test 1 Flashcards
A technician has recently removed malware from a Windows computer,
but the technician is concerned that some of the system files may have
been modified. From the command line, analyze and repair any damaged
operating system files
sfc /scannow
how many steps are there in the malware removal process?
7
what is the first task when removing malware?
Identify malware symptoms
what is the second task when removing malware from a system?
Quarantine infected systems
what is the third task when removing malware from a system?
Disable system restore
what is the fourth task when removing malware from a system?
Remediate
what is the fifth task when removing malware from a system?
Schedule scans and run updates
what is the sixth task when removing malware from a system?
Enable system restore
what is the seventh task when removing malware from a system?
Educate the end user
list all seven steps of malware removal
1 Identify malware symptoms 2 Quarantine infected systems 3 Disable System Restore 4 Remediate 5 Schedule scans and run updates 6 Enable System Restore 7 Educate the end user
Give a description of the following technologies: EULA
The EULA (End User Licensing Agreement) determines how the software can be used by the end user. The user will commonly be required to agree to the terms of the EULA before the software can be installed.
e.g. Software can be used on one computer and one copy can be stored for backup purposes.
Give a description of the following technologies: PII
PII (Personally Identifiable Information) is any data that could be associated
with an individual. For example, your name, address, phone number, and email
address are considered PII.
A database includes all client first names, last
names, and home addresses.
Give a description of the following technologies: PCI DSS
PCI DSS (Payment Card Industry Data Security Standard) is a set of objectives created by the credit card industry to ensure that financial transaction data is stored and transmitted securely.
Any credit card numbers stored locally must
be encrypted.
Give a description of the following technologies: FOSS
FOSS (Free and Open Source) software is distributed for free and usually
includes access to the source code of the application.
The software includes source code and can be distributed at no cost.
Give a description of the following technologies: GDPR
The GDPR (General Data Protection Regulation) is a regulation that controls data protection and privacy for individuals in the EU.
European Union citizens can request to have all personal data removed.
Give a description of the following technologies: PHI
PHI (Protected Health Information) is any healthcare data that can be
associated with an individual.
All blood test results are stored on laboratory file servers.
A user needs to access a file located on the \gate-room server. The file is
located in a share called ship-diagnostics. Use the command line to
connect to this share using drive g:.
NET USE G: \GATE-ROOM\SHIP-DIAGNOSTICS
The Windows net use command is used to map a network share to a drive
letter. The syntax is: net use drive: \servername\sharename
Give a description of what this command does: taskkill
The Windows taskkill command will terminate tasks by process id (PID) or by
the name of the executable.
e.g. Terminate a process by PID
Give a description of what this command does: diskpart
Diskpart (Disk Partitioning) provides command line access to disk and
partition configuration settings.
List the volume names on a storage drive.
Give a description of what this command does: dism
The dism (Deployment Image Servicing and Management tool) utility is used to manage Windows Imaging Format (WIM) files.
Make changes to a WIM image.
Give a description of what this command does: chkdsk
The chkdsk (Check Disk) command can fix logical file system errors and locate and recover data from bad sectors on a hard drive.
Repair logical file system errors.
Give a description of what this command does: gpresult
The gpresult (Group Policy Results) utility allows the domain administrator to verify policy settings for a computer or user.
Verify group policy settings for a user.
A user has opened a help desk ticket regarding the battery life on their
mobile phone. The battery in the phone held a charge for most of the day
prior to connecting to the corporate network. The battery now only lasts
about half a day and the back of the phone is warmer than usual.
The phone is configured as follows:
Storage: 116.2 GB of 256 GB used
Display and Brightness: Automatic
Wi-Fi: Enabled
Auto-lock: Disabled
VPN: Not connected
Low Power Mode: Disabled
Battery Maximum Capacity: 100%
Which of the following changes would have the BEST impact on
battery performance?
β A. Enable auto-lock
β B. Connect to the VPN
β C. Increase available storage space
β D. Disable Wi-Fi
The Answer: A. Enable auto-lock
The backlight of a mobile phone requires constant battery use, and the
phone in an active state will use more battery than one that is locked or in
a standby state.
The incorrect answers:
B. Connect to the VPN
Connecting to a VPN would most likely increase the amount of battery
used due to the encryption and decryption that would need to occur.
C. Increase available storage space
The battery life on a phone is not based on the amount of storage space in
use. Increasing storage space would not extend the life of the battery.
D. Disable Wi-Fi
Wi-Fi does not have a significant impact on battery performance when
compared to the screen backlight and active phone services
Which of the following governmental policies manages the use of
personal data?
β A. PCI DSS
β B. EULA
β C. GDPR
β D. FOSS
The Answer: C. GDPR
GDPR (General Data Protection Regulation) is a European regulation
that provides data protection and privacy for individuals in the European
Union.
The incorrect answers:
A. PCI DSS
PCI DSS (Payment Card Industry Data Security Standard) is a set of
guidelines for protecting credit card data. PCI DSS are industry guidelines
and are not directly associated with governmental regulation.
B. EULA
EULA (End User Licensing Agreement) determines how software can be
used by the end user. This agreement is not a governmental policy.
D. FOSS
FOSS (Free and Open Source) software is freely available and commonly
includes the source code of the software. FOSS is not associated with a
governmental policy.