Practice 4 Flashcards

1
Q

A small business network was recently infected by a piece of malware from a USB drive that copied sensitive data from a computer, infected the system, and then spread across the network by infecting other systems. Which of the following actions could have prevented this type of attack from occurring?

Disabling AutoRun on the computer
Enforcing the use of complex passwords
Enabling full disk data encryption
Replacing the default credentials on the system

A

Disabling AutoRun on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following types of screen locks uses a secret PIN or password to prevent access to a mobile device?

TouchID
Passcode
Swipe
DaceID

A

Passcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

During a disaster recovery, which of the following statements is true?

A virtual machine cannot be used for redundancy or load balancing
A virtual machine has less downtime than a physical server
A virtual machine has more downtime than a physical server
A virtual machine and a physical server have the same downtime

A

A virtual machine has less downtime than a physical server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician at Dion Training wants to identify which version and build of Windows 10 is installed on a laptop. Which of the following commands should the technician enter at the command line?

gpresult
winver
net user
pathping

A

winver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Joseph contacted the service desk because his Windows 10 desktop is acting strangely. He cannot use his mouse, speakers, or printer connected to his workstation by USB. Yesterday, everything worked normally. He attempted to reboot the computer to fix the issue, but it remains. Which of the following actions should be performed NEXT?

Disable System Restore in Windows
Rollback the printer’s device driver in the Device Manager
Rollback any system updates or changes since yesterday
Disable the Windows Update service to prevent future issues

A

Rollback any system updates or changes since yesterday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues began to occur and remember that each time it happened the lights also dimmed momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router’s power cycling. What should you (a network technician) do to solve this problem?

Install a surge protector
Install a UPS
Install a new electrical outlet
Install an upgraded router

A

Install a UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following should you use to fix an issue with a graphics card’s drivers in Windows 10?

Event Viewer
System
Devices and Printers
Device Manager

A

Device Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user is attempting to pay for their morning coffee using Apple Pay on their iPhone. The user quickly taps their phone against the payment terminal, but it fails to process. Which of the following should the user do to properly use NFC for payment?

Turn on airplane mode and then try again
Hold the phone 5 inches above the payment terminal
Hold the phone on the payment terminal for at least 3 seconds
Manually select a card from you Apple Wallet and try again

A

Hold the phone on the payment terminal for at least 3 seconds

Manually select a card from you Apple Wallet and try again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?

WPA2 Enterprise
MAC filtering
WPA personal
WEP

A

WPA Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the maximum amount of memory used in a 32-bit version of the Windows operating system?

2 GB
4 GB
8 GB
1 GB

A

4 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following Windows tools should a technician use to import and install data in the x.509 format?

Device Manager
Group Policy Editor
RDS
Certificate Manager

A

Certificate Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are applying for a job at a cybersecurity firm. The application requests you enter your social security number, date of birth, and email address to conduct a background check as part of the hiring process. Which of the following types of information have you been asked to provide?

CUI
PII
PHI
IP

A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is required for evidence to be admissible in a court of law?

Right to audit
Order of volatility
Chain of custody
Legal hold

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user has asked you for a recommendation for a word processing program for their home computer. The user doesn’t want to pay for a license to be able to use the word processor. Based on this, what type of license would you recommend to the user?

Enterprise license
Personal license
Corporate license
Open license

A

Open License

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dion Training is creating a new security policy that states all access to system resources will be controlled based on the user’s job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following policies or security practices is BEST described by this new policy?

Job Rotation
Separation of duties
Least privilege
Mandatory Vacation

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Marta’s organization is concerned with the vulnerability of a user’s account being vulnerable for an extended period of time if their password was compromised. Which of the following controls should be configured as part of their password policy to minimize this vulnerability?

Minimum Password Length
Password History
Password Expiration
Password Complexity

A

Password Expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following commands is used to edit a text file on a Linux server?

cat
nano
pwd
grep

A

nano

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following types of remote access technologies should NOT be used in a network due to its lack of security?

