Cyber Class Flashcards

1
Q

Which of the following is a valid distinguished way of writing a website URL?

A

MarketSpace.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is true?
a. Group members have the access rights that are assigned to the group.
b. Users can log on as the group and have all the assigned access rights.

A

a.Group members have the access rights that are assigned to the group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following must be set up before you can register a facial or fingerprint scan for your account?
Pin
Security Key
Picture password
Password

A

Pin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Domain

A

A collection of network resources that share a common directory database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Organizational Unit

A

A folder-like container that organizes network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Built-in Containers

A

Default containers used to organize Active Directory objects that cannot be deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which remote access solution is built into macOS?
Quick Assist
Remote Assistance
Screen Sharing
Remote Desktop.

A

Screen Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You want to use a VPN tunneling protocol that can encapsulate other LAN protocols and carry the data securely over an IP Network. Which of the following protocols is suitable for this task?
PPTP - Point to point tunneling Protocol
NetBeui - Net Bios Extended User Interface
PPP - Point to point Protocol
SLIP - Serial Line Internet Protocol

A

PPTP - Point to point tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a VPN’s primary purpose?
Support the distribution of public web documents
Allow use of network-attached printers
Support secure communications over an untrusted network
Allow remote systems to save on long-distance charges.

A

Support secure communications over an untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which user type is the Windows beta channel recommended for?
Administrators
The average user
Highly technical users
Commercial users

A

The average user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Full Backup

A

Backs up all files (even those that have not changed).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incremental Backup

A

Backs up every file that has changed since the last full or incremental backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Differential Backup

A

Backs up every file that has changed since the last full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Synthetic Backup

A

Compares the data found i the last full backup with the current content and uploads only the changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why should you store backup media offsite?
To reduce the possibility of theft
To prevent the same disaster from affecting both the system and it’s associated backup media.
To improve the efficiency of the restoration process
It is required by government regulations in the USA.

A

To prevent the same disaster from affecting both the system and it’s associated backup media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What tool can you use to create a full system image of your windows drive?
Backup and Restore
System Repair
Recovery Drive
Windows Installation Media

A

Backup and Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

While running a presentation editor on your Windows 11 laptop, your computer locks up. When you try powering the computer, Windows 11 will not start up.
Which of the following tools should you use FIRST to try and resolve the issue?
Backup and Restore
Recovery Drive
Startup Repair
Restore files

A

Startup Repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following actions occur during the Pre-EFI Initialization (PEI) stage of the UEFI boot process? (Pick 2)
Device drivers are loaded into memory.
The CPU and chipset are verified and fully initialized.
Power is supplied to the CPU
The EFI boot manager initializes.
System memory is initialized, verified, and allocated.

A

The CPU and chipset are verified and fully initialized.
System memory is initialized, verified, and allocated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

EFI

A

Extensible Firmware Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

UEFI

A

Unified Extensible Firmware Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is the first process that runs once a computer is powered on and the CPU loads the BIOS?
Boot Loader
POST - Power On Self Test
Winload.exe
WININIT

A

POST - Power On Self Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIOS

A

Basic Input output system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed?
%systemdrive%\Program Files (x86)
%systemdrive%\Applications (32-bit)
%systemdrive%\Applications
%systemdrive%\Program Files

A

%systemdrive%\Program Files (x86)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11?
C: Users\Profiles\username
C: Documents and Settings \username
C:\Users\username
C:\Users \Documents and Settings\username

A

C:\Users\username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following statements are true regarding administrative shares? (select Two.)
Adding a ! sign to the end of a share name creates an administrative share.
If you are a member of the Administrators group, the administrative shares are visible to you when you browse the network.
By default, Windows automatically creates an administrative share for every volume.
To connect to an administrative share, you must use the UNC path.
Default administrative shares grant access to the Administrators or Power Users group.

A

By default, Windows automatically creates an administrative share for every volume.
To connect to an administrative share, you must use the UNC path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A help desk technician determines that a user’s issue is caused by a corrupt file on their computer. Which of the following would be the FASTEST way to transfer a good file to the computer?
Use the C$ administrative share to copy the file.
Have the user share the folder as a local share and copy the file to the share.
Attach the file to an email and have the user copy the file to the correct folder.

