Practice 1 Flashcards

1
Q

You are configuring a SOHO network and only allowing specific IP addresses to access the network while blocking any IP addresses that are not on the list. Which of the following should be implemented?

MAC filtering
Blocklist
Allow List
Port Forwarding

A

Allow List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A web server has a planned firmware upgrade for Saturday evening. During the upgrade, the power to the building is lost, and the firmware upgrade fails. Which of the following plans should be implemented to revert to the most recent working version of the firmware on the webserver?

Rollback plan
Backup plan
Contingency plan
Alternative plan

A

Rollback Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which command-line tool is used on a Windows system to erase all the data on a hard disk and ensure it is ready to accept new Windows files?

format /fs:NTFS
chkdsk /f
diskpart list disk
sfc /now

A

format /fs:NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the tools should a technician NOT use with a solid-state device on a workstation?

Performance monitor
Disk cleanup
Disk Defragmenter
Device Manager

A

Disk Defragmenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?

Mac Address
Asset ID
Location
IP Address

A

Asset ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?

NAT
UPnP
DHCP
MDM

A

UPnP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user contacts the service desk, stating their account is locked out, and they are unable to login to their local workstation. Which of the following log files should you review to determine the source of the lockout on the local workstation?

Setup
Security Log
System Log
Application Log

A

Security Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to “click here” to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack?

Phishing
Brute Force
Spear Phishing
Whaling

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A customer’s Android smartphone is only 6 months old but is becoming excessively slow. When questioned, the customer states it was acting fine until they recently installed a new stock market tracking app. What action should you take to troubleshoot the slow performance on this phone?

Perform a hard reboot of the smartphone
Uninstall the app, reboot the phone, and reinstall the app
Replace the phone with a newer model
Factory reset the smartphone and reinstall all the apps

A

Uninstall the app, reboot the phone, and reinstall the app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your company recently downloaded and installed the latest audio card driver for all of its workstations. Now, several users have had their usernames and passwords for several websites compromised. You believe the two issues are related. If they are, which of the following was MOST likely contained in the audio card driver file that was installed?

Worm
Virus
Keylogger
Ransomware

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

While investigating a data breach, you discover that the account credentials used belonged to an employee who was fired several months ago for misusing company IT systems. The IT department never deactivated the employee’s account upon their termination. Which of the following categories would this breach be classified as?

Advanced Persistent Threat
Zero-day
Known Threat
Insider Threat

A

Insider Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A hospital’s file server has become infected with malware. The files on the server all appear to be encrypted and cannot be opened. The network administrator receives an email from the attacker asking for 20 bitcoin in exchange for the decryption key. Which type of malware MOST likely infected these computers?

Keylogger
Spyware
Rootkit
Ransomware

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What permissions would be represented by the octal 517?

A

r-x–xrwx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following file system formatting types should be used with older recordable optical discs?

CDFS
FAT32
NTFS
UDP

A

CDFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Linux command is used to print the full contents of a file to the screen at once?

Grep
cat
dig
ls

A

cat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dion Training wants to provide governance for how employees can utilize the corporate network, email, and laptops while working for the company. Within which of the following should this be documented?

Asset Management Policy
Knowledge Base
Password Policy
Acceptable Use Policy

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Jason has an old 2017 Dell Laptop that he uses to connect to his office network while traveling. The computer is slow and is running Windows 7. The laptop’s screen was recently cracked and needs replacement. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?

  • Replace the display and charge him for the parts/installation
  • Purchase a new laptop as the cost to repair might be more than a new laptop
  • Replace the display and contact the manufacturer for reimbursement
  • Sell him an external 15” tablet/monitor to connect to the laptop as a workaround
A

Purchase a new laptop as the cost to repair might be more than a new laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You have been asked to install a new hard drive in a Windows 10 system. You have already installed the hard drive and booted the system up. Which tool should you use to create the new partitions on the hard drive?

DxDiag
Disk Defragmenter
Disk Management
dd

A

Disk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following should you use to remove any usernames and passwords that you no longer wish to store in Windows 10?

Device Manager
Credential Manager
Internet Options
Keychain

A

Credential Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Jason is working in Microsoft Word, but the application appears to have become frozen and unresponsive. Which of the following features in the Task Manager should he use to terminate the unresponsive program?

Services
Performance
Processes
Startup

A

Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your company wants to ensure that users cannot access USB mass storage devices. You have conducted some research online and found that if you modify the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor key, it will prevent USB storage devices from being used. Which of the following tools should you use to modify this key?

