Practice 6 Flashcards

1
Q

Dion Training utilizes a federation authentication model for all of its internal and external services. If an employee needs to access one of the company’s web applications from their smartphone, they use a username and password to log in to the main website. They then are transferred and authenticated to all of the other sites and services automatically. Which of the following type of authentication is this known as?

MFA
SSO
FaceID
TouchID

A

SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following devices should you NEVER disassemble during troubleshooting due to the risk of electrocution?

LCD display
Tablet
Power supply
Printer

A

Power Supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which editions of Windows 10 can you connect to using Remote Desktop?

Pro
Enterprise
Education
Home

A

Pro
Enterprise
Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You just received your monthly smartphone bill. As you review your charges, you notice that this month shows three times as much data usage as a normal month. You don’t remember changing your usage pattern, so there should not have been a large increase in data used. Which of the following should you do FIRST to determine the source of the increased usage?

Configure your applications to only download large files over Wi-Fi
Enable biometric login for the lock screen to ensure no one else uses your device
Check network permissions and data usage for any applications installed within the last month
Conduct a factory restore of the smartphone and reload your applications

A

Check network permissions and data usage for any applications installed within the last month

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure?

Connections
General
Content
Privacy

A

Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which version should you use when installing a Linux operating system and are concerned with end-of-life support?

LTS release
Rolling release
Beta release
Developer release

A

LTS release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are configuring a SOHO network and only denying specific IP addresses from accessing the network while allowing any IP addresses not found on the list. Which of the following should be implemented?

Blocklist
MAC filtering
Allow list
Port forwarding

A

Blocklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which low power mode is used with Windows 10 laptops to save power, but it takes longer to turn back on and resume where the user left off?

A

Hibernate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following features allows a Linux server to provide file-sharing services to a company’s Windows 10 workstations?

Keychain
Samba
pathping
Yum

A

Samba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which partition of the hard drive is concealed from the user in the File Explorer within Windows 10 and is only used when imaging the computer back to its factory default state?

Primary
Swap
Recovery
Extended

A

Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Michael, a salesman, is on a business trip and is trying to access his corporate email over the hotel’s Wi-Fi network. Michael’s laptop appears to be connected to the hotel’s wireless network, but his email client cannot download any new messages and states, “Network Offline.” Michael contacts the help desk for assistance. What action should the help desk technician tell Michael to perform to solve this issue?

Perform a full system scan for malware on his laptop
Disconnect and reconnect to the hotel’s wireless network
Disable and reenable the wireless network adapter on his laptop
Open a web browser, enter google.com, and see if a redirect page is displayed

A

Open a web browser, enter google.com, and see if a redirect page is displayed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following types of backup requires the LEAST time to complete a backup?

Differential
Incremental
Synthetic
Full

A

Incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of several settings: Email (never), Maps (always), Calendar (while using), Messages (while using), Photos (never), App Store (while using), Bank (while using), and Weather (while using). Based on the information provided, what should be changed to resolve this client’s problem?

Change the Email setting to while using
Change the Map setting to while using
Change the Weather setting to always
Change the App Store to never

A

Change the Map setting to while using

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following wireless technologies allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button?

WPA2
WPS
WEP
WPA

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following file types are commonly used to create simple scripts in the Windows command-line environment?

.bat
.sh
.py
.js

A

.bat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following technologies would you use to securely access the command line interface of a network’s switches and routers remotely for configuration?

Telnet
HTTPS
RDP
SSH

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You are working as a forensic investigator for the police. The police have a search warrant to capture a suspect’s workstation as evidence for an ongoing criminal investigation. As you enter the room with the policeman, he arrests the suspect and handcuffs him. What should you do FIRST?

Secure the area
Document the scene
Turn off the workstation
Implement the chain of custody

A

Secure the area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives?

Security Groups
Credential Manager
Group Policy
Home Folder

A

Security Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An offsite tape backup storage facility is involved with a forensic investigation. The facility has been told they cannot recycle their outdated tapes until the conclusion of the investigation. Which of the following is the MOST likely reason for this?

A chain of custody breach
A data transport request
A notice of a legal hold
The process of discovery

A

A notice of a legal hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A user contacts the service desk and states a hardware conflict error is showing in their Device Manager. Which of the following log files should you review to determine the source of the conflict?

Security Log
Setup
Application Log
System Log

A

System Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following backup rotation schemes overwrites the oldest media with the current backup being performed?

