Practice Assessment Review Flashcards

1
Q

What is measured in ohms?

A

Resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is measured in amps?

A

Current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Alarm that is triggered manually and could be implemented as a wireless pendant, concealed sensor or trigger, or call contact.

A

Duress alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Alarm that sounds when the circuit is opened or closed, depending on the type of alarm. This could be caused by a door opening or by a fence being cut.

A

Circuit-based alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Alarm that is linked to a detector triggered by movement within a room or other area. The sensors in these detectors are either microwave radio reflection or passive infrared (PIR).

A

Motion-based alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Alarms that uses radio frequency ID (RFID) tags and readers that can be used to track the movement of tagged objects within an area.

A

Proximity alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backup that selects new files and files modified since the original full job. Has moderate time and storage requirements and relatively faster during restore

A

Differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backup that is an option for creating full backups with lower data transfer requirements. Not generated directly from the original data but instead assembled from other backup jobs.

A

Synthetic backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Backup job that produces a file that contains all the data from the source. This means that the backup file is nominally the same size.

A

Full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backup that selects only new files and files modified since the previous job. Has the lowest time and storage requirement, but longer restore time.

A

Incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A group policy that configures computer settings and user profile settings for all computers and user accounts within a domain.

A

Domain group policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A script that performs some type of configuration or process activity when the user signs in.

A

Login script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The action of installing applications that are obtained outside of the device’s official app store.

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Will reset the device to its factory state.

A

Wiping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The default shell command interpreter uses what stream for the user’s keyboard input?

A

stdin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any errors in a terminal stream are identified by which stream?

A

stderr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which stream reads data from a shell from the tty device and displays it through the terminal.

A

stdout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A set of common interface standards designed to facilitate compatibility between different operating systems, including but not limited to Unix-like systems and Windows.

A

POSIX (Portable Operating System Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Play or show some sort of content embedded in a web page, or other video/multimedia format.

A

Plugin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Add or change a browser feature via its application programming interface (API).

A

Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Indicates the site used to perform web searches directly from the address bar.

A

A search provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A method used by developers to integrate custom-developed software with other software applications.

A

API (Application Programming Interface)

23
Q

When used with a particular command, what switch lists the syntax and switched used for the command?

A

/?

24
Q

What wildcard character can be used to indicate a string of characters?

A
  • (asterisk)
25
Q

When used with the dir command, what switch(es) can be used to list files using a wide format with no details?

A

/w

26
Q

Evidence that is not immediately visible or accessible, but can be uncovered through further investigation or forensic processes.

A

Latent evidence

27
Q

Involves recovering and analyzing data to determine the nature and scope of a security incident.

A

Digital forensics

28
Q

An option for creating full backups with lower data transfer requirements.

A

Synthetic backup

29
Q

Backup job that selects only new files and files modified since the previous job. Has the lowest time and storage requirement.

A

Incremental

30
Q

Backup job that selects new files and files modified since the original full job. Has moderate time and storage requirement

A

Differential

31
Q

Remote Desktop Protocol on a Windows workstation or server runs on what TCP port?

A

port 3389

32
Q

SSH uses what TCP port?

A

port 22

33
Q

VNC (Virtual Network Connection) works over what TCP port?

A

port 5900

34
Q

To delete a drive mapping, what is the correct syntax?

A

net use X: /delete

35
Q

A tool used by the original equipment manufacturers (OEMs) to restore the OS environment to its ship state.

A

Recovery partition

36
Q

A technician provides a passcode to the user and connects over port 443. What type of Windows help session does the user create when using CTRL+START+Q?

A

Microsoft Quick Assist

37
Q

A user asks for help from a technician or co-worker via an invitation file protected by a passcode.

A

Microsoft Remote Assistance (MSRA)

38
Q

How many bits long is an IPv6 address in total, and how many bits identify the host portion?

A

In IPv6, the address is 128 bits long and the interface address portion is always the last 64 bits.

39
Q

Console that allows administrators to view, edit, and troubleshoot the properties of installed hardware, update drivers, and remove or disable devices

A

Device Manager (devmgmt.msc)

40
Q

Console that displays a summary of any fixed and removable disks.

A

Disk Management (diskmgmt.msc)

41
Q

Tool that runs various operations to speed up the performance of hard disk drives (HDDs) and solid-state drives (SSDs).

A

Defragment and Optimize Drives (dfrgui.exe)

42
Q

Console that provides administrators with an advanced interface for creating, modifying, disabling, and deleting user accounts. This console is also useful for resetting the password for an account.

A

Local Users and Groups (lusrmgr.msc)

43
Q

On a solid state drive (SSD), data is stored in units called what?

A

Blocks

44
Q

Defragment and Optimize Drives tool (dfrgui.exe) on a solid state drive (SSD) does what?

A

The tool runs a trim process that identifies data that the OS has marked as deletable.
When the tool initiates a trim, data that is marked as deletable ultimately has its occupied blocks tagged as writable.

45
Q

A network engineer implements a proxy at a small company. The configuration does not require settings on every client machine. What type of proxy does the engineer deploy?

A

A transparent proxy does not require any client configuration as the server handles the appropriate settings.
An intercepting proxy does not require that each client is individually configured.

46
Q

What means that unless there is a rule specifying that access should be granted, any request for access is denied?

A

Implicit deny

47
Q

What means that a specific rule is created that denies any access to a system or service?

A

Explicit deny

48
Q

Which file does the technician inspect for problems related to a specific operating system boot problem?

A

BOOTMGFW

49
Q

Reset is usually effective in restoring unresponsive or frozen systems and is one of the first things to try when faced with a malfunctioning app or slow performance.

A

soft reset

50
Q

Reset that removes all user data, apps, and settings. The device will either have to be manually reconfigured or restored from a backup configuration. This would be a drastic measure.

A

factory reset

51
Q

Command that clears a system’s DNS cache.

A

ipconfig /flushdns

52
Q

A lunchtime attack is where a threat actor is able to access a computer that has been left unlocked. What might a security engineer suggest as a solution to deter lunchtime attacks?

A

Policies – can configure screensavers that lock the desktop after a period of inactivity.

53
Q

A method where a fraudulent DNS address may be used to direct users to fraudulent websites.

A

DNS spoofing