Practice 5 Flashcards

1
Q

..
A user’s Android smartphone is becoming sluggish and slow to load applications. Which of the following should you perform FIRST to fix this problem?

Close all of the running applications
Turn off the smartphone’s Bluetooth and Wi-Fi
Update the smartphone’s firmware
Conduct a factory restore of the smartphone

A

Close all of the running applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dion Training is building a new computer for its video editor to use. The new computer will use four physical Intel Xeon processors, 128 GB of DDR4 memory, and a RAID 0 with two 2 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer’s resources properly?

Education
Home
Pro
Pro for Workstations

A

Pro for Workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dion Training’s offices are frequently experiencing brownouts and sags. Which of the following solutions would protect all of their workstations and servers from these under-voltage events?

Surge suppressor
Diesel generator
Uninterruptible power supply
Line conditioner

A

Line Conditioner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a connectionless protocol that utilizes on UDP?

HTTPS
FTP
TFTP
HTTP

A

TFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A factory worker suspects that a legacy workstation is infected with malware. The workstation runs Windows XP and is used as part of an ICS/SCADA system to control industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation. After its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent reinfection?

Disable System Restore in Windows
Quarantine the infected system
Investigate and verify malware symptoms
Update the anti-malware solution
Remediate the infected systems
Enable System restore and create a restore point in Windows

A

Update the anti-malware solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On your lunch break, you walked down to the coffee shop on the corner. You open your laptop and connect to their wireless network. After a few minutes of surfing the Internet, a pop-up is displayed on your screen. You close the pop-up, finish your lunch break, shut down the laptop, and put it back into your backpack. When you get back to the office, you take out the laptop and turn it on, but instead of your normal desktop background, you are greeted by a full-screen image with a padlock and a message stating you have to pay 0.1 BTC to regain access to your personal files. What type of malware has infected your laptop?

Spyware
Trojan
Rootkit
Ransomware

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Windows laptop is malfunctioning, and you believe that some system files are missing or corrupted. Which of the following commands should you use to verify this and, if needed, repair the files?

xcopy
sfc
gpupdate
chkdsk

A

sfc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sally just purchased a new iPhone and AirPods to listen to her music. After setting up the new iPhone, she can get online and watch YouTube, but her wireless headphones aren’t working. Which of the following is MOST likely the problem?

Bluetooth is not enabled
WiFi is not enabled
Cellular is not enabled
The phone is in airplane mode

A

Bluetooth is not enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your company recently suffered a small data breach caused by an employee emailing themselves a copy of the current customer’s names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which of the following logical security concepts should you implement to prevent a trusted insider from stealing your corporate data?

DLP
Strong Passwords
MDM
Firewall

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system?

32 GB
64 GB
20 GB
16 GB

A

32 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eduardo is installing Windows 11 (64-bit) in a virtual machine on his macOS desktop. The installation is continually failing and producing an error. Eduardo has configured the virtual machine with a 2.2 GHz processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

Amount of hard drive space
Amount of memory
The screen resolution
Number of CPU cores

A

Number of CPU cores

(Dual-core CPUs are needed for Windows 11)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have finished remediating the infected system. Which of the following steps should you NEXT?

Schedule scans and run updates
Identify and research malware symptoms
Quarantine infected systems
Educate the end user

A

Schedule scans and run updates
.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are installing a new firewall for Dion Training’s corporate network. Which of the following documents should you update FIRST?

Incident database
Knowledge base articles
Password policy
Network topology diagram

A

Network topology diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have directly observed symptoms that indicate the system is infected with malware. Which of the following actions should you perform NEXT?

