Section 2.0 Security Flashcards

1
Q

A healthcare company wants a security engineer to secure access to its critical internal resources and data with more than just a username and password. What access control measure would the security engineer suggest the company implement to provide an extra layer of security?

A

YOU WERE SURE AND CORRECT

Multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A new data security technician is learning many foundational principles of logical security controls concerning critical data. The technician notices a lot of effort and conversations from colleagues with clients around the concept of least privilege. What is the goal when it pertains to implementing least privilege?

A

YOU WERE SURE AND CORRECT

Grant users the minimum possible rights necessary to perform the job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A senior-level government agency wants to implement multifactor authentication. However, they specifically do not want any user’s mobile device to be a part of the solution as it could compromise them. What authentication method would be a possible solution?

A

THE CORRECT ANSWER

Hard token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A small company has just set up a Windows domain environment and would like to add functionality for their users to save personal work-related documents on a designated file server to protect files from being lost on their PCs. What solution would allow this functionality?

A

YOU WERE SURE AND CORRECT

Home folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A group of employees has voiced concerns about not feeling safe when walking to and from their cars in the parking lot. Since the building is not in a safe neighborhood, they feel like someone could easily hide and attack people during certain shift changes. What could the company implement to help these employees feel safer? (Select all that apply.)

A

Security guards
Lighting
Video cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This type of alarm system utilizes either microwave radio reflection or passive infrared to trigger an alert threshold.

A

YOU WERE SURE AND CORRECT

Motion sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A manufacturing plant plans to have cash payments for products sent to their facility for processing. To provide a proper physical security entrance into the area where personnel will handle the cash, a security vendor may suggest what particular automated solution best ensures that only one employee can enter and exit this area at a time?

A

YOU WERE SURE AND CORRECT

Access control vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After switching a medium-sized office to a Windows domain, a systems administrator has had trouble getting buy-in from users when it comes to saving documents in redundant network shares. Users are adamant that they want to work out of the local Documents folder of their profile. What can the administrator implement to accomplish the goal of getting data to reside on network shares?

A

YOU WERE SURE AND CORRECT

Folder redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security engineer is designing a multifactor solution for certain approved users to access highly-sensitive information on the company’s intranet. The engineer will require a soft token code provided by what medium to the user? (Select all that apply.)

A

Short message service

Voice call

Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security vendor contracts with a banking firm to provide access control to highly secured areas. The banking firm wants to grant access via biometric data. What would be suitable to use in this case? (Select all that apply.)

A

Retina scanner

Fingerprint reader

Palmprint scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The security team at a company wants to limit access to certain office areas to prevent theft and improve safety for employees. They would like to utilize door locks with badge readers and software that centrally manages access yet is still accessible with a physical key in case of emergencies or system outages. What objects could the company use in conjunction with the badge readers to grant access? (Select all that apply.)

A

Smart cards

Key fobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organization has asked a network engineer why a particular wireless access point is not allowing users to authenticate to the company’s network. Users can connect to other access points without issue. The engineer finds that the problem access point can find and connect to the Remote Authentication Dial-in User Service (RADIUS) server, but they do not trust each other. What is most likely NOT configured on the access point?

A

YOU WERE SURE AND CORRECT

Shared secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A medium-sized office has a growing number of employees whom all need access to the wireless network. Each employee has an individual Windows domain account and wireless network access account. What protocol or service could the office implement to allow users to use one account, granting them access to the wireless network and the domain?

A

THE CORRECT ANSWER

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol allows access points to use Remote Authentication Dial-in User Service (RADIUS), or Terminal Access Controller Access Control System Plus (TACACS+), and Extensible Authentication Protocol (EAP) to tunnel credentials and tokens that allow a domain user to connect via a wireless client to authenticate to a Windows domain controller and use single sign-on authorization?

A

THE CORRECT ANSWER

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A senior network engineer wants to provide the organization’s staff with a convenient yet secure method for authenticating and administrating all the company Cisco routers, switches, and access points. What Authentication, Authorization, and Accounting (AAA) protocol would provide the best solution for this?

A

YOU WERE SURE AND CORRECT

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A managed services technician works with a customer to properly secure the home office Wi-Fi network. The customer states that they use Wi-Fi Protected Access with Temporal Key Integrity Protocol to secure wireless network traffic. However, the technician advises against this solution, as a malicious actor can easily find the encryption key. What would provide for stronger encryption with AES and CCMP for securing Wi-Fi traffic?

