Practice 3 Flashcards

1
Q

Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?

WPS
WPA
WEP
WPA2

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of structure is IF THEN ELSE in scripting?

Loop
Variable
Constant
Branch

A

Branch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?

Notepad
MMC
Services
RegEdit

A

Notepad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What command is used on a Linux system to convert and copy files from one hard disk to another?

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. What tool should be used to allow both operating systems to exist on their MacBook Pro?

A

Boot Camp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following types of backup would require the MOST time to complete?

Full
Differential
Incremental
Synthetic

A

Full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A customer is complaining that there are intermittent problems with their PC. As a technician, you don’t know exactly what the errors are, so which tool should you use to determine what errors have previously occurred?

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What tool shows a log of application and system messages, including errors, information messages, and warnings?

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What tool is used to only monitor the activities on the CPU and memory on a computer?

A

Performance Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What utility gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues?

A

System Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following concepts is the MOST important for a company’s long-term health in the event of a disaster?

Vulnerability Scanning
Uninterruptible Power Supplies
Off-Site Backups
Implementing an acceptable use policy

A

Off-Site Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a placeholder in a script containing a number, character, or string of characters?

A

Variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DMZ

A

Demilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

aka Demilitarized Zone (DMZ)

A

Screened Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A perimeter network that protects an organization’s internal local area network from untrusted traffic

A

Screened Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your mother says there is something wrong with her computer, but unfortunately, she doesn’t know how to fix it. She asks if you can remotely connect to her computer and see if you can fix it. Which technology would BEST allow you to remotely access her computer and interact with her Windows 10 laptop?

A

RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the steps of the seven-step malware removal process?

A
  1. Investigate and verify malware symptoms
  2. Quarantine the infected systems
  3. Disable System Restore in Windows
  4. Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques
  5. Schedule Scans and Run Updates
  6. Enable System Restore and create a restore point in Windows
  7. Educate the end user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won’t open. What should you do?

A

Verify the digital certificate is installed on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How would you represent r-xrw-r– in octal notation?

A

564

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Convert these letter permissions to their octal form
R
W
X

A

R = 4
W = 2
X = 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Dion Training wants to upgrade its employees’ workstations from Windows 10 to Windows 11. All of the employees’ data and files are saved to the company’s shared drive. The technician has been told to choose an installation type that will delete all of the existing data, settings, and applications on the workstations during the upgrade. Which of the following types of upgrades or installations should you perform on the workstations?

Clean Install
Refresh Installation
Repair Installation
In-Place Upgrade

A

Clean Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An installation of a new operating system on a new computer or a computer that has been recently formatted

A

Clean Install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An installation of a new operating system on top of an existing version of the operating system. This will reserve the applications, user settings, and data files that already exist on the computer

A

In-Place Upgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A type of installation that will recopy the system files and revert most system settings to their default configuration while preserving user personalization settings, data files, and applications installed through the Windows Store

A

Refresh Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. This is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted.

A

Repair Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Joanne is having a drink at the coffee shop near her office. She takes out her Windows 10 laptop and connects it to the coffee shop’s wireless network to check her email. Which type of network should she select to hide their computer from other devices on the network and prevent file sharing with other patrons of the coffee shop?

A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

NFS

A

Network File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which file system type is used to mount remote storage devices on a Linux system?

A

Network File System (NFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

APFS

A

Apple File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A default file system for Mac computers using MacOS 10.13 or later.

A

Apple File System (APFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A file system optimized for external flash memory storage devices such as USB flash drives and SD drives

A

Extensible File Allocation Table (exFAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

exFAT

A

Extensible File Allocation Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which file system supports a maximum volume size of up to 128 PB with a recommended maximum volume size of 512 TB for the best reliability?

A

Extensible File Allocation Table (exFAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

NTFS

A

New Technology File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas

A

New Technology File System (NTFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A file system that can support a maximum volume size of up to 8 PB

A

New Technology File System (NTFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

UPS

A

Uninterruptible Power Supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

An electrical apparatus that provides emergency power to a load when the input power source becomes too low or the main power fails.

