Certmaster Flashcards
Which explanation best describes the maximum password age policy?
When the password reaches its time limit; the user is forced to change the password
When the user account setting enforces password complexity rules
When the user account setting stops the user from
changing his or her account password
When the user account setting requires a unique password must be used when the user changes the password
When the password reaches its time limit; the user is forced to change the password
What method of malware delivery can be marginalized by using email filtering? Spim Spam Viruses Trojan horses
Spam
What is the recommended command to use when copying an entire folder structure to a new location?
move
xcopy
copy
robocopy
robocopy
What term refers to submitting the authorization as proof that the user is authenticated?
Biometric Authentication
Mutual Authentication
Software Token
Single Sign-On (SSO)
Software Token
Which of the following boot methods is commonly set as highest priority in order to perform a repair or install?
Hard drive
Optical drive
USB
Network/PXE
Optical drive
Identify the best physical security method for network access points from the following choices.
Sit on top of a filing cabinet
Add a cable lock.
Position on a high ceiling.
Place in a remote wiring closet.
Add a cable lock.
Which of the following is NOT a reason for Windows to display an invalid certificate warning?
Expiration of the certificate
Issued by an untrusted root
Bypassing the certificate requirement
Certificate issued to a host other than the one being accessed
Bypassing the certificate requirement
What loads only basic drivers and services required to start the system?
Startup Repair
Safe Mode
Startup Settings
The Advanced Boot Options menu
Safe Mode
You need to create a basic script to perform some administrative tasks on a Windows PC. Which script type would you NOT use?
.ps1
.vbs
.sh
.bat
.sh
Which mobile device plan addresses many of the concerns with bring your own device (BYOD) programs, but still provides some flexibility for users?
Restricted BYOD
Corporate-Owned, Business Only (COBO)
Corporate Owned, Personally Enabled (COPE)
Choose Your Own Device (CYOD)
Corporate Owned, Personally Enabled (COPE)
The corporate security team found that someone has broken into the network using a local Internet Protocol (IP) address and an allowed Media Access Control (MAC) address. Using an IP address and MAC address in this way is known as which type of attack?
Spimming
Impersonation
Spoofing
Spamming
Spoofing
You are headed to a customer site to meet with a sales manager. You have met in the past to discuss repetitive technical issues the department has been experiencing. In order to best present the sales manager a clear understating of the suggested remedies, what customer service communication technique should you practice?
Do not argue
Avoid jargon and acronyms
Be culturally sensitive
Narrow the scope of the problem
Avoid jargon and acronyms
Which is false about troubleshooting wireless configuration issues?
Try removing the network from the device list then reconnecting to it.
Verify that the access point supports the same 802.11 standard as the device.
Verify the device is turned on then click on random apps.
Research any known issues between the access point and the model of device.
Verify the device is turned on then click on random apps.
You are troubleshooting an Application on a Windows 10 PC. You need to check if a service is running. How can you accomplish this?
Startup tab in tskmgr
General tab in msconfig
Services tab in msconfig
Boot tab in msconfig
Services tab in msconfig
There has been an incident at work. A possible data breach has occurred on a workstation that is critical to the business. Upon arrival to work, you find the workstation untouched by anyone other than the usual user who says the system doesn’t seem right. They have stopped using the system. Which investigative approach should you take first?
Identify the issue
Report through proper channels
Preservation of the data
Chain of custody
Identify the issue
Which is the best reason for slow data speeds?
Trojan
Malware
Worm
Virus
Malware
Which of these is a Windows event type?
Security log and Application log
Setup
Failure Audit
System log
Failure Audit
Network diagrams can show logical and physical relationships between different elements. What is this relationship called?
Topology
Configuration
Schematic
Schema
Topology
Which of the following can cause a weak signal in a mobile device?
App Log Errors
Low battery charge
Slow performance
Apps not loading
Low battery charge
You are working on a Linux system and need to edit a file. Which command do you use?
grep
vi
apt-get
ls
vi
What is an Internet service provider (ISP)?
A device used to translate a cable signal coming into the house into a wireless signal
A protocol used to facilitate data transfer between different operating systems
An address used to identify a host or client endpoint
A company that provides Internet access to homes or businesses
A company that provides Internet access to homes or businesses
You notice that your computer is running slowly and you think it is due to an errant process. Using the command line and command line tools, how do you view the list of running applications?
