Checkpoint Q’s Flashcards

1
Q

Which of the following operating systems are NOT used in modern smartphones or tablets?

a) iOS
b) Android
c) macOS
d) iPadOS

A

c) macOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend’s Windows 10 desktop. Which file format should you use?

a) FAT32
b) exFAT
c) HFS
d) NTFS

A

b) exFAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following operating systems cannot be run on a laptop?

a) Linux
b) Windows
c) Android
d) iOS

A

d) iOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which edition of Windows 10 does not have the group policy editor enabled?

a) Home
b) Pro
c) Pro for workstations
d) Enterprise

A

a) Home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have been asked to help a user upgrade their laptop from Windows 10 to Windows 11. The user has asked that all of their applications, user profiles, documents, and PST files be preserved during the upgrade. Which of the following types of upgrades or installations should you perform on this laptop?

a) Clean installation
b) In-place upgrade
c) Unattended installation
d) Regular upgrade

A

b) in-place upgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jason is building a new workstation for his son to utilize when writing reports for school. The new computer will have an Intel x86 processor, 3 GB of memory, and a 256 GB SSD. Which of the following editions of Windows 10 would support this workstation at the lowest cost?

a) Home
b) Pro
c) Pro for workstations
d) Enterprise

A

a) Home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When using an MBR, which of the following types of partitions can only have up to four partitions?

a) Extended
b) Primary
c) Swap
d) Logical

A

b) Primary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following types of installations would you use on a system with slow performance or one that you cannot isolate a single cause of the system’s issues?

a) Repair installation
b) Image deployment
c) Remote network installation
d) In-place upgrade

A

a) Repair installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user with an older laptop running Windows 7 that has only 2 GB of RAM, 32 GB of SSD, and a 1.7 GHz 64-bit processor. The user would like to upgrade to a newer OS since Windows 7 is now considered end-of-life. Which of the following operating systems should the technician recommend to ensure the BEST performance on this computer?

a) Windows 8
b) Windows 8.1
c) Windows 10
d) Windows 11

A

c) Windows 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Christina is talking with Fred in IT about a new program that she wants to install on her workstation. The system requirements say it needs 4 GB of RAM. Christina’s computer has 4 GB of RAM, but Fred says the program won’t work well on Christina’s computer. Why does Fred tell Christina the program won’t work well?

a) IT administrators should always minimize new software being installed on workstations because they often result it vulnerabilities.

b) It is clear to Fred that the computer doesn’t have the have the necessary storage space, so the software won’t run well.

c) Computers should have more than the minimum required RAM it order to work well.

A

c) Computers should have more than the minimum required RAM it order to work well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ahmed wants to ensure that he is installing the most up to date version of an application. What distribution method would be BEST meet Ahmed’s goal?

a) Install it from a CD
b) Download it from an app store
c) Install it from a DVD
d) Borrow it from a friend

A

b) Download it from an app store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Shaina wants to take into consideration all of the impacts of installing and configuring new software. In her analysis, she carefully examines the terms of the software license. What type of impact is she considering when she looks at the licensing agreement?

a) Operational impacts
b) Device impacts
c) Business impacts
d) Network impacts

A

c) Business impacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following network configurations is used to identify your computer’s individual host identifier and your computer’s network identifier?

a) WINS
b) Gateway
c) DNS
d) Subnet mask

A

d) Subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tim connects his Windows 10 laptop to his office’s wireless network to print out a report for his boss. Which type of network should he select to discover the printer on the office’s wireless network?

a. Public
b. Private
c. Home
d. Work

A

b. Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Jason is out of town on a business trip and needs to access the share drive on his company’s corporate network. Which of the following types of network connections should he use to access the share drive from his hotel room?

a. Dial-up
b. VPN
c. Wired
d. Wireless

A

b) VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure?

a. General
b. Connections
c. Content
d. Privacy

A

b. Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which low power mode is used with Windows 10 laptops to save power, but it takes longer to turn back on and resume where the user left off?

a) Sleep
b) Balanced
c) Hibernate
d) Power saver

A

c) Hibernate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following should you use to configure a network adapter’s duplex setting manually in Windows 10?

a) Internet Options
b) Windows Defender Firewall
c) System
d) Device Manager

A

d) Device Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following applets in Windows Settings would be used to determine what data collection and app permissions are allowed on a system?

