Practice 3 Flashcards
Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?
WPS
WPA
WEP
WPA2
WEP
What type of structure is IF THEN ELSE in scripting?
Loop
Variable
Constant
Branch
Branch
Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?
Notepad
MMC
Services
RegEdit
Notepad
What command is used on a Linux system to convert and copy files from one hard disk to another?
dd
A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. What tool should be used to allow both operating systems to exist on their MacBook Pro?
Boot Camp
Which of the following types of backup would require the MOST time to complete?
Full
Differential
Incremental
Synthetic
Full
A customer is complaining that there are intermittent problems with their PC. As a technician, you don’t know exactly what the errors are, so which tool should you use to determine what errors have previously occurred?
Event Viewer
What tool shows a log of application and system messages, including errors, information messages, and warnings?
Event Viewer
What tool is used to only monitor the activities on the CPU and memory on a computer?
Performance Monitor
What utility gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues?
System Information
Which of the following concepts is the MOST important for a company’s long-term health in the event of a disaster?
Vulnerability Scanning
Uninterruptible Power Supplies
Off-Site Backups
Implementing an acceptable use policy
Off-Site Backup
What is a placeholder in a script containing a number, character, or string of characters?
Variable
DMZ
Demilitarized Zone
aka Demilitarized Zone (DMZ)
Screened Subnet
A perimeter network that protects an organization’s internal local area network from untrusted traffic
Screened Subnet
Your mother says there is something wrong with her computer, but unfortunately, she doesn’t know how to fix it. She asks if you can remotely connect to her computer and see if you can fix it. Which technology would BEST allow you to remotely access her computer and interact with her Windows 10 laptop?
RDP
What are the steps of the seven-step malware removal process?
- Investigate and verify malware symptoms
- Quarantine the infected systems
- Disable System Restore in Windows
- Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques
- Schedule Scans and Run Updates
- Enable System Restore and create a restore point in Windows
- Educate the end user
Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won’t open. What should you do?
Verify the digital certificate is installed on the device
How would you represent r-xrw-r– in octal notation?
564
Convert these letter permissions to their octal form
R
W
X
R = 4
W = 2
X = 1
Dion Training wants to upgrade its employees’ workstations from Windows 10 to Windows 11. All of the employees’ data and files are saved to the company’s shared drive. The technician has been told to choose an installation type that will delete all of the existing data, settings, and applications on the workstations during the upgrade. Which of the following types of upgrades or installations should you perform on the workstations?
Clean Install
Refresh Installation
Repair Installation
In-Place Upgrade
Clean Installation
An installation of a new operating system on a new computer or a computer that has been recently formatted
Clean Install
An installation of a new operating system on top of an existing version of the operating system. This will reserve the applications, user settings, and data files that already exist on the computer
In-Place Upgrade
A type of installation that will recopy the system files and revert most system settings to their default configuration while preserving user personalization settings, data files, and applications installed through the Windows Store
Refresh Installation
A type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. This is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted.
Repair Installation
Joanne is having a drink at the coffee shop near her office. She takes out her Windows 10 laptop and connects it to the coffee shop’s wireless network to check her email. Which type of network should she select to hide their computer from other devices on the network and prevent file sharing with other patrons of the coffee shop?
Public
NFS
Network File System
Which file system type is used to mount remote storage devices on a Linux system?
Network File System (NFS)
APFS
Apple File System
A default file system for Mac computers using MacOS 10.13 or later.
Apple File System (APFS)
A file system optimized for external flash memory storage devices such as USB flash drives and SD drives
Extensible File Allocation Table (exFAT)
exFAT
Extensible File Allocation Table
Which file system supports a maximum volume size of up to 128 PB with a recommended maximum volume size of 512 TB for the best reliability?
Extensible File Allocation Table (exFAT)
NTFS
New Technology File System
A Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas
New Technology File System (NTFS)
A file system that can support a maximum volume size of up to 8 PB
New Technology File System (NTFS)
UPS
Uninterruptible Power Supply
An electrical apparatus that provides emergency power to a load when the input power source becomes too low or the main power fails.
Uninterruptible Power Supply (UPS)
GPT
Globally Unique Identification Partition Table
A modern disk partitioning system allowing large number of partitions and very large partition sizes
Globally Unique Identification Partition Table
A partitioning system that can support a maximum capacity of up to 9.7 ZB and up to 128 partitions
Globally Unique Identification Partition Table
ISO
Optical Disc Image
A disk image that contains everything that would be written to an optical disc.