A

THE CORRECT ANSWER

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network engineers are talking at a conference, reminiscing about legacy Wi-Fi security standards. Unfortunately, they could not remember the cipher that replaced Rivest Cipher 4 (RC4) at the advent of WPA2. What cipher are they attempting to remember?

A

YOU WERE SURE AND CORRECT

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A security engineer is attending a training session based on newer network security best practices. However, regarding Wi-Fi protected access (WPA), they learn that WPA3 replaced WPA2 with its accompanying encryption standard stack. With WPA3, what other cipher/protocol stack replaced them?

A

THE CORRECT ANSWER

AES GCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A new local coffee shop would like to provide customers with free Wi-Fi access. In addition, they would like to provide a secured wireless connection without using a pre-shared passphrase. Which type of protected access should the coffee shop use to meet these requirements?

A

THE CORRECT ANSWER

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A growing company has just recently implemented a Windows domain and is building out its Active Directory structure. They have asked a network services company if they can manage access to their wireless network using permissions in the new domain. A network engineer tells them this is certainly achievable using this particular protocol.

A

THE CORRECT ANSWER

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A network engineer wants to implement a strong EAP-TLS method using multifactor authentication in an enterprise environment. The engineer must configure the Remote Authentication Dial-in User Service (RADIUS) server and the wireless supplicant with which of the following components? (Select all that apply.)

A

Digital certificate

Encryption key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A user thinks there may be a virus on their computer, calls into an IT help desk, and states that when browsing certain websites, the browser gives a scary warning about the site possibly being unsafe. What could cause a browser certificate warning? (Select all that apply.)

A

A certificate is self-signed.

There is a server name mismatch in the certificate.

A certificate has expired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A customer brings a PC into a local computer repair shop believing it may have a virus. After some investigation into the problems, the technician deems that there are so many viruses and malware on the system that there really is only one appropriate avenue to take to give the customer the security of knowing the PC is free and clear of the viruses and malware. What remediation will the technician perform?

A

THE CORRECT ANSWER

Perform OS reinstallation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A managed service provider company has adopted CompTIA’s seven-step best practice procedure for malware removal. A technician is about to attempt to remove a malware infection according to these best practices. Which step will the technician take in the overall process of removal? (Select all that apply.)

A

Disable System Restore.

Educate the end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An IT security professional has finished removing a trojan malware infection using their company’s enterprise anti-malware platform. What operating-system-specific validations would ensure no reinfections could occur? (Select all that apply.)

A

Restore points
DNS configuration
Software firewall settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A malicious hacker sets out to create a botnet to deploy onto a mass number of computers to perform complex blockchain calculations for obtaining digital coins. What malware payload will accomplish this task?

A

YOU WERE SURE AND CORRECT

Cryptominer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A company’s CFO notices an extremely small USB dongle plugged into their laptop. It is not associated with any of the wireless devices the CFO uses, and the device does not have any logo printed on it. After speaking with the IT service desk, the CFO mentions that he has received some emails lately about changes to various online accounts that he did not initiate. What conclusion may the service desk technician come to after hearing this statement?

A

THE CORRECT ANSWER

The CFO’s system has a keylogger installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A user’s computer has an infection that renders the computer system unusable as soon as it boots up. After calling the support phone number for the system’s antivirus software, the support technician gives the user a .iso file to help remove the infection. What will this file allow the user to do differently from removing the infection after the computer starts up?

A

THE CORRECT ANSWER

Scan the computer in recovery mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A user makes a frantic call to a family friend. Their computer displays a message that the Federal Bureau of Investigation has tracked malicious terrorist activity to their laptop. The only information they see to remove the message is a link to a Bitcoin wallet that requests payment. What type of infection is this user experiencing?

A

YOU WERE SURE AND CORRECT

Ransomware attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A fairly new level one help desk technician has worked hard to remove some malware infections on a user’s computer. However, similar infections reappeared once the technician cleaned up and restarted the computer. What malware vector is manifesting in this situation?