A

Use the C$ administrative share to copy the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

EFS

A

Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are traveling to an industry conference.
What is the result of copying the file to the thumb drive?
aThe file becomes inaccessible.
The file will no longer be encrypted.
The file is compressed and remains secure.
The file remains secure and accessible.

A

The file will no longer be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following security solutions would prevent you from reading a file that you did not create?
BitLocker
EFS
IPSec
VPN

A

EFS

32
Q

Which command would you enter at the shell prompt to start a new Bourne-Again Shell (Bash) session?

A

BASH

33
Q

What would you enter at the Command Prompt on a Linux system to display the IP addresses and subnet masks that are assigned to each network interface?

A

IP

34
Q

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use?
Ps
Grep
Ls
Chmod - Change Mode (Change permissions on Unix machine)

A

Chmod - Change Mode (Change permissions on Unix machine)

35
Q

Jamie has been tasked with designing a solution for the paralegals in his office. They need to review old documents that are on paper files and create word processor documents from them that can be searched and cross referenced. Which of the following devices should Jamie use to create the solution?
Projector
Printer
Scanner
Biometric scanner
Digitizer

A

Digitizer

36
Q

Which component is designed to let you use a notebook system as a desktop system by making it possible to connect a normal-sized external mouse, keyboard, monitor, and speakers?
a. Docking station
b. Built-in Bluetooth
c. USB ports
d. Infrared wireless
e. Firewire ports

A

a. Docking station

37
Q

What do these keys do?

A

Fn1- Touchpad
Fn2- Screen Orientation
Fn3- Wifi/Cellular Data
Fn4- Bluetooth
Fn5- Dual Display
Fn6- Pause and Play

38
Q

You need to replace the video card in a laptop. Which of the following is the first step?
a. Remove the access panel at the bottom of the laptop.
b. Remove the bezel.
c. Remove the keyboard.
d. Remove the display wires if the video card is integrated into the motherboard.
e. Find a service manual with correct disassembly procedure

A

e. Find a service manual with correct disassembly procedure

39
Q

You are troubleshooting a malfunctioning notebook computer system. The user has indicated that the LCD screen suddenly became dark and difficult to read while they were downloading a large file through the wireless network while the system was plugged in at their desk. You have checked the system and determined that the backlight has stopped working. Which of the following are the MOST likely causes?(Select two.)
The extended download placed high demands on the system DC power, causing the BIOS to shut off the backlight.
The cold cathode fluorescent lamp (CCFL) has burned out and needs to be replaced.
The inverter in the LCD assembly has malfunctioned.
The wireless network card is emitting radio signals that interfere with the backlight, causing it to stop functioning.
Malware was installed as part of the download that targeted the backlight circuitry.

A

The cold cathode fluorescent lamp (CCFL) has burned out and needs to be replaced.
The inverter in the LCD assembly has malfunctioned.

40
Q

Which of the following mobile device components are often installed under the bezel of a mobile device display? (Select three.)
Microphone
OLED
OEM
Wi-Fi antenna wires
Inverter
Webcam
Touch Screen digitizer

A

Microphone
Wi-Fi antenna wires
Webcam

41
Q

Which ACPI power state allows a system to start where it left off, but turns all other components off?
a. Working
b. Standby
c. Off
d. Hibernate

A

Hibernate

42
Q

You want to use hibernation on your Windows notebook. What does it need to have for this to work?
a. 1 gigahertz (GHz) or faster processor
b. Enough free hard disk space
c. A minimum of 1 GB of RAM
d. A UPS

A

b. Enough free hard disk space

43
Q

You have just purchased a smartwatch to track your fitness statistics and health. To change the interface or update the firmware, you need to use an app on your smartphone.
Which of the following connection technologies will you MOST likely use to communicate between your watch and the app?
a. E Ink
b. Bluetooth
c. USB cable
d. Wi-Fi

A

Bluetooth

44
Q

Which of the following components allows a tablet to provide a screen interface that recognizes multiple finger touches at the same time?
a. Capacitive touchscreen
b. E Ink
c.OLED display
d. Bluetooth

A

a. Capacitive touchscreen

45
Q

Which of the following protocols can encrypt emails on a mobile device?
a. IMAP
b. РОРЗ
c. SMTP
d. SSL

A

SSL

46
Q

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter.
Which of the following technologies is being used in these phones?
a. Bluetooth transmitters
b. Near-Field Communication (NFC) chips
c.Virtual Private Network (VPN)
d.Fared transmitters

