/IP network configuration values on a given system
ipconfig
97
A command-line network utility that displays network connections for Transmission Control Protocol, routing tables, and some network interface and network protocol statistics on a single system
netstat
98
a command used to troubleshot NetBIOS name resolution problems
nbtstat
99
You have just completed a repair for a customer's smartphone that took you three days. The customer complained that the repair took too long and began to question you about the steps you took to repair the device. What should you do NEXT?
Provide documentation of the repair to the customer and thank them for their patience
100
What are the five key principles for dealing with a difficult customer?
1. Do not argue with customers and/or become defensive 2. Avoid dismissing customer problems 3. Avoid being judgmental 4. Clarify customer statements 5. Do not disclose experiences via social media outlets
101
Your Android device's battery is advertised to last 12 hours, but it drains almost completely within 90 minutes. What should you do FIRST to try and solve this problem?
Check which apps are using the most battery life
102
Which command would a Linux user need to enter to change their password?
passwd
103
A command used to change the owner of the file, directory, or link in Linux
chown
104
A command used to display the preset working directory path on the terminal or display
pwd
105
A command used to list the currently running processes
ps
106
This attack intercepts communications between two systems
On-Path Attack
107
A code injection technique used to attack data-driven applications
SQL Injection
108
SQL
Structured Query Language
109
A type of cyber attack carried out over a Local Area Network that involves sending malicious ARP packets to a default gateway on a LAN to change the pairings in its IP to MAC address table
ARP Poisoning
110
ARP
Address Resolution Protocol
111
A layer 2 protocol used to map MAC addresses to IP addresses
Address Resolution Protocol (ARP)
112
Attacks that are a type of injection in which malicious scripts are injected into otherwise benign and trusted websites
Cross-Site Scripting
113
XSS
Cross-Site Scripting
114
What is the minimum processor(s) required to install Windows 10 (x64) on a device?
1 GHz single-core processor
115
Which of the following contains virtual memory that can supplement the physical system memory in a Linux system? ext4 NFS Swap Partition ext3
Swap Partition
116
A portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it
Swap Partition
117
Journaled file system commonly used by the Linux kernel that can support a maximum volume size of up to32 TB
ext3 (third extended filesystem)
118
Journaled file system commonly used by the Linux kernel that is used natively by modern Linux operating systems.
ext4 (fourth extended filesystem)
119
Journaled file system commonly used by the Linux kernel that can support a maximum volume size of up to 1 EB
ext4 (fourth extended filesystem)
120
This is used to mount remote storage devices into the local file system on a Linux system. It allows you to mount your local file systems over a network and remote hosts to interact with them while mounted locally on the same system
NFS (network file system)
121
What is an administrator performing when he changed everything back to the last known good configuration before a change is started?
Rollback
122
The built-in backup feature of the macOS operating system that automatically backs up all of the system's files, including apps, music, photos, email, documents, and system files.
Time Machine
123
What is used to backup virtual machines by creating a state of the disk at a particular point in time?
Snapshot
124
A Windows feature that creates configuration backups of the operating system
System Restore
125
A macOS app for managing passwords cached by the PS and supported browser/web applications.
Keychain
126
Which of the following file types are commonly used by scripts in a Linux command line environment? .sh .js .ps1 .vbs
.sh
127
What type of language are C# and ASP.NET
Compiled Languages
128
What is .PHP used for?
for scripting web applications
129
This involves searching through publicly accessible garbage cans or recycling bins to find discarded paper, manuals, or other valuable types of information from a targeted company
Dumpster Diving
130
A email-based or web-based form of phishing that targets senior executives or wealthy individuals
Whaling
131
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. What should you do FIRST to attempt to solve this problem?
Reinstall the email app
132
This refers to a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule
Explicit allow
133
This refers to a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it
Implicit allow
134
Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 workstations. When connected to a private network, the firewall has been configured to only allow inbound connections that match an existing rule and to only allow outbound connections that do not match any existing rules. What type of security posture has Dion Training implemented?
Explicit allow for inbound, implicit allow for outbound
135
Which of the following data types would be used to store the value of TRUE? Floating point Integers String Boolean
Boolean
136
What stores a fraction or decimal number such as 34.11?
Floating-point
137
What stores a group of characters, such as Hello, PYTHON, or IzaakJeffers?
String
138
When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are abysmal, and the browser creates numerous pop-ups. Jonathan asks for your assistance in fixing this issue. Which TWO of the following actions do you recommend Jonathan perform first?
Uncheck any unapproved applications from the Startup tab in the Task Manager Reset the web browser to the default settings and configuration
139
You are helping to set up a backup plan for your organization. The current plan states that all of the organization's Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. What do you recommend?
