test 1 Flashcards

1
Q

A technician has recently removed malware from a Windows computer,
but the technician is concerned that some of the system files may have
been modified. From the command line, analyze and repair any damaged
operating system files

A

sfc /scannow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how many steps are there in the malware removal process?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the first task when removing malware?

A

Identify malware symptoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the second task when removing malware from a system?

A

Quarantine infected systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the third task when removing malware from a system?

A

Disable system restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the fourth task when removing malware from a system?

A

Remediate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the fifth task when removing malware from a system?

A

Schedule scans and run updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the sixth task when removing malware from a system?

A

Enable system restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the seventh task when removing malware from a system?

A

Educate the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

list all seven steps of malware removal

A
1 Identify malware symptoms
2 Quarantine infected systems
3 Disable System Restore
4 Remediate
5 Schedule scans and run updates
6 Enable System Restore
7 Educate the end user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give a description of the following technologies: EULA

A
The EULA (End User Licensing Agreement) determines how the software 
can be used by the end user. The user will commonly be required to agree to the terms of the EULA before the software can be installed.

e.g. Software can be used on one computer and one copy can be stored for backup purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give a description of the following technologies: PII

A

PII (Personally Identifiable Information) is any data that could be associated
with an individual. For example, your name, address, phone number, and email
address are considered PII.

A database includes all client first names, last
names, and home addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give a description of the following technologies: PCI DSS

A
PCI DSS (Payment Card Industry Data Security Standard) is a set of 
objectives created by the credit card industry to ensure that financial transaction data is stored and transmitted securely.

Any credit card numbers stored locally must
be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give a description of the following technologies: FOSS

A

FOSS (Free and Open Source) software is distributed for free and usually
includes access to the source code of the application.

The software includes source code and can be distributed at no cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give a description of the following technologies: GDPR

A
The GDPR (General Data Protection Regulation) is a regulation that controls 
data protection and privacy for individuals in the EU.

European Union citizens can request to have all personal data removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Give a description of the following technologies: PHI

A

PHI (Protected Health Information) is any healthcare data that can be
associated with an individual.

All blood test results are stored on laboratory file servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A user needs to access a file located on the \gate-room server. The file is
located in a share called ship-diagnostics. Use the command line to
connect to this share using drive g:.

A

NET USE G: \GATE-ROOM\SHIP-DIAGNOSTICS

The Windows net use command is used to map a network share to a drive
letter. The syntax is: net use drive: \servername\sharename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Give a description of what this command does: taskkill

A

The Windows taskkill command will terminate tasks by process id (PID) or by
the name of the executable.

e.g. Terminate a process by PID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Give a description of what this command does: diskpart

A

Diskpart (Disk Partitioning) provides command line access to disk and
partition configuration settings.

List the volume names on a storage drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Give a description of what this command does: dism

A
The dism (Deployment Image Servicing and Management tool) utility is used 
to manage Windows Imaging Format (WIM) files.

Make changes to a WIM image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Give a description of what this command does: chkdsk

A
The chkdsk (Check Disk) command can fix logical file system errors and locate 
and recover data from bad sectors on a hard drive.

Repair logical file system errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Give a description of what this command does: gpresult

A
The gpresult (Group Policy Results) utility allows the domain administrator to 
verify policy settings for a computer or user.

Verify group policy settings for a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A user has opened a help desk ticket regarding the battery life on their
mobile phone. The battery in the phone held a charge for most of the day
prior to connecting to the corporate network. The battery now only lasts
about half a day and the back of the phone is warmer than usual.
The phone is configured as follows:
Storage: 116.2 GB of 256 GB used
Display and Brightness: Automatic
Wi-Fi: Enabled
Auto-lock: Disabled
VPN: Not connected
Low Power Mode: Disabled
Battery Maximum Capacity: 100%
Which of the following changes would have the BEST impact on
battery performance?