MMC
RDS
RegEdit
MSConfig

A

RegEdit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are troubleshooting an issue with multiple workstations that are having network connectivity issues. The network also has two servers connected to the network, but they do not have any connectivity issues. You look at the network configuration of the two servers and notice they are using static IP addresses. Based on what you know so far, what is most likely the cause of the workstation’s network connectivity issue?

The wireless network adapter for each workstation was accidentally disabled
The internet connection for the network is down
The network’s router is currently down
The workstations are most likely configured to use dynamically assigned IP addresses and DHCP is not working properly

A

The workstations are most likely configured to use dynamically assigned IP addresses and DHCP is not working properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which command-line tool is used on a Windows system to move upward in a directory within the system’s directory structure?

cd .
dir
ls
cd ..

A

cd ..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following would leave a user’s programs running on their Windows 10 laptop while preventing other users from accessing them without entering the correct password?

Shutdown
Sleep
Lock
Hibernate

A

Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You have submitted an RFC to install a security patch on some of your company’s Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe which servers will receive the patch during this maintenance window?

Risk Analysis
Scope
Plain
Purpose

A

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system’s web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then perform the remediation to remove the malware. You have scanned the machine with several anti-virus and anti-malware programs and determined it is now cleaned of all malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated anti-virus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers?

Reformat the system and reinstall the OS
Install a secondary anti-malware solution on the system
Verify the hosts file has not been maliciously modified
Perform a System restore to an earlier date before the infection

A

Verify the hosts file has not been maliciously modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following types of backups generates the recovered files from a complete copy of a file created at some point in time and one or more partial backups created at later times to merge them into the recovered data?

Synthetic
Full
Incremental
Differential

A

Synthetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following should be implemented to allow wireless network access for clients in the lobby using a shared password as the key?

WPA2
Geoforce
Firewall
IPsec

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You have just updated the graphics card’s driver to the latest version. After installation, the Windows workstation crashes and reports an error code. You attempt to reboot the workstation, but it fails again. You decide to reboot the workstation into Safe Mode. What should you do NEXT?

Disable the graphics driver
Perform an antivirus scan
Rollback the graphics driver
Perform an Windows Update

A

Rollback the graphics driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following Control Panel sections would a technician use to configure a Windows 10 computer to use Narrator mode to read aloud the list of files that appear on the screen to the user?

Ease of access
Indexing Options
Sound
File Explorer Options

A

Ease of Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A macOS user is browsing the internet in Google Chrome when they see a notification that says, “Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!” What type of threat is this user experiencing?

Worm
Pharming
Rogue anti-virus
Phishing

A

Rogue anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

An employee at Dion Training complains that their smartphone is broken. They state that it cannot connect to the internet, nor can it make or receive phone calls and text messages. You ask them to start up the music player on his phone, and it opens without any issues. It appears the common issue has to do with the device’s network connectivity. Which of the following is MOST likely the problem with this smartphone?

Airplane mode is enabled on the device
The Bluetooth connection is disabled
The VPN password was entered incorrectly
The cellular radio in it is broken

A

Airplane mode is enabled on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Christina recently purchased a new Android smartphone and is going on a trip. At the airport, she found a public wireless network called “FreeAirportWiFi” and connects to it. She noticed a question mark (?) icon showing in the toolbar next to the Wi-Fi icon. Christina attempts to open a webpage but gets an error of “The page cannot be displayed.” She begins to troubleshoot the device by verifying that the airplane mode is disabled, Bluetooth is enabled, and tethering is enabled. Next, Christina attempts to make a phone call, which works without any issues. Which of the following is MOST likely the issue with Christina’s smartphone?

The smartphone is connected to the FreeAirportWifi but is not authorized yet
The smartphone’s SIM card is deactivated
The smartphone can only support 3G data networks
The smartphone does not have a valid data plan enabled

A

The smartphone is connected to the FreeAirportWifi but is not authenticated yet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

An Android user recently cracked their screen and had it replaced. If they are in a dark room, the phone works fine. If the user enters a room with normal lights on, then the phone’s display is dim and hard to read. What is MOST likely the problem?

Auto-brightness is enabled
Faulty ambient light sensor
Defective display
Low battery

A

Faulty ambient light sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An administrator arrives at work and is told that network users are unable to access the shared drive on a Windows server. The administrator logs into the server and sees that some Windows Updates were automatically installed last night successfully, but now the network connection shows “limited” with no availability. What rollback action should the technician perform?

Server’s NIC driver
Web browser
Server’s IP address
Antivirus updates

A

Server’s NIC drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You are renting space in another company’s data center. To protect your server from being physically accessed when you are not in the building, what device should you use?

