Practice 4 Flashcards
A small business network was recently infected by a piece of malware from a USB drive that copied sensitive data from a computer, infected the system, and then spread across the network by infecting other systems. Which of the following actions could have prevented this type of attack from occurring?
Disabling AutoRun on the computer
Enforcing the use of complex passwords
Enabling full disk data encryption
Replacing the default credentials on the system
Disabling AutoRun on the computer
Which of the following types of screen locks uses a secret PIN or password to prevent access to a mobile device?
TouchID
Passcode
Swipe
DaceID
Passcode
During a disaster recovery, which of the following statements is true?
A virtual machine cannot be used for redundancy or load balancing
A virtual machine has less downtime than a physical server
A virtual machine has more downtime than a physical server
A virtual machine and a physical server have the same downtime
A virtual machine has less downtime than a physical server
A technician at Dion Training wants to identify which version and build of Windows 10 is installed on a laptop. Which of the following commands should the technician enter at the command line?
gpresult
winver
net user
pathping
winver
Joseph contacted the service desk because his Windows 10 desktop is acting strangely. He cannot use his mouse, speakers, or printer connected to his workstation by USB. Yesterday, everything worked normally. He attempted to reboot the computer to fix the issue, but it remains. Which of the following actions should be performed NEXT?
Disable System Restore in Windows
Rollback the printer’s device driver in the Device Manager
Rollback any system updates or changes since yesterday
Disable the Windows Update service to prevent future issues
Rollback any system updates or changes since yesterday
Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues began to occur and remember that each time it happened the lights also dimmed momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router’s power cycling. What should you (a network technician) do to solve this problem?
Install a surge protector
Install a UPS
Install a new electrical outlet
Install an upgraded router
Install a UPS
Which of the following should you use to fix an issue with a graphics card’s drivers in Windows 10?
Event Viewer
System
Devices and Printers
Device Manager
Device Manager
A user is attempting to pay for their morning coffee using Apple Pay on their iPhone. The user quickly taps their phone against the payment terminal, but it fails to process. Which of the following should the user do to properly use NFC for payment?
Turn on airplane mode and then try again
Hold the phone 5 inches above the payment terminal
Hold the phone on the payment terminal for at least 3 seconds
Manually select a card from you Apple Wallet and try again
Hold the phone on the payment terminal for at least 3 seconds
Manually select a card from you Apple Wallet and try again
The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?
WPA2 Enterprise
MAC filtering
WPA personal
WEP
WPA Personal
What is the maximum amount of memory used in a 32-bit version of the Windows operating system?
2 GB
4 GB
8 GB
1 GB
4 GB
Which of the following Windows tools should a technician use to import and install data in the x.509 format?
Device Manager
Group Policy Editor
RDS
Certificate Manager
Certificate Manager
You are applying for a job at a cybersecurity firm. The application requests you enter your social security number, date of birth, and email address to conduct a background check as part of the hiring process. Which of the following types of information have you been asked to provide?
CUI
PII
PHI
IP
PII
Which of the following is required for evidence to be admissible in a court of law?
Right to audit
Order of volatility
Chain of custody
Legal hold
Chain of Custody
A user has asked you for a recommendation for a word processing program for their home computer. The user doesn’t want to pay for a license to be able to use the word processor. Based on this, what type of license would you recommend to the user?
Enterprise license
Personal license
Corporate license
Open license
Open License
Dion Training is creating a new security policy that states all access to system resources will be controlled based on the user’s job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following policies or security practices is BEST described by this new policy?
Job Rotation
Separation of duties
Least privilege
Mandatory Vacation
Least Privilege
Marta’s organization is concerned with the vulnerability of a user’s account being vulnerable for an extended period of time if their password was compromised. Which of the following controls should be configured as part of their password policy to minimize this vulnerability?
Minimum Password Length
Password History
Password Expiration
Password Complexity
Password Expiration
Which of the following commands is used to edit a text file on a Linux server?
cat
nano
pwd
grep
nano
Which of the following types of remote access technologies should NOT be used in a network due to its lack of security?
Telnet
RDP
WPN
SSH
Telnet
Your Windows 10 system is booting up very slowly. Which of the following should you do to speed up the boot process?
Disable unnecessary programs from automatically starting up
Reboot the system into safemode
Rebuild your Windows profile
Reinstall Windows
Disable unnecessary programs from automatically starting up
D
Which command-line tool in Windows would you use to end one or more processes that have begun hung on the system?
net use
taskkill
sfc
gpupdate
taskkill
You noticed that your personal files in your Dropbox had been accessed while you were sleeping. Which of the following threats is this an example of?
Unauthorized microphone activation
Unauthorized Account access
Unauthorized Bluetooth pairing
Unauthorized location tracking
Unauthorized Account access
You need to determine the best way to test operating system patches in a lab environment before deploying them to your automated patch management system. Unfortunately, your network has several different operating systems in use, but you only have one machine available to test the patches on. What is the best environment to utilize to perform the testing of the patches before deployment?
Purchase additional workstations
Virtualization
Bypass testing and deploying patches directly into the production environment
Sandboxing
Virtualization
Judith is installing Windows 10 (64-bit) in a virtual machine on her macOS laptop. The installation is continually failing and producing an error. Judith has configured the virtual machine with a dual-core 1 GHz processor, 2 GB of memory, a 15 GB hard drive, and a 1024x768 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?
Amount of hard drive space
The screen resolution
Number of CPU cores
Amount of memory
Amount of hard drive space