❍ A. Enable auto-lock
❍ B. Connect to the VPN
❍ C. Increase available storage space
❍ D. Disable Wi-Fi

A

The Answer: A. Enable auto-lock
The backlight of a mobile phone requires constant battery use, and the
phone in an active state will use more battery than one that is locked or in
a standby state.
The incorrect answers:
B. Connect to the VPN
Connecting to a VPN would most likely increase the amount of battery
used due to the encryption and decryption that would need to occur.
C. Increase available storage space
The battery life on a phone is not based on the amount of storage space in
use. Increasing storage space would not extend the life of the battery.
D. Disable Wi-Fi
Wi-Fi does not have a significant impact on battery performance when
compared to the screen backlight and active phone services

24
Q

Which of the following governmental policies manages the use of
personal data?

❍ A. PCI DSS
❍ B. EULA
❍ C. GDPR
❍ D. FOSS

A

The Answer: C. GDPR
GDPR (General Data Protection Regulation) is a European regulation
that provides data protection and privacy for individuals in the European
Union.
The incorrect answers:
A. PCI DSS
PCI DSS (Payment Card Industry Data Security Standard) is a set of
guidelines for protecting credit card data. PCI DSS are industry guidelines
and are not directly associated with governmental regulation.
B. EULA
EULA (End User Licensing Agreement) determines how software can be
used by the end user. This agreement is not a governmental policy.
D. FOSS
FOSS (Free and Open Source) software is freely available and commonly
includes the source code of the software. FOSS is not associated with a
governmental policy.