A

THE CORRECT ANSWER

Boot sector virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When dealing with this particular malware payload, users should be aware that there is the possibility that it can compromise system files and programming interfaces. For example, compromised local shell processes, such as Explorer or Task Manager on Windows, ps or top on Linux, and port-listening tools no longer reveal their presence. What is this particular malware payload?

A

YOU WERE SURE AND CORRECT

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A computer science student is taking beginner-level classes on information security. The course discusses malware vectors, a method by which the malware executes on a computer. The student then learns about which of the following common vectors? (Select all that apply.)

A

Worm
Virus
Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

As a part of a company’s overall information security plan, the security operations team sends out designed phishing emails to groups of users. Users who click links inside baited emails are then enrolled in training to help them spot phishing-type emails. What are some characteristics seen in typical phishing emails? (Select all that apply.)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

As a part of a company’s overall information security plan, the security operations team sends out designed phishing emails to groups of users. Users who click links inside baited emails are then enrolled in training to help them spot phishing-type emails. What are some characteristics seen in typical phishing emails? (Select all that apply.)

A

Tailgate into the offices.

Impersonate an employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A systems administrator is auditing the settings of a group of web servers. The administrator notices that a few of the servers also have file services and database roles installed and are not in line with the documented configuration of the company’s standard web servers. What vulnerability are these systems experiencing?

A

THE CORRECT ANSWER

Non-compliant system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A school district is working on a plan for a future bring your own device (BYOD) program for students. They would like to provide connectivity due to the rural location of the building and limited cell phone service. What concern would the network security team have with this plan?

A

YOU WERE SURE AND CORRECT

Lack of a secure baseline configuration for personal devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following attacks are successful since there are currently no known patches to prevent it from happening?

A

YOU WERE SURE AND CORRECT

Zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

An employee receives a phone call from someone in the IT department informing them that their computer has a virus. In a panic, the employee quickly follows the instructions from the caller to grant remote access to their workstation. Unfortunately, the employee notices that the application used for remote access is not the same as the application used in the past when someone from IT has remotely worked on their workstation. What kind of attack has the user just experienced?

A

YOU WERE SURE AND CORRECT

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A concerned employee has noticed that their manager seems to always quietly approach other co-workers from behind and carefully watch the actions they are doing on their computers. Other employees reported that this manager would watch for an extensive amount of time before saying anything to the employee at the computer. What social engineering tactic could be suspect in this situation?

A

YOU WERE SURE AND CORRECT

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What type of attack occurs when an attacker may use software to guess another user’s password using common words?

A

YOU WERE SURE AND CORRECT

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

An IT support intern attends a local IT security conference. The intern attends a breakout session that focuses on common security vulnerabilities when managing multiple endpoints. What security vulnerabilities can the session point out? (Select all that apply.)

A

Unpatched system

End of life OS

Unprotected system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Company executives, like the Chief Information Officer (CIO), are the main target of which of the following attacks?

A

YOU WERE SURE AND CORRECT

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

An employee receives an email from what looks to be the IT department informing the employee has a compromised password. In a panic, the employee clicks the provided web link in the email, enters their old password, and then enters a new password. The employee noticed that this is not how the IT department has had them change their password in the past. What kind of attack has the user just experienced?

A

YOU WERE SURE AND CORRECT

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A person visits a local library frequently with their laptop to use the Wi-Fi to complete school assignments and check social media. One day, the user notices that the wireless network name or the Service Set Identifier (SSID) is slightly different from normal. As a result, the user connects to the Wi-Fi and is automatically brought to a Facebook web page with fields to enter their Facebook username and password. What type of attack has occurred here?

A

YOU WERE SURE AND CORRECT

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

After a recent data breach, a company’s IT department has concluded that the breach started with a laptop that accessed the Wi-Fi to gain access to its resources. The company uses a passphrase and media access control (MAC) address filtering to restrict access to Wi-Fi. What type of attack gained access to the company’s wireless network?

A

THE CORRECT ANSWER

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

After carrying out a campaign to gather data via e-mail and other electronic means, what else can an attacker do to gather personal information about a company owner without being in that person’s presence?

A

THE CORRECT ANSWER

Go dumpster-diving behind the corporate offices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A large corporation has ordered all branch offices to secure office data to prevent unauthorized access to data in the case of theft. The change applies company-wide via a security policy for easy deployment. What does a computer technician need to address to fulfill these orders? (Select all that apply.)

