Practice 4 Flashcards

1
Q

A small business network was recently infected by a piece of malware from a USB drive that copied sensitive data from a computer, infected the system, and then spread across the network by infecting other systems. Which of the following actions could have prevented this type of attack from occurring?

Disabling AutoRun on the computer
Enforcing the use of complex passwords
Enabling full disk data encryption
Replacing the default credentials on the system

A

Disabling AutoRun on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following types of screen locks uses a secret PIN or password to prevent access to a mobile device?

TouchID
Passcode
Swipe
DaceID

A

Passcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

During a disaster recovery, which of the following statements is true?

A virtual machine cannot be used for redundancy or load balancing
A virtual machine has less downtime than a physical server
A virtual machine has more downtime than a physical server
A virtual machine and a physical server have the same downtime

A

A virtual machine has less downtime than a physical server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician at Dion Training wants to identify which version and build of Windows 10 is installed on a laptop. Which of the following commands should the technician enter at the command line?

gpresult
winver
net user
pathping

A

winver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Joseph contacted the service desk because his Windows 10 desktop is acting strangely. He cannot use his mouse, speakers, or printer connected to his workstation by USB. Yesterday, everything worked normally. He attempted to reboot the computer to fix the issue, but it remains. Which of the following actions should be performed NEXT?

Disable System Restore in Windows
Rollback the printer’s device driver in the Device Manager
Rollback any system updates or changes since yesterday
Disable the Windows Update service to prevent future issues

A

Rollback any system updates or changes since yesterday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues began to occur and remember that each time it happened the lights also dimmed momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router’s power cycling. What should you (a network technician) do to solve this problem?

Install a surge protector
Install a UPS
Install a new electrical outlet
Install an upgraded router

A

Install a UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following should you use to fix an issue with a graphics card’s drivers in Windows 10?

Event Viewer
System
Devices and Printers
Device Manager

A

Device Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user is attempting to pay for their morning coffee using Apple Pay on their iPhone. The user quickly taps their phone against the payment terminal, but it fails to process. Which of the following should the user do to properly use NFC for payment?

Turn on airplane mode and then try again
Hold the phone 5 inches above the payment terminal
Hold the phone on the payment terminal for at least 3 seconds
Manually select a card from you Apple Wallet and try again

A

Hold the phone on the payment terminal for at least 3 seconds

Manually select a card from you Apple Wallet and try again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?

WPA2 Enterprise
MAC filtering
WPA personal
WEP

A

WPA Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the maximum amount of memory used in a 32-bit version of the Windows operating system?

2 GB
4 GB
8 GB
1 GB

A

4 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following Windows tools should a technician use to import and install data in the x.509 format?

Device Manager
Group Policy Editor
RDS
Certificate Manager

A

Certificate Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are applying for a job at a cybersecurity firm. The application requests you enter your social security number, date of birth, and email address to conduct a background check as part of the hiring process. Which of the following types of information have you been asked to provide?

CUI
PII
PHI
IP

A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is required for evidence to be admissible in a court of law?

Right to audit
Order of volatility
Chain of custody
Legal hold

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user has asked you for a recommendation for a word processing program for their home computer. The user doesn’t want to pay for a license to be able to use the word processor. Based on this, what type of license would you recommend to the user?

Enterprise license
Personal license
Corporate license
Open license

A

Open License

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dion Training is creating a new security policy that states all access to system resources will be controlled based on the user’s job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following policies or security practices is BEST described by this new policy?

Job Rotation
Separation of duties
Least privilege
Mandatory Vacation

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Marta’s organization is concerned with the vulnerability of a user’s account being vulnerable for an extended period of time if their password was compromised. Which of the following controls should be configured as part of their password policy to minimize this vulnerability?

Minimum Password Length
Password History
Password Expiration
Password Complexity

A

Password Expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following commands is used to edit a text file on a Linux server?

cat
nano
pwd
grep

A

nano

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following types of remote access technologies should NOT be used in a network due to its lack of security?

Telnet
RDP
WPN
SSH

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Your Windows 10 system is booting up very slowly. Which of the following should you do to speed up the boot process?