Telnet
RDP
WPN
SSH

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Your Windows 10 system is booting up very slowly. Which of the following should you do to speed up the boot process?

Disable unnecessary programs from automatically starting up
Reboot the system into safemode
Rebuild your Windows profile
Reinstall Windows

A

Disable unnecessary programs from automatically starting up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which command-line tool in Windows would you use to end one or more processes that have begun hung on the system?

net use
taskkill
sfc
gpupdate

A

taskkill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You noticed that your personal files in your Dropbox had been accessed while you were sleeping. Which of the following threats is this an example of?

Unauthorized microphone activation
Unauthorized Account access
Unauthorized Bluetooth pairing
Unauthorized location tracking

A

Unauthorized Account access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You need to determine the best way to test operating system patches in a lab environment before deploying them to your automated patch management system. Unfortunately, your network has several different operating systems in use, but you only have one machine available to test the patches on. What is the best environment to utilize to perform the testing of the patches before deployment?

Purchase additional workstations
Virtualization
Bypass testing and deploying patches directly into the production environment
Sandboxing

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Judith is installing Windows 10 (64-bit) in a virtual machine on her macOS laptop. The installation is continually failing and producing an error. Judith has configured the virtual machine with a dual-core 1 GHz processor, 2 GB of memory, a 15 GB hard drive, and a 1024x768 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

Amount of hard drive space
The screen resolution
Number of CPU cores
Amount of memory