A

Disable USB ports.

Activate BitLocker To Go.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A company has given its employees a Windows 10 laptop to use for remote work. Employees who already have access to Office 365 applications can get to work right away. How would employees initially log on to their laptops to begin working on them?

A

THE CORRECT ANSWER

Use their Microsoft account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Employees at a secure facility must log on to office workstations with two-factor authentication (2FA). All employees access the building with a smart card. What 2FA methods are employees most likely using to access their workstations? (Select all that apply.)

A

Username and password
PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The User Account Control (UAC) feature in Windows has a concern with what type of user account on a Windows machine?

A

THE CORRECT ANSWER

Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What type of local account does a user’s Windows computer utilize for legacy applications?

A

THE CORRECT ANSWER

Power user account

52
Q

The encrypting file system (EFS) is primarily for what purpose on a Windows machine? (Select all that apply.)

A

File-level encryption
Folder-level encryption

53
Q

Windows Defender Firewall uses which security feature based on Transmission Control Port (TCP) or User Datagram Protocol (UDP)?

A

THE CORRECT ANSWER

Port security

54
Q

Which of the following is most used to access the certificates on a smart card to log on to an account for a web application?

A

THE CORRECT ANSWER

PIN

55
Q

Employees have received their brand-new Windows 10 laptops to support a work-from-home initiative. Employees have already been using Office 365 applications in the office and are looking forward to picking up right where they left off. How should employees initially log on to their laptops?

A

THE CORRECT ANSWER

Use their Microsoft account.

56
Q

An office workstation, that is not connected to the internet, suffers a year-old vulnerability exploit. However, the workstation does have anti-malware software and specific local accounts for employees to use as a logon. Why were the workstation users unaware of the exploit on the workstation?

A

YOU WERE SURE AND CORRECT

Newer updates were not installed.

57
Q

What type of safeguard mechanism triggers an action on a system based on specific processes and how they connect to other systems?

A

THE CORRECT ANSWER

Application security

58
Q

The Chief Information Officer (CIO) has mandated securing all office workstations to prevent unauthorized access to data in the case of thefts. How can a desktop technician configure an office workstation to adhere to the recent mandate? (Select all that apply.)

A

Activate BitLocker To Go.
Disable USB ports.

59
Q

What type of local account on a Windows computer has full rights and privileges to everything on the system?

A

THE CORRECT ANSWER

Administrator account

60
Q

An administrator applies Share and New Technology File System (NTFS) permissions to a folder on a Windows server. The group “Everyone” has Read permissions to the share, and the “Users” group has modify permissions through NTFS permissions. Which of the following is a true statement? (Select all that apply.)

A

The “Users” group can modify files in the share.

The “Users” group can see everything in the share folder.

61
Q

What type of safeguard mechanism triggers an action on a system based on specific processes and how they connect to other systems?

A
62
Q

An insurance company uses different web applications that handle finance, customer account management, and access to car and repair services. However, each application adheres to strict security access and authentication policies. How can web administrators configure these different web applications, so they are both secure and most convenient for users to access as soon as they log on to their workstation office?

A

YOU WERE SURE AND CORRECT

Set up single sign-on (SSO).

63
Q

A large corporation has ordered all branch offices to secure office data to prevent unauthorized access to data in the case of theft. The change applies company-wide via a security policy for easy deployment. What does a computer technician need to address to fulfill these orders? (Select all that apply.)

A

Activate BitLocker To Go.
Disable USB ports.

64
Q

A technician works with an employee who got locked out of their company device. What best describes a failed attempt lockout?

A

YOU WERE SURE AND CORRECT

The account becomes disabled for not entering the correct credential.

65
Q

A software engineer drafts a policy on execution control, emphasizing trusted/untrusted software sources. What should the engineer disable to ensure infections are not on a company device? (Select all that apply.)

A

Secure PII and passwords.

Log off the device when not in use.

Secure and protect hardware.

66
Q

A technician is completing a project and steps away from the computer to get a cup of coffee. Knowing that safeguards are in place, what will the computer do during the technician’s absence?

A

YOU WERE SURE AND CORRECT

The computer locks after a certain amount of time has transpired.

67
Q

An engineer is creating a template for an end-user best practices guide. What assists in securing the workstation when the user steps away from the device? (Select all that apply.)

