Practice 2 Flashcards
You are working on upgrading the memory of a laptop. After removing the old memory chips from the laptop, where should you safely store them until you are ready to reuse them in another laptop?
Ziplock bags
Cardboard box
Antistatic bag
Manila Envelopes
Antistatic Bag
Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room’s contents?
Biometric Lock
Strong Passwords
Privacy Window Shades
Bollard
Badge reader
Cable Lock
Biometric Lock
Badge Reader
Samuel’s computer is taking a very long time to boot up, and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense?
Replace the hard drive with an SSD
Install additional RAM
Defragment the hard drive
Remove unnecessary applications from startup
Terminate processes in the Task Manager
Perform a Disk Cleanup
Defragment the hard drive
Remove unnecessary applications from startup
You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)
Update the anti-malware software
Educate the end user
Disconnect the laptop from the network
Enable System Restore in Windows
Schedule scans and run system updates
Disable System Restore in Windows
Update the anti-malware software
Disconnect the laptop from the network
Disable System Restore in Windows
You are working as a penetration tester and have discovered a new method of exploiting a vulnerability within the Windows 10 operating system. You conduct some research online and discover that a security patch against this particular vulnerability doesn’t exist yet. Which type of threat would this BEST be categorized as?
Zero-Day
Brute Force
Spoofing
DDoS
Zero-Day
An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this?
Brute-Force
Dictionary
Rainbow Table
Hybrid
Dictionary
Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?
HOTP
Proximity Cards
Smart Cards
TOTP
Proximity Cards
Susan is installing several updates on a Windows computer. Nine of the updates were installed without any issues, but one update produced an error and failed to install. Susan restarts the computer as part of the troubleshooting process, and the computer automatically attempts to install the failed update again. Again, the update fails to install. What should Susan do NEXT?
- Download the update from a third-party website like Source Forge and install it
- Review the Event Viewer to determine the cause of the failure
- Research the error number for the failed update and determine if there is a known issue with this update
- Manually download and install the failed update
Research the error number for the failed update and determine if there is a known issue with this update
A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming wants to document his script so that other programmers can understand what his logic was when he wrote it. Which of the following should he use?
Variable
Comment
Constant
Loop
Comment
Jason is building a new workstation for his son to utilize when writing reports for school. The new computer will have an Intel x86 processor, 3 GB of memory, and a 256 GB SSD. Which of the following editions of Windows 10 would support this workstation at the lowest cost?
Pro for Workstations
Enterprise
Pro
Home
Home
When using an MBR, which of the following types of partitions can only have up to four partitions?
Primary
Extended
Logical
Swap
Primary partition
Two weeks ago, David’s computer was infected with a virus. A technician performed the malware removal process on the machine, removed the infection from the system, update the system’s software, and closed the trouble ticket. Now, many of the symptoms have returned on David’s computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation?
Update the anti-virus software and run a full system scan
Educate the end-user about how to avoid malware in the future
Enable System Restore and create a restore point in Windows
Quarantine the infected system by removing its network connectivity
Educate the end-user about how to avoid malware in the future
You have just installed a second monitor for a bookkeeper’s workstation so they can stretch their spreadsheets across both monitors. This would essentially let them use the two monitors as one combined larger monitor. Which of the following settings should you configure?
Extended Mode
Jason is out of town on a business trip and needs to access the share drive on his company’s corporate network. Which of the following types of network connections should he use to access the share drive from his hotel room?
Wireless
Wired
Dial-Up
VPN
VPN
Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem?
The baseband firmware needs to be updates
The cellular radio cannot connect to the cellphone towers
The data speeds are insufficient with only one bar of signal
The smartphone has been infected with a virus
The data speeds are insufficient with only one car of signal
A network administrator has set up a firewall and set up only three allow rules so that traffic can be sent over ports 21, 110, and 25. Next, they added a final rule of “deny any any” to the end of the ACL to minimize the attack surface and better secure the network. Unfortunately, now the administrator is receiving complaints from users that they cannot access any web pages using their URLs, such as DionTraining.com. Which of the following should the administrator do to correct this issue?
