Practice 1 Flashcards
You are configuring a SOHO network and only allowing specific IP addresses to access the network while blocking any IP addresses that are not on the list. Which of the following should be implemented?
MAC filtering
Blocklist
Allow List
Port Forwarding
Allow List
A web server has a planned firmware upgrade for Saturday evening. During the upgrade, the power to the building is lost, and the firmware upgrade fails. Which of the following plans should be implemented to revert to the most recent working version of the firmware on the webserver?
Rollback plan
Backup plan
Contingency plan
Alternative plan
Rollback Plan
Which command-line tool is used on a Windows system to erase all the data on a hard disk and ensure it is ready to accept new Windows files?
format /fs:NTFS
chkdsk /f
diskpart list disk
sfc /now
format /fs:NTFS
Which of the tools should a technician NOT use with a solid-state device on a workstation?
Performance monitor
Disk cleanup
Disk Defragmenter
Device Manager
Disk Defragmenter
Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?
Mac Address
Asset ID
Location
IP Address
Asset ID
Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?
NAT
UPnP
DHCP
MDM
UPnP
A user contacts the service desk, stating their account is locked out, and they are unable to login to their local workstation. Which of the following log files should you review to determine the source of the lockout on the local workstation?
Setup
Security Log
System Log
Application Log
Security Log
Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to “click here” to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack?
Phishing
Brute Force
Spear Phishing
Whaling
Phishing
A customer’s Android smartphone is only 6 months old but is becoming excessively slow. When questioned, the customer states it was acting fine until they recently installed a new stock market tracking app. What action should you take to troubleshoot the slow performance on this phone?
Perform a hard reboot of the smartphone
Uninstall the app, reboot the phone, and reinstall the app
Replace the phone with a newer model
Factory reset the smartphone and reinstall all the apps
Uninstall the app, reboot the phone, and reinstall the app
Your company recently downloaded and installed the latest audio card driver for all of its workstations. Now, several users have had their usernames and passwords for several websites compromised. You believe the two issues are related. If they are, which of the following was MOST likely contained in the audio card driver file that was installed?
Worm
Virus
Keylogger
Ransomware
Ransomware
While investigating a data breach, you discover that the account credentials used belonged to an employee who was fired several months ago for misusing company IT systems. The IT department never deactivated the employee’s account upon their termination. Which of the following categories would this breach be classified as?
Advanced Persistent Threat
Zero-day
Known Threat
Insider Threat
Insider Threat
A hospital’s file server has become infected with malware. The files on the server all appear to be encrypted and cannot be opened. The network administrator receives an email from the attacker asking for 20 bitcoin in exchange for the decryption key. Which type of malware MOST likely infected these computers?
Keylogger
Spyware
Rootkit
Ransomware
Ransomware
What permissions would be represented by the octal 517?
r-x–xrwx
Which of the following file system formatting types should be used with older recordable optical discs?
CDFS
FAT32
NTFS
UDP
CDFS
Which Linux command is used to print the full contents of a file to the screen at once?
Grep
cat
dig
ls
cat
Dion Training wants to provide governance for how employees can utilize the corporate network, email, and laptops while working for the company. Within which of the following should this be documented?
Asset Management Policy
Knowledge Base
Password Policy
Acceptable Use Policy
Acceptable use policy
Jason has an old 2017 Dell Laptop that he uses to connect to his office network while traveling. The computer is slow and is running Windows 7. The laptop’s screen was recently cracked and needs replacement. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?
- Replace the display and charge him for the parts/installation
- Purchase a new laptop as the cost to repair might be more than a new laptop
- Replace the display and contact the manufacturer for reimbursement
- Sell him an external 15” tablet/monitor to connect to the laptop as a workaround
Purchase a new laptop as the cost to repair might be more than a new laptop
You have been asked to install a new hard drive in a Windows 10 system. You have already installed the hard drive and booted the system up. Which tool should you use to create the new partitions on the hard drive?
DxDiag
Disk Defragmenter
Disk Management
dd
Disk Management
Which of the following should you use to remove any usernames and passwords that you no longer wish to store in Windows 10?
Device Manager
Credential Manager
Internet Options
Keychain
Credential Manager
Jason is working in Microsoft Word, but the application appears to have become frozen and unresponsive. Which of the following features in the Task Manager should he use to terminate the unresponsive program?
Services
Performance
Processes
Startup
Processes
Your company wants to ensure that users cannot access USB mass storage devices. You have conducted some research online and found that if you modify the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor key, it will prevent USB storage devices from being used. Which of the following tools should you use to modify this key?
