Practice 2 Flashcards

1
Q

You are working on upgrading the memory of a laptop. After removing the old memory chips from the laptop, where should you safely store them until you are ready to reuse them in another laptop?

Ziplock bags
Cardboard box
Antistatic bag
Manila Envelopes

A

Antistatic Bag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room’s contents?

Biometric Lock
Strong Passwords
Privacy Window Shades
Bollard
Badge reader
Cable Lock

A

Biometric Lock
Badge Reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Samuel’s computer is taking a very long time to boot up, and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense?

Replace the hard drive with an SSD
Install additional RAM
Defragment the hard drive
Remove unnecessary applications from startup
Terminate processes in the Task Manager
Perform a Disk Cleanup

A

Defragment the hard drive
Remove unnecessary applications from startup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)

Update the anti-malware software
Educate the end user
Disconnect the laptop from the network
Enable System Restore in Windows
Schedule scans and run system updates
Disable System Restore in Windows

A

Update the anti-malware software
Disconnect the laptop from the network
Disable System Restore in Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are working as a penetration tester and have discovered a new method of exploiting a vulnerability within the Windows 10 operating system. You conduct some research online and discover that a security patch against this particular vulnerability doesn’t exist yet. Which type of threat would this BEST be categorized as?

Zero-Day
Brute Force
Spoofing
DDoS

A

Zero-Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this?

Brute-Force
Dictionary
Rainbow Table
Hybrid

A

Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?

HOTP
Proximity Cards
Smart Cards
TOTP

A

Proximity Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Susan is installing several updates on a Windows computer. Nine of the updates were installed without any issues, but one update produced an error and failed to install. Susan restarts the computer as part of the troubleshooting process, and the computer automatically attempts to install the failed update again. Again, the update fails to install. What should Susan do NEXT?

  • Download the update from a third-party website like Source Forge and install it
  • Review the Event Viewer to determine the cause of the failure
  • Research the error number for the failed update and determine if there is a known issue with this update
  • Manually download and install the failed update
A

Research the error number for the failed update and determine if there is a known issue with this update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming wants to document his script so that other programmers can understand what his logic was when he wrote it. Which of the following should he use?

Variable
Comment
Constant
Loop

A

Comment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Jason is building a new workstation for his son to utilize when writing reports for school. The new computer will have an Intel x86 processor, 3 GB of memory, and a 256 GB SSD. Which of the following editions of Windows 10 would support this workstation at the lowest cost?

Pro for Workstations
Enterprise
Pro
Home

A

Home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When using an MBR, which of the following types of partitions can only have up to four partitions?

Primary
Extended
Logical
Swap

A

Primary partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two weeks ago, David’s computer was infected with a virus. A technician performed the malware removal process on the machine, removed the infection from the system, update the system’s software, and closed the trouble ticket. Now, many of the symptoms have returned on David’s computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation?

Update the anti-virus software and run a full system scan
Educate the end-user about how to avoid malware in the future
Enable System Restore and create a restore point in Windows
Quarantine the infected system by removing its network connectivity

A

Educate the end-user about how to avoid malware in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have just installed a second monitor for a bookkeeper’s workstation so they can stretch their spreadsheets across both monitors. This would essentially let them use the two monitors as one combined larger monitor. Which of the following settings should you configure?

A

Extended Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Jason is out of town on a business trip and needs to access the share drive on his company’s corporate network. Which of the following types of network connections should he use to access the share drive from his hotel room?

Wireless
Wired
Dial-Up
VPN

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem?

The baseband firmware needs to be updates
The cellular radio cannot connect to the cellphone towers
The data speeds are insufficient with only one bar of signal
The smartphone has been infected with a virus

A

The data speeds are insufficient with only one car of signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network administrator has set up a firewall and set up only three allow rules so that traffic can be sent over ports 21, 110, and 25. Next, they added a final rule of “deny any any” to the end of the ACL to minimize the attack surface and better secure the network. Unfortunately, now the administrator is receiving complaints from users that they cannot access any web pages using their URLs, such as DionTraining.com. Which of the following should the administrator do to correct this issue?

Add a rule to the ACL to allow traffic on ports 110 and 389
Add a rule to the ACL to allow traffic on ports 80 and 53
Add a rule to the ACL to allow traffic on ports 139 and 445
Add a rule to the ACL to allow traffic on ports 143 and 22

A

Add a rule to the ACL to allow traffic on ports 80 and 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as?