ISO (Optical Disc Image)
A file system supported by Windows, macOS, and Linux computers that supports a maximum volume size of up to 2 TB and maximum file sizes of up to 4 GB
FAT32
Allows the bug driver to suspend an individual port without affecting the operation of the other ports on the hub
USB selective suspend
Used to save the current session to memory and put the computer into a minimal power state to save battery life when the system is not being used
Sleep/Standby mode
A mode between full shutdown and a hibernation mode
Fast Startup
Which of the following Control Panel options should a technician configure to automatically adjust the volume of different sounds when the computer is being used to place or receive telephone calls?
Ease of Access
Sound
Program and Features
USB selective suspent
Sound
Which section of the control panel brings together the functionality for the accessibility features in Windows?
Ease of Access
Which command-line tool could you use on a Windows system to enable an inactive administrator account?
Net User
Which command allows system administrators to manage user accounts on Windows PCs?
Net User
Which tool is used to mirror or synchronize directories and their contents?
Robocopy
Which command is used to end one or more tasks or processes on a Windows system?
Taskkill
RSoP
Resultant Set of Policy
PID
Process ID
Which command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer?
gpresult
Allows you to discover what policy settings are applied to local and remote commuters?
Resultant Set of Policy (RSoP)
What is used to communicate data and preferences to child processes within a script or batch file?
Environmental Variables
A process created by another process
Child Process
Which Linux command displays the present working directory oath to the terminal or display?
pwd
Which command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line?
SFC (System File Checker)
SFC
System File Checker
Which Windows command is used to check the file system and file system metadata of a volume for logical and physical errors?
chkdsk
Which of the following file types are commonly used to create applications that can run on Linux, macOS, and Windows?
.ps1
.py
.vbs
.sh
.py
Which file type is used for a shell script?
.sh
This type of files first line always begins with #!/bin/bash
.sh (Shell Script)
A scripting language based on Microsoft’s Visual Basic programming language
VBScript
What enables you to perform management and administrative tasks in Windows 7 and later?
Windows PowerShell
Which file type is used for PowerShell?
.ps1
Which file type is used for VBScript?
.vbs
What is used to configure the method used by Windows when searching for content within the storage devices?
Indexing Options
Your home network is configured with a long, strong, and complex pre-shared key for its WPA3 encryption. You noticed that your wireless network has been running slow, so you checked the list of “connected clients” and see that “Bob’s Laptop” is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the proper WPA3 password?
Enable WEP
Disable WPA3
Disable WPS
Disable SSID broadcast
Disable WPS
Which macOS feature is the equivalent of the Taskbar in Windows?
Dock
Which Windows command is used to view, create, delete, and modify a computer’s disk partitions?
diskpart
A Linux command that is used to copy and convert raw data from one source to another
dd
What message appears when a computer detects that the wireless network is present and operating, but the system cannot connect to the internet?
Limited or no connectivity
Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall’s ACL to see if the server’s outgoing email is being blocked. Which port should you ensure is open and not blocked by the firewall?
25 (Simple Mail Transfer Protocol)
Any technique used to prevent a user from being overwhelmed with spam or junk email is referred to as ______
Email Filtering
All emails from a specific URL could be blocked and prevented from being delivered to the user by creating what type of email filter?
Domain-Based
This occurs when someone takes over your email account and sends out messages on your behalf
Hijacked Emails
An email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
Phishing
The fraudulent practice of sending emails from a seemingly known or trusted sender to induce TARGETED individuals to reveal confidential information
Spear Phishing
A social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based VoIP services.
Vishing
While troubleshooting the reason that the File Explorer is crashing on a Windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this?
gpuupdate
dxdiag
regedit
sfc
sfc (System File Checker)
A command-line utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line
sfc (System File Checker)
This command-line allows you to view and make changes to system files and programs that you wouldn’t be able to access otherwise.
RegEdit (Registry Editor)
A database made up of hives and keys that control various settings on a Window system
Registry
A command-line that is used to update the group policy settings on a Windows system
gpuupdate
A utility that is used to collect info about devices to help troubleshoot problems with DirectX sound and Video.
dxdiag (DirectX Diagnostic)
This attack mimics a legitimate hotspot provided by a nearby business, such as a coffee shop that provides free Wi-Fi access to its patrons
Evil Twin
An access point installed on a network without the network owner’s permission
Rogue Access Point
An attack that is a brute force password attack conducted against a wireless network that relies on WEP for its encryption and security
WEP attack
A type of social engineering technique used to obtain information such as personal identification numbers, passwords, and other confidential data by looking over the victim’s shoulder
Shoulder Surfing
You are troubleshooting a network connectivity issue and need to determine the packet’s flow path from your system to the remote server. Which of the following tools would best help you identify the path between the two systems?
ipconfig
netstat
nbtstat
tracert
tracert
A diagnostic utility that determines the route to a destination by sending Internet Control Message Protocol (ICMP) echo achets to the destination
tracert
A tool that displays all current TCP/IP network configuration values on a given system
ipconfig
A command-line network utility that displays network connections for Transmission Control Protocol, routing tables, and some network interface and network protocol statistics on a single system
netstat
a command used to troubleshot NetBIOS name resolution problems
nbtstat
You have just completed a repair for a customer’s smartphone that took you three days. The customer complained that the repair took too long and began to question you about the steps you took to repair the device. What should you do NEXT?