Tower of Hanoi
Grandfather-father-son
FIFO Backup
3-2-1 backup

A

FIFO Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are troubleshooting an issue with a Windows desktop and need to display the machine’s active TCP connections. Which of the following commands should you use?

natstat
ping
ipconfig
net use

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You have just set up a Minecraft server on a spare computer within your network and want your friends to connect to it over the internet. What do you need to configure in your SOHO router to allow your friends to connect to the new Minecraft server you created?

Update the firmware
Enable DHCP
Configure port forwarding
Configure your Wi-Fi to use Channel 11

A

Configure port forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A customer is complaining that they cannot connect to the local network share drive. You run the command ‘ipconfig /all’ from their workstation, and it returns an IP of 169.254.34.12. Which of the following is the problem with this workstation?

The workstation couldn’t reach the gateway
The workstation couldn’t reach the proxy server
The workstation couldn’t reach the DNS server
The workstation couldn’t teach the DHCP server

A

The workstation couldn’t teach the DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You are configuring a new printer for a small real estate office. There are only 4 computers in the network, and they are all connected to a single 4-port switch/router/cable modem device. There are no additional open ports on the device and no servers configured within the network. All the computers operate as part of a single workgroup with no domain controller. You need to configure the printer to allow all 4 computers to print to it as long as they are connected to the switch. Which of the following methods would BEST allow the users to print to the printer based on this network’s configuration?

Configure it as a shared printer connected to one of the four workstations
Configure the printer to support Bluetooth printing
Configure the printer to support cloud printing
Configure a print server and connect the printer to it

A

Configure it as a shared printer connected to one of the four workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You just installed a flat panel television in a conference room in your office building. The facilities manager is concerned that a lightning strike could damage it. The company is not worried about the threat of power outages because the conference room is only used a few times per week. Which of the following should be installed to BEST mitigate the facilities manager’s concerns without spending too much money?

Power strip
Surge suppressor
Line conditioner
UPS

A

Surge suppressor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Every new employee at Dion Training must sign a document to show they understand the proper rules for using the company’s computers. This document states that the new employee has read the policy that dictates what can and cannot be done from the corporate workstations. Which of the following documents BEST describes this policy?

SLA
SOW
MOU
AUP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Fail To Pass Systems has just been the victim of another embarrassing data breach. Their database administrator needed to work from home this weekend, so he downloaded the corporate database to his work laptop. On his way home, he left the laptop in an Uber, and a few days later, the data was posted on the internet. Which of the following mitigations would have provided the greatest protection against this data breach?

Require a VPN to be utilized for all telework employees
Require data at rest encryption on all endpoints
Require all new employees to sign an NDA
Require data masking for any information stored in the database

A

Require data at rest encryption on all endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A user’s SOHO wireless network appears to have significantly slowed down today. Normally, they can download files at 900 Mbps or more, but today, they only averaged 23 Mbps when downloading. You check their wireless settings and see the following: Network SSID: DionTraining Security: WPA2 Password: diontraining Mode: AC ISP: Fiber1Gbps Which of the following is MOST likely the problem?

WPA2 reduces download speeds and the user should switch to WPA3
Additional transmission power is needed for the wireless signal
The WAN type needs to be upgraded to DSL or cable
Other users have connected to the Wi-Fi due to a weak password

A

Other users have connected to the Wi-Fi due to a weak password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An employee at Dion Training is complaining that every time they reboot their Windows 10 workstation a music application is loaded. Which of the following commands would you use to disable the program from starting up each time Windows reboots?

User account control
System information
Task manager
Event viewer

A

Task manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Jason’s iPhone has not received any emails or SMS messages in the few 4 hours. Which of the following is the most cause of these issues?

Bluetooth connectivity failure
Mail client error
Internet connectivity failure
OS update failure

A

Internet connectivity failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the minimum processor required to install Windows 11 (x64) on a device?

1 GHz dual-core processor
2 GHz dual-core processor
1 GHz single-core processor
2 GHz single-core processor

A

1 GHz dual-core processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following file system formatting types should be used with a DVD?

CDFS
NTFS
UDF
FAT32

A

UDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence?

Financial Responsibility
Legal hold
Secure copy protocol
Chain of custody

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is an APIPA or link-local address?

33.52.7.83
192.168.1.34
127.0.0.1
169.254.64.23

A

169.254.64.23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which command would be used to display the network address and subnet mask for the wired network connection on a Linux system?

ip
netstat
ipcongif
nslookup

A

ip

37
Q

You have just finished installing a new workstation for a user in your office. They need to be able to see the other workstations on the company’s workgroup. Which of the following settings should you ensure is enabled?