25
``` What is the maximum amount of RAM supported by a 32-bit version of an operating system? ❍ A. 4 GB ❍ B. 8 GB ❍ C. 16 GB ❍ D. 192 GB ```
The Answer: A. 4 GB The limited address space of a 32-bit operating system can only support 4 GB of system memory. The incorrect answers: B. 8 GB A 32-bit operating system hits a limit at 4 GB of addressable memory. Although there are some techniques to work around this 4 GB limitation, they're not often implemented in practice. C. 16 GB 4 GB is the limit for 32-bit operating systems. D. 192 GB 192 GB would be well over the limit for 32-bit operating systems. More information: 220-1002, Objective 1.1 - Operating Systems Overview https://professormesser.link/1002010101
26
A system administrator has created a shared folder on a server to store operating system images. Technicians will access the shared folder to download the latest images when performing large-scale system installations. Which of the following will be the MOST likely method of accessing this data? ❍ A. Map the shared folder to an available drive letter ❍ B. Download the shared folder through a proxy ❍ C. Link the images to a cloud storage service ❍ D. Access the folder using a remote access client
The Answer: A. Map the shared folder to an available drive letter The easiest and most efficient way for technicians to access the drive share is to map a drive letter to the share and transfer the files directly. The incorrect answers: B. Download the shared folder through a proxy There's no mention of a proxy in the question, and adding a proxy to this process would not provide any additional features or benefits. C. Link the images to a cloud storage service Operating system images are relatively large, and transferring them to an external cloud-based service would add additional time and bandwidth to resources that are already located on a local file server. D. Access the folder using a remote access client The installation of an operating system requires direct access to the installation files, and a remote access client would not provide direct access to the files.
27
A help desk technician has been called to a training room that uses Android tablets as presentation devices. An application used for the training program will not start on any of the tablets. When the application is selected, the splash screen appears for a moment and then completely disappears with no error message. Which of the following would be the best NEXT troubleshooting step? ❍ A. Install all operating system updates ❍ B. Uninstall the application ❍ C. Power cycle the tablets ❍ D. Roll back to the previous application version
The Answer: C. Power cycle the tablets Before making any changes to the operating system or application software, it would be useful to know if power cycling the tablets would have an effect. If the symptom was to disappear after the restart, then no immediate changes would be required. The incorrect answers: A. Install all operating system updates Making a change to the system without understanding the issue would be a blind guess. It would be a better practice to gather more information about the problem before making changes. B. Uninstall the application Uninstalling the application would make it very difficult to troubleshoot the application, and it's not the best possible option before gathering more information about the problem. D. Roll back to the previous application version A technician wouldn't want to make significant changes to the application or the operating system until they knew more about the problem and tried to resolve the issue without installing or uninstalling any software.
28
Give a description of what this command does: dd
The Linux dd command is used to copy and convert files. It's commonly used to backup and restore an entire Linux partition as a disk image.
29
A Linux administrator needs to create a system image of a laptop used by the help desk for network troubleshooting. Which of the following utilities would provide this functionality? ❍ A. dd ❍ B. sudo ❍ C. ifconfig ❍ D. apt-get
The Answer: A. dd The Linux dd command is used to copy and convert files. It's commonly used to backup and restore an entire Linux partition as a disk image. The incorrect answers: B. sudo The sudo command allows a Linux user to execute a command as the superuser or as any other user on the system. The sudo command on its own does not provide any backup or imaging functionality. C. ifconfig The Linux ifconfig command is similar in function to the Windows ipconfig command. The output of ifconfig will display network interface and IP address configuration details. D. apt-get The Linux apt-get is an Advanced Packaging Tool command that handles the management of application packages on the system.
30
A user has delivered a broken laptop to the help desk, and he's visibly upset and quite vocal about the problem he's having. He's also asking for a very specific repair that doesn't appear to have any relationship to his issue. What's the best way to handle this situation? ❍ A. Repeat your understanding of the issue to the customer and provide an estimate and follow-up time ❍ B. Refuse the repair until the customer calms down ❍ C. Inform the customer of his mistake with the proposed repair ❍ D. Refuse to make any commitments until the computer is examined
The Answer: A. Repeat your understanding of the issue to the customer and provide an estimate and follow-up time The best response in a stressful situation is to listen, ask questions, and refrain from arguing or acting defensive. In this situation, the technician should gather as much information about the problem and keep all responses focused on resolving the problem. The incorrect answers: B. Refuse the repair until the customer calms down It's always preferable to avoid any comments that would be associated with emotion. Technical problems can be stressful enough on their own, and adding additional stress is not going to help repair the system. C. Inform the customer of his mistake with the proposed repair This isn't a game, and there are no winners or losers. The technician will be left to resolve the issue, regardless of the root cause. It's not necessary to comment or speculate on any proposed repair process. D. Refuse to make any commitments until the computer is examined The technician is ultimately responsible for resolving the issue, and it would help everyone involved to maintain a constant line of communication.
