1102 Certification Practice Exam 8 Flashcards
Which of the following should you implement to monitor and manage the risks of a BYOD policy?
Mobile device management
What do you call an operating system that no longer receives security patches or updates?
End-of-life
Which of the following requirements must be met in order to extend a volume?
-The volume must be formatted with NTFS.
-The volume must be unformatted.
You need to use a common USB flash drive to transport important sensitive information for your organization.
Which of the following would be the BEST program for protecting the data on the flash drive with encryption?
BitLocker To Go
Which of the following Bring Your Own Device benefits is a result of users becoming experts in device usage?
Increased productivity
Which encryption method is used in WPA3 to generate a new key for every transmission?
SAE
One day, while trying to start your Windows 11 computer, the system displays the following error:
Windows could not start. Could not read from the selected boot disk. Check boot path and disk hardware.
Which of the following solutions will MOST likely fix the problem?
Boot into the Recovery Environment and run the bootrec /rebuildbcd command.
A security technician is conducting a forensic analysis.
Which of the following actions is MOST likely to destroy critical evidence?
Shutting down the system
Which of the following statements are true regarding administrative shares?
-To connect to an administrative share, you must use the UNC path.
-By default, Windows automatically creates an administrative share for every volume.
You have just installed the latest Windows updates on your Windows 11 computer. After the computer has rebooted, you get the following error message:
Error: Windows failed to start. A recent hardware or software change might have caused the issue after you installed Windows updates.
Because your computer won’t start, you have booted your computer into the Advanced Options section of the Windows 11 recovery environment (see image below).
While troubleshooting this issue, which of the advanced options would be the BEST to try first?
Start-up Repair
Which of the following are features of Group Policy Editor (gpedit.msc)?
-Can run specific scripts at specified times
-Lets you enforce settings on all computer in an Active Directory network.
Which of the following is true about System Restore?
System changes made since the restore point was taken are undone.
You are a security consultant and have been hired to evaluate an organization’s physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock.
A receptionist is located next to a locked door in the reception area. They use an iPad application to log any security events that may occur. They also use their iPad to complete work tasks as assigned by the organization’s CEO.
Network jacks are provided in the reception area so that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time.
Which of the following recommendations are you MOST likely to make to this organization to increase their security?
-Disable the network jacks in the reception area.
-Train the receptionist to keep their iPad in a locked drawer when not in use.