Remediate the infected system
Quarantine the affected system
Disable System Restore
Enable System Restore

A

Quarantine the affected system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A printing company uses an isolated Windows XP workstation to print out large format banners for its customers on a custom printer. Unfortunately, the printer does not support newer versions of Windows and would cost $50,000 to replace it. To mitigate this risk, the workstation is not connected to the internet or a local area network. When a customer needs a banner printer, the technician takes a copy of their PDF file and moves it to the Windows XP workstation using a USB thumb drive. The workstation recently became infected with malware when printing a customer’s file. The technician remediated the issue, but the workstation became infected again three weeks later. Which of the following actions did the technician forget to perform?

Perform a data wipe operation on the USB thumb drive before its next use
Connect the workstation to the Internet to receive the latest Windows XP patches
Manually update the antivirus on the workstation and set it to perform on-screen scans
Disable System restore and remote the previous restore points

A

Manually update the antivirus on the workstation and set it to perform on-screen scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You recently moved 1.5 TB of data from your office’s file server to a new 16 TB NAS and decommissioned the old file server. You verified all users had been given the same permissions to the new file shares on the NAS as they had on the old server. The users are receiving an error stating, “Windows cannot access \server10\shared" every time they click the Share drive icon on their desktop. What is MOST likely the source of this error?

The users are still mapped to the old share drive
The users are outside the authorized hours set in the GPO
The users need administrative permission to access the new NAS
The users are using the incorrect password for the new server

A

The users are still mapped to the old share drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Jennifer decided that the licensing cost for a piece of video editing software was too expensive. Instead, she decided to download a keygen program to generate a license key and install a pirated version of the editing software. After she runs the keygen, a license key is created, but her system performance becomes very sluggish, and her antimalware suite begins to display numerous alerts. Which type of malware might her computer be infected with?

Worm
Adware
Trojan
Logic Bomb

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which file system type should you format a 4 TB USB flash drive to use with both Windows and macOS laptops?

NTFS
exFAT
FAT32
APFS

A

exFAT

(FAT32 can only support maximum volume sizes of up to 2 TB and maximum file sized of up to 4 GB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which command is used in the Linux terminal to change the permissions of a file?

pwd
chmod
sudo
chown

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dion Training uses DHCP to assign private Class B IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class B address?

192.168.2.14
10.5.34.15
172.16.13.12
169.254.125.154

A

172.16.13.12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

David is troubleshooting a new Android application his company is creating. He has installed the app on an Android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. Which of the following should David enable on the device?

Jailbreak
Developer Mode
Rooting
Sideloading

A

Developer Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Christina is attempting to install Windows 10 (32-bit) on an older netbook-style laptop. The installation is continually failing and producing an error. The device has a 1.1 GHz processor, 1 GB of memory, an 8 GB hard drive, and a 720p display. Which component would need to be fixed to allow Windows 10 (32-bit) to be installed on this device?

The screen resolution
Amount of memory
Amount of hard drive space
Number of CPU cores

A

Amount of hard drive space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?

Spoofing
Zero-day
Spear phishing
Phishing

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following remote access tools is a command-line terminal emulation program operating on port 23?

VNC
SSH
RDP
Telnet

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following commands is used on a Linux system to copy a file to a new directory and then remove the original file from the previous directory?

ls
cp
rm
mv

A

mv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A Windows 2019 server is crashing every evening at 2:35 am, but you are not sure why. Which of the following tools should you use to identify the cause of the system crash?

System Information
Registry Editor
Performance Monitor
Event Viewer

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?

Whaling
Spear Phishing
VIshing
Phishing

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Nicole’s smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is in her apartment building. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue?

Update the smartphone’s applications or OS
Reset the data usage statistics on the smartphone
Reset the smartphone’s wireless network settings
Verify the smartphone has adequate signal strength

A

Verify the smartphone has adequate signal strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Bradley has been authorized to work from home every Friday. Normally, he can use his work laptop home from home while still accessing the company’s internal network shares, but for some reason, it isn’t working today. What is MOST likely the cause of Bradley’s issue today?