Under-Voltage Event
Power spikes
Power Surge
Power Failure

A

Power Surge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What unmask should be set for a directory to have 700 as its octal permissions?

rwxrwxrwx
r–r–r–
rwx—rwx
rwx——

A

rwx——

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What unmask should be set for a directory to have 406 as its octal permissions?

A

r—–r-x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What unmask should be set for a directory to have 673 as its octal permissions?

A

r-xrwx-wx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An employee’s inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?

Establish an allow list of trusted senders
Create a domain-based email filter
Mark each email as spam or junk
Click the unsubscribe button of each email

A

Mark each email as spam or junk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Your organization has recently suffered a data breach due to a server being exploited. As a part of the remediation efforts, the company wants to ensure that the default administrator password on each of the 1250 workstations on the network is changed. What is the easiest way to perform this password change requirement?

Deploy a new group policy
Create a new security group
Utilize the key escrow process
Revoke the digital certificate

A

Deploy a new group policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?

MSDS
AUP
SOW
SOP

A

SOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You have submitted an RFC to install a security patch on all of your company’s Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window?

Risk Analysis
Plan
Scope
Purpose

A

Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Dion Training is building a new computer for its video editor to use. The new computer will use an octa-core Intel processor, 3 TB of DDR4 memory, and a RAID 0 with two 4 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer’s memory properly?

Enterprise
Education
Home
Pro

A

Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Sarah is installing Windows 10 (64-bit) in a virtual machine. The installation is continually failing and producing an error. She has configured the virtual machine with a dual-core 950 MHz processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

The amount of storage space is insufficient
The processor is insufficient
The screen resolution is insufficient
The amount of RAM is insufficient

A

Processor is insufficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following physical security controls would be the most effective in preventing an attacker from driving a vehicle through the glass doors at the front of the organization’s headquarters?

Intrusion alarm
Security guards
Access control vestibule
Bollards

A

Bollards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What best describes how a DHCP reservation works?

By leasing a set of reserved IP addresses according to their category
By matching a MAC address to an IP address within the DHCP scope
By assigning options to the computers on the network by priority
By letting the network switches assign IP addresses from a reserved pool

A

By matching a MAC address to an IP address within the DHCP scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which command-line tool on a Windows system is used to display the resulting set of policy settings that were enforced on a computer for a specified user when they logged on?

gpupdate
sfc
dism
gpresult

A

gpresult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following types of software CANNOT be updated via the Windows Update program?

Firmware updates
Driver updates
Critical fixes
Security patches

A

Firmware updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which command should you use to repair the boot sector of the hard disk?

bootrec /rebuildbdc
bootrec /fixboot
bootrec /fixmbr
diskpart list

A

bootrec /fixboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What action should you take first when working on a computer or server?

Verify proper cable management is being used
Remove any jewelry you are wearing
Use a grounding probe to discharge the power supply
Dispose of the old power supply

A

Remove any jewelry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state?

Hibernate
Shutdown
Sleep
Lock

A

Sleep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A user with an older laptop running Windows 7 that has only 2 GB of RAM, 32 GB of SSD, and a 1.7 GHz 64-bit processor. The user would like to upgrade to a newer OS since Windows 7 is now considered end-of-life. Which operating system should the technician recommend to ensure the BEST performance on this computer?

Windows 8.1
Windows 11
Windows 10
Windows 8

A

Windows 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which mitigation provides the best return on investment by mitigating the most vulnerable attack vector in an enterprise network?

Enable biometric and SSO for authorization
Remove unneeded services running on the servers
Provide end-user awareness training for office staff
Update all antivirus definitions on workstations and servers

A

Providing end-user awareness training for office staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend’s Windows 10 desktop. Which file format should you use?

FAT32
exFAT
HFS
NTSF

A

exFAT

37
Q

A corporate workstation was recently infected with malware. The malware was able to access the workstation’s credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. What should be done to prevent this from happening?

Install a host-based intrusion detection system on all of the corporate workstations
Install an anti-virus or anti-malware solution that uses heuristic analysis
Monitor all Workstations for failed login attempts and forward them to a centralized SYSLOG server
Install a Unified Threat Management system on the network to monitor for suspicious traffic

A

Install an anti-virus or anti-malware solution that uses heuristic analysis

38
Q

Which tool should you utilize to ensure you don’t damage a laptop’s SSD while replacing it?