MMC
RDS
RegEdit
MSConfig
RegEdit
You are troubleshooting an issue with multiple workstations that are having network connectivity issues. The network also has two servers connected to the network, but they do not have any connectivity issues. You look at the network configuration of the two servers and notice they are using static IP addresses. Based on what you know so far, what is most likely the cause of the workstation’s network connectivity issue?
The wireless network adapter for each workstation was accidentally disabled
The internet connection for the network is down
The network’s router is currently down
The workstations are most likely configured to use dynamically assigned IP addresses and DHCP is not working properly
The workstations are most likely configured to use dynamically assigned IP addresses and DHCP is not working properly
Which command-line tool is used on a Windows system to move upward in a directory within the system’s directory structure?
cd .
dir
ls
cd ..
cd ..
Which of the following would leave a user’s programs running on their Windows 10 laptop while preventing other users from accessing them without entering the correct password?
Shutdown
Sleep
Lock
Hibernate
Lock
You have submitted an RFC to install a security patch on some of your company’s Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe which servers will receive the patch during this maintenance window?
Risk Analysis
Scope
Plain
Purpose
Scope
A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system’s web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then perform the remediation to remove the malware. You have scanned the machine with several anti-virus and anti-malware programs and determined it is now cleaned of all malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated anti-virus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers?
Reformat the system and reinstall the OS
Install a secondary anti-malware solution on the system
Verify the hosts file has not been maliciously modified
Perform a System restore to an earlier date before the infection
Verify the hosts file has not been maliciously modified
Which of the following types of backups generates the recovered files from a complete copy of a file created at some point in time and one or more partial backups created at later times to merge them into the recovered data?
Synthetic
Full
Incremental
Differential
Synthetic
Which of the following should be implemented to allow wireless network access for clients in the lobby using a shared password as the key?
WPA2
Geoforce
Firewall
IPsec
WPA2
You have just updated the graphics card’s driver to the latest version. After installation, the Windows workstation crashes and reports an error code. You attempt to reboot the workstation, but it fails again. You decide to reboot the workstation into Safe Mode. What should you do NEXT?
Disable the graphics driver
Perform an antivirus scan
Rollback the graphics driver
Perform an Windows Update
Rollback the graphics driver
Which of the following Control Panel sections would a technician use to configure a Windows 10 computer to use Narrator mode to read aloud the list of files that appear on the screen to the user?
Ease of access
Indexing Options
Sound
File Explorer Options
Ease of Access
A macOS user is browsing the internet in Google Chrome when they see a notification that says, “Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!” What type of threat is this user experiencing?
Worm
Pharming
Rogue anti-virus
Phishing
Rogue anti-virus
An employee at Dion Training complains that their smartphone is broken. They state that it cannot connect to the internet, nor can it make or receive phone calls and text messages. You ask them to start up the music player on his phone, and it opens without any issues. It appears the common issue has to do with the device’s network connectivity. Which of the following is MOST likely the problem with this smartphone?
Airplane mode is enabled on the device
The Bluetooth connection is disabled
The VPN password was entered incorrectly
The cellular radio in it is broken
Airplane mode is enabled on the device
Christina recently purchased a new Android smartphone and is going on a trip. At the airport, she found a public wireless network called “FreeAirportWiFi” and connects to it. She noticed a question mark (?) icon showing in the toolbar next to the Wi-Fi icon. Christina attempts to open a webpage but gets an error of “The page cannot be displayed.” She begins to troubleshoot the device by verifying that the airplane mode is disabled, Bluetooth is enabled, and tethering is enabled. Next, Christina attempts to make a phone call, which works without any issues. Which of the following is MOST likely the issue with Christina’s smartphone?
The smartphone is connected to the FreeAirportWifi but is not authorized yet
The smartphone’s SIM card is deactivated
The smartphone can only support 3G data networks
The smartphone does not have a valid data plan enabled
The smartphone is connected to the FreeAirportWifi but is not authenticated yet
An Android user recently cracked their screen and had it replaced. If they are in a dark room, the phone works fine. If the user enters a room with normal lights on, then the phone’s display is dim and hard to read. What is MOST likely the problem?
Auto-brightness is enabled
Faulty ambient light sensor
Defective display
Low battery
Faulty ambient light sensor
An administrator arrives at work and is told that network users are unable to access the shared drive on a Windows server. The administrator logs into the server and sees that some Windows Updates were automatically installed last night successfully, but now the network connection shows “limited” with no availability. What rollback action should the technician perform?
Server’s NIC driver
Web browser
Server’s IP address
Antivirus updates
Server’s NIC drivers
You are renting space in another company’s data center. To protect your server from being physically accessed when you are not in the building, what device should you use?
Server lock
Smart card
USB lock
Entry control roster
Server Lock