Attempt to restore to a test server from one of the backup files to verify them
140
A technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities
Dictionary Attack
141
A cybersecurity analyst is applying for a new job with a penetration testing firm. He received the job application as a secured Adobe PDF file, but unfortunately, the firm locked the file with a password so the potential employee could not fill in the application. Instead of asking for an unlocked copy of the document, the analyst decides to write a script in Python to attempt to unlock the PDF file by using passwords from a list of commonly used passwords until he can find the correct password or attempts every password in his list. Based on this description, what kind of cryptographic attack did the analyst perform?
Dictionary Attack
142
A workstation at Dion Training's office is taking a long time to boot up. Once it finishes booting to the Windows 10 desktop, which of the following tools can a technician use to diagnose and fix the boot issues? resmon.exe msconfig.exe perfmon.msc msinfo32.exe
msconfig.exe
143
This is used to disable or re-enable software, device drivers, and Windows services that run at startup, and changes boot parameters
MSConfig
144
A performance monitoring and system monitoring utility in Windows that is used to monitor the activities on CPU and memory activity on a computer
Perfmon
145
A utility used to display information about the use of hardware and software resources in real-time
Resmon (Resource monitor)
146
A utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues
msinfo32 (System Information)
147
A file currently has permissions of 755. Which command would change file permission to r-xr--r--?
chmod 544 filename
148
Which command is used to change a file or directory's permission from the command line or terminal?
chmod
149
You are working as a military defense contractor and have been asked to dispose of 5 laptop hard drives used in systems that processed classified information. Which of the following physical data destruction and disposal methods is MOST appropriate to ensure the data cannot be recovered? Low-level formatting the HDDs Standard formatting the HDDs Degaussing of the HHDs Drill/Hammer the HDD platters
Degaussing of the HDDs
150
Which of the following tools is used to duplicate all of the files in one directory to another in the Windows command line? dir format xcopy netstat
xcopy
151
What windows command is ued to display the disk's volume label and serial number, followed by a list of directories and files on the disk?
dir
152
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. What should should you do FIRST to attempt to solve this problem?
Since this issue is occurring on multiple devices with the same model, it would be best to first update the smartphone's OS
153
Which encryption type was used by WPA to better secure wireless networks than WEP?
TKIP (Temporal Key Integrity Protocol)
154
WPA2 uses what cipher?
AES
155
What are the four forms or regulated data?
PII (Personally Identifiable Information) PCI (Payment Card Industry) GDPR (General Data Protection Regulation) PHI (Protected Health Information)
156
Data used to identify, contact, or locate an individual
PII (Personally Identifiable Information)
157
A document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet
Acceptable Use Policy (AUP)
158
AUP
Acceptable Use Policy
159
DRM
Digital Rights Management
160
A copyright protection technology for digital media
Digital Rights Management (DRM)
161
DMCA
Digital Millennium Copyright Act
162
A 1998 United Stats copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted work
Digital Millennium Copyright Act (DMCA)
163
A set of rules created t improve computer security by motivating users to create dependable, secure passwords and then store and utilize them properly
Password Policy
164
A document that defines how organizations can share and protect data
Data Loss Prevention Policy
165
A document that outlines and defines acceptable methods of remotely connecting the the internal network
Remote Access Policy
166
A scripting language that is designed to create interactive web-based content and web apps
JavaScript (.js)
167
GPO
Group Policy Object
168
A collection of Group Policy settings that defines what a system will look like and how it will behave for a defines group of users
Group Policy Objects (GPO)
169
HIDS
Host-based Intrusion Detection System
170
A device or software application that monitors a system for malicious activity or policy violations
HIPS (Host-based Intrusion Detection System)
171
The process of distributing and applying updates to the software to prevent vulnerabilities from being exploited by an attacker or malware.
Patch Management
172
Jason has built a custom Android application that he wants to install on an Android tablet without having to install it through the Play Store. What would be required to allow him to install the app's APK on the device?
Sideloading
173
Which of the following Windows tools can a technician use to display information about the performance of hardware and software resources in real-time? resmon.exe dxdiag.exe devmgmt.,sc msinfo.exe
resmon.exe
174
You run the command ipconfig on your laptop and see that you have been assigned an IP address of 169.254.0.56. Which category of IPv4 address is this? APIPA Static Private Public
APIPA
175
A user contacts the help desk and complains they are getting an error when they attempt to open a 4 GB .dmg file on their Windows 10 workstation. Which of the following should you tell them? "You need to use macOS to open DMG files" "You must be an administrator to open that file" "Your hard drive must not have enough space" "Your workstation needs to have 16 GB of RAM to open the file"
"You need to use macOS to open DMG files"
176
Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company's owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donating them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend? Wiping Purging Degaussing Shredding
Wiping