31
A user has reported that all Google search results in their Internet browser are displaying a non-Google website. This redirection occurs each time a Google search is attempted. Which of the following would be the BEST way to prevent this issue in the future? ❍ A. Windows Firewall ❍ B. MAC filtering ❍ C. Port security ❍ D. Certificate-based authentication ❍ E. Anti-malware utility
The Answer: E. Anti-malware utility A browser hijack is a very specific attack type that is commonly the result of a malware infection. The incorrect answers: A. Windows firewall The Windows firewall is useful for preventing inbound connections, but most malware is installed by the user. This installation process circumvents the firewall and it's the reason we rely on both a firewall and anti-malware software. B. MAC filtering MAC filtering is commonly used on a network device to limit which devices can communicate on a network. MAC filtering would not be related to a browser hijack. C. Port security Port security prevents unauthorized users from connecting to a switch interface. Port security is not associated with a browser hijack. D. Certificate-based authentication Certificate-based authentication provides a method to verify a user during the authentication process. This authentication mechanism is not related to browser hijacking.
32
Give a description of what this command does: msconfig
The msconfig (System Configuration) command is useful for managing the startup process of services. Prior to Windows 8.1, System Configuration can also be used to manage applications during the startup process.
33
A server administrator is replacing the memory in a database server. Which of the following steps should be followed FIRST? ❍ A. Remove the existing memory modules ❍ B. Wear an air filter mask ❍ C. Disconnect all power sources ❍ D. Connect an ESD strap
The Answer: C. Disconnect all power sources The first step when working inside of a computer or printer is to remove all power sources. The incorrect answers: A. Remove the existing memory modules Prior to removing the existing modules, the power source would need to be disconnected and an ESD strap would need to be attached to the computer case. B. Wear an air filter mask A filtered mask would not commonly be required for replacing memory modules. If the environment is very dusty or dirty, then a filtered mask may be necessary. D. Connect an ESD strap An ESD (Electrostatic Discharge) strap would allow the technician to minimize the potential of an electrostatic discharge. However, disconnecting the power source takes a higher priority
34
A technician is dismantling a test lab for a recently completed project, and the lab manager would like to use the existing computers on a new project. However, the security administrator would like to ensure that none of the data from the previous project is accessible on the existing hard drives. Which of the following would be the best way to accomplish this? ❍ A. Quick format ❍ B. Deguass the drives ❍ C. Regular format ❍ D. Reinstall the operating system
The Answer: C. Regular format A standard Windows format with the regular formatting option overwrites each sector of the drive with zeros. After this format is complete, the previous data on the drive is unrecoverable. The incorrect answers: A. Quick format A standard Windows format with the quick format option clears the master file table, but it doesn't overwrite any data on the drive. With the right software, the previous data could be recovered. B. Degauss the drives Degaussing the drives would remove the magnetic fields necessary for the drives to work properly. Although this would make the previous data unrecoverable, it would also cause the hard drives to be unusable. D. Reinstall the operating system Reinstalling the operating system may not overwrite any of the previous user data on the drive. Recovery software would be able to identify and "undelete" the previous drive data.
35
Which of the following technologies would be the best choice to boot computers in a training room over the network? ❍ A. MBR ❍ B. NTFS ❍ C. Dual boot ❍ D. PXE
The Answer: D. PXE PXE or "Pixie" (Preboot eXecution Environment) is a method of booting a computer from a device over the network instead of from operating system files on a local storage device. This method is especially useful when managing large groups of devices, such as a training room. The incorrect answers: A. MBR MBR (Master Boot Record) describes the information contained on the first sector of a drive. MBR is not used to boot devices across the network. B. NTFS NTFS (NT File System) is a file system designed for Windows computers. Although a system may store files using NTFS, the file system does not include any features that would allow it to be booted over the network. C. Dual boot A dual boot system contains a storage device with multiple operating systems, and each operating system can be individually selected and booted when starting the computer.
36
Give a description of the following technologies: PXE
PXE or "Pixie" (Preboot eXecution Environment) is a method of booting a computer from a device over the network instead of from operating system files on a local storage device. This method is especially useful when managing large groups of devices, such as a training room.
37