Server lock
Smart card
USB lock
Entry control roster

A

Server Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A cybersecurity analyst from BigCorp contacts your company to notify them that several of your computers were seen attempting to create a denial of service condition against their servers. They believe your company has become infected with malware, and those machines were part of a larger botnet. Which of the following BEST describes your company’s infected computers?

Monsters
Zero-day
Zombie
Bugs

A

Zombie

38
Q

You are trying to copy a 4.7 GB file from your Windows laptop to an external hard drive using USB 3. The external hard drive is formatted with FAT32. Every time you attempt this copy, you receive an error. What is MOST likely the issue?

The external hard drive must be formatted as APFS to support this transfer
Files over 4 GB cannot be stored on a FAT32 formatted drive
The laptop must be reformatted as FAT32 to support this transfer
USB 3 is too slow to transfer a file this large

A

Files over 4 GB cannot be stored on a FAT32 formatted drive

39
Q

A network administrator needs to allow employees to upload files to a remote server securely. What port must be allowed through the firewall?

22
25
21
161

A

22

40
Q

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing?

Enable System Restore and perform a backup
Disable the laptop’s wired and wireless network cards
Remove, Quarantine, or erase the infected files
Review the type, symptoms, purpose, and removal of the malware

A

Remove, quarantine, or erase the infected files

41
Q

Which of the following tools in Windows 10 allows a technician to add different utilities, such as disk management, computer management, performance monitor, print management, and others to create a modular and customized tool kit for the technician to utilize?

UAC
MMC
PerfMon
RDS

A

MMC

42
Q

You are working as a file server administrator. You are backing up the files on the server when you observe numerous inappropriate photos and videos stored on the corporate share drive by the user jsmith. These files are clearly in violation of the company’s AUP. What should you do FIRST?

Notify your immediate supervisor
Copy the files to an external hard drive
Delete the files immediately
Contact the user and ask them to remove the files

A

Notify your immediate supervisor

43
Q

Dion Training uses DHCP to assign private Class C IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class C address?

172.18.21.252
192.168.3.5
169.254.1.52
10.1.2.3

A

192.168.3.5

44
Q

The server administrators have asked you to open the default port on the firewall for a new DNS server. Which of the following ports should you set to ALLOW in the ACL?

67
110
53
3389

A

53

45
Q

You are troubleshooting a user’s workstation that is operating extremely slowly. You open the Task Manager and see that only Microsoft Word is currently running, but the CPU and network utilization is consistently running between 95-100%. Which of the following is MOST likely causing this issue?

The computer has become a zombie
The computer is the victim of a DoS attack
The network’s firewall is blocking outbound traffic
The application is not compatible with this OS

A

The computer has become a zombie

46
Q

Which macOS features is used to backup and restore files to an external hard disk?

Remote disc
Snapshot
Time Machine
Boot Camp

A

Time Machine

47
Q

A penetration tester sends an email out to 100,000 random email addresses. In the email the attacker sent, it claims that “Your Bank of America account is locked out. Please click here to reset your password.” Which of the following attack types is being used?

Phishing
Whaling
Spear Phishing
Vishing

A

Phishing

48
Q

A user cannot change their iPad display from landscape to portrait when they are on the home screen. Which of the following is MOST likely the reason for this issue?

NDC is disabled
Smartphone has overheated
Developer mode is enabled
Autorotate is disabled

A

Autorotate is disabled

49
Q

Which RAID solution will provide the BEST speed and redundancy for a backup and disaster recovery server?

RAID 1
RAID 10
RAID 0
RAID 5

A

RAID 10

50
Q

You are configuring a SOHO network for a small coffee shop. They have found that certain customers will buy a single coffee cup and then sit at the coffee shop all day to use the WiFi. The owner has asked you to block this customer’s laptop from connecting by placing it on a blocklist. Which of the following configurations would you use to blocklist this customer’s device based on its unique hardware identifier?

Port Forwarding
Enforce a WPA2 password
MAC filtering
Port Filtering

A

MAC filtering

51
Q

Which version of Windows supports Virtual Desktops?

Windows 10
Windows 8
Windows 8.1
Windows 7

A

Windows 10

52
Q

What is the minimum amount of storage space required to install Windows 10 (x64) on a device?

20 Gb
32 GB
16 GB
64 GB

A

32 GB

53
Q

Which backup rotation schemes requires at least one monthly full backup to be stored safely off-site?

Grandfather-father-son
Tower of Hanoi
FIFO Backup
3-2-1 Backup

A

3-2-1 backup

54
Q

Which Windows 10 power options will turn off individual devices connected to a laptop to save energy?