FSUTIL
NET VIEW F
DIR /S
TASKLIST
TASKLIST
To ensure maximum compatibility with all wired networks that you might connect to, how should you configure transmission on your wired Ethernet network interface card (NIC)?
1 Gbps
Auto negotiate
Half duplex
Full duplex
Auto negotiate
What is the common solution to defragment the hard drive?
msconfig
sata
hdd
defrag
defrag
Which technique can be used in case of a mobile device theft or loss to protect any confidential data stored on the device?
Remote power off
Remote wipe
Remote Wi-Fi disable
Remote lock
Remote wipe
Which of these is a common symptom of infection by spyware or adware?
Disappearing files
Slow performance
Security alerts
Application crash
Slow performance
You have a small office of six employees and you want to have a network to enable file and printer sharing and to add a bit of security. Which type of Windows network should you select for this scenario?
HomeGroup
Workgroup
Client/server
Active Directory domain
Workgroup
Which of the following boot methods involves using the network adapter to obtain boot settings?
Network/PXE
USB
Optical drive
Hard drive
Network/PXE
A user’s Windows 10 computer is not able to communicate with the Internet but is able to access a network printer. Which of the following network settings do you need to modify?
Subnet mask
MAC address
IP address
Gateway address
Gateway address
How would you protect a browsing session when using a public hotspot?
Secure Sockets Tunneling Protocol (SSTP)
WPA2
IPSec
Virtual Private Network (VPN)
Virtual Private Network (VPN)
What is the greatest danger of rootkit malware?
They install pop-up browser ads.
They collect browser history and send it to the developer.
They are difficult to detect.
They corrupt the hard drive boot sector.
They are difficult to detect.
A user has been receiving errors when using an application. They send you a screenshot, but the errors are not very detailed. Which of the following logs should you examine in Event Viewer to see more verbose error output?
Application
Security
Setup
System
Application
How can you detect if a hacker has unauthorized access to the camera on your device?
By checking the installed apps
By the amount of send/receive activity
By checking your phone directory
By checking to see if the camera is working
By the amount of send/receive activity
Which of the following is a regulation of data within and exported outside of the European Union?
PCI
PII
GDPR
PHI
GDPR
What is the possible consequence of forcing users to change passwords too often?
Frequent changes might overburden domain controllers when updating the Active Directory forest permissions.
Some users will experience access denials because of the frequent changes.
Mapped network drives will have to be remapped with each password change.
They might write down their passwords because they cannot remember them.
They might write down their passwords because they cannot remember them.
You are creating a documentation repository. You need to submit documentation for critical tasks including, restoring a production server and process nightly firewall log reports. What type of documents will you be creating?
Regulations
Configuration item (CI)
Standard operating procedure (SOP)
Configuration management database (CMDB)
Standard operating procedure (SOP)
You have a removable drive that needs to hold large files and be read/write capable in both Windows and macOS environments. Which of the following file systems should you use to format the drive?
NTFS (New Technology File System)
FAT32 (File Allocation Table 32-bit)
CDFS (CD File System)
exFAT (extended File Allocation Table)
exFAT (extended File Allocation Table)
What is the reason for using Wi-Fi Protected Access version 2 (WPA2) instead of Wired Equivalent Privacy (WEP) on a router?
Improved transmission rates
Improved connection stability
Improved wireless signal range
Improved data security
Improved data security
You need to implement a backup storage security plan for the company backups. Which of the following is NOT considered a security best practice?
Data encryption
Role-based access
Redundant connectivity
Backup and restore logging
Redundant connectivity
When it comes to using remote access methods, what is the prevalent concern?
Security
Regulations
Data speed
Specifications
Security
What should you suspect if a handheld device becomes unusually hot?
The backlight setting is too low.
There is a problem with the battery.
The mute switch is activated.
There are hardware issues such as dirt, grease, or cracks.
There is a problem with the battery.
Which of the following is referred to as ‘fake anti-virus’?
Spyware
Keyloggers
Scareware
Ransomware
Scareware