Disable unnecessary programs from automatically starting up
Reboot the system into safemode
Rebuild your Windows profile
Reinstall Windows

A

Disable unnecessary programs from automatically starting up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which command-line tool in Windows would you use to end one or more processes that have begun hung on the system?

net use
taskkill
sfc
gpupdate

A

taskkill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You noticed that your personal files in your Dropbox had been accessed while you were sleeping. Which of the following threats is this an example of?

Unauthorized microphone activation
Unauthorized Account access
Unauthorized Bluetooth pairing
Unauthorized location tracking

A

Unauthorized Account access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You need to determine the best way to test operating system patches in a lab environment before deploying them to your automated patch management system. Unfortunately, your network has several different operating systems in use, but you only have one machine available to test the patches on. What is the best environment to utilize to perform the testing of the patches before deployment?

Purchase additional workstations
Virtualization
Bypass testing and deploying patches directly into the production environment
Sandboxing

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Judith is installing Windows 10 (64-bit) in a virtual machine on her macOS laptop. The installation is continually failing and producing an error. Judith has configured the virtual machine with a dual-core 1 GHz processor, 2 GB of memory, a 15 GB hard drive, and a 1024x768 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

Amount of hard drive space
The screen resolution
Number of CPU cores
Amount of memory

A

Amount of hard drive space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which command-line tool is used on a Windows system to display a list of the files and directories within the current directory or path?

ls
chkdsk
dir
sfc

A

dir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their own SOHO wireless router to that same switch port. Which of the following security features would BEST accomplish this goal?

Firewall
Login script
Port security
Single sign-on

A

Port Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A technician is trying to locate a protected .dll file to edit, but they cannot see it in the System32 folder. Which Control Panel utility should the technician use to find the file?

System
File Explorer Options
Programs and Features
Indexing Options

A

File Explorer Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Jason checks the Dion Training server room and finds that it currently has over 80% humidity. Which of the following risks to the servers could occur due to this high humidity level?

An over-voltage event
An under-voltage event
Accidental static discharge
Corrosion of the servers

A

Corrosion of the servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You have just installed a second monitor for a salesperson’s workstation. The user wants to clone the display so that both monitors show the exact same image. This will allow them to see one of the displays while their customer sees the other from across their desk. When you connect the second monitor and clone the display, the second monitor displays text twice as large as the other monitor. Which of the following settings should you configure?

Extended mode
Resolution
Refresh Rate
Color Depth

A

Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You are configuring a wireless access point (WAP) in a large apartment building for a home user. The home user is concerned that their neighbor may try to connect to their Wi-Fi and wants to prevent it. Which TWO of the following actions should you perform to increase the wireless network’s security?

Reduce the transmission power
Disable the DHCP server
Reduce the channel availability
Enable WPA3 encryption
Enable WEP encryption
Disable the SSID broadcast

A

Reduce the transmission power

Enable WPA3 encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Your supervisor has requested remote access to a particular server to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do before granting remote access to the server to your supervisor?

  • Install the latest security patches and updates to the server
  • Educate your supervisor on safe internet browsing techniques
  • Set the server’s anti-virus software to automatically update itself and
    perform a full scan every Saturday night
  • Disable internet access from the server outside of normal business
    hours
A

Install the latest security patches and updates to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A user’s workstation is opening up browser windows without any action from the user. A technician attempts to troubleshoot the workstation, but the machine is extremely slow when in use. Which of the following actions should the technician perform?

Enable the pop-up blocker in the web browser
Update the Windows operating system
Perform an anti-malware scan of the workstation
Format and reinstall the operating system

A

Perform an anti-malware scan of the workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

You are working for a brand new startup company that allows you to use your laptop, tablet, or other devices while at work. The company does provide some rules and guidelines that you must follow based on their policy. Which of the following policies should you look at to ensure you understand these rules and guidelines?

SLA
MOU
NDA
BYOD

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A user’s computer was running out of storage space, so they decided to install a new second 1 TB hard disk drive (HDD) into their Windows 10 computer. Whenever they attempt to boot up the computer, an error of “No Operating System Found” is displayed on their screen. You unplugged the new 1 TB HDD, and then the computer boots up without any errors. You have just reconnected the 1 TB HDD. What step should you attempt NEXT to fix this issue?