A

Disable autoplay.

Disable autorun.

68
Q

A company has tasked a technician with installing a system in a new complex. What should be the technician’s first step when creating the administrator account?

A

YOU WERE SURE AND CORRECT

Change the default password.

69
Q

Corporate pushes out a memorandum to improve the physical security of branch office workstations so that company data does not get stolen if someone breaks into the offices and steals hard drive disks (HDDs). How can an IT manager address this specific security concern when deploying new workstations?

A

YOU WERE SURE AND CORRECT

Set up the Windows BitLocker service.

70
Q

A technician is writing a policy on workstation security. What can a user accomplish on a Windows machine by hitting START+L on the keyboard?

A

THE CORRECT ANSWER

Screensaver lock

71
Q

A technician works on the organization’s account management matrix and disables user access for Saturdays and Sundays. What action does the technician complete?

A

YOU WERE SURE AND CORRECT

Restricted the user’s login time to access the system.

72
Q

A technician is reviewing the organization’s account management policies. Why should the technician disable a guest account?

A

YOU WERE SURE AND CORRECT

It allows unauthenticated access to the computer and may provide network access.

73
Q

A technician develops the organization’s account policies and incorporates controls to safeguard the company system infrastructure. What are account policies? (Select all that apply.)

A
74
Q

A desktop technician must configure a Windows workstation with a local administrator account to be accessible when the network is not available. Unfortunately, initial attempts to set up the account during the Windows deployment phase failed due to local security password policies on the Windows image. What password best practices can help the technician properly set up the local administrator account password during this initial deployment? (Select all that apply.)

A

Use symbols or special characters.
Use upper and lowercase letters.

75
Q

When deploying a Windows operating system (OS) to a workstation using a network deployment image, the desktop technician could not complete setting up the local administrator password. This is due to the local security password policies denying the previous password entries. What password best practices could help the technician properly set up the local administrator account during this phase of the deployment? (Select all that apply.)

A

Use symbols or special characters.

Use upper and lowercase letters.

76
Q

A help desk technician assists an employee having issues with their corporate device. According to the employee, the Face ID feature is not working. The technician observes the employee’s actions, and after a few attempts, the screen produces a message stating, “try again in five minutes.” What has occurred in this situation?

A

YOU WERE SURE AND CORRECT

Failed attempt locks

77
Q

An employee reviews available screen lock features on their new corporate device. What is unique to pattern screen locks?

A

YOU WERE SURE AND CORRECT

It uses a connect-the-dot approach to unlock the device.

78
Q

An engineer reviews the functionality and use of locator applications for mobile devices. What are the benefits of using a locator application? (Select all that apply.)

A

Use the app if the phone is lost or stolen.

Use the app to find misplaced phones.

Use the app to lock the device remotely.

79
Q

A technician is advising a new employee on best practices regarding screen locks for their corporate device. What is unique in using facial recognition?

A

YOU WERE SURE AND CORRECT

It uses infrared scanning and 3-D imaging to identify the user.

80
Q

A technician drafts a report on internet of things (IoT) security. What type of components uses an IoT network? (Select all that apply.)

A

Smart device types

Wireless mesh networking

Hub/control system

81
Q

A cyber engineer is conducting an evaluation of current screen lock capabilities for corporate mobile devices. What type of screen lock uses a sensor to scan the unique features of a user?

A

YOU WERE SURE AND CORRECT

Fingerprint recognition

82
Q

A technician reviews the team’s best practice guide for mobile security software. What can the technician use to monitor app activity and prevent connections to ports or IP addresses?

A

THE CORRECT ANSWER

Firewall

83
Q

A technician is preparing a corporate presentation on the use of locator applications for organizationally-owned devices. What is NOT a feature of a locator application?

A

YOU WERE SURE AND CORRECT

To reset the phone to factory settings

84
Q

An engineer reviews the organization’s policy on mobile security software. What works as a content filter to block access to known phishing sites and block adware/spyware activity?

A

YOU WERE SURE AND CORRECT

Antivirus/Anti-malware app

85
Q

A technician is testing the various methods available to screen lock/unlock a device. What uses simple hand gestures but provides no authentication?