a) Update and Security
b) Personalization
c) Privacy
d) Apps

A

c) Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following applets in Windows Settings would be used to set the region options for the appropriate spelling, localization, and key input methods?

a. Personalization
b. Time and Language
c. Privacy
d. Accounts

A

b. Time and Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following applets in Windows Settings would be used to add or manage peripherals connected using Bluetooth or USB?

a) System
b) Devices
c) Gaming
d) Personalization

A

b) Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An employee at Dion Training is complaining that every time they reboot their Windows 10 workstation a music application is loaded. Which of the following commands would you use to disable the program from starting up each time Windows reboots?

a. System information
b. Task manager
c. User account control
d. Event viewer

A

b. Task manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the tools should a technician NOT use with a solid-state device on a workstation?

a) Disk defragmenter
b) Performance monitor
c) Device manager
d) Disk cleanup

A

a) Disk defragmenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A customer is complaining that there is are intermittent problems with their PC. As a technician, you don’t know exactly what the errors are, so which tool should you use to determine what errors have previously occurred?

a. System Information
b. Event Viewer
c. Device Manager
d. Performance Monitor

A

b. Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does the command “shutdown /s” do on a Windows workstation?

a) Shutdown the workstation
b) Reboot the workstation
c) Log off the workstation
d) Enter sleep mode

A

a) Shutdown the workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A Windows laptop is malfunctioning, and you believe that some system files are missing or corrupted. Which of the following commands should you use to verify this and, if needed, repair the files?

a) chkdsk
b) sfc
c) gpupdate
d) xcopy

A

b) sfc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You are troubleshooting an issue with a Windows desktop and need to display the machine’s active TCP connections. Which of the following commands should you use?

a. net use
b. ipconfig
c. netstat
d. ping

A

c. netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You are working as a technician for a small company and recently moved some files from one server to another to free up some storage capacity on the existing server. Now, multiple users have begun reporting that they cannot access some of their previous shares on the file server. If a user attempts to open one of the shares, they get an “Access Denied” error. You have verified that all users are located in the correct security groups, and their access permissions are correct. Still, the users cannot access the network shares. Which of the following is MOST likely causing the issue with the users accessing the network shares?

a) The network shares require administrative permissions

b) Users are trying to access the shares via their previously mapped drive letters.

c) The users are trying to access the shares during Group Policy restricted hours.

d) The proxy settings on the users’ computers are disabled

A

b) Users are trying to access the shares via their previously mapped drive letters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You are configuring a new printer for a small real estate office. There are only 4 computers in the network, and they are all connected to a single 4-port switch/router/cable modem device. There are no additional open ports on the device and no servers configured within the network. All the computers operate as part of a single workgroup with no domain controller. You need to configure the printer to allow all 4 computers to print to it as long as they are connected to the switch. Which of the following methods would BEST allow the users to print to the printer based on this network’s configuration?

a. Configure a print server and connect the printer to it

b. Configure the printer to support cloud computing

c. Configure the printer to support Bluetooth printing

d. Configure it as a shared printer connected to one of the four workstations

A

d. Configure it as a shared printer connected to one of the four workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which version of Windows 10 does NOT support joining a domain or using Group Policy management?

a) Home
b) Pro
c) Pro for workstations
d) Enterprise

A

a) Home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following MacOS features allows you to use multiple desktops or spaces on a single system?

a) Mission Control
b) Finder
c) Dock
d) Boot Camp

A

a) Mission Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following MacOS features is used to manage passwords cached by the OS and is the equivalent of the Credential Manager in Windows?

a) Apple ID
b) Keychain
c) Spotlight
d) Mission Control

A

b) Keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Malware infected Natalie’s iMac. The malware has deleted numerous files from the system and corrupted the operating system. Natalie needs to access some of her files from the computer that have been deleted by the malware. Which of the following built-in utilities could restore access to those files?

a) Keychain
b) System Restore
c) Time machine
d) Snapshot

A

c) Time machine

34
Q

Which command-line tool is used on a Linux system to display a list of the files and directories within the current path?

a) pwd
b) ls
c) chkdsk
d) sfc

A

b) ls

35
Q

A file currently has permissions of 755. Which of the following commands would change file permission to r-xr–r–?

a) chmod u-rx,go-r filename
b) chmod u+w,go+x filename
c) chmod r-wr–r– filename
d) chmod 544 filename