A

b. Near-Field Communication (NFC) chips

47
Q

Which of the following are devices categorized as part of the Internet of Things (IoT)? (Select two.)
a. Smartwatches
b. Routers
c. Tablets
d. Laptops
e. Medical sensors

A

Smartwatches
e. Medical sensors

48
Q

You are comparing methods for securing your mobile device.
Which of the following is the BEST method to secure your device’s storage?
a. Remote backup applications
b. Locator applications
c.Full device encryption
d. Biometric authentication

A

c.Full device encryption

49
Q

Your laptop’s LCD screen is beginning to flicker and dim. You have checked the brightness setting to make sure that it is configured correctly. Which of the following is the MOST likely cause of your screen issue?
a. The LCD screen is failing.
b. The system is configured to use an external display port.
c. The LCD screen inverter is failing.
d. The video ribbon cable to the screen is disconnected.

A

c. The LCD screen inverter is failing.

50
Q

You are troubleshooting a malfunctioning laptop computer system. The customer has indicated that the screen is always dark and difficult to read, even while the system is plugged into a wall outlet. You checked the system and determined that the backlight isn’t working.
Which of the following is the MOST likely cause of this issue?
a. The laptop battery is failing and needs to be replaced.
b. The LCD cutoff switch is stuck in the Off position.
c. The laptop video adapter is malfunctioning.
d. The wrong AC adapter is being used with the system

A

b. The LCD cutoff switch is stuck in the Off position.

51
Q

Which of the following are printer languages? (Select three.)
Capture
PostScript
PrintDef
Escape codes
PCL
Pascal

A

PostScript
Escape codes
PCL

52
Q

Several employees have called you to complain about the default configuration settings on the network printer. One has asked to change the page orientation, another has wanted to change the collating setting, and another asked about duplexing.
Which of the following print features would allow the employees to make the requested changes to their print jobs?
a. Print server
b. Print spooling
c. Print queue
d. Printer Properties

A

d. Printer Properties

53
Q

Which of the following methods can be used to connect a printer to a network? (Select two.)
Plug an Ethernet cable into the printer’s network port.
Plug a network cable into your printer’s serial port.
Connect your printer to an external print server device that is connected to the network.
Plug a network cable into your printer’s USB port.
Plug a USB-to-Ethernet adapter into your printer’s USB port.

A

Plug an Ethernet cable into the printer’s network port.
Connect your printer to an external print server device that is connected to the network.

54
Q

In order to edit print server properties in Windows 11. Which section do you need to select from the settings menu?
Accessibility
Bluetooth and devices
Bluetooth
Network and internet

A

Bluetooth and devices

55
Q

Your company needs to print a lot of high-quality back-and-white text documents. These documents need to be printed as quickly and inexpensively as possible. The printer must also have the capacity to perform duplex printing. Which of the following printers BEST meets your company’s printing requirements?
Dot matrix
Laser
Thermal
Inkjet

A

Laser

56
Q

Inkjet printers are popular for small businesses because they provide good quality printouts. However, fuzzy lines can appear in artwork, or colored areas in images can sometimes start and stop before they should. Which of the following should you do when this happens?
Calibrate the printer
Clear the paper jam
Replace the ink supply
Clean the printhead

A

Calibrate the printer

57
Q

Inkjet printers spray microscopic dots of ink with precise, controlled movement . Which of the following components carries the printhead back and forth during a print job?
Carriage assembly
Rubber rollers
Duplexing assembly
Stepper motor

A

Carriage assembly

58
Q

Which of the following is the feed assembly on a thermal printer that is used to move the paper through the printer?
Rubber platen
Unwind spindle
Stepper motor
Paper feeder

A

Rubber platen

59
Q

Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does NOT go away. What is the MOST likely problem?
The fuser assembly is damaged.
The photosensitive drum is wearing out.
The paper is poor quality.
The corona wire is dirty.

A

The corona wire is dirty.

60
Q

Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does NOT go away. What is the MOST likely problem?
The fuser assembly is damaged.
The photosensitive drum is wearing out.
The paper is poor quality.
The corona wire is dirty.

A

The corona wire is dirty.