A

YOU WERE SURE AND CORRECT

Swiping

86
Q

A technician is reviewing the standard operating procedure after an employee reports that they have lost their company laptop. What is the value of using remote wipe?

A

THE CORRECT ANSWER

It allows a device that is not physically available to be reset to factory settings.

87
Q

A technician reviews the organization’s policies on mobile security software. What is critical for all corporate devices and ensures they are up-to-date?

A

THE CORRECT ANSWER

OS update

88
Q

An engineer prepares an organizational course-based training module on the use of screen locks for corporate devices. What is unique to using the fingerprint method of screen locking?

A

YOU WERE SURE AND CORRECT

It uses a biometric scanner to identify the unique features of the user.

89
Q

An employee contacts the help desk and advises them that their computer, which contains sensitive organizational data, is missing. What action can the help desk take to protect the organization’s data?

A

Remote wipe

90
Q

A technician is destroying disks containing organizational documents. What method involves the technician using a tool to punch holes through the disk?

A

Drilling

91
Q

A company has tasked a technician with the destruction of 15 discs. After reviewing the approved list of destruction methods, the technician elects to degauss the disks. What is degaussing?

A

YOU WERE SURE AND CORRECT

The technician exposes the disk to a powerful electromagnet.

92
Q

A consultant is reviewing the organization’s policy on approved data destruction methods. In reviewing the available approaches, what ensures that old data gets destroyed by writing to each location on a hard disk drive?

A

THE CORRECT ANSWER

Erasing/wiping

93
Q

A company has tasked a software engineer with destroying archived data that has reached its retention requirements. The engineer uses a technique, exposing the disk to high heat that melts it. What is the name of this destruction technique?

A

YOU WERE SURE AND CORRECT

Incinerating

94
Q

A consultant wants to sanitize some of the organization’s disk drives. What deletes partitions and writes a new file system?

A

YOU WERE SURE AND CORRECT

Standard formatting

95
Q

A cyber team has elected to use outside sources to assist in recycling and destroying company records maintained on disks. What (or who) provides a certificate of destruction?

A

YOU WERE SURE AND CORRECT

Third-party vendor

96
Q

A cyber team uses a third-party vendor to assist in disposing drives taken from the company’s legacy computers. What should the third-party vendor provide the cyber team?

A

YOU WERE SURE AND CORRECT

Certificate of destruction/recycling

97
Q

A technician wants to reset a disk to its factory condition. What can the technician use to accomplish this task?

A

YOU WERE SURE AND CORRECT

Low-level formatting

98
Q

A specialist reviews the company’s approved data destruction methods in preparation to decommission a set of legacy computers. What is the function of low-level formatting tools?

A

YOU WERE SURE AND CORRECT

To reset a disk to its factory condition

99
Q

A company has tasked a technician with physically destroying disks containing organizational data. What method grinds the disk into tiny pieces?

A

YOU WERE SURE AND CORRECT

Shredding

100
Q

An engineer is exploring various methods of destroying data housed on disks. How is the drilling method used to destroy disks?

A

YOU WERE SURE AND CORRECT

The technician drives a metal bit through the disk, leaving a hole.

101
Q

A helpdesk technician has received a request to decommission a legacy computer. When reviewing the company’s approved data destruction methods, what process correlates with erasing/wiping?

A

THE CORRECT ANSWER

Writing to each location on the hard drive, using zeroes or a random pattern to “clean” the disk

102
Q

An engineer is revising the organization’s policy on home router LAN and WAN configurations for employees that work from home. What is beneficial in changing the SSID?

A

THE CORRECT ANSWER

It orients users to the correct network.

103
Q

A cyber consultant assists a contracted employee with setting up their home router firewall. What occurs when the firewall downloads curated reputation databases that associate IP address ranges, fully-qualified domain names (FQDNs), and URL web addresses with sites that host various categories?

A

THE CORRECT ANSWER

Content filtering

104
Q

A technician assists an employee in setting up their home router. What aids in securing the administrator account?

A

YOU WERE SURE AND CORRECT

Changing the default password

105
Q

A technician is working on the organization’s network and connecting to corporate devices. What is a benefit of UPnP?

A

YOU WERE SURE AND CORRECT

It provides a networking protocol framework, allowing networked devices to discover the network.

106
Q

A technician is working on Home Router WAN configurations. What can a Wi-Fi Analyzer do to assist in the configurations?

