Practice 5 Flashcards
..
A user’s Android smartphone is becoming sluggish and slow to load applications. Which of the following should you perform FIRST to fix this problem?
Close all of the running applications
Turn off the smartphone’s Bluetooth and Wi-Fi
Update the smartphone’s firmware
Conduct a factory restore of the smartphone
Close all of the running applications
Dion Training is building a new computer for its video editor to use. The new computer will use four physical Intel Xeon processors, 128 GB of DDR4 memory, and a RAID 0 with two 2 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer’s resources properly?
Education
Home
Pro
Pro for Workstations
Pro for Workstations
Dion Training’s offices are frequently experiencing brownouts and sags. Which of the following solutions would protect all of their workstations and servers from these under-voltage events?
Surge suppressor
Diesel generator
Uninterruptible power supply
Line conditioner
Line Conditioner
Which of the following is a connectionless protocol that utilizes on UDP?
HTTPS
FTP
TFTP
HTTP
TFTP
A factory worker suspects that a legacy workstation is infected with malware. The workstation runs Windows XP and is used as part of an ICS/SCADA system to control industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation. After its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent reinfection?
Disable System Restore in Windows
Quarantine the infected system
Investigate and verify malware symptoms
Update the anti-malware solution
Remediate the infected systems
Enable System restore and create a restore point in Windows
Update the anti-malware solution
On your lunch break, you walked down to the coffee shop on the corner. You open your laptop and connect to their wireless network. After a few minutes of surfing the Internet, a pop-up is displayed on your screen. You close the pop-up, finish your lunch break, shut down the laptop, and put it back into your backpack. When you get back to the office, you take out the laptop and turn it on, but instead of your normal desktop background, you are greeted by a full-screen image with a padlock and a message stating you have to pay 0.1 BTC to regain access to your personal files. What type of malware has infected your laptop?
Spyware
Trojan
Rootkit
Ransomware
Ransomware
A Windows laptop is malfunctioning, and you believe that some system files are missing or corrupted. Which of the following commands should you use to verify this and, if needed, repair the files?
xcopy
sfc
gpupdate
chkdsk
sfc
Sally just purchased a new iPhone and AirPods to listen to her music. After setting up the new iPhone, she can get online and watch YouTube, but her wireless headphones aren’t working. Which of the following is MOST likely the problem?
Bluetooth is not enabled
WiFi is not enabled
Cellular is not enabled
The phone is in airplane mode
Bluetooth is not enabled
Your company recently suffered a small data breach caused by an employee emailing themselves a copy of the current customer’s names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which of the following logical security concepts should you implement to prevent a trusted insider from stealing your corporate data?
DLP
Strong Passwords
MDM
Firewall
DLP
What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system?
32 GB
64 GB
20 GB
16 GB
32 GB
Eduardo is installing Windows 11 (64-bit) in a virtual machine on his macOS desktop. The installation is continually failing and producing an error. Eduardo has configured the virtual machine with a 2.2 GHz processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?
Amount of hard drive space
Amount of memory
The screen resolution
Number of CPU cores
Number of CPU cores
(Dual-core CPUs are needed for Windows 11)
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have finished remediating the infected system. Which of the following steps should you NEXT?
Schedule scans and run updates
Identify and research malware symptoms
Quarantine infected systems
Educate the end user
Schedule scans and run updates
.
You are installing a new firewall for Dion Training’s corporate network. Which of the following documents should you update FIRST?
Incident database
Knowledge base articles
Password policy
Network topology diagram
Network topology diagram
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have directly observed symptoms that indicate the system is infected with malware. Which of the following actions should you perform NEXT?
Remediate the infected system
Quarantine the affected system
Disable System Restore
Enable System Restore
Quarantine the affected system
A printing company uses an isolated Windows XP workstation to print out large format banners for its customers on a custom printer. Unfortunately, the printer does not support newer versions of Windows and would cost $50,000 to replace it. To mitigate this risk, the workstation is not connected to the internet or a local area network. When a customer needs a banner printer, the technician takes a copy of their PDF file and moves it to the Windows XP workstation using a USB thumb drive. The workstation recently became infected with malware when printing a customer’s file. The technician remediated the issue, but the workstation became infected again three weeks later. Which of the following actions did the technician forget to perform?
Perform a data wipe operation on the USB thumb drive before its next use
Connect the workstation to the Internet to receive the latest Windows XP patches
Manually update the antivirus on the workstation and set it to perform on-screen scans
Disable System restore and remote the previous restore points
Manually update the antivirus on the workstation and set it to perform on-screen scans
You recently moved 1.5 TB of data from your office’s file server to a new 16 TB NAS and decommissioned the old file server. You verified all users had been given the same permissions to the new file shares on the NAS as they had on the old server. The users are receiving an error stating, “Windows cannot access \server10\shared" every time they click the Share drive icon on their desktop. What is MOST likely the source of this error?
The users are still mapped to the old share drive
The users are outside the authorized hours set in the GPO
The users need administrative permission to access the new NAS
The users are using the incorrect password for the new server
The users are still mapped to the old share drive
Jennifer decided that the licensing cost for a piece of video editing software was too expensive. Instead, she decided to download a keygen program to generate a license key and install a pirated version of the editing software. After she runs the keygen, a license key is created, but her system performance becomes very sluggish, and her antimalware suite begins to display numerous alerts. Which type of malware might her computer be infected with?
Worm
Adware
Trojan
Logic Bomb
Trojan
Which file system type should you format a 4 TB USB flash drive to use with both Windows and macOS laptops?
NTFS
exFAT
FAT32
APFS
exFAT
(FAT32 can only support maximum volume sizes of up to 2 TB and maximum file sized of up to 4 GB)
Which command is used in the Linux terminal to change the permissions of a file?
pwd
chmod
sudo
chown
Dion Training uses DHCP to assign private Class B IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class B address?
192.168.2.14
10.5.34.15
172.16.13.12
169.254.125.154
172.16.13.12
David is troubleshooting a new Android application his company is creating. He has installed the app on an Android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. Which of the following should David enable on the device?
Jailbreak
Developer Mode
Rooting
Sideloading
Developer Mode
Christina is attempting to install Windows 10 (32-bit) on an older netbook-style laptop. The installation is continually failing and producing an error. The device has a 1.1 GHz processor, 1 GB of memory, an 8 GB hard drive, and a 720p display. Which component would need to be fixed to allow Windows 10 (32-bit) to be installed on this device?
The screen resolution
Amount of memory
Amount of hard drive space
Number of CPU cores
Amount of hard drive space
Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?
Spoofing
Zero-day
Spear phishing
Phishing
Spear Phishing
Which of the following remote access tools is a command-line terminal emulation program operating on port 23?
VNC
SSH
RDP
Telnet
Telnet