USB selective suspend
Hibernate
Fast Startup
Sleep

A

USB selective suspend

55
Q

Elizabeth was replacing a client’s security device that protects their screened subnet. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. Which of the following devices was MOST likely misconfigured and is now causing a problem?

DHCP
Content Filter
Firewall
DNS

A

Firewall

56
Q

You are troubleshooting a user’s laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which log in Windows 10 would you review to determine if the print spooler service is causing this issue?

Application Log
Setup
Security Log
System Log

A

System Log

57
Q

Which file type is commonly used by network administrators to perform repetitive tasks using a Microsoft proprietary programming language?

.py
.vbs
.js
.sh

A

.vbs

58
Q

Which data type would be used to store the user’s middle initial?

String
Boolean
Integers
Character

A

Character

59
Q

A customer is complaining that her laptop is too slow. You have thoroughly checked the device but cannot find anything wrong with it. Which of the following is the best thing to say NEXT?

“Can you tell me more about the problem? What do you mean by ‘it is acting slow’?”
“Excuse me for a moment; my phone is bussing.”
“I found nothing wrong with this laptop that would make it slow.”
“I don’t understand what you are complaining about; this laptop seems plenty fast to me.”

A

“Can you tell me more about the problem? What do you mean by ‘it is acting slow’?”

60
Q

Which version of Windows 10 does NOT support joining a domain or using Group Policy management?

Home
Enterprise
Pro
Education

A

Home

61
Q

Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?

RADIUS
Kerberos
CHAP
TACACS+

A

TACACS+

62
Q

Which of the following backup rotation schemes uses a three-tiered approach to ensure at least one monthly full backup is conducted?

Tower of Hanoi
Grandfather-father-son
3-2-1 Backup
FIFO Backup

A

Grandfather-Father-Son

63
Q

Dion Training just released a new corporate policy that dictates all access to network resources will be controlled based on the user’s job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy?

Zero trust
Acceptable use policy
Defense in depth
Least Privilege

A

Least Privilege

64
Q

During the reconnaissance phase of a penetration test, you have determined that your client’s employees all use Android smartphones that connect back to the corporate network over a secure VPN connection. Which of the following methods would MOST likely be the best method for exploiting these?

Use web-based exploits against the devices web interfaces
Use a tool like ICSSPLOIT
Use social engineering to trick a user into opening a malicious APK
Identify a jailbroken device for east exploitation

A

Use social engineering to trick a user into opening a malicious APK

65
Q

You recently read a news article about a new crypto-malware worm that is causing issues for corporate networks. Today, you noticed that four of your company’s workstations had their files encrypted. You are worried about the rest of the network’s workstations. What should you do FIRST?

Update the antimalware scanner’s signature on all workstations
Format the affected workstation’s hard drives and reinstall Windows
Perform a full disk antimalware scan on the affected workstations
Immediately quarantine the affected workstations

A

Immediately quarantine the affected workstation

66
Q

Which of the following MacOS features is used to manage passwords cached by the OS and is the equivalent of the Credential Manager in Windows?

Keychain
Mission Control
Apple ID
Spotlight

A

Keychain

67
Q

You are a member of a project team contracted to install twenty new wireless access points (WAPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is still finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the scope of work and change request before its approval?

Plan for change
End-User Acceptance
Risk Analysis
Rollback Plan

A

Rollback plan

68
Q

Which of the following types of attacks occurs when an attacker specifically targets the CEO, CFO, CIO, and other board members during their attack?

Spear Phishing
Whaling
Vishing
Phishing

A

Whaling

69
Q

A coworker is creating a file containing a script. You look over their shoulder and see “#!/bin/bash” as the first line in the file. Based on this, what type of file extension should this script use?

.sh
.py
.bat
.vbs

A

.sh

70
Q

What type of structure is “For Next” in scripting?

Brach
Variable
Constant
Loop

A

Loop

71
Q

A user’s computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do?

Answer the phone, put the user on hold, and help them after their scheduled break
Ask another Tier 2 technician to answer the call since it will take too long to solve
Answer the phone and politely ask the user to call back later
Troubleshoot the issue for the user regardless of how long it takes

A

Ask another Tier 2 technician to answer the call since it will take too long to solve

72
Q

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar’s printer icon. Which of the following actions should Peter try FIRST to solve this issue?

Cancel all documents and print them again
Check the status of the print server queue
Check that the printer is not offline
Check to ensure the printer selected is the default printer

A

Check the status of the print server queue

73
Q

A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?

Trojan
Worm
Virus
Ransomware

A

Worm

74
Q

Windows file servers commonly hold sensitive files, databases, passwords, and more. What common vulnerability is usually used against a Windows file server to expose sensitive files, databases, and passwords?