Verify the boot order in the BIOS/UEFI
Format the 1 TB HDD
Reboot the computer into safe mode
Reinstall to the 1 TB HDD

A

Verify the boot order in the BIOS/UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A user has reported that their workstation is running very slowly. A technician begins to investigate the issue and notices a lot of unknown processes running in the background. The technician determines that the user has recently downloaded a new application from the internet and may have become infected with malware. Which of the following types of infections does the workstation MOST likely have?

Trojan
Ransomware
Rootkit
Keylogger

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A user reports that every time they try to access https://www.diontraining.com, they receive an error stating “Invalid or Expired Security Certificate.” The technician attempts to connect to the same site from other computers on the network, and no errors or issues are observed. Which of the following settings needs to be changed on the user’s workstation to fix the “Invalid or Expired Security Certificate” error?

UEFI boot mode
Logon times
Data and time
User access control

A

Date and Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following will close all of a user’s open programs and services before powering off their Windows 10 computer?

Shutdown
Lock
Sleep
Hibernate

A

Shutdown

38
Q

You are cleaning out the closet in your office and find several bottles of cleaner that need to be disposed of. Which of the following should you consult to determine the proper method of disposal?

SOW
MOU
UPS
MSDS

A

MSDS (Material Safety Data Sheet)

39
Q

You are concerned that your servers could be damaged during a power failure or under-voltage event. Which TWO devices would protect against these conditions?

Battery backup
Grounding the server rack
Surge suppressor
Line conditioner

A

Battery Backup

Line Conditioner

40
Q

Which of the following Control Panel sections would allow a technician to see which version and build of Windows 10 is installed on a computer?

Programs and Features
Device Manager
Devices and Printers
System

A

System

41
Q

Which of the following could be used to meet regulatory compliance requirements associated with the monitoring of employee actions on their work computer by providing a customizable dialog box with a textual warning to the user before they log in to their Windows 10 workstation?

Change request form
Splash Screen
Request Form
Chain of custody

A

Splash Screen

42
Q

Which of the following commands would a technician use to find the comprehensive documentation for any command from the Linux terminal?

grep
apt-get
man
yum

A

man

43
Q

A user contacts the service desk after they just finished attempting to upgrade their laptop to Windows 10. The upgrade failed, and the user asks you to explain why. Which of the following log files should you review to determine the cause of the upgrade failure?

Security Log
Application Log
System Log
Setup

A

Setup

44
Q

Dion Consulting Group has been hired by a large security operations center (SOC) to build a Windows 2019 domain environment. The SOC has a total of 150 Windows 10 Professional edition workstations that will connect to the domain for authentication, administration, and access to networked resources. Which of the following types of network models is being used by this security operations center in the domain environment?

Peer-to-peer
Mesh
Hub-and-Spoke
Client/Server

A

Client/Server

45
Q

Your company’s wireless network was recently compromised by an attacker who utilized a brute force attack against the network’s PIN to gain access. Once connected to the network, the attacker modified the DNS settings on the router and spread additional malware across the entire network. Which TWO of the following configurations were most likely used to allow the attack to occur?

Guest Network Enabled
Router with outdated firmware
WPA2 Encryption
TKIP encryption protocols
WPS enabled
Default administrative login credentials

A

WPS enabled

Default administrative login credentials

46
Q

Which of the following commands is used on a Linux system to edit a text file on a server?

pwd
vi
chown
ps

A

vi

47
Q

A user’s workstation is running slowly and cannot open some larger program files. The user complains that they often get a warning that states memory is running low on their Windows 10 workstation. Which of the following should you configure until more memory can be installed to help alleviate this problem?

Disable the visual effects
Increase the pagefile size
Defragment the hard disk
Enable the swap file

A

Increase the pagefile size

48
Q

Which of the following commands is used to display the amount of disk space available on the file system in Linux?

df
cat
pwd
ls

A

df

49
Q

A user contacts the service desk and states that Microsoft Excel crashed while they were in the middle of updating their spreadsheet. Which of the following log files should you review to determine the cause of the crash?