The corporate MDM policy
An inactive VPN connection
Outdated anti-malware software
Missing OS security patches

A

An inactive VPN connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You want to ensure that only one person can enter or leave the server room at a time. Which of the following physical security devices would BEST help you meet this requirement?

Access control vestibule
Thumbprint reader
Cipher lock
Video monitoring

A

Access control vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following installation types would allow a single technician to quickly install Windows 10 Enterprise on 50 workstations simultaneously?

Repair installation
In-place upgrade
Refresh install
Image deployment

A

Image Deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A user’s Android smartphone is sluggish in responding when the user tries to open any of its apps. The smartphone has 2 GB of memory and a 16 GB internal storage device. The technician saw that the smartphone currently has 1.7 GB of memory in use and 412 MB of free storage space on the internal storage device. Which of the following should the technician perform to improve the device’s performance?

Replace the device’s battery
Replace the device’s screen
Uninstall any unneeded apps
Upgrade the internal storage device

A

Uninstall any unneeded apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Dion Training is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this small company to purchase?

Enterprise
Business
Open-source
Personal

A

Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A user is complaining that when they attempt to access Google’s homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT?

Remove any proxy servers configured in their web browser
Verify the user’s date and time zone are correctly listed in Windows
Disable the Windows Firewall
Download the latest security updates for Windows

A

Remove any proxy servers configured in their web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How would you represent the Linux permissions rwxr-xr– in octal notation?

754
724
624
742

A

754

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following commands is used on a Linux system to switch to another user’s account?

passwd
ps
su
chown

37
Q

A programmer is writing a script to calculate the temperature in Fahrenheit when it receives input in celsius. The conversion factor used is 5/9. Which of the following would be used to store this fixed conversion factor in the script?

Constant
Comment
Variable
Loop

38
Q

Which of the following types of encryption should be selected on a SOHO access point if you are running a coffee shop and want all of your customers to be able to join it by default?

Open
WPA
WPA2
WEP

39
Q

You have connected your laptop to the network using a CAT 5e cable but received an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is most likely the cause of this issue?

Duplicate IP address
Failed DNS resolution
DHCP failure
Poisoned ARP cache

A

DHCP failure

40
Q

When Jason needs to log in to his bank, he must use a hardware token to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to log in?

Biometric lock
PIV card
Smart Card
Key fob

41
Q

You are installing a new file server at the offices of Dion Training. The entire building has a diesel generator installed to protect it from power outages. The file server must have zero downtime once placed into production. Which of the following power sources should the file server utilize?

A line conditioner
A surge protector connected to a UPS
A surge protector
An uninterruptible power supply

A

An uninterruptible power supply

42
Q

The Chief Financial Officer has asked Maria for a recommendation on how the company could reduce its software licensing costs while still maintaining the ability to access its application server remotely. Which of the following should Maria recommend?

Use a Remote Desktop Protocol application on a Windows 10 desktop
Install and deploy Windows 10 Home edition on each user’s thick client
Install and deploy thin client without an operating system for each user
Use a Virtual Network Client (VNC) on a Windows 2019 server

A

Install and deploy thin client without an operating system for each user

43
Q

Your company has just installed 50 new LCD monitors to replace some older CRT monitors. How should you properly dispose of the old CRT monitors?

Recycle them
Give them to charity
Haul them to the landfill
Follow local government regulations and handling procedures

A

Follow local government regulations and handling procedures

44
Q

Which of the following commands can be used to install software on a Linux system?

nano
yum
cat
grep

45
Q

You are assisting a network administrator with updating the firmware of a Cisco iOS-based router. This router is the only border router for your organization, and it connects them to the internet. A request for change (RFC) is being written and contains the purpose, plan, scope, and risk analysis of the proposed change. Which of the following should be added to the RFC before its approval?

Document a blackout plan if the update is not successful
Update the asset management database with the new router’s asset ID
Extend the maintenance database with the new router’s asset ID
Configure a secondary route during the maintenance window

A

Document a blackout plan if the update is not successful

46
Q

What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card’s hardware address?