SQL Injection
CRLF Injection
Cross-Site Scripting
Missing Patches

A

Missing patches

75
Q

A company has had several virus infections over the past few months. The root cause was determined to be known vulnerabilities in the software applications in use by the company. What should an administrator implement to prevent future outbreaks?

Host-based intrusion detection system
Incident response team
Acceptable use policies
Patch management

A

Patch Management

76
Q

You have submitted an RFC to install a security patch on all of your company’s Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe why the change will be installed during this maintenance window?

Purpose
Scope
Plan
Risk Analysis

A

Purpose

77
Q

Mark’s laptop is running Windows 10 and appears to become slower and slower over time with use. You decide to check the current CPU utilization and observe that it remains in the 95% to 100% range fairly consistently. You close three of Mark’s open applications and recheck the CPU utilization. You notice the utilization dropped to the 30% to 35% range. A week later, Mark calls you again and says the computer is extremely slow. Which of the following tools can you use to check the CPU utilization and manage any high-resource processes?

MSConfig
Task Manager
PerfMon
RDS

A

Task Manager

78
Q

Which of the following types of attacks are usually used as part of an on-path attack?

Spoofing
Tailgating
DDoS
Brute Force

A

Spoofing

79
Q

Which of the following types of wireless encryption uses a 40-bit encryption key with an RC4 encryption cipher?

Open
WPA
WEP
WPA2

A

WEP

80
Q

Another technician tells you that they are PXE booting a computer. What is the technician MOST likely doing with the computer?

Conducting a system repair
Installing an image to the computer over the network
Using a multiboot configuration
An in-place upgrade of the OS

A

Installing an image to the computer over the network

81
Q

You are troubleshooting a user’s computer. As part of your efforts, you want to install a new login with administrative privileges. Which of the following utilities should you use?

System Configuration
System Information
Local Users and Groups
Group Policy

A

Local Users and Groups

82
Q

Dion Training is concerned with the possibility of employees accessing another user’s workstation in secured areas without their permission. Which of the following would BEST be able to prevent this from happening?

Install security cameras in secure areas to monitor logins
Require a username and a password for user logins
Enforce a policy that requires passwords to be changed every 30 dats
Require biometric identification for user logins

A

Require biometric identification for user logins

83
Q

You are partitioning a 1 TB hard drive on a new workstation. The hard disk has been partitioned into four different partitions with 100 GB, 150 GB, 250 GB, and 500 GB. How many different file system types could you support on this 1 TB hard drive?

3
1
4
2

A

4

84
Q

A salesperson uses their smartphone as a hotspot while traveling. The first week of their trip, their smartphone could download files at 24 Mbps and stream online videos without any problems. Unfortunately, this week their smartphone is only operating at 256 Kbps when they attempt to download a file. Additionally, they are having difficulty watching online videos due to excessive buffering. Which of the following is MOST likely the problem?

The smartphone is overheating
The smartphone’s hotspot is defective
The smartphone’s data connection is being throttled
The smartphone is not connected to WiFi

A

The smartphone’s data connection is being throttled

85
Q

Which of the following policies or plans would describe the access requirements for connecting a user’s laptop to the corporate network?

Onboarding Policy
Password Policy
Bring your own device policy
remote access policy

A

Bring your own device policy

86
Q

Which edition of Windows 10 does not have the group policy editor enabled?

Home
Pro
Enterprise
Pro for Workstations

A

Home

87
Q

Jonathan’s father is visually impaired and is having difficulty seeing some of the items on his Windows 10 laptop. Which of the following Control Panel sections would a technician use to configure the Magnifier feature so that his father can zoom in on the different parts of the screen and see them easier?

Indexing Options
Ease of Access
Sound
File Explorer Options

A

Ease of Access

88
Q

Sagar is planning to patch a production system to correct a detected vulnerability during his most recent network vulnerability scan. What process should he follow to minimize the risk of a system failure while patching this vulnerability?

  • Wait 60 days to deploy the patch to ensure there are no associated bugs reported with it
  • Contact the vendor to determine a safe time frame for deploying the patch into the production environment
  • Deploy the patch immediately on the production system to remediate the vulnerability
  • Deploy the patch in a sandbox environment to test it before patching the production system
A

Deploy the patch in a sandbox environment to test it before patching the production system

89
Q

A customer has requested you install an external video card into their gaming PC. Which of the following tools should you utilize to protect the video card as you carry it from the storage room to your workbench?

Antistatic Bag
ESD Strap
Latex Gloves
Air Filter Mask

A

Antistatic bag

90
Q

A user is having an issue with a specific application on their Android device. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue?

A

Clear the local application cache