Practice some more Flashcards

1
Q

Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?

A

Asset ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your company recently downloaded and installed the latest audio card driver for all of its workstations. Now, several users have had their usernames and passwords for several websites compromised. You believe the two issues are related. If they are, which of the following was MOST likely contained in the audio card driver file that was installed?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A macOS user is browsing the internet in Google Chrome when they see a notification that says, “Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!” What type of threat is this user experiencing?

A

Rogue Anti-Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following tools in Windows 10 allows a technician to add different utilities, such as disk management, computer management, performance monitor, print management, and others to create a modular and customized tool kit for the technician to utilize?

A

MMC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are troubleshooting a user’s workstation that is operating extremely slowly. You open the Task Manager and see that only Microsoft Word is currently running, but the CPU and network utilization is consistently running between 95-100%. Which of the following is MOST likely causing this issue?

A

The computer has become a zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which backup rotation schemes requires at least one monthly full backup to be stored safely off-site?

A

3-2-1 Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Elizabeth was replacing a client’s security device that protects their screened subnet. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. Which of the following devices was MOST likely misconfigured and is now causing a problem?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are a member of a project team contracted to install twenty new wireless access points (WAPs) for a college campus. Your team has already determined the locations for the new WAPs and notated them in the physical and logical network diagrams. Your team is still finalizing the change request documents for the installation. The project cannot move forward with the installation until the change request is finalized and approved. Which of the following is the MOST important thing to add to the scope of work and change request before its approval?

A

Rollback Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Windows file servers commonly hold sensitive files, databases, passwords, and more. What common vulnerability is usually used against a Windows file server to expose sensitive files, databases, and passwords?

A

MIssing Patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company has had several virus infections over the past few months. The root cause was determined to be known vulnerabilities in the software applications in use by the company. What should an administrator implement to prevent future outbreaks?

A

Patch Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following types of wireless encryption uses a 40-bit encryption key with an RC4 encryption cipher?

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

-
Susan is installing several updates on a Windows computer. Nine of the updates were installed without any issues, but one update produced an error and failed to install. Susan restarts the computer as part of the troubleshooting process, and the computer automatically attempts to install the failed update again. Again, the update fails to install. What should Susan do NEXT?

A

Research the error number for the failed update and determine if there is a known issue with this update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as?

A

Power Surge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following would a technician use when trying to find the exact steps required to install a custom software package within their organization?

A

SOP (Standard Operating Procedure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which mitigation provides the best return on investment by mitigating the most vulnerable attack vector in an enterprise network?

A

Provide end-user awareness training for office staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A corporate workstation was recently infected with malware. The malware was able to access the workstation’s credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. What should be done to prevent this from happening?

A

Install an anti-virus or anti-malware solution that uses heuristic analysis

17
Q

Which tool should you utilize to ensure you don’t damage a laptop’s SSD while replacing it?

A

ESD strap

18
Q

A password-based authentication and password-authenticated key agreement method used in WPA3 that replaced the 4-way handshake used un WPA-based wireless networks

A

Simultaneous Authentication of Equals (SAE)

19
Q

-
Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues began to occur and remember that each time it happened the lights also dimmed momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router’s power cycling. What should you (a network technician) do to solve this problem?

A

Install a UPS

20
Q

A coworker is creating a file containing a script. You look over their shoulder and see “net use s:\fileserver\videos” in the file. Based on this, what type of file extension should this script use?

A

.bat

21
Q

Your companies share drive has several folders that have become encrypted by a piece of ransomware. During your investigation, you found that only the Sales department folders were encrypted. You continue your investigation and find that a salesperson’s workstation was also encrypted. You suspect that this workstation was the original source of the infection. Since it was connected to the Sales department share drive as a mapped S:\ drive, it was also encrypted. You have unplugged the network cable from this workstation. What action should you perform NEXT to restore the company’s network to normal operation?

A

Restore the Sales department folders from backups

22
Q

You are trying to open your company’s internal shared drive from your Windows 10 laptop but cannot reach it. You open your web browser and can connect to DionTraining.com without any issues. Which of the following commands should you use to determine if the internal shared drive is mapped to your computer properly?

A

Net Use

23
Q

-
Dion Training’s offices are frequently experiencing brownouts and sags. Which of the following solutions would protect all of their workstations and servers from these under-voltage events?

A

Line Conditioner