WEP
WPS
MAC filtering
Disable SSID broadcast

A

MAC filtering

47
Q

A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

Document the pop-ups displayed and take a screenshot
- Quarantine the machine and report it as infected to your company’s cybersecurity department for investigation
Clear the browser’s cookies, history, and enable the pop-up blocker
Reinstall or reimage the operating system

A

Quarantine the machine and report it as infected to your company’s cybersecurity department for investigation

48
Q

Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as?

Power spikes
Power failure
Under-voltage event
Power surge

A

Under-voltage event

49
Q

A network technician determines that two dynamically assigned workstations have duplicate IP addresses. What command should the technician use to correct this issue?

ipconfig /release | ipconfig /renew
ipconfig /all
ipconfig /renew
ipconfig /dhcp

A

ipconfig /release | ipconfig /renew

50
Q

During a penetration test of your company’s network, the assessor came across a spreadsheet with the passwords being used for several servers. Four of the passwords recovered are listed below. Which one is the weakest password and should be changed FIRST to increase the password’s complexity?

P@$$w0rd
pa55word
Pa55w0rd
P@$$W0RD

51
Q

Which of the following Control Panel sections would allow a technician to turn on Hyper-V on a Windows 10 Pro workstation?

Programs and Features
Devices and Printers
Device Manager
System

A

Programs and Features

52
Q

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as challenge/response and password encryption?

ISAKMP
TACACS+
Network Access Control
Multi-Factor Authentication

53
Q

The customer service manager at Dion Training is having issues with her Windows 10 laptop. A technician believes that the operating system may have been corrupted by a piece of malware. The technician has removed the malware and wants to perform an installation or upgrade that will recopy the system files and revert most of the system settings to their default configurations while still preserving the user’s personalization settings, data files, and any applications installed through the Windows store. The technician has been told that they may delete any applications installed by the user, though, since they may have been infected by the malware. Which of the following types of upgrades or installations should the technician use?

Clean Install
In-Place Upgrade
Refresh Installation
Repair Installation

A

Refresh Installation

54
Q

Susan, an executive at Dion Training, will be traveling to Italy for a conference next week. She is worried about remaining connected to the internet while overseas and plans to use the Wi-Fi in her hotel room and the local coffee shop with her laptop. Which of the following should she purchase and configure before leaving for Italy to ensure her communications remain secure regardless of where she is connecting from?

VPN
Local Mobile Hotspot
International Data Roaming Plan on her Cellphone
Local SIM card for her smartphone

55
Q

Which of the following commands is used on a Linux system to display the current working directory’s full pathname to the screen?

Chown
pwd
chmod
passwd

56
Q

Which of the following workstation operating systems are Ubuntu and Red Hat considered?

Linux
macOS
Windows
Android

57
Q

You are configuring a SOHO network that will contain 7 devices, but you only have a single public IP address. Which of the following concepts should be configured to allow the 7 devices to share that single IP when connecting to the internet?

NAT
Perimeter Network
UPnP
DHCP

58
Q

Dion Consulting Group has been hired by a small real estate office to build its network. The office has 4 computers running Windows 10 Professional edition configured in a workgroup to access a shared file server. Which of the following types of network models is being used by this real estate office?

Hub-and-spoke
Mesh
Client/Server
Peer-to-peer

A

Peer-to-peer

59
Q

During the reconnaissance phase of a penetration test, you have determined that your client’s employees all use iPhones that connect back to the corporate network over a secure VPN connection. Which of the following methods would MOST likely be the best method for exploiting these?

Use a tool like ICSSPLOIT to target specific vulnerabilities
Identify a jailbroken device for easy exploitation
Use social engineering to trick a user into opening a malicious APK
Use web-based exploits against the devices web interfaces

A

Identify a jailbroken device for easy exploitation

60
Q

Which of the following techniques would be the most appropriate solution to implementing a multi-factor authentication system?