A

d) chmod 544 filename

36
Q

Which of the following commands is used on a Linux system to edit a text file on a server?

a) ps
b) vi
c) chown
d) pwd

A

b) vi

37
Q

Which of the following attacks would most likely be used to create an inadvertent disclosure of information from an organization’s database?

a. SQL injection
b. Cross-site scripting
c. Buffalo overflow
d. Denial of Service

A

a. SQL injection

38
Q

Which type of threat actor can accidentally or inadvertently cause a security incident in your organization?

a) Hacktivist
b) Insider threat
c) Organized crime
d) APT

A

b) Insider threat

39
Q

Tony works for a company as a cybersecurity analyst. His company runs a website that allows public postings. Recently, users have started complaining about the website having pop-up messages asking for their username and password. Simultaneously, your security team has noticed a large increase in the number of compromised user accounts on the system. What type of attack is most likely the cause of both of these events?

a) SQL injection
b) Rootkit
c) Cross-site request forgery
d) Cross-site scripting

A

d) Cross-site scripting

40
Q

A hospital’s file server has become infected with malware. The files on the server all appear to be encrypted and cannot be opened. The network administrator receives an email from the attacker asking for 20 bitcoin in exchange for the decryption key. Which type of malware MOST likely infected these computers?

a. Spyware
b. Ransomware
c. Keylogger
d. Rootkit

A

b. Ransomware

41
Q

A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?

a) Worm
b) Virus
c) Trojan
d) Ransomware

A

a) Worm

42
Q

Which of the following is the BEST way to regularly prevent different security threats from occurring within your network?

a. Disaster recovery plan
b. User training and awareness
c. Penetration testing
d. Business continuity training

A

b. User training and awareness

43
Q

You are working as a server administrator at Dion Training. You unlock the server room door using your proximity badge and walk through the door. Before the door shuts, another person walks in behind you. What social engineering technique did this person utilize?

a) Impersonation
b) Spoofing
c) Tailgating
d) Shoulder surfing

A

c) Tailgating

44
Q

An attacker has been collecting credit card details by calling victims and using false pretexts to trick them. Which of the following types of attack is being conducted?

a. Phishing
b. Vishing
c. Spear phishing
d. Whaling

A

b. Vishing

45
Q

Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?

a) Phishing
b) Zero-day
c) Spear phishing
d) Spoofing

A

c) Spear phishing

46
Q

Your physical security manager, Janice, wants to ensure she can detect any unauthorized access to the data center. Which technology should be used to meet her requirement?

a. Smart card
b. Biometric access
c. Video surveillance
d. Access badge reader

A

c. Video surveillance

47
Q

Which of the following techniques would be the most appropriate solution to implementing a multi-factor authentication system?

a) Fingerprint and retinal scan
b) Password and security question
c) Username and password
d) Smartcard and PIN

A

d) Smartcard and PIN

something you have and something you know

48
Q

Dion Training has set up a lab consisting of 12 laptops for students to use outside of normal classroom hours. The instructor is worried that a student may try to steal one of the laptops. Which of the following physical security measures should be used to ensure the laptop is not stolen or moved out of the lab environment?

a) USB lock
b) Cable locks
c) Key fob
d) Biometric locks

A

b) Cable locks

49
Q

Dion Training wants to implement a new wireless network using WPA3 in their offices. Which of the following features of WPA3 is used to provide a high-performance mode of symmetric encryption and supports authenticated encryption with associated data (AEAD)?

a) AES GCMP
b) Enhanced open
c) AES CCMP
d) SAE

A

a) AES GCMP

50
Q

Which of the following types of wireless encryption uses a 40-bit encryption key with an RC4 encryption cipher?

a) Open
b) WEP
c) WPA
d) WPA2

A

b) WEP

51
Q

You are installing a new wireless network in your office building and want to ensure it is secure. Which of the following configurations would create the MOST secure wireless network?

a. WPA2 and AES
b. WPA and MAC filtering
c. WEP and TKIP
d. WPA2 and RC4

A

a. WPA2 and AES

52
Q

Which of the following types of screen locks uses a secret pattern drawn on the screen to prevent access to a mobile device?

a) Swipe
b) FaceID
c) Passcode
d) TouchID

A

a) Swipe

53
Q

Fail to Pass Solutions has requested that its employees have a mobile device so that they can respond to questions when they are out of the office. Each employee is responsible for buying their Android smartphone and cellular plan service. To access the corporate network and its data, the employees need to install a company-provided APK on their device. This app contains access to their company-provided email, cloud storage, and customer relationship management (CRM) database. Which of the following policies BEST describes Fail to Pass’s mobile device deployment model?