Provide documentation of the repair to the customer and thank them for their patience
What are the five key principles for dealing with a difficult customer?
- Do not argue with customers and/or become defensive
- Avoid dismissing customer problems
- Avoid being judgmental
- Clarify customer statements
- Do not disclose experiences via social media outlets
Your Android device’s battery is advertised to last 12 hours, but it drains almost completely within 90 minutes. What should you do FIRST to try and solve this problem?
Check which apps are using the most battery life
Which command would a Linux user need to enter to change their password?
passwd
A command used to change the owner of the file, directory, or link in Linux
chown
A command used to display the preset working directory path on the terminal or display
pwd
A command used to list the currently running processes
ps
This attack intercepts communications between two systems
On-Path Attack
A code injection technique used to attack data-driven applications
SQL Injection
SQL
Structured Query Language
A type of cyber attack carried out over a Local Area Network that involves sending malicious ARP packets to a default gateway on a LAN to change the pairings in its IP to MAC address table
ARP Poisoning
ARP
Address Resolution Protocol
A layer 2 protocol used to map MAC addresses to IP addresses
Address Resolution Protocol (ARP)
Attacks that are a type of injection in which malicious scripts are injected into otherwise benign and trusted websites
Cross-Site Scripting
XSS
Cross-Site Scripting
What is the minimum processor(s) required to install Windows 10 (x64) on a device?
1 GHz single-core processor
Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?
ext4
NFS
Swap Partition
ext3
Swap Partition
A portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it
Swap Partition
Journaled file system commonly used by the Linux kernel that can support a maximum volume size of up to32 TB
ext3 (third extended filesystem)
Journaled file system commonly used by the Linux kernel that is used natively by modern Linux operating systems.
ext4 (fourth extended filesystem)
Journaled file system commonly used by the Linux kernel that can support a maximum volume size of up to 1 EB
ext4 (fourth extended filesystem)
This is used to mount remote storage devices into the local file system on a Linux system. It allows you to mount your local file systems over a network and remote hosts to interact with them while mounted locally on the same system
NFS (network file system)
What is an administrator performing when he changed everything back to the last known good configuration before a change is started?
Rollback
The built-in backup feature of the macOS operating system that automatically backs up all of the system’s files, including apps, music, photos, email, documents, and system files.
Time Machine
What is used to backup virtual machines by creating a state of the disk at a particular point in time?
Snapshot
A Windows feature that creates configuration backups of the operating system
System Restore
A macOS app for managing passwords cached by the PS and supported browser/web applications.
Keychain
Which of the following file types are commonly used by scripts in a Linux command line environment?
.sh
.js
.ps1
.vbs
.sh
What type of language are C# and ASP.NET
Compiled Languages
What is .PHP used for?
for scripting web applications
This involves searching through publicly accessible garbage cans or recycling bins to find discarded paper, manuals, or other valuable types of information from a targeted company
Dumpster Diving
A email-based or web-based form of phishing that targets senior executives or wealthy individuals
Whaling
You are working as a mobile device technician for a large corporation’s enterprise service desk. A user complains that every time they attempt to launch the company’s mobile email application, it crashes and displays an error message of Code123. What should you do FIRST to attempt to solve this problem?
Reinstall the email app
This refers to a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule
Explicit allow
This refers to a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it
Implicit allow
Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 workstations. When connected to a private network, the firewall has been configured to only allow inbound connections that match an existing rule and to only allow outbound connections that do not match any existing rules. What type of security posture has Dion Training implemented?
Explicit allow for inbound, implicit allow for outbound
Which of the following data types would be used to store the value of TRUE?
Floating point
Integers
String
Boolean
Boolean
What stores a fraction or decimal number such as 34.11?
Floating-point
What stores a group of characters, such as Hello, PYTHON, or IzaakJeffers?
String
When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are abysmal, and the browser creates numerous pop-ups. Jonathan asks for your assistance in fixing this issue. Which TWO of the following actions do you recommend Jonathan perform first?
Uncheck any unapproved applications from the Startup tab in the Task Manager
Reset the web browser to the default settings and configuration
You are helping to set up a backup plan for your organization. The current plan states that all of the organization’s Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. What do you recommend?