Which of these OS installation types uses an XML file that answers all of the questions normally provided during the installation? ❍ A. Unattended ❍ B. Image ❍ C. PXE ❍ D. Clean
The Answer: A. Unattended An unattended Windows installation requires the administrator to answer the normal installation questions in a single XML file. This allows the installation process to continue from the beginning to end without any user intervention. The incorrect answers: B. Image A system image is a complete backup of a volume or drive. The process for installing a system image is to copy the entire contents of the image to the drive of the computer. The normal operating system setup is not used, so an XML file would not answer installation questions. C. PXE PXE, or "Pixie," (Preboot eXecution Environment) is a method of booting a computer across the network. Booting with PXE does not answer files during an operating system installation. D. Clean A clean install is used to completely replace an existing operating system with a fresh version. Although this can be used with an unattended answer file, a clean installation by itself does not include an XML file with answers to installation questions.
38
A user purchased a copy of home tax software and has installed it on their company computer. This morning, the user logs in and finds that the tax software has been automatically removed from the system. Which of the following would be the MOST likely reason for this result? ❍ A. The company per-seat licenses are all in use ❍ B. The software uses a FOSS license ❍ C. The user has installed a personal license ❍ D. The software is subject to the GDPR
The Answer: C. The user has installed a personal license Personally licensed software can be difficult to audit on computers that are owned by a company, and many organizations will not allow software to be installed on company-owned systems if the company has not purchased the license. The incorrect answers: A. The company per-seat licenses are all in use This home tax software is not owned by the company, so the company would not have per-seat licenses to distribute. B. The software uses a FOSS license A FOSS (Free and Open Source) license would not cause any licensing issues, and many companies will install FOSS software on their systems. D. The software is subject to the GDPR The GDPR (General Data Protection Regulation) are rules in the European Union that are specific to a user's control of their personal data. The GDPR regulations would not be the most likely reason for removing this software.
39
A workstation on a manufacturing floor is taking much longer than normal to boot. Which of the following would be the BEST way to troubleshoot this issue? ❍ A. Replace the CPU ❍ B. Disable the startup applications ❍ C. Upgrade the RAM ❍ D. Install the latest OS patches
The Answer: B. Disable the startup applications Delays during the boot process can be caused by many issues, but a device that was previously working properly most likely has been changed. A single application install can create issues, so disabling startup applications would be an easy way to remove those from the troubleshooting process. The incorrect answers: A. Replace the CPU If the CPU was faulty, the computer would most likely not be operational. C. Upgrade the RAM Upgrading RAM can often resolve application performance issues, but this computer was previously working with the existing amount of memory. D. Install the latest OS patches It's possible that problems might occur after an OS patch update, but it would not be most likely that these issues would occur prior to patching. Without knowing more about the issue, it would not be a best practice to make such a significant change to the system.
40
A technician has been assigned a support ticket that urgently requests a laptop repair, but there are already many open support tickets ahead of this request. The technician doesn’t recognize the name associated with the ticket. Which of these choices would be the best path to take? ❍ A. Place the ticket into the queue as first-come, first-served ❍ B. Prioritize the support tickets by device type ❍ C. Triage the queue and prioritize the tickets in order of repair complexity ❍ D. Contact the end-user and determine the urgency of the repair
The Answer: D. Contact the end-user and determine the urgency of the repair A support ticket marked as "urgent" should be evaluated to determine the timeframe for resolving the issue and the complexity of the task. If the end user feels that the issue is time-sensitive, then it's important to contact them and see what options might be available to get them up and running as quickly as possible. The incorrect answers: A. Place the ticket into the queue as first-come, first-served Not all support tickets have the same priority, and it's the responsibility of the technician to properly triage the cases to handle the most critical first. It will usually involve some communication with the client to determine the scope of the issue. B. Prioritize the support tickets by device type The urgency of a technical issue isn't determined by the type of the device. Instead, the priority of issues should be based on the needs of the end user and the importance of their task. C. Triage the queue and prioritize the tickets in order of repair complexity The complexity of a repair doesn't consider the importance of the repair to the organization's goals and objectives. An executive going into an important presentation may have a simple problem, but their issue has greater importance to the organization.
41
A user has received a pop up message on their computer that states applications on their computer are infected with a virus. A technician has determined that the pop up message is a hoax that needs to be removed from the computer. The technician has disabled System Restore to remove all previous restore points. Which of the following tasks would be the best NEXT step? ❍ A. Update the anti-virus signatures ❍ B. Educate the end-user ❍ C. Schedule anti-virus scans for midnight each day ❍ D. Boot the system with a pre-installation environment