Username and password
Fingerprint and retinal scan
Smartcard and PIN
Password and security question

A

Smartcard and PIN

61
Q

Which of the following network configurations is used to identify your computer’s individual host identifier and your computer’s network identifier?

Gateway
Subnet mask
WINS
DNS

A

Subnet mask

62
Q

Which of the following data types would be used to store a user’s name?

Integers
Boolean
Floating point
String

63
Q

Your company is expanding its operations in the European Union and is concerned about additional governmental regulations that may apply. Which of the following regulations applies when processing personal data within the European Union?

PHI
PII
PCI
GDPR

64
Q

A user receives the following error message: “Windows Update cannot currently check for updates because the service is not running.” The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT?

Reboot the computer
Restart the network services
Register the Windows Update service’s DLL files
Rollback the device drivers

A

Reboot the computer

65
Q

Jason checks the Dion Training server room and finds that it currently has only 10% humidity. Which of the following risks to the servers could occur due to this low humidity level?

Corrosion of the servers
An under-voltage event
An over-voltage event
Accidental static discharge

A

Accidental static discharge

66
Q

Which of the following commands is used on a Linux system to copy a file from one directory to another directory?

cp
mv
rm
ls

67
Q

Which command-line entry would be used on a Windows system to test if your system can reach diontraining.com?

sfc diontraining.com
ping diontraining.com
ipconfig diontraining.com
net use diontraining.com

A

ping diontraining.com

68
Q

You are working on a Windows 10 workstation with a 1 TB HDD and 16 GB of memory that is operating slowly when reading large files from its storage device. Which of the following commands should you use to speed up this workstation?

ipconfig
chkdsk
diskpart
format

69
Q

Which of the following commands would you use to duplicate the file c:\Users\Jason\Downloads\newfile.docx to c:\Users\Jason\Desktop\newfile.docx from the command line?

chkdsk
net user
copy
diskpart

70
Q

A home user contacts the help desk and states that their desktop applications are running very slowly. The user also says that they have not received any emails all morning, but they normally get at least 5-10 emails each day. The help desk technician gets permission from the home user to remotely access their computer and runs some diagnostic scripts. The technician determines that the CPU performance is normal, the system can ping the local router/gateway, and the system can load websites slowly, or they fail to load completely. During the diagnosis, the technician also observes the remote connection dropping and reconnecting intermittently. Which of the following should the technician attempt to perform NEXT to resolve the user’s issue?

-Boot into the BIOS setup, enable TPM, reboot into safemode, and perform
a System Restore
-Empty the web browser’s cache, send a test email to the technician’s
personal account, and open the Explorer to check the file system
- Reboot into safe mode, uninstall the last OS update, and run a CHKDSK
against the hard
- Update the anti-virus software, run a full system, and verify the web
browser’s and email client’s settings

A

Update the anti-virus software, run a full system, and verify the web browser’s and email client’s settings

71
Q

You need to connect to a Linux server to conduct some maintenance. The server is located in a remote office about 50 miles away. You decide to connect the server remotely instead of driving to the location to save some time, but you want to ensure you do this securely. The Linux server has VNC installed, but it isn’t configured to provide an encrypted connection. Which of the following should you use to secure the VNC connection to the remote server?

RDP
WPA2
HTTPS
SSH in tunnel mode

A

SSH in tunnel mode

72
Q

What is the minimum amount of memory required to install Windows 10 (x64) on a device?

4 GB
1 GB
8 GB
2 GB

73
Q

Which edition of Windows 10 does not have the group policy editor enabled?

Enterprise
Pro for Workstations
Pro
Home

74
Q

An increased amount of web traffic to an e-commerce server is observed by a network administrator but without increasing the number of financial transactions. Which kind of attack might the company be experiencing?

