Certmaster Flashcards

1
Q

Which explanation best describes the maximum password age policy?

When the password reaches its time limit; the user is forced to change the password

When the user account setting enforces password complexity rules

When the user account setting stops the user from
changing his or her account password

When the user account setting requires a unique password must be used when the user changes the password

A

When the password reaches its time limit; the user is forced to change the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What method of malware delivery can be marginalized by using email filtering?
Spim
Spam
Viruses
Trojan horses
A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the recommended command to use when copying an entire folder structure to a new location?

move
xcopy
copy
robocopy

A

robocopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What term refers to submitting the authorization as proof that the user is authenticated?

Biometric Authentication
Mutual Authentication
Software Token
Single Sign-On (SSO)

A

Software Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following boot methods is commonly set as highest priority in order to perform a repair or install?

Hard drive
Optical drive
USB
Network/PXE

A

Optical drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify the best physical security method for network access points from the following choices.

Sit on top of a filing cabinet
Add a cable lock.
Position on a high ceiling.
Place in a remote wiring closet.

A

Add a cable lock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is NOT a reason for Windows to display an invalid certificate warning?

Expiration of the certificate
Issued by an untrusted root
Bypassing the certificate requirement
Certificate issued to a host other than the one being accessed

A

Bypassing the certificate requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What loads only basic drivers and services required to start the system?

Startup Repair
Safe Mode
Startup Settings
The Advanced Boot Options menu

A

Safe Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to create a basic script to perform some administrative tasks on a Windows PC. Which script type would you NOT use?

.ps1
.vbs
.sh
.bat

A

.sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which mobile device plan addresses many of the concerns with bring your own device (BYOD) programs, but still provides some flexibility for users?

Restricted BYOD
Corporate-Owned, Business Only (COBO)
Corporate Owned, Personally Enabled (COPE)
Choose Your Own Device (CYOD)

A

Corporate Owned, Personally Enabled (COPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The corporate security team found that someone has broken into the network using a local Internet Protocol (IP) address and an allowed Media Access Control (MAC) address. Using an IP address and MAC address in this way is known as which type of attack?

Spimming
Impersonation
Spoofing
Spamming

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are headed to a customer site to meet with a sales manager. You have met in the past to discuss repetitive technical issues the department has been experiencing. In order to best present the sales manager a clear understating of the suggested remedies, what customer service communication technique should you practice?

Do not argue
Avoid jargon and acronyms
Be culturally sensitive
Narrow the scope of the problem

A

Avoid jargon and acronyms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is false about troubleshooting wireless configuration issues?

Try removing the network from the device list then reconnecting to it.
Verify that the access point supports the same 802.11 standard as the device.
Verify the device is turned on then click on random apps.
Research any known issues between the access point and the model of device.

A

Verify the device is turned on then click on random apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are troubleshooting an Application on a Windows 10 PC. You need to check if a service is running. How can you accomplish this?

Startup tab in tskmgr
General tab in msconfig
Services tab in msconfig
Boot tab in msconfig

A

Services tab in msconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

There has been an incident at work. A possible data breach has occurred on a workstation that is critical to the business. Upon arrival to work, you find the workstation untouched by anyone other than the usual user who says the system doesn’t seem right. They have stopped using the system. Which investigative approach should you take first?

Identify the issue
Report through proper channels
Preservation of the data
Chain of custody

A

Identify the issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which is the best reason for slow data speeds?

Trojan
Malware
Worm
Virus

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of these is a Windows event type?

Security log and Application log
Setup
Failure Audit
System log

A

Failure Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network diagrams can show logical and physical relationships between different elements. What is this relationship called?

Topology
Configuration
Schematic
Schema

A

Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following can cause a weak signal in a mobile device?

App Log Errors
Low battery charge
Slow performance
Apps not loading

A

Low battery charge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You are working on a Linux system and need to edit a file. Which command do you use?

grep
vi
apt-get
ls

A

vi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an Internet service provider (ISP)?

A device used to translate a cable signal coming into the house into a wireless signal
A protocol used to facilitate data transfer between different operating systems
An address used to identify a host or client endpoint
A company that provides Internet access to homes or businesses

A

A company that provides Internet access to homes or businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You notice that your computer is running slowly and you think it is due to an errant process. Using the command line and command line tools, how do you view the list of running applications?