A

Uninterruptible Power Supply (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

GPT

A

Globally Unique Identification Partition Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A modern disk partitioning system allowing large number of partitions and very large partition sizes

A

Globally Unique Identification Partition Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A partitioning system that can support a maximum capacity of up to 9.7 ZB and up to 128 partitions

A

Globally Unique Identification Partition Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

ISO

A

Optical Disc Image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A disk image that contains everything that would be written to an optical disc.

A

ISO (Optical Disc Image)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A file system supported by Windows, macOS, and Linux computers that supports a maximum volume size of up to 2 TB and maximum file sizes of up to 4 GB

A

FAT32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Allows the bug driver to suspend an individual port without affecting the operation of the other ports on the hub

A

USB selective suspend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Used to save the current session to memory and put the computer into a minimal power state to save battery life when the system is not being used

A

Sleep/Standby mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A mode between full shutdown and a hibernation mode

A

Fast Startup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following Control Panel options should a technician configure to automatically adjust the volume of different sounds when the computer is being used to place or receive telephone calls?

Ease of Access
Sound
Program and Features
USB selective suspent

A

Sound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which section of the control panel brings together the functionality for the accessibility features in Windows?

A

Ease of Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which command-line tool could you use on a Windows system to enable an inactive administrator account?

A

Net User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which command allows system administrators to manage user accounts on Windows PCs?

A

Net User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which tool is used to mirror or synchronize directories and their contents?

A

Robocopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which command is used to end one or more tasks or processes on a Windows system?

A

Taskkill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

RSoP

A

Resultant Set of Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

PID

A

Process ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer?

A

gpresult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Allows you to discover what policy settings are applied to local and remote commuters?

A

Resultant Set of Policy (RSoP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is used to communicate data and preferences to child processes within a script or batch file?

A

Environmental Variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A process created by another process

A

Child Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which Linux command displays the present working directory oath to the terminal or display?

A

pwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line?

A

SFC (System File Checker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

SFC

A

System File Checker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which Windows command is used to check the file system and file system metadata of a volume for logical and physical errors?

A

chkdsk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which of the following file types are commonly used to create applications that can run on Linux, macOS, and Windows?

.ps1
.py
.vbs
.sh

A

.py

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Which file type is used for a shell script?

A

.sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

This type of files first line always begins with #!/bin/bash

A

.sh (Shell Script)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A scripting language based on Microsoft’s Visual Basic programming language

A

VBScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What enables you to perform management and administrative tasks in Windows 7 and later?

A

Windows PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which file type is used for PowerShell?

A

.ps1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which file type is used for VBScript?

A

.vbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is used to configure the method used by Windows when searching for content within the storage devices?

A

Indexing Options

72
Q

Your home network is configured with a long, strong, and complex pre-shared key for its WPA3 encryption. You noticed that your wireless network has been running slow, so you checked the list of “connected clients” and see that “Bob’s Laptop” is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the proper WPA3 password?

Enable WEP
Disable WPA3
Disable WPS
Disable SSID broadcast

A

Disable WPS

73
Q

Which macOS feature is the equivalent of the Taskbar in Windows?

A

Dock

74
Q

Which Windows command is used to view, create, delete, and modify a computer’s disk partitions?

A

diskpart

75
Q

A Linux command that is used to copy and convert raw data from one source to another

A

dd

76
Q

What message appears when a computer detects that the wireless network is present and operating, but the system cannot connect to the internet?

A

Limited or no connectivity

77
Q

Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall’s ACL to see if the server’s outgoing email is being blocked. Which port should you ensure is open and not blocked by the firewall?

A

25 (Simple Mail Transfer Protocol)

78
Q

Any technique used to prevent a user from being overwhelmed with spam or junk email is referred to as ______

A

Email Filtering

79
Q

All emails from a specific URL could be blocked and prevented from being delivered to the user by creating what type of email filter?

A

Domain-Based

80
Q

This occurs when someone takes over your email account and sends out messages on your behalf

A

Hijacked Emails

81
Q

An email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

A

Phishing

82
Q

The fraudulent practice of sending emails from a seemingly known or trusted sender to induce TARGETED individuals to reveal confidential information

A

Spear Phishing

83
Q

A social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based VoIP services.