Phishing
Bluejacking
ARP spoofing
DoS

75
Q

You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the first 512-byte sector on the hard disk?

diskpart list
bootrec /rebuildbcd
bootrec /fixmbr
bootrec /fixboot

A

bootrec /fixmbr

76
Q

Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards?

PHI
PII
PCI-DSS
GDPR

77
Q

You are installing a new wireless network in your office building and want to ensure it is secure. Which of the following configurations would create the MOST secure wireless network?

WEP and TKIP
WPA2 and AES
WPA and MAC filtering
WPA2 and RC4

A

WPA2 and AES

78
Q

Last week, a technician remediated a malware infection on Karen’s laptop. Today, she shows up at the service desk, frustrated because her laptop appears to have been infected again. What step of the malware remediation process did the technician MOST likely forget to complete?

Educating the end user
Quarantining the infected laptop
Investigate and verify malware symptoms
Enabling System Restore

A

Educating the end user

79
Q

You are writing a script that will take an employee’s name as the input. Which of the following data types would the employee’s name be stored in?

Integers
Boolean
Float
String

80
Q

A user’s smartphone has become unresponsive since installing the latest iOS update. Which of the following should a technician do to restore the smartphone’s performance?

Update the applications
Reimage the device
Rollback the iOS update
Perform a factory reset

A

Rollback the iOS update

81
Q

An ethical hacker has been hired to conduct a physical penetration test of a company. During the first day of the test, the ethical hacker dresses up like a plumber and waits in the building’s main lobby until an employee goes through the main turnstile. As soon as the employee enters his access number and proceeds to go through the turnstile, the ethical hacker follows them through the access gate. What type of attack did the ethical hacker utilize to access the restricted area of the building?

Social Engineering
Tailgating
Spoofing
Shoulder surfing

A

Tailgating

82
Q

What is the SIXTH step of the seven-step malware removal process?

Educate the end user
Update the applications and the operating system
Quarantine the infected system
Enable System Restore and create a restore point in Windows

A

Enable System Restore and create a restore point in Window

83
Q

Fail to Pass Solutions has requested that its employees have a mobile device so that they can respond to questions when they are out of the office. Each employee is responsible for buying their Android smartphone and cellular plan service. To access the corporate network and its data, the employees need to install a company-provided APK on their device. This app contains access to their company-provided email, cloud storage, and customer relationship management (CRM) database. Which of the following policies BEST describes Fail to Pass’s mobile device deployment model?

COBO
CYOD
COPE
BYOD

84
Q

Jason is using a Windows 10 workstation in the Dion Training conference room. The workstation is acting extremely slow and he suspects there are other accounts logged on to the workstation. Which of the following features in the Task Manager should he use to identify if anyone else is currently logged on to the workstation?

Users
Services
Performance
Processes

85
Q

Which attack method is MOST likely to be used by a malicious employee or insider trying to obtain another user’s passwords?

Tailgating
Phishing
On-path attack
Shoulder surfing

A

Shoulder surfing

86
Q

Which of the following components presents the largest risk of electrical shock to a technician?

LCD monitor
CRT monitor
Laptop battery
Hard drive

A

CRT monitor

87
Q

A user attempted to go to their favorite social media website this morning from their laptop. When they typed in Facebook.com, their browser redirected them to MalwareInfect.com instead. You asked the user to clear their cache, history, and cookies, but the problem remains. What should you do NEXT to solve this problem?

Conduct an antivirus scan
Upgrade their web browser
Check the host.ini file
Disable System Restore

A

Check the host.ini file

88
Q

John is setting up 100 Windows 10 computers for a new corporate office. He wants to ensure that no one can change the boot order and boot from an unauthorized operating system. What feature should he ensure is enabled?

RAM integrity checking
Full disk encryption
Secure Boot
BIOS password required

A

BIOS password required

89
Q

Which of the following types of screen locks uses a biometric authentication system to prevent access to a mobile device?

Swipe
Passcode
Pattern lock
TouchID