Add a rule to the ACL to allow traffic on ports 110 and 389
Add a rule to the ACL to allow traffic on ports 80 and 53
Add a rule to the ACL to allow traffic on ports 139 and 445
Add a rule to the ACL to allow traffic on ports 143 and 22
Add a rule to the ACL to allow traffic on ports 80 and 53
Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as?
Under-Voltage Event
Power spikes
Power Surge
Power Failure
Power Surge
What unmask should be set for a directory to have 700 as its octal permissions?
rwxrwxrwx
r–r–r–
rwx—rwx
rwx——
rwx——
What unmask should be set for a directory to have 406 as its octal permissions?
r—–r-x
What unmask should be set for a directory to have 673 as its octal permissions?
r-xrwx-wx
An employee’s inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses such as @yahoo.com, @gmail.com, and @hotmail.com. Which of the following actions should the user take to help reduce the amount of spam they receive?
Establish an allow list of trusted senders
Create a domain-based email filter
Mark each email as spam or junk
Click the unsubscribe button of each email
Mark each email as spam or junk
Your organization has recently suffered a data breach due to a server being exploited. As a part of the remediation efforts, the company wants to ensure that the default administrator password on each of the 1250 workstations on the network is changed. What is the easiest way to perform this password change requirement?
Deploy a new group policy
Create a new security group
Utilize the key escrow process
Revoke the digital certificate
Deploy a new group policy
Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?
MSDS
AUP
SOW
SOP
SOP
You have submitted an RFC to install a security patch on all of your company’s Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window?
Risk Analysis
Plan
Scope
Purpose
Plan
Dion Training is building a new computer for its video editor to use. The new computer will use an octa-core Intel processor, 3 TB of DDR4 memory, and a RAID 0 with two 4 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer’s memory properly?
Enterprise
Education
Home
Pro
Enterprise
Sarah is installing Windows 10 (64-bit) in a virtual machine. The installation is continually failing and producing an error. She has configured the virtual machine with a dual-core 950 MHz processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?
The amount of storage space is insufficient
The processor is insufficient
The screen resolution is insufficient
The amount of RAM is insufficient
Processor is insufficient
Which of the following physical security controls would be the most effective in preventing an attacker from driving a vehicle through the glass doors at the front of the organization’s headquarters?
Intrusion alarm
Security guards
Access control vestibule
Bollards
Bollards
What best describes how a DHCP reservation works?
By leasing a set of reserved IP addresses according to their category
By matching a MAC address to an IP address within the DHCP scope
By assigning options to the computers on the network by priority
By letting the network switches assign IP addresses from a reserved pool
By matching a MAC address to an IP address within the DHCP scope
Which command-line tool on a Windows system is used to display the resulting set of policy settings that were enforced on a computer for a specified user when they logged on?
gpupdate
sfc
dism
gpresult
gpresult
Which of the following types of software CANNOT be updated via the Windows Update program?
Firmware updates
Driver updates
Critical fixes
Security patches
Firmware updates
You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which command should you use to repair the boot sector of the hard disk?
bootrec /rebuildbdc
bootrec /fixboot
bootrec /fixmbr
diskpart list
bootrec /fixboot
What action should you take first when working on a computer or server?
Verify proper cable management is being used
Remove any jewelry you are wearing
Use a grounding probe to discharge the power supply
Dispose of the old power supply
Remove any jewelry
What allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state?
Hibernate
Shutdown
Sleep
Lock
Sleep
A user with an older laptop running Windows 7 that has only 2 GB of RAM, 32 GB of SSD, and a 1.7 GHz 64-bit processor. The user would like to upgrade to a newer OS since Windows 7 is now considered end-of-life. Which operating system should the technician recommend to ensure the BEST performance on this computer?
Windows 8.1
Windows 11
Windows 10
Windows 8
Windows 10
Which mitigation provides the best return on investment by mitigating the most vulnerable attack vector in an enterprise network?
Enable biometric and SSO for authorization
Remove unneeded services running on the servers
Provide end-user awareness training for office staff
Update all antivirus definitions on workstations and servers
Providing end-user awareness training for office staff