System log
Security log
Setup
Application log

A

Application Log

50
Q

A coworker is creating a file containing a script. You look over their shoulder and see “net use s:\fileserver\videos” in the file. Based on this, what type of file extension should this script use?

.bat
.py
.js
.vbs

A

.bat

51
Q

Which of the following commands can a technician use on a Linux server to verify the IP address associated with diontraining.com?

grep
netstat
dig
apt-get

A

dig

52
Q

You were troubleshooting a recently installed NIC on a workstation and decided to ping the NIC’s loopback address. Which of the following IPv4 addresses should you ping?

10.0.0.1
127.0.0.1
192.168.1.1
172.16.1.1

A

127.0.0.1

53
Q

Dion Training has an open wireless network so that their students can connect to the network during class without logging in. The Dion Training security team is worried that the customers from the coffee shop next door may be connecting to the wireless network without permission. If Dion Training wants to keep the wireless network open for students but prevents the coffee shop’s customers from using it, which of the following should be changed or modified?

Default SSID
MAC filtering
Signal Strength or Power Level
Firewall

A

Signal Strength or Power Level

54
Q

A user’s workstation is infected with malware. You have quarantined it from the network. When you attempt to boot it to the Windows 10 desktop, it fails. Which of the following should you do NEXT to begin remediating this system?

Disable System Restore and reinstall Windows 10
Restore the workstation from the last system restore point
Format the workstation and reinstall Windows 10
Restart into Safe Mode and conduct an antivirus scan

A

Restart into Safe Mode and conduct an antivirus scan

55
Q

Dion Training has several Windows 10 Professional workstations with an internal 2 TB hard disk drive. The company wants to use full disk encryption to protect the contents of this hard drive. Which of the following security settings can be used to encrypt this storage device?

FileVault
BitLocker
Encryption File System
BitLocker to Go

A

Bitlocker

56
Q

Sam and Mary both work in the accounting department and use a web-based SaaS product as part of their job. Sam cannot log in to the website using his credentials from his computer, but Mary can log in with her credentials on her computer. Sam asks Mary to login into her account from his computer to see if the problem is with his account or computer. When Mary attempts to log in to Sam’s computer, she receives an error. Mary noticed a pop-up notification about a new piece of software on Sam’s computer when she attempted to log in to the website. Which TWO of the following steps should Mary take to resolve the issue with logging in from Sam’s computer?

Have Sam attempt to log on to another website from Sam’s computer to see if it works
Have Sam clear his browser cache on his computer and then attempt to log on to the website again
Install a new web browser, reboot Sam’s computer, and attempt to log on to the website again from Sam’s computer
Ask Sam about the pop-up notification and determine what new programs he installed on his computer
Verify Sam’s computer has the correct web browser configuration and settings
Ask Sam for his username/password to log on to the website from Mary’s computer

A

Ask Sam about the pop-up notification and determine what new programs he installed on his computer

Verify Sam’s computer has the correct web browser configuration and settings

57
Q

Which of the following types of installations would you use on a system with slow performance or one that you cannot isolate a single cause of the system’s issues?

Remote network installation
Image deployment
Repair installation
In-place upgrade

A

Repair Installation

58
Q

Dion Training uses a patch management server to control the distribution and installation of security patches. A technician needs to configure a new Windows 10 workstation to not perform Windows Updates automatically. Which of the following features in the Task Manager should the technician use to disable the Windows Update service?

Performance
Processes
Startup
Services

A

Services

59
Q

What does the command “shutdown /r” do on a Windows workstation?

Enter sleep mode
Reboot the workstation
Log off the workstation
Shutdown the workstation

A

Reboot the workstation

60
Q

Your companies share drive has several folders that have become encrypted by a piece of ransomware. During your investigation, you found that only the Sales department folders were encrypted. You continue your investigation and find that a salesperson’s workstation was also encrypted. You suspect that this workstation was the original source of the infection. Since it was connected to the Sales department share drive as a mapped S:\ drive, it was also encrypted. You have unplugged the network cable from this workstation. What action should you perform NEXT to restore the company’s network to normal operation?