Enable network discovery
Enable file and folder sharing
Enable Bitlocker
Enable an RDP connection

A

Enable network discovery

38
Q

Which of the following allows users to save their current session to disk and before powering down their Windows 10 laptop?

Shutdown
Hibernate
Lock
Sleep

A

Hibernate

39
Q

You are troubleshooting a workstation and want to check if any S.M.A.R.T. errors are being reported. Which of the following tools should you use to troubleshoot this workstation?

Performance monitor
Disk management
Task scheduler
DxDiag

A

Disk management

40
Q

What is the FOURTH step of the seven-step malware removal process?

Enable System Restore and create a restore point in Windows
Remediate the infected systems
Quarantine the infected system
Update the applications and the operating system

A

Remediate the infected systems

41
Q

A small business recently experienced a catastrophic data loss due to flooding from a recent hurricane. The customer had no backups, and flooding destroyed all of the hardware associated with the small business. As part of the rebuilding process, the small business contracts with your company to help create a disaster recovery plan to ensure this never reoccurs again. Which of the following recommendations should you include as part of the disaster recovery plan?

Local backups should be conducted
Local backups should be verified weekly to ensure no data loss occurs
Purchase waterproof devices to prevent data loss
Backups should be conducted to a cloud-based storage solution

A

Backups should be conducted to a cloud-based storage solution

42
Q

You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented?

Cable lock
Biometric reader
Smart cart
Key fob

A

Smart cart

43
Q

A user is complaining that the touchscreen on their smartphone is not responding to their touch. What is the FIRST step you recommend to solve this issue?

Reinstall the OS
Have the user restart the device
Replace the defective touchscreen
Enable and disable airplane mode

A

Have the user restart the device

44
Q

You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the EFI/BIOS of the system. Which of the following commands should you use to add the Windows installation to the boot manager?

diskpart list
bootrec /fixboot
bootrec /fixmbr
bootrec /rebuildbdc

A

bootrec /rebuildbdc

45
Q

Which of the following components presents the largest risk of electrical shock to a technician?

LCD monitor
Laptop battery
Solid-state device
Power supply

A

Power supply

46
Q

Your Windows 10 workstation is attempting to boot up when it receives the following error, “BOOTMGR is missing; Press Ctrl+Alt+Del to restart.” To fix this, you insert your Windows installation disc and reboot into the Command Prompt under the System Recovery Options. Which of the following commands should you enter in the command prompt?

chkdsk /repair
sfc /fixboot
diskpart /repair
bootrex /fixboot

A

bootrex /fixboot

47
Q

What is the minimum amount of storage space required to install Windows 10 (x86) on a device?

20 GB
32 GB
16 GB
64 GB

A

16 GB

48
Q

You need to move a 75-pound box with a rack-mounted UPS in it. Which of the following actions should you take?

Lift with your back and not your legs
Open the box and carry the UPS in pieces
Lift with your legs and not your back
Ask a coworker to team lift it with you

A

Ask a coworker to team lift it with you

49
Q

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?

RADIUS
WPA2
WPS
WEP

A

RADIUS

50
Q

A network technician must allow HTTP traffic from the Internet over port 80 to an internal server running HTTP over port 81. Which of the following is this an example of?

Dynamic NAT
Static NAT
Port forwarding
Dynamic DNS

A

Port forwarding

51
Q

A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of their location settings, which are summarized below: * Storage (49 GB Used, 15 GB Free, 64 GB Total) * Mail Client (Corporate account set to push, Personal account set to pull hourly) * Display (Auto brightness, Lock after 30 minutes, Night mode disabled) * Calls (33 minutes used during last 24 hours) * Data (52 MB used during last 24 hours) * Location (All apps set to “allow while using”) Based on the information provided, what should be changed to resolve this client’s problem?

Mail settings
Location settings
Display settings
Storage settings

A

Display settings

52
Q

Which of the following Windows tools can a technician use to gather information about a workstation and create a comprehensive list of hardware, system components, and the software environment used by that workstation?

devmgmt.msc
msinfo32.exe
dxdiag.exe
resmon.exe

A

msinfo32.exe

53
Q

Which of the following Control Panel sections contains various tools like computer management, disk cleanup, print management, and the registry editor?

Administrative Tools
Device and Printers
Device Manager
System

A

Administrative Tools

54
Q

Which of the following types of wireless connections requires a pin to be entered as part of the pairing process before it is utilized?