FSUTIL
NET VIEW F
DIR /S
TASKLIST

A

TASKLIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

To ensure maximum compatibility with all wired networks that you might connect to, how should you configure transmission on your wired Ethernet network interface card (NIC)?

1 Gbps
Auto negotiate
Half duplex
Full duplex

A

Auto negotiate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the common solution to defragment the hard drive?

msconfig
sata
hdd
defrag

A

defrag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which technique can be used in case of a mobile device theft or loss to protect any confidential data stored on the device?

Remote power off
Remote wipe
Remote Wi-Fi disable
Remote lock

A

Remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of these is a common symptom of infection by spyware or adware?

Disappearing files
Slow performance
Security alerts
Application crash

A

Slow performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You have a small office of six employees and you want to have a network to enable file and printer sharing and to add a bit of security. Which type of Windows network should you select for this scenario?

HomeGroup
Workgroup
Client/server
Active Directory domain

A

Workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following boot methods involves using the network adapter to obtain boot settings?

Network/PXE
USB
Optical drive
Hard drive

A

Network/PXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A user’s Windows 10 computer is not able to communicate with the Internet but is able to access a network printer. Which of the following network settings do you need to modify?

Subnet mask
MAC address
IP address
Gateway address

A

Gateway address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How would you protect a browsing session when using a public hotspot?

Secure Sockets Tunneling Protocol (SSTP)
WPA2
IPSec
Virtual Private Network (VPN)

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the greatest danger of rootkit malware?

They install pop-up browser ads.
They collect browser history and send it to the developer.
They are difficult to detect.
They corrupt the hard drive boot sector.

A

They are difficult to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A user has been receiving errors when using an application. They send you a screenshot, but the errors are not very detailed. Which of the following logs should you examine in Event Viewer to see more verbose error output?

Application
Security
Setup
System

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

How can you detect if a hacker has unauthorized access to the camera on your device?

By checking the installed apps
By the amount of send/receive activity
By checking your phone directory
By checking to see if the camera is working

A

By the amount of send/receive activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is a regulation of data within and exported outside of the European Union?

PCI
PII
GDPR
PHI

A

GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the possible consequence of forcing users to change passwords too often?

Frequent changes might overburden domain controllers when updating the Active Directory forest permissions.
Some users will experience access denials because of the frequent changes.
Mapped network drives will have to be remapped with each password change.
They might write down their passwords because they cannot remember them.

A

They might write down their passwords because they cannot remember them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You are creating a documentation repository. You need to submit documentation for critical tasks including, restoring a production server and process nightly firewall log reports. What type of documents will you be creating?

Regulations
Configuration item (CI)
Standard operating procedure (SOP)
Configuration management database (CMDB)

A

Standard operating procedure (SOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

You have a removable drive that needs to hold large files and be read/write capable in both Windows and macOS environments. Which of the following file systems should you use to format the drive?

NTFS (New Technology File System)
FAT32 (File Allocation Table 32-bit)
CDFS (CD File System)
exFAT (extended File Allocation Table)

A

exFAT (extended File Allocation Table)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the reason for using Wi-Fi Protected Access version 2 (WPA2) instead of Wired Equivalent Privacy (WEP) on a router?

Improved transmission rates
Improved connection stability
Improved wireless signal range
Improved data security

A

Improved data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

You need to implement a backup storage security plan for the company backups. Which of the following is NOT considered a security best practice?

Data encryption
Role-based access
Redundant connectivity
Backup and restore logging

A

Redundant connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

When it comes to using remote access methods, what is the prevalent concern?

Security
Regulations
Data speed
Specifications

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What should you suspect if a handheld device becomes unusually hot?

The backlight setting is too low.
There is a problem with the battery.
The mute switch is activated.
There are hardware issues such as dirt, grease, or cracks.

A

There is a problem with the battery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following is referred to as ‘fake anti-virus’?

Spyware
Keyloggers
Scareware
Ransomware

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What common issue happens when the user sets the backlight on their mobile device to its lowest setting?

A dim display
Sound issues
External monitor issues
An unresponsive touchscreen

A

A dim display

44
Q

A user needs to work remotely and access network resources. What type of connection allows the user to connect remotely and securely to the internal network?