Schedule weekly scans and enable on-access scanning
Disable System Restore on the workstation
Restore the Sales department folders from backups
Schedule a full disk anti-malware scan on the workstation

A

Restore the Sales department folders from backups

61
Q

One of your Windows services is failing to start when you boot up your laptop. You have checked the service in the Windows Services tool and verified it is set to Automatic. What should you attempt to do NEXT to get the service to startup?

Restore the backup
Update the operating system
Run chkdsk on the system
Reboot into Safe Mode and see if the service starts

A

Reboot into Safe Mode and see if the service starts

62
Q

Tim connects his Windows 10 laptop to his office’s wireless network to print out a report for his boss. Which type of network should he select to discover the printer on the office’s wireless network?

Home
Work
Public
Private

A

Private

63
Q

A system administrator has noticed that an employee’s account has been attempting to log in to multiple workstations and servers across the network. This employee does not have access to these systems, and the login attempts are unsuccessful. Which of the following actions should the administrator do to this employee’s account in Active Directory?

Delete the user’s account
Reset the password of the user’s account
Lock the user’s account
Disable the user’s account

A

Disable the user’s account (System Administrators cannot lock an account)

64
Q

Which of the following is the purpose of an ESD mat?

Protects the technician from accidental shocks
Protects equipment from dust or dirt
Protects casings from scratches and dents
Protects equipment against accidental static discharge

A

Protects equipment against accidental static discharge

65
Q

Which of the following commands is used on a Linux system to terminate an unresponsive system process?

grep
ls
ps
kill

A

kill

66
Q

Tony works for a company as a cybersecurity analyst. His company runs a website that allows public postings. Recently, users have started complaining about the website having pop-up messages asking for their username and password. Simultaneously, your security team has noticed a large increase in the number of compromised user accounts on the system. What type of attack is most likely the cause of both of these events?

Rootkit
Cross-site request forgery
Cross-site scripting
SQL injection

A

Cross-site scripting

67
Q

Which of the following data types would be used to store the number 3.14?

Integers
Boolean
String
Floating-point

A

Floating-Point

68
Q

You need to move a new desktop computer to another desk. Which of the following actions should you take?

Lift with you back and not your leg
Open the box and carry each piece individually
Ask a coworker to teal lift it with you
Lift with you legs and not your back

A

Lift with your legs and not your back

69
Q

A user’s personal settings are not showing up on their computer. You suspect that their profile has become corrupted within Windows. You attempt to look at their profile file but cannot find it in their profile directory. Which of the following options do you need to configure to see this file?

Display Settings
Folder Options
User Accounts
Internet Options

A

Folder Options

70
Q

You have been asked to recycle 20 of your company’s old laptops. The laptops will be donated to a local community center for underprivileged children. Which of the following data destruction and disposal methods is MOST appropriate to allow the data on the drives to be fully destroyed and the drives to be reused by the community center?

Standard formatting of the HDDs
Low-level formatting of the HDDs
Degaussing of the HDDs
Drill/hammer the HDD platters

A

Low-level formatting of the HDDs

71
Q

Which of the following commands is used on a Linux system to change the ownership of a file or directory on a system?

chmod
pwd
passwd
chown

A

chown

72
Q

You are working as a desktop repair technician for a large corporation. The company uses the exact same desktop hardware for all of its user’s workstations. Today, you have received multiple calls from users complaining that their screen becomes filled with static when moving their mouse. You believe the video card driver may be at fault. Which log would you review to determine if the video card driver has been updated recently?

Security log
System log
Setup
Application log

A

System Log

73
Q

Your Windows 10 machine has just crashed. Where should you look to identify the cause of the system crash and how to fix it?
MAC
POST
BSOD
DDOS

A

BSOD

74
Q

Dion Training uses DHCP to assign private Class C IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class C address?

172.16.13.12
10.5.34.15
192.168.2.14
169.254.125.154

A

192.168.2.14

75
Q

Dion Training’s offices are frequently experiencing under-voltage events, sags, and power failures. Which of the following solutions would protect their servers from these issues?

Line conditioner
Uninterruptible power supply
Diesel generator
Surge suppressor

A

Uninterruptible Power Supply (UPS)

76
Q

Which of the following commands is used on a Linux system to safely turn off a server?

shutdown
kill
rm
ps

A

shutdown

77
Q

A technician wants to conduct a vulnerability scan on a server every morning at 3:00 am. Which of the following tools should the technician use?