A

THE CORRECT ANSWER

Changing a channel

107
Q

A cyber consultant is reviewing the organization’s policy on home router port forwarding configurations. What is beneficial in disabling unused ports?

A

YOU WERE SURE AND CORRECT

It disables unused access to/from the router.

108
Q

A remote employee has installed a new router in their home and is setting up wide area network (WAN) configurations. What is the value of disabling SSID broadcasts?

A

YOU WERE SURE AND CORRECT

It masks the network from being seen.

109
Q

A cyber architect assists an employee in setting up their home router port forwarding configurations. What allows a device to retain the same IP each time it connects to a host?

A

YOU WERE SURE AND CORRECT

DHCP reservation

110
Q

An employee is speaking with the help ticket office regarding their home router configurations for port forwarding. What is a tenet of port forwarding?

A

THE CORRECT ANSWER

It takes a request from an internet host for a particular service.

111
Q

A remote employee is reviewing their home router firewall configuration. What protects a network by allowing users to control what traffic to permit in and out of the network?

A

YOU WERE SURE AND CORRECT

IP filtering

112
Q

A help center technician assists an employee set up a home network. What can be auto or manually configured to follow the service provider’s instructions to configure the correct address on the router’s interface?

A

YOU WERE SURE AND CORRECT

Static WAN IP

113
Q

A company has tasked a cyber consultant with compiling a list of approved sources for the company network. What describes an untrusted source?

A

YOU WERE SURE AND CORRECT

It involves the use of a source that cannot be verified.

114
Q

A technician reviews possible methods of securing data through encryption and other processes. What function can take any amount of data as input and produce a fixed-length value as output?

A

YOU WERE SURE AND CORRECT

Hashing

115
Q

An engineer reviews the benefits of using secure connections. What validates the host’s identity running a webpage and encrypts communications to protect against snooping?

A

YOU WERE SURE AND CORRECT

Site validation certificates

116
Q

A consultant advises an employee on the importance of browser selection and installing programs/applications onto their company computer. What questions should the consultant consider regarding trusted sources? (Select all that apply.)

A

Can the installer of the vendor be verified?

Is the vendor of the program/application reputable?

From where is the program installed?

117
Q

An employee sets up their new work computer and looks for a tool that assists with credentials. What tool provides suggestions for strong credentials at each new sign-up on a website/program?

A
118
Q

A consultant drafts a point paper for the organization’s cyber department discussing the various methods of securing data. What is a tenet of hashing?

A

YOU WERE SURE AND CORRECT

It takes any amount of data and produces a fixed-length value.

119
Q

A technician reviews the various tenets of browser settings. What allows a user to share settings between instances on different devices?

A

YOU WERE SURE AND CORRECT

Browser data synchronization

120
Q

A cyber consultant provides a briefing to the organization’s employees regarding browser privacy. What is the benefit of using the private browsing mode?

A

YOU WERE SURE AND CORRECT

It disables the caching features of the browser.

121
Q

A technician prepares an organizational presentation on browser privacy settings and additional features that supplement the cookie policy and tracking protection. What uses more sophisticated techniques to prevent displaying anything that does not seem to be part of the site’s main content or functionality?

A

THE CORRECT ANSWER

Ad blocker

122
Q

A cyber consultant reviews the risk matrix associated with sources. What is the tenet of a trusted source?

A

YOU WERE SURE AND CORRECT

It involves the use of a source that contains a verified digital signature.

123
Q

A cyber consultant views the various methods of supplementing browser privacy settings. What prevents a website from creating dialogs or additional windows?

A

YOU WERE SURE AND CORRECT

Pop-up blocker

124
Q

An engineer develops a training packet for newly-hired employees regarding computer passwords. Regarding passwords, what is the benefit of using a password manager?

A

YOU WERE SURE AND CORRECT

It suggests strong credentials at each new sign-up.

125
Q

An employee sets up their new work computer and looks for a tool that assists with credentials. What tool provides suggestions for strong credentials at each new sign-up on a website/program?

A

THE CORRECT ANSWER

Password manager

126
Q

A technician reviews organizational protocols surrounding browser privacy settings. What is the benefit of using an ad blocker?

A

YOU WERE SURE AND CORRECT

It prevents displaying anything not part of the site’s main content