Wired
VPN
WWAN
Wireless

A

VPN

45
Q

You are troubleshooting a Windows 10 PC that runs very slowly after the user logs on. You want to check how many programs are configured to start. How can you accomplish this?

Boot tab in msconfig
General tab in msconfig
Startup tab in tskmgr
Services tab in msconfig

A

Startup tab in tskmgr

46
Q

What is the common solution to disable application startup?

Performance Monitor
Close Session
Resource Monitor
System Configuration Utility

A

System Configuration Utility

47
Q

Which of these is NOT associated with troubleshooting wireless configuration issues?

A low battery
The device stuck in airplane mode
Wi-Fi adapter and AP compatibility standards
Bluetooth pairing information

A

A low battery

48
Q

Why do administrators insist on disabling the autorun feature for inserted media and removable devices?

It speeds up access to media when disabled.
It prevents Java-based programs from loading into memory.
It prevents scanning by antivirus software to disable autorun.
It prevents the automatic launching of malware.

A

It prevents the automatic launching of malware.

49
Q

Updating anti-virus and anti-malware software is extremely important in preventing security compromises on systems. How often should you apply updates?

Anti-malware updates should be applied quarterly with other rollup updates.
Anti-malware updates should be applied as soon as they are available.
Monthly updates for all malware are sufficient to protect most systems.
Anti-malware updates should be applied weekly, or as time permits.

A

Anti-malware updates should be applied as soon as they are available.

50
Q

The current directory is “C:\Users\David\Documents” and you want to move into a sub-directory called “Tech_files.” It is the only sub-directory. Which of the following commands could you enter to move into that directory?

cd T*
cd\
cd ....
cd ..

A

cd T*

51
Q

Your organization uses images to deploy Windows to laptops on the network. You are responsible for creating a new image. You run Microsoft’s System Preparation Tool (sysprep) before imaging the disk. Which of the following is NOT a reason to use sysprep before creating an image?

Sysprep updates all drivers.
Sysprep removes the Windows Security ID (SID) from the machine.
Sysprep preserves all data from the machine.
Sysprep preserves the Windows updates that have been applied.

A

Sysprep updates all drivers.

52
Q

Which of the following network card transmissions settings only allows 1-way data communication?

1 Gbps
Full duplex
Half duplex
Auto negotiate

A

Half duplex

53
Q

Where can you set the programs you wish to use for particular tasks or to configure individual file associations?

The System Properties applet
The Computer Manager applet
The Program and Features applet
The Default Programs applet

A

The Default Programs applet

54
Q

You will be documenting a customer’s network with several network diagrams. One diagram you will be creating will show the actual connectivity of devices. Which type of diagram will you be creating?

Regulatory
Asset
Logical
Physical

A

Physical

55
Q

An administrator suspects that a user who arrives early, stays late, and sometimes works weekends might be stealing data. How can the administrator limit this user without raising the user’s suspicion?

Lock down the user’s access on their workstation and the network to a small subset of the standard accessible areas.
Set up strict file permissions on sensitive files using file attributes.
Restrict login hours to standard working hours.
Disable the user’s Active Directory account.

A

Restrict login hours to standard working hours.

56
Q

You will be creating a diagram for the research and development department. The diagram will document the business flow of a web development process. What type of diagram will you be creating?

Regulatory
Logical
Physical
Policy

A

Logical

57
Q

You have decided to roll out Microsoft Office to all users using a single license that covers all users. Which type of license will be used?

OEM
Open source
Volume
Retail

A

Volume

58
Q

Which security feature does Windows BitLocker provide for computer systems and for users?

Encrypted communications link
Full disk encryption
Single sign-on capability
Kerberos

A

Full disk encryption

59
Q

While typing in your debit card personal identification number (PIN) at a grocery store terminal, you notice someone watching you press the numbers for your card. What is this method of stealing information known as?

Spoofing
Phishing
Shoulder surfing
Spear phishing

A

Shoulder surfing

60
Q

Which of the following is NOT a ‘red flag’ for malware infection?

Date stamps and file sizes of infected files change.
Permissions attributes of files change, resulting in “Access Denied” errors.
The file system or individual files are updated.
The file system or individual files are corrupted or deleted.