61
Q

After removing the printed paper from your laser printer, the toner smudges and can be wiped off in places.
Which of the following printer components is MOST likely causing the problem?
Print drum
Primary corona
Secondary corona
Fuser rollers

A

Fuser rollers

62
Q

A customer who uses a Windows computer purchased an Inkjet printer from your store. He recently called to complain that the colors in the photos he prints on his new printer do not match the colors in the original photos. Which of the following actions will MOST likely resolve the issue? (Select 2)
Download and install the latest printer drivers.
Run the Windows FIXCOLR utility to automatically calibrate the driver’s color settings.
Educate the customer on the limitations of Inkjet printers.
Use the Color Management tab of the printer driver to calibrate the driver’s color settings.
Use Driver Rollback to restore an earlier version of the printer driver.

A

Download and install the latest printer drivers.
Use the Color Management tab of the printer driver to calibrate the driver’s color settings.

63
Q

You have an Inkjet printer attached to the laptop computer in your home office. With a document ready to print, you select the Print option from your word processor.
Unfortunately, shortly after the job has started, the printer stops printing. You turn the printer off.
Which of the following actions should you perform to fix the printer?
Remove the jammed paper following its regular path.
Remove the jammed paper by sending another file to the printer.
Remove the jammed paper by restarting the printer, which automatically attempts to clear the paper jam.
Remove the jammed paper from the way it entered

A

Remove the jammed paper following its regular path.

64
Q

Which Windows feature can you use to encrypt a hard drive volume?
NTFS - New Technology File System
EFS - Encrypting File system \
Bitlocker to Go
BitLocker

A

BitLocker

65
Q

Which database encryption method can you use to encrypt data at rest?
Transparent data encryption
Trusted Platform Module
Application-level encryption
Column-level encryption

A

Transparent data encryption

66
Q

As part of the response to a security incident on your company network, you have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up to the time of presentation in court. Which document has been asked to draft?
CPS (Certificate Practice Statement)
FIPS-140
Rules of evidence
Chain of custody

A

Chain of custody

67
Q

A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence?
Shutting down the system
Copying the contents of memory to removable media
Restricting physical access to the system
Disconnecting the system from the network

A

Shutting down the system

68
Q

Which of the following door locks provides authentication to a specific lock over a Bluetooth connection?
Standard Lock
Smart Lock
Biometric
Key fob

A

Key fob

69
Q

Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents?
Switch
Router
Hub
Bridge
Gateway

A

Hub

70
Q

22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com
[154.11.10.62]
5 39 ms 39 ms 65 ms plalca01 gr00.bb.ispxy.com
[154.11.12.11]
6 39 ms 39 ms 39 ms
Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14]
7 40 ms 39 ms 46 ms svI-core-03.inet.ispxy.net
[205.171.205.29]
8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net
[205.171.142.17
Which command produced this output?

A

Tracert

71
Q

You are troubleshooting network connectivity issues on a workstation. Which command would you use to request new IP configuration information from a DHCP server?
Net config
Ipconfig /renew
Ipconfig /all
Net use

A

Ipconfig /renew

72
Q

You have just installed a wireless network, but the network is experiencing slow speeds, especially when accessing the internet from your workstation. Which action should you try FIRST to resolve the issue
Add a network extender
Move the wireless access point
Reset your wireless router to the factory defaults.
Move your workstation closer to the wireless access point

A

Move the wireless access point

73
Q

Which of the following is a common cause for high latency issues on a network?
Port flapping - connect and disconnect frequently
Limited connectivity
A bad switch or router
Malware

A

Port flapping - connect and disconnect frequently

74
Q

Which of the following BEST describes authorization?
The process of verifying a user’s identity.
The policy of allowing employees to use their own devices for work purposes.
The resources that a user can access.
The process of giving users access to only the resources they need.

A

The resources that a user can access.

75
Q

Which of the following processes is used to prove a user’s identity?
Authentication
Authorization
Logical security
Certificate Manager

A

Authentication

76
Q

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee’s company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply.
Which of the following BEST describes the type of attack that just occurred?
Tailgating
Vishing
Phishing
Eavesdropping

A

Vishing

77
Q

You have been tasked with removing malware from an infected system. You have confirmed that there is an infection, and you continue running scans and removing the malware, but every time the system is rebooted, the malware comes back.
Which of the following should you do to help prevent this from happening?
Use a different anti-malware program
Quarantine the system
Boot into Safe Mode
Disable Windows System Restore

A

Disable Windows System Restore