Dion Test Flashcards

1
Q

What is the symbolic representation of the octal numeric permission 644?

A

rw-r–r–

In Linux, you can convert letter permissions to octal by giving 4 for each R, 2 for each W, and 1 for each X. So, RW- is 6 and R– is 4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have been asked to configure your neighbor’s SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are trying to open your company’s internal shared drive from your Windows 10 laptop but cannot reach it. You open your web browser and can connect to DionTraining.com without any issues. Which of the following commands should you use to determine if the internal shared drive is mapped to your computer properly?

A

net use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Due to a global pandemic, your company decides to implement a telework policy for its employees. Unfortunately, the company doesn’t have enough time to issue laptops and smartphones to each employee. The Chief Information Officer (CIO) has decided to allow employees to use their own laptops and smartphones when conducting their work from home. Which of the following policies and technology should be implemented to provide security guidance to employees on the use of these devices?

A
  1. BYOD

2. MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of structure is “IF THEN ELSE” in scripting?

A

Branch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage occurs. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP?

A

tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A salesperson uses their smartphone as a hotspot while traveling. The first week of their trip, their smartphone could download files at 24 Mbps and stream online videos without any problems. Unfortunately, this week their smartphone is only operating at 256 Kbps when they attempt to download a file. Additionally, they are having difficulty watching online videos due to excessive buffering. Which of the following is MOST likely the problem?

A

The smartphone’s data connection is being throttled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jason’s company issued him an old 2015 Dell Laptop with an internal hardware security key that he uses to connect to his office network over a VPN while traveling. Without this laptop, Jason cannot access his company’s internal servers, email, or share drive files. The Windows 7 laptop is extremely slow, and the screen recently cracked and needs to be replaced. When Jason returns to the company’s headquarters, the company will provide him a new laptop due to the broken screen. Still, he is currently on a 45-day business trip and needs to continue working until then. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?

A

Sell him an external 15” tablet/monitor to connect to the laptop as a workaround.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The server administrators have asked you to open the default port on the firewall for their new DNS server. Which of the following ports should you set as ALLOW in the ACL?

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dion Training is worried about the security of the data on their corporate smartphones if lost or stolen. The Chief Security Officer has instructed that the devices be configured so that unauthorized users cannot access the data. Which TWO of the following settings would provide the BEST security and protection for the corporate smartphones’ data?

A
  1. Enable full device encryption

2. Configure the ability to perform a remote wipe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have discovered that an employee has been conducting illegal activities using his workplace computer. You have taken possession of the employee’s laptop according to your company’s procedures and are waiting to give it to law enforcement authorities. What should you do when turning over the laptop to the police?

A

Maintain the chain of custody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have connected your laptop to the network using a CAT 5e cable but received an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is most likely the cause of this issue?

A

DHCP Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are working on a Windows 10 workstation that is operating much too slowly. Which TWO of the following commands should you use to speed up the system?

A
  1. dism

2. chkdsk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system’s filesystem?

A

rm -rf /

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following types of software cannot be updated via the Windows Update program?

A

Firmware updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An employee’s inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses ending in spamyou.com. Which of the following actions should you take to help reduce the amount of spam this and other users in your organization are receiving?

A

Create a domain-based email filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Your supervisor has requested remote access to a particular server to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do before granting remote access to the server to your supervisor?

A

Install the latest security updates and patches to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A user is having an issue with a specific application on their Android devices. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue?

A

Clear the local application cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?

A

Notepad

20
Q

Your company failed a recent security audit. The IT Directory has issued a new policy dictating that all workstations must be locked when not in use for more than 2 minutes. A password must be entered before booting up the operating system, and that the hard drive is fully encrypted. You have been asked to configure the corporate workstations to enforce these new security measures. Which THREE of the following should you configure FIRST?

A
  1. Enable UEFI Password
  2. Enable a screen lock
  3. Enable Bitlocker
21
Q

Which of the following remote access protocols should you use to connect to a Linux server securely over the internet?