Bluetooth
Infrared
NFC
Radiofrequency

A

Bluetooth

55
Q

Which of the following commands is used on a Linux system to change a user’s password on the system?

chown
pwd
chmod
passwd

A

passwd

56
Q

Jason wants to configure his Windows 10 laptop to more quickly find files when he is searching its hard drive. Which of the following Control Panel sections should he use to configure his laptop for optimal searching performance?

Indexing Options
Power Options
Internet Options
File Explorer Options

A

Indexing Options

57
Q

You have discovered that an employee has been conducting illegal activities using his workplace computer. You have taken possession of the employee’s laptop according to your company’s procedures and are waiting to give it to law enforcement authorities. What should you do when turning over the laptop to the police?

Document the changes
Maintain the chain of custody
Preserve the evidence
Quarantine the system

A

Maintain the chain of custody

58
Q

Which of the following password policies defines the number of previous passwords that cannot be reused when resetting a user’s password?

Password length
Password expiration
Password history
Password complexity

A

Password history

59
Q

You are working as a desktop repair technician for a large corporation. The company uses the exact same desktop hardware for all of its user’s workstations. Today, you have received multiple calls from users complaining that their screen becomes filled with static when moving their mouse. You noticed that the systems all received a security patch and other updates from the Microsoft Endpoint Configuration Management (MECM) server last night. Which of the following actions should you take to resolve this issue?

Rollback the video card driver and wait for a new driver to be released
Disable the DirectX service in service.msc
Use SFC to ensure all system files are correct and not corrupted
Reboot the system into safe mode and allow the user to continue their work

A

Rollback the video card driver and wait for a new driver to be released

60
Q

Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class A address?

169.254.1.52
10.1.2.3
172.18.21.252
192.168.3.5

A

10.1.2.3

61
Q

After a company rolls out software updates, Ann, a lab researcher, can no longer use the lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest version of the drivers. Which of the following should the technician perform to get the researcher back to work as quickly as possible?

Restore Ann’s PC to the latest known good configuration
Downgrade the PC to a working patch level
Rollback the drivers to the previous version
Reset Ann’s equipment configuration from a backup

A

Rollback the drivers to the previous version

62
Q

You are troubleshooting a user’s laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which of the following actions should you attempt to fix the problem in Windows 10?

Restart Windows Defender
Disable/Enable the wireless network adapter
Restart the print spooler service
Rollback the USB drivers

A

Restart the print spooler service

63
Q

A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be?

Zero-day attack
Spoofing
Social engineering
VLAN hopping

A

Social engineering

64
Q

Which of the following policies should be created to provide employees with the guidelines and limitations they must follow when using company-provided email, computers, and network access?

Local security policy
Group Policy
Acceptable use policy
Password policy

A

Acceptable use policy

65
Q

What is the symbolic representation of the octal numeric permission 644?

rw——-
rw-r–r–
r–rw-rw-
rwx-r-xr-x

A

rw-r–r–

66
Q

Which of the following operating systems are NOT used in modern smartphones or tablets?

macOS
iPadOS
Android
iOS

A

macOS

67
Q

David is a brand new help desk technician. To perform his job, he needs to install programs and printers but should not have full access to change everything on a Windows workstation. Which of the following types of user accounts should David be given to perform his job as a help desk technician?

Power User
Guest
Administrator
Remote Desktop User

A

Power User

68
Q

Which of the following operating systems cannot be run on a laptop?

Linux
Android
iOS
Windows

A

iOS

69
Q

What is the THIRD step of the seven-step malware removal process?

Quarantine the infected system
Enable System Restore and create a restore point in Windows
Update the applications and the operating system
Disable System Restore in Windows

A

Disable System Restore in Windows

70
Q

You have been asked to help a user upgrade their laptop from Windows 10 to Windows 11. The user has asked that all of their applications, user profiles, documents, and PST files be preserved during the upgrade. Which of the following types of upgrades or installations should you perform on this laptop?

Repair upgrade
Clean installation
in-place upgrade
Unattended installation

A

in-place upgrade

71
Q

Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation?

Telnet
RDP
SSH
VNC

A

RDP

72
Q

Dion Training has recently replaced the batteries in their rack-mounted UPS in their data center. Which of the following should their technicians do to dispose of the depleted batteries?

Place the batteries in the recycle bin behind their office building
Research local regulations for toxic waste disposal in their area
Wrap the batteries in plastic and place them in the trash
Review the material safety data sheet for disposal instructions

A

Research local regulations for toxic waste disposal in their area

73
Q

You work for Dion Training as a physical security manager. You are concerned that the physical security at the entrance to the company is not sufficient. To increase your security, you are determined to prevent piggybacking. What technique should you implement first?