Antistatic bag
Air filter mask
Latex glove
ESD strap

A

ESD strap

39
Q

Which open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?

Telnet
RDP
SSH
VNC

A

Virtual Network Computing (VNC)

40
Q

A computer has been performing slowly. During your troubleshooting, you notice that the Task Manager shows the processor is utilizing 90-100% of the system resources immediately after completing the boot-up process. Which action should you take?

Disable any unneeded applications configure to automatically startup
Uninstall and reinstall the applications
Verify that disabling one service has not affected others
Remove a recently added hardware device

A

Disable any unneeded applications configure to automatically startup

41
Q

You recently built a new gaming PC for a customer. The system has an octa-core 64-bit processor, 32 GB of DDR4 RAM, 1 TB SSD, a PCI x16 video card with 8 GB of RAM, and Windows 10 Pro (x86) installed. When you turn on the system, you notice that Windows only recognizes 3.5 GB of RAM. Which component should be upgraded to correct this issue?

Replace the OS with Windows 10 Pro (x64) edition
Set the processor to VT-enabled in the BIOS
Replace the 1 TB SSD with a 4 TB 7200 RPM HDD
Replace the 32 GB of DDR4 with DDR5

A

Replace the OS with Windows 10 Pro (x64) edition

42
Q

What file format is used for PowerShell scripts

A

.ps1

43
Q

The video editor at Dion Training is having issues with her workstation. The workstation is running Windows 10 and is failing to boot up properly. A technician wants to replace the existing operating system files with a new copy of the same version. The technician has been told to ensure the user’s data and applications are not modified or deleted during the upgrade or installation. Which types of upgrades or installations should the technician use?

Refresh Installation
Repair Installation
Clean Install
In-place upgrade

A

Repair installation

44
Q

Which MacOS feature allows you to use multiple desktops or spaces on a single system?

Finder
Mission Control
Dock
Boot Camp

A

Mission Control

45
Q

You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. This tool tests the end-to-end connection and reports on each hop found in the connection. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP?

ping
Tracert
nslookup
netstat

A

Tracert

46
Q

Dion Training wants to implement a new wireless network in their offices. What would support encryption for traffic being sent and received over the network while still allowing users to connect to the open network without a password, passphrase, or digital certificate?

WPA3
WEP
WPA2
WPA

A

WPA3

47
Q

What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system?

4 GB
2 GB
8 GB
1 GB

A

1GB

48
Q

Jason’s company issued him an old 2018 laptop with an internal hardware security key that he uses to connect to his office network over a VPN while traveling. Without this laptop, Jason cannot access his company’s internal servers, email, or share drive files. The Windows 10 laptop is extremely slow, and the screen recently cracked and needs to be replaced. When Jason returns to the company’s headquarters, the company will provide him with a new laptop due to the broken screen. Until then, he is working out of his hotel room during a 45-day business trip and needs to continue using this laptop. Jason brings the laptop to the computer store you work at and asks for your assistance. What do you recommend?

Purchase a new laptop as the cost to repair might be more than a new laptop
Sell him an external 15” tablet/monitor to connect to the laptop as a workaround
Replace the display and contact the manufacturer for reimbursement
Replace the display and charge him for the parts/installation

A

Selling him an external monitor to connect to the laptop as a workaround

49
Q

You have been asked to replace a computer’s hard drive. What step should you take FIRST to prevent an electrical hazard while working on the computer?

Place the computer on the ground workbench
Disconnect the power before servicing the computer
Connect an ESD strap to yourself to prevent shock
Place the computer and its components on an ESD mat

A

Disconnect the power before servicing the computer

50
Q

Jack has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. Jack states he wants to get a copy of Microsoft Word so their son can create reports for school. Which of the following would MOST likely be the best option for them?

Open-Source
Personal
Business
Enterprise

A

Personal

51
Q

Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class A address?

169.254.125.154
10.5.34.15
172.16.13.12
192.168.2.14

A

10.5.34.15

52
Q

You are working on a customer’s computer when your cellphone begins to ring. What should you do?

Apologize to the customer and send the call to voicemail
Ignore the phone and let it continue ringing until it goes to voicemail
Apologize to the customer and answer the phone
Answer the phone while continuing to work on the customer’s computer

A

Apologize to the customer and send the call to voicemail

53
Q

Your boss has asked you to write a script that will copy all of the files from one hard drive to another each evening. This script should mirror the directories from one drive to the other and ensure they are synchronized each evening. Which command-line tool should you use in your script?

xcopy
copy
robocopy
cp

A

Robocopy

54
Q

Which of the following types of mobile device screen locks uses biometrics to securely unlock the device?