A

Vishing

84
Q

While troubleshooting the reason that the File Explorer is crashing on a Windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this?

gpuupdate
dxdiag
regedit
sfc

A

sfc (System File Checker)

85
Q

A command-line utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line

A

sfc (System File Checker)

86
Q

This command-line allows you to view and make changes to system files and programs that you wouldn’t be able to access otherwise.

A

RegEdit (Registry Editor)

87
Q

A database made up of hives and keys that control various settings on a Window system

A

Registry

88
Q

A command-line that is used to update the group policy settings on a Windows system

A

gpuupdate

89
Q

A utility that is used to collect info about devices to help troubleshoot problems with DirectX sound and Video.

A

dxdiag (DirectX Diagnostic)

90
Q

This attack mimics a legitimate hotspot provided by a nearby business, such as a coffee shop that provides free Wi-Fi access to its patrons

A

Evil Twin

91
Q

An access point installed on a network without the network owner’s permission

A

Rogue Access Point

92
Q

An attack that is a brute force password attack conducted against a wireless network that relies on WEP for its encryption and security

A

WEP attack

93
Q

A type of social engineering technique used to obtain information such as personal identification numbers, passwords, and other confidential data by looking over the victim’s shoulder

A

Shoulder Surfing

94
Q

You are troubleshooting a network connectivity issue and need to determine the packet’s flow path from your system to the remote server. Which of the following tools would best help you identify the path between the two systems?

ipconfig
netstat
nbtstat
tracert

A

tracert

95
Q

A diagnostic utility that determines the route to a destination by sending Internet Control Message Protocol (ICMP) echo achets to the destination

A

tracert

96
Q

A tool that displays all current TCP/IP network configuration values on a given system

A

ipconfig

97
Q

A command-line network utility that displays network connections for Transmission Control Protocol, routing tables, and some network interface and network protocol statistics on a single system

A

netstat

98
Q

a command used to troubleshot NetBIOS name resolution problems

A

nbtstat

99
Q

You have just completed a repair for a customer’s smartphone that took you three days. The customer complained that the repair took too long and began to question you about the steps you took to repair the device. What should you do NEXT?

A

Provide documentation of the repair to the customer and thank them for their patience

100
Q

What are the five key principles for dealing with a difficult customer?

A
  1. Do not argue with customers and/or become defensive
  2. Avoid dismissing customer problems
  3. Avoid being judgmental
  4. Clarify customer statements
  5. Do not disclose experiences via social media outlets
101
Q

Your Android device’s battery is advertised to last 12 hours, but it drains almost completely within 90 minutes. What should you do FIRST to try and solve this problem?

A

Check which apps are using the most battery life

102
Q

Which command would a Linux user need to enter to change their password?

A

passwd

103
Q

A command used to change the owner of the file, directory, or link in Linux

A

chown

104
Q

A command used to display the preset working directory path on the terminal or display

A

pwd

105
Q

A command used to list the currently running processes

A

ps

106
Q

This attack intercepts communications between two systems

A

On-Path Attack

107
Q

A code injection technique used to attack data-driven applications

A

SQL Injection

108
Q

SQL

A

Structured Query Language

109
Q

A type of cyber attack carried out over a Local Area Network that involves sending malicious ARP packets to a default gateway on a LAN to change the pairings in its IP to MAC address table

A

ARP Poisoning

110
Q

ARP

A

Address Resolution Protocol

111
Q

A layer 2 protocol used to map MAC addresses to IP addresses

A

Address Resolution Protocol (ARP)

112
Q

Attacks that are a type of injection in which malicious scripts are injected into otherwise benign and trusted websites

A

Cross-Site Scripting

113
Q

XSS

A

Cross-Site Scripting

114
Q

What is the minimum processor(s) required to install Windows 10 (x64) on a device?

A

1 GHz single-core processor

115
Q

Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?

ext4
NFS
Swap Partition
ext3

A

Swap Partition

116
Q

A portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it

A

Swap Partition

117
Q

Journaled file system commonly used by the Linux kernel that can support a maximum volume size of up to32 TB

A

ext3 (third extended filesystem)

118
Q

Journaled file system commonly used by the Linux kernel that is used natively by modern Linux operating systems.