Attempt to restore to a test server from one of the backup files to verify them
A technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities
Dictionary Attack
A cybersecurity analyst is applying for a new job with a penetration testing firm. He received the job application as a secured Adobe PDF file, but unfortunately, the firm locked the file with a password so the potential employee could not fill in the application. Instead of asking for an unlocked copy of the document, the analyst decides to write a script in Python to attempt to unlock the PDF file by using passwords from a list of commonly used passwords until he can find the correct password or attempts every password in his list. Based on this description, what kind of cryptographic attack did the analyst perform?
Dictionary Attack
A workstation at Dion Training’s office is taking a long time to boot up. Once it finishes booting to the Windows 10 desktop, which of the following tools can a technician use to diagnose and fix the boot issues?
resmon.exe
msconfig.exe
perfmon.msc
msinfo32.exe
msconfig.exe
This is used to disable or re-enable software, device drivers, and Windows services that run at startup, and changes boot parameters
MSConfig
A performance monitoring and system monitoring utility in Windows that is used to monitor the activities on CPU and memory activity on a computer
Perfmon
A utility used to display information about the use of hardware and software resources in real-time
Resmon (Resource monitor)
A utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues
msinfo32 (System Information)
A file currently has permissions of 755. Which command would change file permission to r-xr–r–?
chmod 544 filename
Which command is used to change a file or directory’s permission from the command line or terminal?
chmod
You are working as a military defense contractor and have been asked to dispose of 5 laptop hard drives used in systems that processed classified information. Which of the following physical data destruction and disposal methods is MOST appropriate to ensure the data cannot be recovered?
Low-level formatting the HDDs
Standard formatting the HDDs
Degaussing of the HHDs
Drill/Hammer the HDD platters
Degaussing of the HDDs
Which of the following tools is used to duplicate all of the files in one directory to another in the Windows command line?
dir
format
xcopy
netstat
xcopy
What windows command is ued to display the disk’s volume label and serial number, followed by a list of directories and files on the disk?
dir
You are working as a mobile device technician for a large corporation’s enterprise service desk. A user complains that every time they attempt to launch the company’s mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. What should should you do FIRST to attempt to solve this problem?
Since this issue is occurring on multiple devices with the same model, it would be best to first update the smartphone’s OS
Which encryption type was used by WPA to better secure wireless networks than WEP?
TKIP (Temporal Key Integrity Protocol)
WPA2 uses what cipher?
AES
What are the four forms or regulated data?
PII (Personally Identifiable Information)
PCI (Payment Card Industry)
GDPR (General Data Protection Regulation)
PHI (Protected Health Information)
Data used to identify, contact, or locate an individual
PII (Personally Identifiable Information)
A document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet
Acceptable Use Policy (AUP)
AUP
Acceptable Use Policy
DRM
Digital Rights Management
A copyright protection technology for digital media
Digital Rights Management (DRM)
DMCA
Digital Millennium Copyright Act
A 1998 United Stats copyright law that implements two 1996 treaties of the World Intellectual Property Organization that criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted work
Digital Millennium Copyright Act (DMCA)
A set of rules created t improve computer security by motivating users to create dependable, secure passwords and then store and utilize them properly
Password Policy
A document that defines how organizations can share and protect data
Data Loss Prevention Policy
A document that outlines and defines acceptable methods of remotely connecting the the internal network
Remote Access Policy
A scripting language that is designed to create interactive web-based content and web apps
JavaScript (.js)
GPO
Group Policy Object
A collection of Group Policy settings that defines what a system will look like and how it will behave for a defines group of users
Group Policy Objects (GPO)
HIDS
Host-based Intrusion Detection System
A device or software application that monitors a system for malicious activity or policy violations
HIPS (Host-based Intrusion Detection System)
The process of distributing and applying updates to the software to prevent vulnerabilities from being exploited by an attacker or malware.
Patch Management
Jason has built a custom Android application that he wants to install on an Android tablet without having to install it through the Play Store. What would be required to allow him to install the app’s APK on the device?
Sideloading
Which of the following Windows tools can a technician use to display information about the performance of hardware and software resources in real-time?
resmon.exe
dxdiag.exe
devmgmt.,sc
msinfo.exe
resmon.exe
You run the command ipconfig on your laptop and see that you have been assigned an IP address of 169.254.0.56. Which category of IPv4 address is this?
APIPA
Static
Private
Public
APIPA
A user contacts the help desk and complains they are getting an error when they attempt to open a 4 GB .dmg file on their Windows 10 workstation. Which of the following should you tell them?
“You need to use macOS to open DMG files”
“You must be an administrator to open that file”
“Your hard drive must not have enough space”
“Your workstation needs to have 16 GB of RAM to open the file”
“You need to use macOS to open DMG files”
Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company’s owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donating them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?
Wiping
Purging
Degaussing
Shredding
Wiping