A

Amount of hard drive space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which command-line tool is used on a Windows system to display a list of the files and directories within the current directory or path? ls chkdsk dir sfc
dir
26
You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their own SOHO wireless router to that same switch port. Which of the following security features would BEST accomplish this goal? Firewall Login script Port security Single sign-on
Port Security
27
A technician is trying to locate a protected .dll file to edit, but they cannot see it in the System32 folder. Which Control Panel utility should the technician use to find the file? System File Explorer Options Programs and Features Indexing Options
File Explorer Options
28
Jason checks the Dion Training server room and finds that it currently has over 80% humidity. Which of the following risks to the servers could occur due to this high humidity level? An over-voltage event An under-voltage event Accidental static discharge Corrosion of the servers
Corrosion of the servers
29
You have just installed a second monitor for a salesperson's workstation. The user wants to clone the display so that both monitors show the exact same image. This will allow them to see one of the displays while their customer sees the other from across their desk. When you connect the second monitor and clone the display, the second monitor displays text twice as large as the other monitor. Which of the following settings should you configure? Extended mode Resolution Refresh Rate Color Depth
Resolution
30
You are configuring a wireless access point (WAP) in a large apartment building for a home user. The home user is concerned that their neighbor may try to connect to their Wi-Fi and wants to prevent it. Which TWO of the following actions should you perform to increase the wireless network's security? Reduce the transmission power Disable the DHCP server Reduce the channel availability Enable WPA3 encryption Enable WEP encryption Disable the SSID broadcast
Reduce the transmission power Enable WPA3 encryption
31
Your supervisor has requested remote access to a particular server to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do before granting remote access to the server to your supervisor? - Install the latest security patches and updates to the server - Educate your supervisor on safe internet browsing techniques - Set the server's anti-virus software to automatically update itself and perform a full scan every Saturday night - Disable internet access from the server outside of normal business hours
Install the latest security patches and updates to the server
32
A user's workstation is opening up browser windows without any action from the user. A technician attempts to troubleshoot the workstation, but the machine is extremely slow when in use. Which of the following actions should the technician perform? Enable the pop-up blocker in the web browser Update the Windows operating system Perform an anti-malware scan of the workstation Format and reinstall the operating system
Perform an anti-malware scan of the workstation
33
You are working for a brand new startup company that allows you to use your laptop, tablet, or other devices while at work. The company does provide some rules and guidelines that you must follow based on their policy. Which of the following policies should you look at to ensure you understand these rules and guidelines? SLA MOU NDA BYOD
BYOD
34
A user's computer was running out of storage space, so they decided to install a new second 1 TB hard disk drive (HDD) into their Windows 10 computer. Whenever they attempt to boot up the computer, an error of "No Operating System Found" is displayed on their screen. You unplugged the new 1 TB HDD, and then the computer boots up without any errors. You have just reconnected the 1 TB HDD. What step should you attempt NEXT to fix this issue? Verify the boot order in the BIOS/UEFI Format the 1 TB HDD Reboot the computer into safe mode Reinstall to the 1 TB HDD
Verify the boot order in the BIOS/UEFI
35
A user has reported that their workstation is running very slowly. A technician begins to investigate the issue and notices a lot of unknown processes running in the background. The technician determines that the user has recently downloaded a new application from the internet and may have become infected with malware. Which of the following types of infections does the workstation MOST likely have? Trojan Ransomware Rootkit Keylogger
Trojan
36
A user reports that every time they try to access https://www.diontraining.com, they receive an error stating "Invalid or Expired Security Certificate." The technician attempts to connect to the same site from other computers on the network, and no errors or issues are observed. Which of the following settings needs to be changed on the user's workstation to fix the "Invalid or Expired Security Certificate" error? UEFI boot mode Logon times Data and time User access control
Date and Time
37
Which of the following will close all of a user's open programs and services before powering off their Windows 10 computer? Shutdown Lock Sleep Hibernate
Shutdown
38
You are cleaning out the closet in your office and find several bottles of cleaner that need to be disposed of. Which of the following should you consult to determine the proper method of disposal? SOW MOU UPS MSDS
MSDS (Material Safety Data Sheet)
39
You are concerned that your servers could be damaged during a power failure or under-voltage event. Which TWO devices would protect against these conditions? Battery backup Grounding the server rack Surge suppressor Line conditioner
Battery Backup Line Conditioner
40
Which of the following Control Panel sections would allow a technician to see which version and build of Windows 10 is installed on a computer? Programs and Features Device Manager Devices and Printers System
System
41