a) COBO
b) BYOD
c) COPE
d) CYOD

A

b) BYOD

54
Q

A business owner’s smartphone contains a lot of her customer’s PII. Unfortunately, the business owner refuses to set up the phone to automatically wipe the data if the phone is lost or stolen because the data is precious. Based on the business owner’s refusal to allow automatic wiping of the data, which of the following is the next BEST method of securing the phone?

a) Enable a PIN lock on the device
b) Enable a swipe lock on a device
c) Enable a fingerprint lock on a device
d) Enable a passcode lock on a device

A

c) Enable a fingerprint lock on a device

55
Q

Dion Training has several Windows 10 Professional workstations with an internal 2 TB hard disk drive. The company wants to use full disk encryption to protect the contents of this hard drive. Which of the following security settings can be used to encrypt this storage device?

a) BitLocker
b) Encrypting File System
c) BitLocker to go
d) FileVault

A

a) BitLocker

56
Q

John is a PC technician. To perform his job, he needs to be able to install and remove programs, modify system files, and change user permissions on the Windows workstation in his office. Which of the following types of user account types should he have to perform his role?

a) Remote Desktop User
b) Guest
c) Power User
d) Administrator

A

d) Administrator

57
Q

Dion Training uses Windows 10 Pro workstations in a domain environment. The company wants to allow individual users to encrypt any files or folders they store on the local workstation’s internal hard drive. Which of the following security settings can be used to encrypt this storage device?

a) BitLocker
b) Encrypting File System
c) BitLocker to Go
d) FileVault

A

b) Encrypting File System

58
Q

Which of the following password policies defines the types of alphanumeric characters required to be utilized in a user’s password?

a. Password complexity
b. Password length
c. Password history
d. Password expiration

A

a. Password complexity

59
Q

A small business network was recently infected by a piece of malware from a USB drive that copied sensitive data from a computer, infected the system, and then spread across the network by infecting other systems. Which of the following actions could have prevented this type of attack from occurring?

a. Enforcing the use of complex passwords
b. Disabling AutoRun on the computer
c. Replacing the default credentials on the system
d. Enabling the full disk data encryption

A

b. Disabling AutoRun on the computer

60
Q

Your company works as a contractor to the military and has just finished replacing about 500 workstations across its secure network. You have been asked to properly dispose of the workstations and destroy the data on their hard disk drives. Which of the following methods would be the MOST effective and efficient?

a) Physically destroy the drives by drilling each HDD’s platter

b) Fully format each hard drive with a series of 0’s

c) Conduct a low-level format of each hard drive

d) Degauss (erasing/wiping) each of the hard drives

A

d) Degauss (erasing/wiping) each of the hard drives

61
Q

When Eduardo opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Eduardo attempts to use the search engine, but the results are abysmal, and the browser creates numerous pop-ups. Jonathan asks for your assistance in fixing this issue. Which of the following actions do you recommend Eduardo perform first?

a) Reboot Eduardo’s computer and install a second anti-virus program

b) Reset the web browser to the default settings and configuration

A

b) Reset the web browser to the default settings and configuration

62
Q

Which of the following types of encryption would ensure the best security of a website?

a) SSLv2
b) TLS 1.2
c) SSLv3
d) TLS 1.1

A

b) TLS 1.2

63
Q

Which of the following web browsing features is used to disable the caching features or a web browser so that cookies, browsing history, form fields, passwords, and temp files are not stored when the browsing session is completed?

a) Ad blocker
b) Private / incognito mode
c) Pop-up blocker
d) Password manager

A

b) Private / incognito mode

64
Q

Your network administrator has handed you some documentation showing you which switch ports on a patch panel you need to connect with a CAT 5e patch cable for an upcoming network upgrade. What document are you MOST likely holding?

a) Process flow diagram
b) Physical network diagram
c) Inventory management plan
d) Logical network diagram

A

b) Physical network diagram

65
Q

Dion Training is creating troubleshooting guides and frequently asked questions for its new customer service technicians. Which of the following would MOST likely contain these documents?

a) Password policy
b) Asset management database
c) Network topology diagrams
d) Knowledge base articles