Install CCTV to monitor the entrance
Install the RFIS badge reader at the entrance
Install an access control vestibule at the entrance
Require all employees to wear security badges when entering the building

A

Install an access control vestibule at the entrance

74
Q

A co-worker just sent you a macro-enabled Microsoft Word document. After you opened the file, your computer began to delete the photos stored in your c:\photos directory. What type of malware did you MOST likely receive?

Trojan
Virus
Worm
Rootkit

A

Virus

75
Q

Which of the following types of attacks involves changing the system’s MAC address before it connects to a wireless network?

Spoofing
Botnet
DDoS
Zombie

A

Spoofing

76
Q

Which of the following would NOT be included in a company’s password policy?

Password History
Password Age
Password Style
Password Complexity Requirements

A

Password Style

77
Q

Tamera trying to install Windows 11 (64-bit) on an older laptop she found in her closet. The installation is continually failing and producing an error. The laptop has a dual-core 1.2 GHz processor, 2 GB of memory, a 250 GB hard drive, and a 1280 x 720 screen resolution. Which item in the laptop must be upgraded to meet the minimum requirements for installing Windows 11?

Number of CPU cores
Amount of hard drive space
Amount of memory
The screen resolution

A

Amount of memory

78
Q

Jason wants to configure his Windows 10 laptop to suspend individual USB ports when not in use. Which of the following Control Panel sections should he use to set the USB selective suspend feature?

Internet Options
File Explorer Options
Indexing Options
Power Options

A

Power Options

79
Q

John is a PC technician. To perform his job, he needs to be able to install and remove programs, modify system files, and change user permissions on the Windows workstation in his office. Which of the following types of user account types should he have to perform his role?

Power User
Remote Desktop Use
Guest
Administrator

A

Administrator

80
Q

Tamera just purchased a Wi-Fi-enabled Nest Thermostat for her home. She has hired you to install it, but she is worried about a hacker breaking into the thermostat since it is an IoT device. Which of the following is the BEST thing to do to mitigate Tamera’s security concerns? (Select TWO)

Configure the thermostat to use a segregated part of the network by installing it into a screened subnet
Enable two-factor authentication on the device’s website (if supported by the company)
Configure the thermostat to use the WEP encryption standard for additional confidentiality
Upgrade the firmware of the wireless access point to the latest version to improve the security of the network
Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password
Disable wireless connectivity to the thermostat to ensure a hacker cannot access it

A

Configure the thermostat to use a segregated part of the network by installing it into a screened subnet

Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password

81
Q

Which of the following backup rotation schemes uses a complex mathematical puzzle to extend the number of unique days of backups stored with the least amount of tapes?

FIFO Backup
Tower of Hanoi
3-2-1 backup
Grandfather-Father-son

A

Tower of Hanoi

82
Q

You are working at the service desk and just received the following email from an end-user who believes it is suspicious:

Zero-day
Spoofing
Phishing
Spear phishing

A

Phishing

83
Q

Your company is concerned about the possibility of power fluctuations that may occur and cause an immediate loss of power for several minutes to their server room. To prevent this condition, they are installing a large rack-mounted UPS to protect the server. Which type of condition are they trying to prevent using this UPS?

Under-voltage event
Power Spikes
Power Surge
Power Failure

A

Power Failure

84
Q

What is the name of a program that monitors user activity and sends that information to someone else?

Spyware
Rootkit
Keylogger
Virus

A

Spyware

85
Q

Which of the following MacOS features allows the user to create a user account that is used to sign in to the App Store, iCloud, and iTunes?

Spotlight
Passwd
Apple ID
Keychain

A

Apple ID

86
Q

Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system’s filesystem?

rm -rf /
rm /rf .
rm /
rm .

A

rm -rf /

87
Q

Which of the following policies should be created to provide employees with the guidelines and limitations they must follow when using company-provided email, computers, and network access?

AUP
PII
GDPR
DLP

A

AUP

88
Q

What anti-malware solution is installed as a dedicated on-premise appliance to scan all incoming traffic and prevent malware from being installed on any of your clients without requiring the installation of any software on your clients?

Host-based anti-malware
Cloud-based anti-malware
Network-based anti-malware
Signature-based anti-malware

A

Network-based anti-malware

89
Q

AUP
SOW
MOU
SLA

A