A

ext4 (fourth extended filesystem)

119
Q

Journaled file system commonly used by the Linux kernel that can support a maximum volume size of up to 1 EB

A

ext4 (fourth extended filesystem)

120
Q

This is used to mount remote storage devices into the local file system on a Linux system. It allows you to mount your local file systems over a network and remote hosts to interact with them while mounted locally on the same system

A

NFS (network file system)

121
Q

What is an administrator performing when he changed everything back to the last known good configuration before a change is started?

A

Rollback

122
Q

The built-in backup feature of the macOS operating system that automatically backs up all of the system’s files, including apps, music, photos, email, documents, and system files.

A

Time Machine

123
Q

What is used to backup virtual machines by creating a state of the disk at a particular point in time?

A

Snapshot

124
Q

A Windows feature that creates configuration backups of the operating system

A

System Restore

125
Q

A macOS app for managing passwords cached by the PS and supported browser/web applications.

A

Keychain

126
Q

Which of the following file types are commonly used by scripts in a Linux command line environment?

.sh
.js
.ps1
.vbs

A

.sh

127
Q

What type of language are C# and ASP.NET

A

Compiled Languages

128
Q

What is .PHP used for?

A

for scripting web applications

129
Q

This involves searching through publicly accessible garbage cans or recycling bins to find discarded paper, manuals, or other valuable types of information from a targeted company

A

Dumpster Diving

130
Q

A email-based or web-based form of phishing that targets senior executives or wealthy individuals

A

Whaling

131
Q

You are working as a mobile device technician for a large corporation’s enterprise service desk. A user complains that every time they attempt to launch the company’s mobile email application, it crashes and displays an error message of Code123. What should you do FIRST to attempt to solve this problem?

A

Reinstall the email app

132
Q

This refers to a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule

A

Explicit allow

133
Q

This refers to a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it

A

Implicit allow

134
Q

Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 workstations. When connected to a private network, the firewall has been configured to only allow inbound connections that match an existing rule and to only allow outbound connections that do not match any existing rules. What type of security posture has Dion Training implemented?

A

Explicit allow for inbound, implicit allow for outbound

135
Q

Which of the following data types would be used to store the value of TRUE?

Floating point
Integers
String
Boolean

A

Boolean

136
Q

What stores a fraction or decimal number such as 34.11?

A

Floating-point

137
Q

What stores a group of characters, such as Hello, PYTHON, or IzaakJeffers?

A

String

138
Q

When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are abysmal, and the browser creates numerous pop-ups. Jonathan asks for your assistance in fixing this issue. Which TWO of the following actions do you recommend Jonathan perform first?

A

Uncheck any unapproved applications from the Startup tab in the Task Manager

Reset the web browser to the default settings and configuration

139
Q

You are helping to set up a backup plan for your organization. The current plan states that all of the organization’s Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. What do you recommend?

A

Attempt to restore to a test server from one of the backup files to verify them

140
Q

A technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities

A

Dictionary Attack

141
Q

A cybersecurity analyst is applying for a new job with a penetration testing firm. He received the job application as a secured Adobe PDF file, but unfortunately, the firm locked the file with a password so the potential employee could not fill in the application. Instead of asking for an unlocked copy of the document, the analyst decides to write a script in Python to attempt to unlock the PDF file by using passwords from a list of commonly used passwords until he can find the correct password or attempts every password in his list. Based on this description, what kind of cryptographic attack did the analyst perform?

A

Dictionary Attack

142
Q

A workstation at Dion Training’s office is taking a long time to boot up. Once it finishes booting to the Windows 10 desktop, which of the following tools can a technician use to diagnose and fix the boot issues?

resmon.exe
msconfig.exe
perfmon.msc
msinfo32.exe

A

msconfig.exe

143
Q

This is used to disable or re-enable software, device drivers, and Windows services that run at startup, and changes boot parameters

A

MSConfig

144
Q

A performance monitoring and system monitoring utility in Windows that is used to monitor the activities on CPU and memory activity on a computer

A

Perfmon

145
Q

A utility used to display information about the use of hardware and software resources in real-time

A

Resmon (Resource monitor)

146
Q

A utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues

A

msinfo32 (System Information)

147
Q

A file currently has permissions of 755. Which command would change file permission to r-xr–r–?