A

d) Knowledge base articles

66
Q

Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?

a) IP address
b) Asset ID
c) Location
d) MAC address

A

b) Asset ID

67
Q

Karen lives in an area that is prone to hurricanes and other extreme weather conditions. She asks you to recommend an electrical conditioning device that will prevent her files from being corrupted if the building’s power is unstable or lost. Additionally, she would like the computer to maintain power for up to an hour of uptime to allow for a graceful shutdown of her programs and computer. Which of the following should you recommend?

a) Surge protector
b) Uninterruptible power supply
c) Power distribution unit
d) Line coordinator

A

b) Uninterruptible power supply

68
Q

Which of the following backup rotation schemes uses a three-tiered approach to ensure at least one monthly full backup is conducted?

a) Grandfather-father-son
b) Tower of Hanoi
c) 3-2-1 backup
d) FIFO Backup

A

a) Grandfather-father-son

69
Q

You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST?

a) Verify proper cable management is being used
b) Dispose of the old power supply
c) Remove any jewelry you are wearing
d) Use a grounding probe to to discharge the power supply

A

c) Remove any jewelry you are wearing

70
Q

Which of the following is considered a form of regulated data?

a. PII
b. AUP
c. DMCA
d. DRM

A

a. PII

71
Q

Which of the following is required for evidence to be admissible in a court of law?

a) Order of volatility
b) Legal hold
c) Chain of custody
d) Right to audit

A

c) Chain of custody

72
Q

You are working as a defense contractor for the U.S. Army. The Army is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this sized organization to purchase?

a. Personal
b. Business
c. Enterprise
d. Open-source

A

c. Enterprise

73
Q

Which of the following file types are commonly used by scripts in a Linux command line environment?

a) .vbs
b) .ps1
c) .sh
d) .js

A

c) .sh

74
Q

A programmer is writing a script to calculate the temperature in Fahrenheit when it receives input in celsius. The conversion factor used is 5/9. Which of the following would be used to store this fixed conversion factor in the script?

a) Loop
b) Constant
c) Variable
d) Comment

A

b) Constant

75
Q

Which of the following file types are commonly used to create simple scripts in the Windows command-line environment?

a) .js
b) .bat
c) .py
d) .sh

A

b) .bat

76
Q

Your mother says there is something wrong with her computer, but unfortunately, she doesn’t know how to fix it. She asks if you can remotely connect to her computer and see if you can fix it. Which of the following technologies would BEST allow you to remotely access her computer and interact with her Windows 10 laptop?

a. RDP
b. Telnet
c. SSH
d. VPN

A

a. RDP

77
Q

A network administrator needs to allow employees to upload files to a remote server securely. What port must be allowed through the firewall?

a) 21
b) 22
c) 25
d) 161

A

b) 22

78
Q

Which of the following remote access tools is a command-line terminal emulation program operating on port 23?

a) VNC
b) RDP
c) Telnet
d) SSH

A

c) Telnet

79
Q

An employee at Dion Training complains that their smartphone is broken. They state that it cannot connect to the internet, nor can it make or receive phone calls and text messages. You ask them to start up the music player on his phone, and it opens without any issues. It appears the common issue has to do with the device’s network connectivity. Which of the following is MOST likely the problem with this smartphone?

a) The VPN password was entered incorrectly
b) Airplane mode is enabled on the device
c) The bluetooth connection is disabled
d) The cellular radio in it is broken

A

b) Airplane mode is enabled on the device

80
Q

A smartphone user notices that their phone gets very hot, and their battery is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem?

a. The smartphone is infected with malware and is using a lot of processing power.
b. The touchscreen is faulty.
c. The battery is depleted.
d. The charging port is faulty.

A

a. The smartphone is infected with malware and is using a lot of processing power

81
Q

David is troubleshooting a new Android application his company is creating. He has installed the app on an Android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. Which of the following should David enable on the device?

a) Sideloading
b) Rooting
c) Developer mode
d) Jailbreak

A

c) Developer mode

82
Q

What are the seven steps in malware removal process?

A

(1) Investigate and verify malware symptoms,
(2) Quarantine the infected systems,
(3) Disable System Restore in Windows,
(4) Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques (e.g., safe mode, pre-installation environment),
(5) Schedule scans and run updates,
(6) Enable System Restore and create a restore point in Windows, and
(7) Educate the end user.