Practice Assessment Review Flashcards
What is measured in ohms?
Resistance
What is measured in amps?
Current
Alarm that is triggered manually and could be implemented as a wireless pendant, concealed sensor or trigger, or call contact.
Duress alarm
Alarm that sounds when the circuit is opened or closed, depending on the type of alarm. This could be caused by a door opening or by a fence being cut.
Circuit-based alarm
Alarm that is linked to a detector triggered by movement within a room or other area. The sensors in these detectors are either microwave radio reflection or passive infrared (PIR).
Motion-based alarm
Alarms that uses radio frequency ID (RFID) tags and readers that can be used to track the movement of tagged objects within an area.
Proximity alarms
Backup that selects new files and files modified since the original full job. Has moderate time and storage requirements and relatively faster during restore
Differential backup
Backup that is an option for creating full backups with lower data transfer requirements. Not generated directly from the original data but instead assembled from other backup jobs.
Synthetic backup
Backup job that produces a file that contains all the data from the source. This means that the backup file is nominally the same size.
Full backup
Backup that selects only new files and files modified since the previous job. Has the lowest time and storage requirement, but longer restore time.
Incremental backup
A group policy that configures computer settings and user profile settings for all computers and user accounts within a domain.
Domain group policy
A script that performs some type of configuration or process activity when the user signs in.
Login script
The action of installing applications that are obtained outside of the device’s official app store.
Sideloading
Will reset the device to its factory state.
Wiping
The default shell command interpreter uses what stream for the user’s keyboard input?
stdin
Any errors in a terminal stream are identified by which stream?
stderr
Which stream reads data from a shell from the tty device and displays it through the terminal.
stdout
A set of common interface standards designed to facilitate compatibility between different operating systems, including but not limited to Unix-like systems and Windows.
POSIX (Portable Operating System Interface)
Play or show some sort of content embedded in a web page, or other video/multimedia format.
Plugin
Add or change a browser feature via its application programming interface (API).
Extensions
Indicates the site used to perform web searches directly from the address bar.
A search provider
A method used by developers to integrate custom-developed software with other software applications.
API (Application Programming Interface)
When used with a particular command, what switch lists the syntax and switched used for the command?
/?
What wildcard character can be used to indicate a string of characters?
- (asterisk)
When used with the dir command, what switch(es) can be used to list files using a wide format with no details?
/w
Evidence that is not immediately visible or accessible, but can be uncovered through further investigation or forensic processes.
Latent evidence
Involves recovering and analyzing data to determine the nature and scope of a security incident.
Digital forensics
An option for creating full backups with lower data transfer requirements.
Synthetic backup
Backup job that selects only new files and files modified since the previous job. Has the lowest time and storage requirement.
Incremental
Backup job that selects new files and files modified since the original full job. Has moderate time and storage requirement
Differential
Remote Desktop Protocol on a Windows workstation or server runs on what TCP port?
port 3389
SSH uses what TCP port?
port 22
VNC (Virtual Network Connection) works over what TCP port?
port 5900
To delete a drive mapping, what is the correct syntax?
net use X: /delete
A tool used by the original equipment manufacturers (OEMs) to restore the OS environment to its ship state.
Recovery partition
A technician provides a passcode to the user and connects over port 443. What type of Windows help session does the user create when using CTRL+START+Q?
Microsoft Quick Assist
A user asks for help from a technician or co-worker via an invitation file protected by a passcode.
Microsoft Remote Assistance (MSRA)
How many bits long is an IPv6 address in total, and how many bits identify the host portion?
In IPv6, the address is 128 bits long and the interface address portion is always the last 64 bits.
Console that allows administrators to view, edit, and troubleshoot the properties of installed hardware, update drivers, and remove or disable devices
Device Manager (devmgmt.msc)
Console that displays a summary of any fixed and removable disks.
Disk Management (diskmgmt.msc)
Tool that runs various operations to speed up the performance of hard disk drives (HDDs) and solid-state drives (SSDs).
Defragment and Optimize Drives (dfrgui.exe)
Console that provides administrators with an advanced interface for creating, modifying, disabling, and deleting user accounts. This console is also useful for resetting the password for an account.
Local Users and Groups (lusrmgr.msc)
On a solid state drive (SSD), data is stored in units called what?
Blocks
Defragment and Optimize Drives tool (dfrgui.exe) on a solid state drive (SSD) does what?
The tool runs a trim process that identifies data that the OS has marked as deletable.
When the tool initiates a trim, data that is marked as deletable ultimately has its occupied blocks tagged as writable.
A network engineer implements a proxy at a small company. The configuration does not require settings on every client machine. What type of proxy does the engineer deploy?
A transparent proxy does not require any client configuration as the server handles the appropriate settings.
An intercepting proxy does not require that each client is individually configured.
What means that unless there is a rule specifying that access should be granted, any request for access is denied?
Implicit deny
What means that a specific rule is created that denies any access to a system or service?
Explicit deny
Which file does the technician inspect for problems related to a specific operating system boot problem?
BOOTMGFW
Reset is usually effective in restoring unresponsive or frozen systems and is one of the first things to try when faced with a malfunctioning app or slow performance.
soft reset
Reset that removes all user data, apps, and settings. The device will either have to be manually reconfigured or restored from a backup configuration. This would be a drastic measure.
factory reset
Command that clears a system’s DNS cache.
ipconfig /flushdns
A lunchtime attack is where a threat actor is able to access a computer that has been left unlocked. What might a security engineer suggest as a solution to deter lunchtime attacks?
Policies – can configure screensavers that lock the desktop after a period of inactivity.
A method where a fraudulent DNS address may be used to direct users to fraudulent websites.
DNS spoofing