TouchID
Swipe
Passcode
FaceID

A

TouchID
FaceID

55
Q

Upon booting up a Windows 10 machine, you see an error message stating, “One or more services failed to start.” Which of the following actions should you take?

Disable application startup
Verify that disabling one service has not affected others
Uninstall and reinstall the service
Check the configuration of the antivirus software

A

Verify that disabling one service has not affected others

56
Q

Which type of installation would require an answer file to install the operating system?

Repair
Upgrade
Clean
Unattended

A

Unattended

57
Q

Madison is trying to open up her anti-malware solution to run a full system scan because she suspects her computer has become infected. When she attempts to run the tool, an error of “Access denied” is received. What security issue is MOST likely occurring?

Rogue Anti-Virus
Renamed System Files
File Permission Change
Disappearing Files

A

File Permission Change

58
Q

Which file system type is used by default when installing macOS on a modern workstation?

APFS
NTFS
HFS+
FAT32

A

Apple File System (APFS)

59
Q

What does the command “shutdown /h” do on a Windows workstation?

Log off the workstation
Enter hibernation
Reboot the workstation
Shutdown the workstation

A

Enter hibernation mode

60
Q

A new corporate policy dictates that all access to network resources will be controlled based on the user’s job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy?

Directory Permissions
Blocklists
Least Privilege
Permission Creep

A

Least Privilege

61
Q

You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through their database. Which of the following types of data should this be classified?

CUI
PHI
IP
PII

A

PHI

62
Q

Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 laptops. When connected to a public network, the firewall has been configured to allow only inbound connections that match an existing rule and to only allow outbound connections that do match an existing rule to achieve the highest level of security. What type of security posture has Dion Training implemented?

Implicit allow for inbound, explicitly allow for outbound
Explicit allow for inbound, implicit allow for outbound
Implicit allow for inbound, implicit allow for outbound
Explicit allow for inbound, explicit allow for outbound

A

Explicit allow for inbound, explicit allow for outbound

63
Q

What type of security measure is used to control access to an area by using a retina scan?

Cipher Locks
Two-factor authentication
Optical reader
Biometric

A

Biometric

64
Q

What type of encryption is considered the most secure to utilize on a SOHO network?

WEP
WPA2
WPS
WPA3

A

WPA3 (Wi-Fi Protection Access version 3)

65
Q

A cybersecurity analyst notices that an attacker is trying to crack the WPS pin associated with a wireless printer. The device logs show that the attacker tried 00000000, 00000001, 00000002 and continued to increment by 1 number each time until they found the correct PIN of 13252342. Which of the following type of password cracking was being performed by the attacker?

Brute-Force
Hybrid
Dictionary
Rainbow Table

A

Bruce Force

66
Q

A password-based authentication and password-authenticated key agreement method used in WPA3 that replaced the 4-way handshake used un WPA-based wireless networks

A

Simultaneous Authentication of Equals (SAE)

67
Q

What only creates a copy of the selected data that has been modified since the last full backup?

Differential
Full
Synthetic
Incremental

A

Differential Backup

68
Q

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. What is the FIRST action you should perform?

Investigate malware symptoms
Run Windows Update
Disable System Restore
Enable System Restore

A

Investigate malware symptoms

69
Q

A user has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. The user states they do not want to pay for the software. Which of the following would MOST likely be the best option for them?

Corporate
Enterprise
Open-Source
Personal

A

Open-Source

70
Q

Which of the following data types would be used to store the number 21?

Floating Point
Boolean
String
Integers

A

Integers

71
Q

Which command-line tool and option on a Windows system is used to force a background refresh of all group policy settings on a system?

A

gpupdate /force

72
Q

A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

-Document the pop-ups displayed and take a screenshot
-Reinstall or reimage the operating system
-Quarantine the machine and report it as infected to your company’s cybersecurity
department or investigation
-Clear the browser’s cookies and history, enable the pop-up blocker, and scan the
system for malware

A

Clear the browser’s cookies and history, enable pop-up blocker, and scan the system for malware

73
Q

A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?