A

The file system or individual files are updated.

61
Q

A company hesitates to upgrade to the latest version of an operating system (OS). Which of the following is NOT a concern for the company?

Cost
Network compatibility
Web application compatibility
Software compatibility

A

Web application compatibility

62
Q

Which is the worst-case scenario for unauthorized location tracking?

Tailgating
Domestic burglary
Piggybacking
Advertisements

A

Domestic burglary

63
Q

What is one of the most notable differences between iOS and Android?

iOS apps are only compatible with iOS.
Android is open source.
Handset vendors can make their own Android version.
Android releases major and minor versions.

A

Android is open source.

64
Q

What setting should you enable if you wanted to configure a host to automatically and dynamically forward inbound traffic received on specific ports to other ports?

Media access control (MAC) filtering
Universal Plug and Play (UPnP)
Dynamic Network Address Translation (DNAT)
Port triggering

A

Port triggering

65
Q

What term refers to a small section of a private network located between two firewalls and made available for public access?

Demilitarized zone (DMZ)
Domain
Subnet
Local area network (LAN)

A

Demilitarized zone (DMZ)

66
Q

Instead of searching for the Windows Device Manager, how do you start it from the Run dialog box?

compmgmt. msc
control. exe
devmgmt. msc
taskmgr. exe

A

devmgmt.msc

67
Q

You will be virtualizing a Linux workstation on a Linux host system. The hypervisor you will be using is available freely on the Internet for any type of use. What type of license does the hypervisor likely use?

OEM
Retail
Open source
Volume

A

Open source

68
Q

Which form of wireless encryption introduced the Temporal Key Integrity Protocol (TKIP) security protocol?

802.11i
Wi-Fi Protected Access (WPA)
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access version 2 (WPA2)

A

Wi-Fi Protected Access (WPA)

69
Q

Where are 32-bit application files stored in a 64-bit Windows environment?

Program Files
%SystemRoot%\system32
%SystemRoot%\syswow64
Program Files (x86) folder

A

Program Files (x86) folder

70
Q

Which Windows version imposed significant user interface changes to provide better support for touchscreens?

Windows XP
Windows 10
Windows 7
Windows 8

A

Windows 8

71
Q

Identify which virus becomes active when the application is executed?

Firmware virus
Script virus
Program virus
Boot sector virus

A

Program virus

72
Q

You have installed a new Windows 2016 server. You need to monitor this server over the next 6 months for performance. What is the first step that should be taken?

Perform a bare metal installation.
Create a standard operating procedure (SOP).
Record a baseline.
Diagram the topology.

A

Record a baseline.

73
Q

You install a second hard drive into your computer to store data on and, after a bit of preliminary setup, you have to perform which of the following actions to prepare the drive for file storage?

BOOTREC
CHKDSK
FORMAT
GPRESULT

A

FORMAT

74
Q

Which of the following is NOT part of patch management?

Segregating updates into urgent, important, and non-critical categories prior to deployment
Evaluation of fixes on various operating systems and in different user environments
Replacing hardware components on a break/fix schedule
Delivery of approved urgent software fixes

A

Replacing hardware components on a break/fix schedule

75
Q

What is the most likely cause of Windows booting but not displaying the login dialog or failing to load the desktop?

A corrupt user profile
Update installs
A malware infection or corrupt drivers
A network service or configuration problem

A

A malware infection or corrupt drivers

76
Q

You were notified that a data breach occurred on a social media site that you visit frequently. What should be the first action you take once you receive notification about the breach?

Delete your account immediately.
Check your account from your mobile device.
Change your password as soon as possible using your mobile device.
Change your password as soon as possible using a clean uncompromised device.

A

Change your password as soon as possible using a clean uncompromised device.

77
Q

What is the purpose of Material Safety Data Sheet (MSDS) documentation?

Dealing with confidential data
Proper disposal of equipment
Compliance to government regulations
Customer expectations

A

Proper disposal of equipment

78
Q

A user located in another building is having difficulty printing. The user states they receive an error message. What method would best be used to view and understand the error?

VPN
Telnet
SSH
Screen sharing

A

Screen sharing

79
Q

Which of these is NOT an intent for adware and spyware?