A

SSH

22
Q

Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of “connected clients” and see that “Bob’s Laptop” is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the WPA2 password?

A

Disable WPS

23
Q

A user is having an issue with a specific application on their Android devices. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue?

A

Clear the local application cache

24
Q

Ted, a file server administrator at Dion Training, has noticed that many sensitive files have been transferred from a corporate workstation to an IP address outside of the local area network. Ted looks up the IP address and determines that it is located in a foreign country. Ted contacts his company’s security analyst, verifying that the workstation’s anti-malware solution is up-to-date and the network’s firewall is properly configured. What type of attack most likely occurred to allow the exfiltration of the files from the workstation?

A

Zero-Day

25
Q

An offsite backup service is involved in an investigation currently. Because of this, they are not recycling outdated tapes. Which of the following is the MOST likely reason for this?

A

The process of discovery

26
Q

Which type of antivirus scan provides the best protection for a typical home user?

A

On-access scans

27
Q

Marta’s organization is concerned with the vulnerability of a user’s account being vulnerable for an extended period of time if their password was compromised. Which of the following controls should be configured as part of their password policy to minimize this vulnerability?

A

Password Expiration.

28
Q

Which of the following file system formatting types should be used with a DVD?

A

UDF - Universal Disk Format

29
Q

Which of the following types of installations would require the use of an XML text file containing the instructions that the Windows Setup program would need to complete the installation?

A

Image installation.

30
Q

You are assisting a network administrator with updating the firmware of a Cisco iOS-based router. This router is the only border router for your organization, and it connects them to the internet. The request for change is being written and contains the purpose, plan, scope, and risk analysis of the proposed change. Which of the following should be added to the RFC before its approval?

A

Document a backout plan if the update is not successful.

31
Q

What is the BEST way to secure the most vulnerable attack vector for a network?

A

Provide end-user awareness training for office staff

32
Q

An employee’s inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?

A

Mark each email as spam or junk

33
Q

You are troubleshooting a workstation and need to run some diagnostic tools as an administrator on this Windows 10 workstation. Which of the following keys should you hold while left-clicking the mouse to open the Command Prompt as an administrator?

A

CTRL

34
Q

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)

A
  1. Disable System Restore in Windows
  2. Update the anti-malware software
  3. Disconnect the laptop from the network.
35
Q

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue

A

RADIUS

36
Q

Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?

A

dd

37
Q

An attacker is using a precomputed table of values to attempt to crack your Windows password. What type of password attack is this?

A

Rainbow Table

38
Q

A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?

A

Loop

39
Q

What network device uses ACLs to prevent unauthorized access into company systems?

A

Firewall

40
Q

Dion Training’s offices are frequently experiencing brownouts and sags. Which of the following solutions would protect all of their workstations and servers from these brownouts?

A

Line conditioner

41
Q

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have directly observed symptoms that indicate the system is infected with malware. Which of the following actions should you perform NEXT?

A

Quarantine the affected system

42
Q

A factory worker suspects that a legacy workstation is infected with malware. The workstation runs Windows XP and is used as part of an ICS/SCADA system to control industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation. After its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent reinfection?

A

Update the anti-malware solution

43
Q

Which of the following data types would be used to store the number 3.14?

A

Floating Point

44
Q

Your company wants to get rid of some old paper files. The files contain PII from previous customers, including their names, birth dates, and social security numbers. Which of the following are the appropriate data destruction and disposal techniques that should be utilized for these papers?

A

Micro-cut Shredder

45
Q

You have submitted an RFC to install a security patch on all of your company’s Windows 2019 server on Friday at 11 pm using an automated patch installation process. Which of the following change request documents would describe any uncertainty or adverse effects that may occur during the installation process?

A

Risk analysis

46
Q

A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, and the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

A

Quarantine the machine and report it as infected to your company’s cybersecurity department for investigation