Which of the following could be used to meet regulatory compliance requirements associated with the monitoring of employee actions on their work computer by providing a customizable dialog box with a textual warning to the user before they log in to their Windows 10 workstation? Change request form Splash Screen Request Form Chain of custody
Splash Screen
42
Which of the following commands would a technician use to find the comprehensive documentation for any command from the Linux terminal? grep apt-get man yum
man
43
A user contacts the service desk after they just finished attempting to upgrade their laptop to Windows 10. The upgrade failed, and the user asks you to explain why. Which of the following log files should you review to determine the cause of the upgrade failure? Security Log Application Log System Log Setup
Setup
44
Dion Consulting Group has been hired by a large security operations center (SOC) to build a Windows 2019 domain environment. The SOC has a total of 150 Windows 10 Professional edition workstations that will connect to the domain for authentication, administration, and access to networked resources. Which of the following types of network models is being used by this security operations center in the domain environment? Peer-to-peer Mesh Hub-and-Spoke Client/Server
Client/Server
45
Your company's wireless network was recently compromised by an attacker who utilized a brute force attack against the network's PIN to gain access. Once connected to the network, the attacker modified the DNS settings on the router and spread additional malware across the entire network. Which TWO of the following configurations were most likely used to allow the attack to occur? Guest Network Enabled Router with outdated firmware WPA2 Encryption TKIP encryption protocols WPS enabled Default administrative login credentials
WPS enabled Default administrative login credentials
46
Which of the following commands is used on a Linux system to edit a text file on a server? pwd vi chown ps
vi
47
A user's workstation is running slowly and cannot open some larger program files. The user complains that they often get a warning that states memory is running low on their Windows 10 workstation. Which of the following should you configure until more memory can be installed to help alleviate this problem? Disable the visual effects Increase the pagefile size Defragment the hard disk Enable the swap file
Increase the pagefile size
48
Which of the following commands is used to display the amount of disk space available on the file system in Linux? df cat pwd ls
df
49
A user contacts the service desk and states that Microsoft Excel crashed while they were in the middle of updating their spreadsheet. Which of the following log files should you review to determine the cause of the crash? System log Security log Setup Application log
Application Log
50
A coworker is creating a file containing a script. You look over their shoulder and see "net use s:\\fileserver\videos" in the file. Based on this, what type of file extension should this script use? .bat .py .js .vbs
.bat
51
Which of the following commands can a technician use on a Linux server to verify the IP address associated with diontraining.com? grep netstat dig apt-get
dig
52
You were troubleshooting a recently installed NIC on a workstation and decided to ping the NIC's loopback address. Which of the following IPv4 addresses should you ping? 10.0.0.1 127.0.0.1 192.168.1.1 172.16.1.1
127.0.0.1
53
Dion Training has an open wireless network so that their students can connect to the network during class without logging in. The Dion Training security team is worried that the customers from the coffee shop next door may be connecting to the wireless network without permission. If Dion Training wants to keep the wireless network open for students but prevents the coffee shop's customers from using it, which of the following should be changed or modified? Default SSID MAC filtering Signal Strength or Power Level Firewall
Signal Strength or Power Level
54
A user's workstation is infected with malware. You have quarantined it from the network. When you attempt to boot it to the Windows 10 desktop, it fails. Which of the following should you do NEXT to begin remediating this system? Disable System Restore and reinstall Windows 10 Restore the workstation from the last system restore point Format the workstation and reinstall Windows 10 Restart into Safe Mode and conduct an antivirus scan
Restart into Safe Mode and conduct an antivirus scan
55
Dion Training has several Windows 10 Professional workstations with an internal 2 TB hard disk drive. The company wants to use full disk encryption to protect the contents of this hard drive. Which of the following security settings can be used to encrypt this storage device? FileVault BitLocker Encryption File System BitLocker to Go
Bitlocker
56
Sam and Mary both work in the accounting department and use a web-based SaaS product as part of their job. Sam cannot log in to the website using his credentials from his computer, but Mary can log in with her credentials on her computer. Sam asks Mary to login into her account from his computer to see if the problem is with his account or computer. When Mary attempts to log in to Sam's computer, she receives an error. Mary noticed a pop-up notification about a new piece of software on Sam's computer when she attempted to log in to the website. Which TWO of the following steps should Mary take to resolve the issue with logging in from Sam's computer? Have Sam attempt to log on to another website from Sam's computer to see if it works Have Sam clear his browser cache on his computer and then attempt to log on to the website again Install a new web browser, reboot Sam's computer, and attempt to log on to the website again from Sam's computer Ask Sam about the pop-up notification and determine what new programs he installed on his computer Verify Sam's computer has the correct web browser configuration and settings Ask Sam for his username/password to log on to the website from Mary's computer