A

chmod 544 filename

148
Q

Which command is used to change a file or directory’s permission from the command line or terminal?

A

chmod

149
Q

You are working as a military defense contractor and have been asked to dispose of 5 laptop hard drives used in systems that processed classified information. Which of the following physical data destruction and disposal methods is MOST appropriate to ensure the data cannot be recovered?

Low-level formatting the HDDs
Standard formatting the HDDs
Degaussing of the HHDs
Drill/Hammer the HDD platters

A

Degaussing of the HDDs

150
Q

Which of the following tools is used to duplicate all of the files in one directory to another in the Windows command line?

dir
format
xcopy
netstat

A

xcopy

151
Q

What windows command is ued to display the disk’s volume label and serial number, followed by a list of directories and files on the disk?

A

dir

152
Q

You are working as a mobile device technician for a large corporation’s enterprise service desk. A user complains that every time they attempt to launch the company’s mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. What should should you do FIRST to attempt to solve this problem?

A

Since this issue is occurring on multiple devices with the same model, it would be best to first update the smartphone’s OS

153
Q

Which encryption type was used by WPA to better secure wireless networks than WEP?

A

TKIP (Temporal Key Integrity Protocol)

154
Q

WPA2 uses what cipher?

A

AES

155
Q

What are the four forms or regulated data?

A

PII (Personally Identifiable Information)
PCI (Payment Card Industry)
GDPR (General Data Protection Regulation)
PHI (Protected Health Information)

156
Q

Data used to identify, contact, or locate an individual

A

PII (Personally Identifiable Information)

157
Q

A document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet

A

Acceptable Use Policy (AUP)

158
Q

AUP

A

Acceptable Use Policy

159
Q

DRM

A

Digital Rights Management

160
Q

A copyright protection technology for digital media

A

Digital Rights Management (DRM)

161
Q

DMCA

A

Digital Millennium Copyright Act

162
Q

A 1998 United Stats copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted work

A

Digital Millennium Copyright Act (DMCA)

163
Q

A set of rules created t improve computer security by motivating users to create dependable, secure passwords and then store and utilize them properly

A

Password Policy

164
Q

A document that defines how organizations can share and protect data

A

Data Loss Prevention Policy

165
Q

A document that outlines and defines acceptable methods of remotely connecting the the internal network

A

Remote Access Policy

166
Q

A scripting language that is designed to create interactive web-based content and web apps

A

JavaScript (.js)

167
Q

GPO

A

Group Policy Object

168
Q

A collection of Group Policy settings that defines what a system will look like and how it will behave for a defines group of users

A

Group Policy Objects (GPO)

169
Q

HIDS

A

Host-based Intrusion Detection System

170
Q

A device or software application that monitors a system for malicious activity or policy violations

A

HIPS (Host-based Intrusion Detection System)

171
Q

The process of distributing and applying updates to the software to prevent vulnerabilities from being exploited by an attacker or malware.

A

Patch Management

172
Q

Jason has built a custom Android application that he wants to install on an Android tablet without having to install it through the Play Store. What would be required to allow him to install the app’s APK on the device?

A

Sideloading

173
Q

Which of the following Windows tools can a technician use to display information about the performance of hardware and software resources in real-time?

resmon.exe
dxdiag.exe
devmgmt.,sc
msinfo.exe

A

resmon.exe

174
Q

You run the command ipconfig on your laptop and see that you have been assigned an IP address of 169.254.0.56. Which category of IPv4 address is this?

APIPA
Static
Private
Public

A

APIPA

175
Q

A user contacts the help desk and complains they are getting an error when they attempt to open a 4 GB .dmg file on their Windows 10 workstation. Which of the following should you tell them?

“You need to use macOS to open DMG files”
“You must be an administrator to open that file”
“Your hard drive must not have enough space”
“Your workstation needs to have 16 GB of RAM to open the file”

A

“You need to use macOS to open DMG files”

176
Q

Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company’s owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donating them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?

Wiping
Purging
Degaussing
Shredding

A

Wiping