Practice 4 Flashcards
A small business network was recently infected by a piece of malware from a USB drive that copied sensitive data from a computer, infected the system, and then spread across the network by infecting other systems. Which of the following actions could have prevented this type of attack from occurring?
Disabling AutoRun on the computer
Enforcing the use of complex passwords
Enabling full disk data encryption
Replacing the default credentials on the system
Disabling AutoRun on the computer
Which of the following types of screen locks uses a secret PIN or password to prevent access to a mobile device?
TouchID
Passcode
Swipe
DaceID
Passcode
During a disaster recovery, which of the following statements is true?
A virtual machine cannot be used for redundancy or load balancing
A virtual machine has less downtime than a physical server
A virtual machine has more downtime than a physical server
A virtual machine and a physical server have the same downtime
A virtual machine has less downtime than a physical server
A technician at Dion Training wants to identify which version and build of Windows 10 is installed on a laptop. Which of the following commands should the technician enter at the command line?
gpresult
winver
net user
pathping
winver
Joseph contacted the service desk because his Windows 10 desktop is acting strangely. He cannot use his mouse, speakers, or printer connected to his workstation by USB. Yesterday, everything worked normally. He attempted to reboot the computer to fix the issue, but it remains. Which of the following actions should be performed NEXT?
Disable System Restore in Windows
Rollback the printer’s device driver in the Device Manager
Rollback any system updates or changes since yesterday
Disable the Windows Update service to prevent future issues
Rollback any system updates or changes since yesterday
Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues began to occur and remember that each time it happened the lights also dimmed momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router’s power cycling. What should you (a network technician) do to solve this problem?
Install a surge protector
Install a UPS
Install a new electrical outlet
Install an upgraded router
Install a UPS
Which of the following should you use to fix an issue with a graphics card’s drivers in Windows 10?
Event Viewer
System
Devices and Printers
Device Manager
Device Manager
A user is attempting to pay for their morning coffee using Apple Pay on their iPhone. The user quickly taps their phone against the payment terminal, but it fails to process. Which of the following should the user do to properly use NFC for payment?
Turn on airplane mode and then try again
Hold the phone 5 inches above the payment terminal
Hold the phone on the payment terminal for at least 3 seconds
Manually select a card from you Apple Wallet and try again
Hold the phone on the payment terminal for at least 3 seconds
Manually select a card from you Apple Wallet and try again
The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?
WPA2 Enterprise
MAC filtering
WPA personal
WEP
WPA Personal
What is the maximum amount of memory used in a 32-bit version of the Windows operating system?
2 GB
4 GB
8 GB
1 GB
4 GB
Which of the following Windows tools should a technician use to import and install data in the x.509 format?
Device Manager
Group Policy Editor
RDS
Certificate Manager
Certificate Manager
You are applying for a job at a cybersecurity firm. The application requests you enter your social security number, date of birth, and email address to conduct a background check as part of the hiring process. Which of the following types of information have you been asked to provide?
CUI
PII
PHI
IP
PII
Which of the following is required for evidence to be admissible in a court of law?
Right to audit
Order of volatility
Chain of custody
Legal hold
Chain of Custody
A user has asked you for a recommendation for a word processing program for their home computer. The user doesn’t want to pay for a license to be able to use the word processor. Based on this, what type of license would you recommend to the user?
Enterprise license
Personal license
Corporate license
Open license
Open License
Dion Training is creating a new security policy that states all access to system resources will be controlled based on the user’s job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following policies or security practices is BEST described by this new policy?
Job Rotation
Separation of duties
Least privilege
Mandatory Vacation
Least Privilege
Marta’s organization is concerned with the vulnerability of a user’s account being vulnerable for an extended period of time if their password was compromised. Which of the following controls should be configured as part of their password policy to minimize this vulnerability?
Minimum Password Length
Password History
Password Expiration
Password Complexity
Password Expiration
Which of the following commands is used to edit a text file on a Linux server?
cat
nano
pwd
grep
nano
Which of the following types of remote access technologies should NOT be used in a network due to its lack of security?
Telnet
RDP
WPN
SSH
Telnet
Your Windows 10 system is booting up very slowly. Which of the following should you do to speed up the boot process?
Disable unnecessary programs from automatically starting up
Reboot the system into safemode
Rebuild your Windows profile
Reinstall Windows
Disable unnecessary programs from automatically starting up
D
Which command-line tool in Windows would you use to end one or more processes that have begun hung on the system?
net use
taskkill
sfc
gpupdate
taskkill
You noticed that your personal files in your Dropbox had been accessed while you were sleeping. Which of the following threats is this an example of?