The Answer: A. Update the anti-virus signatures After disabling system restore, the next step in virus removal is to remediate the system. To remove the malware, it's important the technician is using the latest set of signatures. The incorrect answers: B. Educate the end-user This is one of the most important tasks for malware removal, but it's usually reserved for the final step when there's no longer any urgency to remove the malware. C. Schedule anti-virus scans for midnight each day Once the virus is removed, the system should be configured for ondemand scanning and additional scans each day. However, this would not immediately follow the disabling of System Restore. D. Boot the system with a pre-installation environment A pre-installation environment may be required for more difficult virus removal tasks, but this would only occur after the latest anti-virus signatures were downloaded and installed
42
A network administrator needs to manage a switch and firewall at a remote location. Which of the following would be the BEST choice for this requirement? ❍ A. RDP ❍ B. Telnet ❍ C. SSH ❍ D. VNC
The Answer: C. SSH SSH (Secure Shell) provides encrypted console communication, and it's commonly used to manage devices across the network. If an administrator is managing a server, switch, router, or firewall, they're probably using SSH. The incorrect answers: A. RDP Microsoft RDP (Remote Desktop Protocol) is commonly used to share the desktop of a Windows computer. Most switches and firewalls are not Windows devices, so RDP would not be the best choice for this connection. B. Telnet Telnet (Telecommunication Network) is very similar to SSH, but Telnet does not use encrypted communication. Because Telnet traffic is sent in the clear, it's not a good choice for most networks. Don't use Telnet! D. VNC VNC (Virtual Network Computing) is a screen sharing technology that is common to many non-Windows operating systems. If a technician is sharing the screen of a macOS or Linux desktop, they may be using VNC.
43
Jack, a user, has opened a help desk ticket relating to email messages he’s receiving. The messages appear to be replies to a message that Jack did not send. Most of the messages contain information about third-party product promotions and sales information. Which of the following is the MOST likely cause of these messages? ❍ A. Man-in-the-middle ❍ B. Corrupted email database ❍ C. Adware ❍ D. Hijacked email
The Answer: D. Hijacked email Of the available options, the most likely reason for these unusual email replies is a hijacked email account. An attacker that gains access to an email account can send spam, read messages, and effectively control all emails associated with the account. Common responses to an email hijacking are to change the passwords associated with the account and scan for malware. The incorrect answers: A. Man-in-the-middle A man-in-the-middle attack would include a third-party that was intercepting and potentially modifying network data. In this situation, there's no evidence that a third-party is intercepting any network communication. B. Corrupted email database A corrupted email database would cause the user's emails to be unreadable or would cause messages to be missing. Most email platforms will recognize a corrupted database and would not allow the user to access their mailbox. C. Adware Adware would show advertising and sales messages to the infected user and would not commonly send email messages to other users.
44
A malware infection has recently been removed from a computer. When starting the operating system, Windows shows errors during the startup process indicating some core operating system files are missing. Which of the following should be used to restore these missing files? ❍ A. gpupdate ❍ B. dism ❍ C. sfc ❍ D. diskpart
The Answer: C. sfc The sfc (System File Checker) command is used to scan and replace any core operating system files that may be corrupted or missing. It's common to run the sfc utility after removing malware or after a significant operating system issue. The incorrect answers: A. gpupdate The gpupdate (Group Policy Update) command is used to force a Group Policy update to computers in a Windows Active Directory domain. The gpupdate command would not restore any missing operating system files. B. dism The dism (Deployment Image Servicing and Management) tool is used to make changes to Windows Imaging Format (WIM) files. This question did not specify that the computer was using a WIM file, so the dism utility would not be the best choice to restore any missing files. D. diskpart An administrator can manage disk configurations and partitions with the Windows diskpart utility. The diskpart utility is not used to restore or modify files within the Windows operating system.
45
A desktop administrator has determined that an employee in the corporate office has been using their computer to share copyrighted materials to others on the Internet. Which of the following should be the best NEXT step? ❍ A. Create a firewall rule to block Internet access to this computer ❍ B. Create a hash for each file that was shared ❍ C. Compile a list of licenses for each set of copyrighted materials ❍ D. Retrieve and securely store the computer