Commercial pop-ups
To vandalize the computer system
New toolbars, the home page changing suddenly, and faults
Web page redirection

A

To vandalize the computer system

80
Q

Which of the following is NOT a reasonable bring your own device (BYOD) security requirement from a company to its employees?

Be sure that all apps and networks are from trusted sources
Configure a local firewall on the device
Install no personal apps on the device
Set up a password-protected screen lock

A

Install no personal apps on the device

81
Q

What is a symptom of a rootkit?

Enter a secure area without authorization
Disguise malicious activity by appearing to perform a useful one
Take advantage of vulnerability in an application
Hide the actions of other types of malicious software

A

Hide the actions of other types of malicious software

82
Q

A disaster prevention and recovery process needs to be put in place for a critical Windows server. Which of the following does NOT address this process?

Surge protector
Backout plan
Account recovery
File-level backup

A

Backout plan

83
Q

Over the years your company has acquired a closet full of old unused technology. You need to properly dispose of the equipment. Which of the following would NOT be considered an environmental hazard?

Cell Phone
Computer case
CRT
Toner

A

Computer case

84
Q

You need to write a script to help with systems automation. You need to use comparison operators to accomplish a task within the script. What syntax would be used for less than?

<
>=
<=
>

A
85
Q

Which computer component contains a glass vacuum tube that needs to be disposed of properly?

LCD Panel
DVD-ROM
CRT Monitor
Printer

A

CRT Monitor

86
Q

What would most likely cause a cable fire?

Too much current through a cable
Improperly terminated Ethernet cable ends
Non-plenum rated cable
Plenum rated cable

A

Too much current through a cable

87
Q

What protocol is used to provide nonsecure remote access from host terminals to various servers and network devices?

A

Telnet

88
Q

What protocol is used when email is stored locally and might not synchronize if accessed from multiple locations but is available offlilne?

A

POP3

89
Q

What protocol delivers administrative alerts to and from network devices?

A

SNMP - Simple Network Management Protocol

90
Q

Which protocol is used to provide connectionless network service?

A

UDP - User Datagram Protocol

91
Q

Which protocol offers a synchronized time service to all configured network devices?

A

NTP - Network Time Protocol

92
Q

Which protocol is used to resolve IP addresses to MAC addresses for purpose of local-area message delivery?

A

ARP - Address Resolution Protocol

93
Q

Which protocol manages the initiation of VOIP phone services?

A

SIP - Session Initiation Protocol

94
Q

Which protocol offers a secure connection from virtual terminal to remote devices?

A

SSH - Secure Shell

95
Q

Which protocol provides for the automatic assignment of IP addresses to hosts on a given network?

A

DHCP - Dynamic Host Configuration Protocol

96
Q

Which protocol provides encryption for data above the transport layer and updates the SSL protocol?

A

TLS - Transport Layer Security

97
Q

Which nonsecure client/server protocol is used to retrieve data from web servers to their clients?

A

HTTP - Hypertext Transfer Protocol

98
Q

Which protocol is used by email servers to deliver email between server systems?

A

SMTP - Simple Mail Transfer Protocol

99
Q

What protocol is used to transfer files in a connection-oriented state?

A

FTP - File Transfer Protocol

100
Q

What protocol is used as a connection-oriented delivery of upper-layer datagrams using acknowledgments?

A

TCP - Transmission Control Protocol

101
Q

What protocol is a network layer protocol used by programs such as ping to deliver network connection messages to requesting clients?

A

ICMP - Internet Control Message Protocol

102
Q

Which protocol offers a secure authentication of clients to web servers before delivery of requested data?

A

HTTPS - Hypertext Transfer Protocol Secure

103
Q

Which protocol is often used in audio/video delivery of real-time data requiring QoS and tight sequencing?

A

RTP - Real-Time Transport Protocol

104
Q

Which protocol resolves fully qualified domain names to their unique IP addresses

A

DNS - Domain Name System

105
Q

What protocol is used when the email is stored on the server and can be accessed from multiple locations?

A

IMAP - Internet Message Access Protocol

106
Q

What network layer protocol that makes multicast connections for purposes of delivering mass datagrams simultaneously to groups of clients?

A

IGMP - Internet Group Management Protocol