Ask Sam about the pop-up notification and determine what new programs he installed on his computer Verify Sam's computer has the correct web browser configuration and settings
57
Which of the following types of installations would you use on a system with slow performance or one that you cannot isolate a single cause of the system's issues? Remote network installation Image deployment Repair installation In-place upgrade
Repair Installation
58
Dion Training uses a patch management server to control the distribution and installation of security patches. A technician needs to configure a new Windows 10 workstation to not perform Windows Updates automatically. Which of the following features in the Task Manager should the technician use to disable the Windows Update service? Performance Processes Startup Services
Services
59
What does the command "shutdown /r" do on a Windows workstation? Enter sleep mode Reboot the workstation Log off the workstation Shutdown the workstation
Reboot the workstation
60
Your companies share drive has several folders that have become encrypted by a piece of ransomware. During your investigation, you found that only the Sales department folders were encrypted. You continue your investigation and find that a salesperson's workstation was also encrypted. You suspect that this workstation was the original source of the infection. Since it was connected to the Sales department share drive as a mapped S:\ drive, it was also encrypted. You have unplugged the network cable from this workstation. What action should you perform NEXT to restore the company's network to normal operation? Schedule weekly scans and enable on-access scanning Disable System Restore on the workstation Restore the Sales department folders from backups Schedule a full disk anti-malware scan on the workstation
Restore the Sales department folders from backups
61
One of your Windows services is failing to start when you boot up your laptop. You have checked the service in the Windows Services tool and verified it is set to Automatic. What should you attempt to do NEXT to get the service to startup? Restore the backup Update the operating system Run chkdsk on the system Reboot into Safe Mode and see if the service starts
Reboot into Safe Mode and see if the service starts
62
Tim connects his Windows 10 laptop to his office’s wireless network to print out a report for his boss. Which type of network should he select to discover the printer on the office’s wireless network? Home Work Public Private
Private
63
A system administrator has noticed that an employee's account has been attempting to log in to multiple workstations and servers across the network. This employee does not have access to these systems, and the login attempts are unsuccessful. Which of the following actions should the administrator do to this employee's account in Active Directory? Delete the user's account Reset the password of the user's account Lock the user's account Disable the user's account
Disable the user's account (System Administrators cannot lock an account)
64
Which of the following is the purpose of an ESD mat? Protects the technician from accidental shocks Protects equipment from dust or dirt Protects casings from scratches and dents Protects equipment against accidental static discharge
Protects equipment against accidental static discharge
65
Which of the following commands is used on a Linux system to terminate an unresponsive system process? grep ls ps kill
kill
66
Tony works for a company as a cybersecurity analyst. His company runs a website that allows public postings. Recently, users have started complaining about the website having pop-up messages asking for their username and password. Simultaneously, your security team has noticed a large increase in the number of compromised user accounts on the system. What type of attack is most likely the cause of both of these events? Rootkit Cross-site request forgery Cross-site scripting SQL injection
Cross-site scripting
67
Which of the following data types would be used to store the number 3.14? Integers Boolean String Floating-point
Floating-Point
68
You need to move a new desktop computer to another desk. Which of the following actions should you take? Lift with you back and not your leg Open the box and carry each piece individually Ask a coworker to teal lift it with you Lift with you legs and not your back
Lift with your legs and not your back
69
A user's personal settings are not showing up on their computer. You suspect that their profile has become corrupted within Windows. You attempt to look at their profile file but cannot find it in their profile directory. Which of the following options do you need to configure to see this file? Display Settings Folder Options User Accounts Internet Options
Folder Options
70
You have been asked to recycle 20 of your company's old laptops. The laptops will be donated to a local community center for underprivileged children. Which of the following data destruction and disposal methods is MOST appropriate to allow the data on the drives to be fully destroyed and the drives to be reused by the community center? Standard formatting of the HDDs Low-level formatting of the HDDs Degaussing of the HDDs Drill/hammer the HDD platters
Low-level formatting of the HDDs
71
Which of the following commands is used on a Linux system to change the ownership of a file or directory on a system? chmod pwd passwd chown
chown
72
You are working as a desktop repair technician for a large corporation. The company uses the exact same desktop hardware for all of its user's workstations. Today, you have received multiple calls from users complaining that their screen becomes filled with static when moving their mouse. You believe the video card driver may be at fault. Which log would you review to determine if the video card driver has been updated recently? Security log System log Setup Application log