The Answer: D. Retrieve and securely store the computer When a security incident has occurred, it's important to securely collect and store any evidence. The computer that was used to share copyrighted materials should be collected and stored until the proper authorities can take control of this evidence. The incorrect answers: A. Create a firewall rule to block Internet access to this computer Creating a firewall rule would stop anyone from accessing the computer, but it wouldn't stop the user from modifying or deleting files and evidence from the PC. B. Create a hash for each file that was shared Although creating hashes of the files may be part of the evidence gathering process, the immediate need is to impound and protect the data on the system used in this event. C. Compile a list of licenses for each set of copyrighted materials The determination of copyright is part of the process that will occur later. The more important task will be to collect the evidence and protect its integrity.
46
A network consulting firm is creating a proposal to upgrade the Internet firewalls for a large corporation. The proposal includes a description of the project and the network topology changes that would be required to support the upgrade. The proposal also describes the risks involved in the process of making this upgrade. Which of the following should be covered NEXT in the proposal? ❍ A. End-user approvals ❍ B. Backout plan ❍ C. Change control application ❍ D. Detailed upgrade plan
The Answer: D. Detailed upgrade plan Before working through the remaining change control steps, it's important to have a detailed explanation of the steps that will be required to complete the change. This detailed plan will provide decision-making information to the change control board and provide the information needed to create a backout plan. The incorrect answers: A. End-user approvals Without a detailed plan, it's difficult to determine who the end users are. Since the end-user approvals are required to continue with the change control process, the detailed plan will need to be created first. B. Backout plan A backout plan can't be created until you know the specific changes that are planned. C. Change control application The change control committee will need specific details about the proposed changes so they can understand the scope of what they are approving.
47
A data center manager requires each server to maintain at least fifteen minutes of uptime during a power failure. Which of these would be the BEST choice for this requirement? ❍ A. Cloud-based storage ❍ B. UPS ❍ C. Redundant power supplies ❍ D. Surge suppressor
The Answer: B. UPS A UPS (Uninterruptible Power Supply) provides short-term backup power if a power outage or low-voltage situation was to occur. The incorrect answers: A. Cloud-based storage The use of cloud-based storage does not provide any server uptime if a power outage occurs. C. Redundant power supplies Some servers might use redundant power supplies to maintain uptime if one of the power supplies was to fail. If there's a power outage, then none of the power supplies will be working properly. D. Surge suppressor A surge suppressor will protect a computer from spikes and noise, but it won't provide any uptime if the primary power source was to fail.
48
Give a description of the following technologies: UPS
``` A UPS (Uninterruptible Power Supply) provides short-term backup power if a power outage or low-voltage situation was to occur. ```
49
A system administrator has booted a computer using PXE. Which of the following would be the MOST likely reason for this task? ❍ A. Monthly OS patch install ❍ B. OS installation from a network drive ❍ C. Boot to Safe Mode ❍ D. Control the computer remotely
The Answer: B. OS installation from a network drive PXE (Preboot eXecution Environment), or "Pixie," is a method of booting a computer from an image file located on a network server. One common use of PXE boots are to install an operating system across many systems at the same time. The incorrect answers: A. Monthly OS patch install It's not necessary to boot from a network drive to install the monthly Microsoft operating system patches. C. Boot to Safe Mode Booting into Safe Mode can be managed on a local computer without the requirement of booting across the network using PXE. D. Control the computer remotely Remote control or remote desktop functionality is managed with applications on the operating system. It is not necessary to boot with PXE to control a device remotely
50
A business partner in a different country needs to access an internal company server during the very early morning hours. The internal firewall will limit the partner’s access to this single server. Which of these would be the MOST important security task to perform on this server? ❍ A. Install the latest OS patches ❍ B. Remove the server from the Active Directory domain ❍ C. Use only 64-bit applications ❍ D. Run a weekly anti-virus scan
The Answer: A. Install the latest OS patches This system will be used during non-working hours from a location that is not part of your organization, so keeping the operating system secure will be important. Maintaining an aggressive patching schedule will ensure that any known vulnerabilities are always removed before they could possibly be exploited. The incorrect answers: B. Remove the server from the Active Directory domain An Active Directory domain allows a domain administrator to centrally manage security policies and to provide ongoing monitoring of a device. The server would be less secure if it were removed from the AD domain. C. Use only 64-bit applications There's no enhanced security with 64-bit applications, so ensuring the use of those applications wouldn't provide any significant security advantages. D. Run a weekly anti-virus scan The concern with this server is that it will be accessed by unknown thirdparties from the partner's network. Running an anti-virus scan every week would not provide any significant security benefit, and would probably be delivered too late to be of use.
51
A Linux administrator has been asked to upgrade the web server software on a device. Which of the following would provide the administrator with the appropriate rights and permissions for this upgrade? ❍ A. chmod ❍ B. apt-get ❍ C. ifconfig ❍ D. sudo