Unauthorized microphone activation
Unauthorized Account access
Unauthorized Bluetooth pairing
Unauthorized location tracking
Unauthorized Account access
You need to determine the best way to test operating system patches in a lab environment before deploying them to your automated patch management system. Unfortunately, your network has several different operating systems in use, but you only have one machine available to test the patches on. What is the best environment to utilize to perform the testing of the patches before deployment?
Purchase additional workstations
Virtualization
Bypass testing and deploying patches directly into the production environment
Sandboxing
Virtualization
Judith is installing Windows 10 (64-bit) in a virtual machine on her macOS laptop. The installation is continually failing and producing an error. Judith has configured the virtual machine with a dual-core 1 GHz processor, 2 GB of memory, a 15 GB hard drive, and a 1024x768 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?
Amount of hard drive space
The screen resolution
Number of CPU cores
Amount of memory
Amount of hard drive space
Which command-line tool is used on a Windows system to display a list of the files and directories within the current directory or path?
ls
chkdsk
dir
sfc
dir
You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their own SOHO wireless router to that same switch port. Which of the following security features would BEST accomplish this goal?
Firewall
Login script
Port security
Single sign-on
Port Security
A technician is trying to locate a protected .dll file to edit, but they cannot see it in the System32 folder. Which Control Panel utility should the technician use to find the file?
System
File Explorer Options
Programs and Features
Indexing Options
File Explorer Options
Jason checks the Dion Training server room and finds that it currently has over 80% humidity. Which of the following risks to the servers could occur due to this high humidity level?
An over-voltage event
An under-voltage event
Accidental static discharge
Corrosion of the servers
Corrosion of the servers
You have just installed a second monitor for a salesperson’s workstation. The user wants to clone the display so that both monitors show the exact same image. This will allow them to see one of the displays while their customer sees the other from across their desk. When you connect the second monitor and clone the display, the second monitor displays text twice as large as the other monitor. Which of the following settings should you configure?
Extended mode
Resolution
Refresh Rate
Color Depth
Resolution
You are configuring a wireless access point (WAP) in a large apartment building for a home user. The home user is concerned that their neighbor may try to connect to their Wi-Fi and wants to prevent it. Which TWO of the following actions should you perform to increase the wireless network’s security?
Reduce the transmission power
Disable the DHCP server
Reduce the channel availability
Enable WPA3 encryption
Enable WEP encryption
Disable the SSID broadcast
Reduce the transmission power
Enable WPA3 encryption
Your supervisor has requested remote access to a particular server to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do before granting remote access to the server to your supervisor?
- Install the latest security patches and updates to the server
- Educate your supervisor on safe internet browsing techniques
- Set the server’s anti-virus software to automatically update itself and
perform a full scan every Saturday night - Disable internet access from the server outside of normal business
hours
Install the latest security patches and updates to the server
A user’s workstation is opening up browser windows without any action from the user. A technician attempts to troubleshoot the workstation, but the machine is extremely slow when in use. Which of the following actions should the technician perform?
Enable the pop-up blocker in the web browser
Update the Windows operating system
Perform an anti-malware scan of the workstation
Format and reinstall the operating system
Perform an anti-malware scan of the workstation
You are working for a brand new startup company that allows you to use your laptop, tablet, or other devices while at work. The company does provide some rules and guidelines that you must follow based on their policy. Which of the following policies should you look at to ensure you understand these rules and guidelines?
SLA
MOU
NDA
BYOD
BYOD
A user’s computer was running out of storage space, so they decided to install a new second 1 TB hard disk drive (HDD) into their Windows 10 computer. Whenever they attempt to boot up the computer, an error of “No Operating System Found” is displayed on their screen. You unplugged the new 1 TB HDD, and then the computer boots up without any errors. You have just reconnected the 1 TB HDD. What step should you attempt NEXT to fix this issue?
Verify the boot order in the BIOS/UEFI
Format the 1 TB HDD
Reboot the computer into safe mode
Reinstall to the 1 TB HDD
Verify the boot order in the BIOS/UEFI
A user has reported that their workstation is running very slowly. A technician begins to investigate the issue and notices a lot of unknown processes running in the background. The technician determines that the user has recently downloaded a new application from the internet and may have become infected with malware. Which of the following types of infections does the workstation MOST likely have?
Trojan
Ransomware
Rootkit
Keylogger
Trojan
A user reports that every time they try to access https://www.diontraining.com, they receive an error stating “Invalid or Expired Security Certificate.” The technician attempts to connect to the same site from other computers on the network, and no errors or issues are observed. Which of the following settings needs to be changed on the user’s workstation to fix the “Invalid or Expired Security Certificate” error?
UEFI boot mode
Logon times
Data and time
User access control
Date and Time