Task Scheduler
PerMon
Event viewer
MSConfig

A

Task Scheduler

78
Q

Dion Training is creating troubleshooting guides and frequently asked questions for its new customer service technicians. Which of the following would MOST likely contain these documents?

Network topology diagrams
Knowledge base articles
Asset management database
Password policy

A

Knowledge Base Articles

79
Q

Barbara has connected her personal wireless router to a network jack inside her office. The router cannot get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router’s configuration to ensure it is set up to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address?

DHCP requests that originate from access points are blocked
Only allow listed MAC addresses can connect to the network
The wireless router’s MAC address is blocklist by the network
DHCP snooping is enabled on the network

A

Only allow listed MAC addresses can connect to the network

80
Q

You have been asked to configure your neighbor’s SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server?

WAN
MAN
LAN
Perimeter network

A

Perimeter network

81
Q

Jonni is installing Windows 11 (64-bit) in a virtual machine on his Linux desktop. The installation is continually failing and producing an error. Jonni has configured the virtual machine with a dual-core 1.2 GHz processor, 4 GB of memory, a 32 GB hard drive, and a 1920 x 1080 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

The screen resolution
Number of CPU cores
Amount of memory
Amount of hard drive space

A

Amount of hard drive space

82
Q

Regardless of what website Michelle types into her browser, she is being redirected to “malwarescammers.com.” What should Michelle do to fix this problem?

Rollback the application to the previous version
Update the anti-virus software and run a full system scan
Restart the network services
Reset the web browser’s proxy setting

A

Reset the web browser’s proxy setting

83
Q

Matt has verified that a user’s system has symptoms of being infected with malware. According to the malware removal procedures, what should Matt do NEXT?

Quarantine the infected system by removing its network connectivity
Update the anti-virus software and run a full system scan
Enable System Restoration and create a restore point in Windows
Educate the end user about how to avoid malware in the future

A

Quarantine the infected system by removing its network connectivity

84
Q

You are working in a doctor’s office and have been asked to set up a kiosk to allow customers to check in for their appointments. The kiosk should be secured, and only customers to access a single application used for the check-in process. You must also ensure that the computer will automatically log in whenever the system is powered on or rebooted. Which of the following types of accounts should you configure for this kiosk?

Power User
Remote Desktop User
Administrator
Guest

A

Guest

85
Q

You are working at the service desk when you receive a call from an upset user because their workstation cannot receive any emails. Which of the following should you use to document this phone call?

Asset management database
Incident report
Knowledge base articles
Network topology diagram

A

Incident report

86
Q

You are trying to open your company’s internal shared drive from your Windows 10 laptop but cannot reach it. You open your web browser and can connect to DionTraining.com without any issues. Which of the following commands should you use to determine if the internal shared drive is mapped to your computer properly?

Tracert
net use
ping
chkdsk

A

net use

87
Q

One of the routers in your network just failed. You have been asked to replace it with the same model router from the spare inventory closet as part of an emergency change request. You find the new router in the closet and notice it was signed into inventory 13 months ago. You install the router and attempt to enable HTTPS in the configuration to allow for remote access. The failed router had this capability, but this spare does not, even though they are the same model and were purchased at the same time. What should you do to enable HTTPS access for this router?

Update the firmware
Perform a factory reset
Reboot the router
Enable HTTP instead

A

Update the firmware

88
Q

Which of the following commands is used on a Linux system to delete a file from a directory?

mv
cp
rm
kill

A

rm

89
Q

A technician needs to add new features to an existing router on the network. Which of the following should be performed to add the new features?

Clone the router
Migrating o IPv6
Firmware update
Vulnerability patching

A

Firmware Update

90
Q

Tim has requested to install a security update to the Dion Training web server during the next maintenance window. At the change control board meeting, Tim presents the requested change and gains approval from the change board. Before Tim installs the update, which of the following should be documented as a result of the change board’s approval?

Date and time of the change
Affected systems/impact of the change
Purpose of the change
Risk of the change

A

Date and time of the change