The Answer: D. sudo The sudo (superuser do) command will execute a command as the superuser or any other user on the system. When performing administrative tasks such as upgrading software, it's often necessary to use elevated rights and permissions. The incorrect answers: A. chmod The chmod (change mode) command will modify the read, write, and execution permissions for a file system object. The mode of a file or folder would not commonly need to be modified during an upgrade. B. apt-get The apt-get (Advanced Packaging Tool) command is used to manage application packages and software upgrades. The apt-get command does not provide any additional rights and permissions, however. C. ifconfig The ifconfig (Interface Configuration) command displays or configures a network interface and IP address configuration. No rights or permissions are provided through the ifconfig command.
52
A network administrator is configuring a wireless network at a small office. The administrator would like to allow wireless access for all computers but exclude a single kiosk in the lobby. Which of the following configuration settings would meet this requirement? ❍ A. SSID suppression ❍ B. Content filtering ❍ C. Static IP addressing ❍ D. WPS ❍ E. MAC filtering
The Answer: E. MAC filtering MAC (Media Access Control) address filtering can be configured to allow or deny access to the network based on the hardware address of the wireless network adapter. Given the available options, MAC filtering would be the only way to provide this type of device exclusion. The incorrect answers: A. SSID suppression The SSID (Service Set Identifier) is the name of the wireless network, and most access points allow the administrator to control the broadcasting of the network name. This option would not display the name on a list of available wireless networks, but a device could connect to the network if the name was already known. B. Content filtering Content filtering refers to the control of information inside of an existing data flow. This commonly controls based on the URLs (Uniform Resource Locators) associated with websites, allowing the administrator to allow or deny access to certain categories of online content. This functionality would not be used to limit wireless network access for a single device. Practice Exam A - Answers 125 C. Static IP addressing Static IP addressing would require the administrator to manually assign IP addresses to all of the devices on the network, but this manual assignment is not a security feature and would not necessarily restrict access to the network from any device. D. WPS WPS (Wi-Fi Protected Setup) is a configuration option on a wireless access point that is designed to make it easier for other devices to connect to the network. The use of WPS does not provide a way to limit or restrict wireless network access if a device already has the proper credentials.
53
A security administrator has received an alert that a user’s workstation in the shipping department has attempted to communicate to a command and control server for a well-known botnet. The logs on the workstation show that the user manually installed a new Internet browser the previous day. Which of the following would be the BEST next step for troubleshooting this issue? ❍ A. Uninstall the new browser ❍ B. Backup the user's documents ❍ C. Roll back to a previous restore point ❍ D. Disable the user's account
The Answer: D. Disable the user's account The first step after identifying a malware infection is to quarantine the system. This would include removing the system from the network and preventing the user's account from accessing other network resources. The incorrect answers: A. Uninstall the new browser Once the new browser was installed, the malware undoubtedly made significant changes to the user's operating system. Uninstalling the browser would not remove the existing malware infection. B. Backup the user's documents Although it will be important to preserve as much of the data as possible, performing a backup of the user's documents would not be the best next step given the available options. C. Roll back to a previous restore point If the system is infected with malware, then it's very likely that the previous restore points have also been infected. Rolling back to a previous restore point will most likely not remove the malware.
54
A technician is installing a new wireless network in a small remote office. Which of the following should the technician choose to provide the highest level of security on the network? ❍ A. WPA2 ❍ B. MAC filtering ❍ C. Static IP addressing ❍ D. SSID suppression
The Answer: A. WPA2 WPA2 (Wi-Fi Protected Access 2) encryption is used to protect the data transmitted over the wireless network. WPA2 or similar encryption would be considered to be the highest level of data protection on a wireless network. The incorrect answers: B. MAC filtering MAC (Media Access Control) filtering is used to allow or deny access to the network based on the hardware address of the wireless adapter. However, MAC filtering can be easily circumvented and is not considered a security feature. C. Static IP addressing Static IP address would require the network administrator to manually assign IP addresses to the network devices. Static IP addressing does not provide any security features. D. SSID suppression SSID (Service Set Identifier) suppression will prevent the name of the wireless network from appearing in lists of available networks. SSID suppression does not prevent someone from connecting to the network if they already know the name, and it's not considered a security feature
55
Give a description of the following technologies: PXE
PXE or "Pixie" (Preboot eXecution Environment) is a method of booting a computer from a device over the network instead of from operating system files on a local storage device. This method is especially useful when managing large groups of devices, such as a training room.