Comment
Branch
Loop
Constant

A

Loop

74
Q

Which of the following commands is used on a Linux system to search for lines that match a pattern within a file?

vi
grep
pwd
apt-get

A

grep

75
Q

Which of the following pairs of authentication factors should you choose to meet the requirements associated with MFA?

Username and Password
Thumbprint and Password
Username and Pin
Thumbprint and Retina scan

A

Thumbprint and Password

76
Q

You are troubleshooting a computer that is not producing any sounds through its speakers. Which tools should you use to troubleshoot this workstation?

A

Device Manager

77
Q

You are configuring a Windows 10 Professional workstation to connect to the Dion Training domain. To provide additional security to its users, Dion Training requires that all uses route their internet traffic through a server located at 10.0.0.15 for inspection before it is sent to the internet. Once inspected, the server will route the traffic to the WAN router whose IP is 10.0.0.1. Which settings should be configured on the workstation to achieve this?

Under Internet options, configure the proxy server address as 10.0.0.15
Under the Network Adapter, configure the workstation’s gateway as 10.0.0.15
Under Network Adapter, configure the proxy server address as 10.0.0.15
Under Internet Options, configure the workstation’s gateway as 10.0.0.15

A

Under Internet Options, configure the Proxy Server address as 10.0.0.15

78
Q

What type of structure is a “Do While” in scripting?

Loop
Constant
Variable
Branch

A

Loop

79
Q

You are troubleshooting a computer that is operating slowly. Which of the following tools should you use to troubleshoot this workstation?

Task Scheduler
Performance Monitor
Device Manager
DxDiag

A

Performance Monitor

80
Q

A type of anti-virus scan where the AV software intercepts operating system calls to open files to scan the file before allowing or preventing the file from being opened

Daily scheduled scans
On-access scans
Safe mode scans
Weekly schedule scans

A

On-Access scans

81
Q

Which of the following is the BEST way to regularly prevent different security threats from occurring within your network?

Penetration Testing
User training and awareness
Business continuity training
Disaster recovery planning

A

User training and awareness

82
Q

What is the minimum processor required to install Windows 10 (x86) on a device?

1 GHz dual-core
2 GHz dual-core
1 GHz single-core
2 GHz dual-core

A

1 GHz single-core processor

83
Q

Which of the following Control Panel sections would allow a technician to add or remove an external scanner from a Windows 10 computer?

Programs and Features
System
Device Manager
Devices and Printers

A

Devices and Printers

84
Q

Which of the following remote access protocols should you use to connect to a Linux server securely over the internet?

RDP
SSH
FTP
Telnet

A

SSH

85
Q

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the “Operating System Not Found” error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?

An incompatible partition is marked as active
An unsupported version of Linux is installed
The MBR bootloader was installed accidently
Windows Startup services are not properly running

A

An incompatible partition is marked as active

86
Q

Jason took home a company-issued Windows 10 laptop home to do some work. He successfully connected it to his home’s wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network’s shared files from his home network’s media server. Which of the following may be why Jason cannot access the network shares in his home network?

The laptop’s gateway is not properly configured
The Laptop’s DNS configuration is not properly setup
The laptop has an IP conflict
The laptop must join the network as private

A

The laptop must join the network as private

87
Q

You have just installed a new photo-sharing social media app on your smartphone. When you try to take a photo with the app, you hear the picture-taking sound. Unfortunately, when you check the app and your photo album, you cannot find any new pictures. Which of the following actions should you take to fix this issue?

Update all the smartphone’s apps
Perform a firmware update
Uninstall and reinstall the app
Verify the app has the correct permissions

A

Verify the app has the correct permissions

88
Q

You have decided that you wanted to install a second operating system on your computer. After installing the OS and rebooting the computer, you see the “Operating System Not Found” error on your display. You verify that the boot.ini file is configured properly, but the error still appears. What is MOST likely causing this error?

An incompatible partition is marked as active
An unsupported version of Linux is installed
The MBR bootloader was installed accidentally
Windows Startup services are not properly running

A

An incompatible partition is marked as active

89
Q

Jason took home a company-issued Windows 10 laptop home to do some work. He successfully connected it to his home’s wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network’s shared files from his home network’s media server. Which of the following may be why Jason cannot access the network shares in his home network?

The laptop’s gateway is not properly configured
The laptop’s DNS configuration is not properly setup
The laptop has an IP conflict
The laptop must join the network as private

A

The laptop must join the network as private