Practice Assessment Review Flashcards

(53 cards)

1
Q

What is measured in ohms?

A

Resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is measured in amps?

A

Current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Alarm that is triggered manually and could be implemented as a wireless pendant, concealed sensor or trigger, or call contact.

A

Duress alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Alarm that sounds when the circuit is opened or closed, depending on the type of alarm. This could be caused by a door opening or by a fence being cut.

A

Circuit-based alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Alarm that is linked to a detector triggered by movement within a room or other area. The sensors in these detectors are either microwave radio reflection or passive infrared (PIR).

A

Motion-based alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Alarms that uses radio frequency ID (RFID) tags and readers that can be used to track the movement of tagged objects within an area.

A

Proximity alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backup that selects new files and files modified since the original full job. Has moderate time and storage requirements and relatively faster during restore

A

Differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backup that is an option for creating full backups with lower data transfer requirements. Not generated directly from the original data but instead assembled from other backup jobs.

A

Synthetic backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Backup job that produces a file that contains all the data from the source. This means that the backup file is nominally the same size.

A

Full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backup that selects only new files and files modified since the previous job. Has the lowest time and storage requirement, but longer restore time.

A

Incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A group policy that configures computer settings and user profile settings for all computers and user accounts within a domain.

A

Domain group policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A script that performs some type of configuration or process activity when the user signs in.

A

Login script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The action of installing applications that are obtained outside of the device’s official app store.

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Will reset the device to its factory state.

A

Wiping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The default shell command interpreter uses what stream for the user’s keyboard input?

A

stdin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any errors in a terminal stream are identified by which stream?

A

stderr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which stream reads data from a shell from the tty device and displays it through the terminal.

A

stdout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A set of common interface standards designed to facilitate compatibility between different operating systems, including but not limited to Unix-like systems and Windows.

A

POSIX (Portable Operating System Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Play or show some sort of content embedded in a web page, or other video/multimedia format.

A

Plugin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Add or change a browser feature via its application programming interface (API).

A

Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Indicates the site used to perform web searches directly from the address bar.

A

A search provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A method used by developers to integrate custom-developed software with other software applications.

A

API (Application Programming Interface)

23
Q

When used with a particular command, what switch lists the syntax and switched used for the command?

24
Q

What wildcard character can be used to indicate a string of characters?

25
When used with the *dir* command, what switch(es) can be used to list files using a wide format with no details?
/w
26
Evidence that is not immediately visible or accessible, but can be uncovered through further investigation or forensic processes.
Latent evidence
27
Involves recovering and analyzing data to determine the nature and scope of a security incident.
Digital forensics
28
An option for creating full backups with lower data transfer requirements.
Synthetic backup
29
Backup job that selects only new files and files modified since the previous job. Has the lowest time and storage requirement.
Incremental
30
Backup job that selects new files and files modified since the original full job. Has moderate time and storage requirement
Differential
31
Remote Desktop Protocol on a Windows workstation or server runs on what TCP port?
port 3389
32
SSH uses what TCP port?
port 22
33
VNC (Virtual Network Connection) works over what TCP port?
port 5900
34
To delete a drive mapping, what is the correct syntax?
net use X: /delete
35
A tool used by the original equipment manufacturers (OEMs) to restore the OS environment to its ship state.
Recovery partition
36
A technician provides a passcode to the user and connects over port 443. What type of Windows help session does the user create when using CTRL+START+Q?
Microsoft Quick Assist
37
A user asks for help from a technician or co-worker via an invitation file protected by a passcode.
Microsoft Remote Assistance (MSRA)
38
How many bits long is an IPv6 address in total, and how many bits identify the host portion?
In IPv6, the address is **128** bits long and the interface address portion is always the last **64** bits.
39
Console that allows administrators to view, edit, and troubleshoot the properties of installed hardware, update drivers, and remove or disable devices
Device Manager (devmgmt.msc)
40
Console that displays a summary of any fixed and removable disks.
Disk Management (diskmgmt.msc)
41
Tool that runs various operations to speed up the performance of hard disk drives (HDDs) and solid-state drives (SSDs).
Defragment and Optimize Drives (dfrgui.exe)
42
Console that provides administrators with an advanced interface for creating, modifying, disabling, and deleting user accounts. This console is also useful for resetting the password for an account.
Local Users and Groups (lusrmgr.msc)
43
On a solid state drive (SSD), data is stored in units called what?
Blocks
44
Defragment and Optimize Drives tool (dfrgui.exe) on a solid state drive (SSD) does what?
The tool runs a trim process that identifies data that the OS has marked as **deletable**. When the tool initiates a trim, data that is marked as deletable ultimately has its occupied blocks tagged as **writable**.
45
A network engineer implements a proxy at a small company. The configuration does not require settings on every client machine. What type of proxy does the engineer deploy?
A **transparent** proxy does not require any client configuration as the server handles the appropriate settings. An **intercepting** proxy does not require that each client is individually configured.
46
What means that unless there is a rule specifying that access should be granted, any request for access is denied?
Implicit deny
47
What means that a specific rule is created that denies any access to a system or service?
Explicit deny
48
Which file does the technician inspect for problems related to a specific operating system boot problem?
BOOTMGFW
49
Reset is usually effective in restoring unresponsive or frozen systems and is one of the first things to try when faced with a malfunctioning app or slow performance.
soft reset
50
Reset that removes all user data, apps, and settings. The device will either have to be manually reconfigured or restored from a backup configuration. This would be a drastic measure.
factory reset
51
Command that clears a system’s DNS cache.
ipconfig /flushdns
52
A lunchtime attack is where a threat actor is able to access a computer that has been left unlocked. What might a security engineer suggest as a solution to deter lunchtime attacks?
Policies -- can configure screensavers that lock the desktop after a period of inactivity.
53
A method where a fraudulent DNS address may be used to direct users to fraudulent websites.
DNS spoofing