System Log
73
Your Windows 10 machine has just crashed. Where should you look to identify the cause of the system crash and how to fix it? MAC POST BSOD DDOS
BSOD
74
Dion Training uses DHCP to assign private Class C IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class C address? 172.16.13.12 10.5.34.15 192.168.2.14 169.254.125.154
192.168.2.14
75
Dion Training's offices are frequently experiencing under-voltage events, sags, and power failures. Which of the following solutions would protect their servers from these issues? Line conditioner Uninterruptible power supply Diesel generator Surge suppressor
Uninterruptible Power Supply (UPS)
76
Which of the following commands is used on a Linux system to safely turn off a server? shutdown kill rm ps
shutdown
77
A technician wants to conduct a vulnerability scan on a server every morning at 3:00 am. Which of the following tools should the technician use? Task Scheduler PerMon Event viewer MSConfig
Task Scheduler
78
Dion Training is creating troubleshooting guides and frequently asked questions for its new customer service technicians. Which of the following would MOST likely contain these documents? Network topology diagrams Knowledge base articles Asset management database Password policy
Knowledge Base Articles
79
Barbara has connected her personal wireless router to a network jack inside her office. The router cannot get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router's configuration to ensure it is set up to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address? DHCP requests that originate from access points are blocked Only allow listed MAC addresses can connect to the network The wireless router's MAC address is blocklist by the network DHCP snooping is enabled on the network
Only allow listed MAC addresses can connect to the network
80
You have been asked to configure your neighbor's SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server? WAN MAN LAN Perimeter network
Perimeter network
81
Jonni is installing Windows 11 (64-bit) in a virtual machine on his Linux desktop. The installation is continually failing and producing an error. Jonni has configured the virtual machine with a dual-core 1.2 GHz processor, 4 GB of memory, a 32 GB hard drive, and a 1920 x 1080 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced? The screen resolution Number of CPU cores Amount of memory Amount of hard drive space
Amount of hard drive space
82
Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com." What should Michelle do to fix this problem? Rollback the application to the previous version Update the anti-virus software and run a full system scan Restart the network services Reset the web browser's proxy setting
Reset the web browser's proxy setting
83
Matt has verified that a user's system has symptoms of being infected with malware. According to the malware removal procedures, what should Matt do NEXT? Quarantine the infected system by removing its network connectivity Update the anti-virus software and run a full system scan Enable System Restoration and create a restore point in Windows Educate the end user about how to avoid malware in the future
Quarantine the infected system by removing its network connectivity
84
You are working in a doctor's office and have been asked to set up a kiosk to allow customers to check in for their appointments. The kiosk should be secured, and only customers to access a single application used for the check-in process. You must also ensure that the computer will automatically log in whenever the system is powered on or rebooted. Which of the following types of accounts should you configure for this kiosk? Power User Remote Desktop User Administrator Guest
Guest
85
You are working at the service desk when you receive a call from an upset user because their workstation cannot receive any emails. Which of the following should you use to document this phone call? Asset management database Incident report Knowledge base articles Network topology diagram
Incident report
86
You are trying to open your company's internal shared drive from your Windows 10 laptop but cannot reach it. You open your web browser and can connect to DionTraining.com without any issues. Which of the following commands should you use to determine if the internal shared drive is mapped to your computer properly? Tracert net use ping chkdsk
net use
87
One of the routers in your network just failed. You have been asked to replace it with the same model router from the spare inventory closet as part of an emergency change request. You find the new router in the closet and notice it was signed into inventory 13 months ago. You install the router and attempt to enable HTTPS in the configuration to allow for remote access. The failed router had this capability, but this spare does not, even though they are the same model and were purchased at the same time. What should you do to enable HTTPS access for this router? Update the firmware Perform a factory reset Reboot the router Enable HTTP instead
Update the firmware
88
Which of the following commands is used on a Linux system to delete a file from a directory? mv cp rm kill
rm
89
A technician needs to add new features to an existing router on the network. Which of the following should be performed to add the new features? Clone the router Migrating o IPv6 Firmware update Vulnerability patching
Firmware Update
90
Tim has requested to install a security update to the Dion Training web server during the next maintenance window. At the change control board meeting, Tim presents the requested change and gains approval from the change board. Before Tim installs the update, which of the following should be documented as a result of the change board's approval? Date and time of the change Affected systems/impact of the change Purpose of the change Risk of the change
Date and time of the change