Practice Test #1 Questions Flashcards
Jason’s company issued him an old 2018 laptop with an internal hardware security key that he uses to connect to his office network over a VPN while traveling. Without this laptop, Jason cannot access his company’s internal servers, email, or share drive files. The Windows 10 laptop is extremely slow, and the screen recently cracked and needs to be replaced. When Jason returns to the company’s headquarters, the company will provide him with a new laptop due to the broken screen. Until then, he is working out of his hotel room during a 45-day business trip and needs to continue using this laptop. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?
a) Replace the display and charge him for the parts/installation
b) Sell him an external 15” tablet/monitor to connect to the laptop as a workaround
c) Replace the display and contact the manufacturer for reimbursement
d) Purchase a new laptop as the cost to repair might be more than a new laptop
b) Sell him an external 15” tablet/monitor to connect to the laptop as a workaround
In this scenario, you should recommend that he purchase an external 15” tablet/monitor to connect to the laptop as a workaround until he can return to the company’s headquarters. Since the laptop has an internal hardware key, if he replaces it with a new laptop then it will not connect to the corporate network over the VPN. The laptop is outside of the warranty period, making the recommendation of replacing the display and being reimbursed by the manufacturer incorrect.
While you could replace the display and charge him for the parts/installation, this would likely be more expensive than simply buying an external tablet/monitor as a workaround. A laptop replacement display usually costs between $300-500, whereas an external tablet/monitor costs between $100-150. The cheapest and quickest option provided would be to purchase an external monitor to use in his hotel until he gets back to the office.
You are working on upgrading the memory of a laptop. After removing the old memory chips from the laptop, where should you safely store them until you are ready to reuse them in another laptop?
a) Ziplock bags
b) Antistatic bag
c) Cardboard box
d) Manila envelopes
b) Antistatic bag
To properly handle and store sensitive components, like a memory chip, you should use an ESD strap and place the components in an antistatic bag. An antistatic bag is a bag used for storing electronic components, which are prone to damage caused by electrostatic discharge (ESD) These bags are usually plastic polyethylene terephthalate (PET) and have a distinctive color (silvery for metalized film, pink or black for polyethylene).
You are working as a penetration tester and have discovered a new method of exploiting a vulnerability within the Windows 10 operating system. You conduct some research online and discover that a security patch against this particular vulnerability doesn’t exist yet. Which type of threat would this BEST be categorized as?
a) Spoofing
b) Brute force
c) Zero-day
d) DDOS
c) Zero-day
A zero-day attack happens once that flaw, or software/hardware vulnerability, is exploited, and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability, hence the term zero-day.
A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
A brute-force attack consists of an attacker systematically trying all possible password and passphrase combinations until the correct one is found.
Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source.
Dion Training is building a new computer for its video editor to use. The new computer will use an octa-core Intel processor, 3 TB of DDR4 memory, and a RAID 0 with two 4 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer’s memory properly?
a) Enterprise
b) Pro
c) Home
d) Educational
a) Enterprise
*Microsoft Windows 10 Enterprise supports up to 6TB of RAM while Windows 10 Pro supports up to 2TB of RAM. Microsoft Windows 10 Enterprise and Windows 10 Pro for Workstations are designed to run on devices with high-performance configurations.
Windows 10 Enterprise and Windows 10 Pro for Workstations both support up to four physical CPUs. Windows 10 Pro and Windows 10 Education both only support two physical CPUs and 2 TB of RAM. Windows 10 Home only supports one physical CPU and up to 128 GB of RAM.*
A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?
a) Clear the browser’s cookies and history, enable the pop-up blocker, and scan the system for malware
b) Quarantine the machine and report it as infected to your company’s cybersecurity department for investigation
c) Document the pop-ups displayed and take a screenshot
d) Reinstall or reimage the operating system
a) Clear the browser’s cookies and history, enable the pop-up blocker, and scan the system for malware
Malware often targets the web browser. Malware such as adware and spyware is designed with commercial or criminal intent rather than to vandalize the computer system. Common infection symptoms of spyware or adware are pop-ups or additional toolbars, the home page or search provider changing suddenly, searches returning results that are different to other computers, slow performance, and excessive crashing. Viruses and Trojans may spawn pop-ups without the user opening the browser. Since this is a home user’s laptop, you should remediate the issue and return the system to them. Since this is not a system owned by your company, there is no reason to report it to your company’s cybersecurity department.
You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)
a) Enable System Restore in Windows
b) Disconnect the laptop from the network
c) Educate the end user
d) Schedule scans and run system updates
e) Disable System Restore in Windows
f) Update the anti-malware software
b) Disconnect the laptop from the network
e) Disable System Restore in Windows
f) Update the anti-malware software
b) is Quarantine
A new corporate policy dictates that all access to network resources will be controlled based on the user’s job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy?
a) Blocklists
b) Directory permissions
c) Least privilege
d) Permission creep
c) Least privilege
Least privilege is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities. Privilege itself refers to the authorization to bypass certain security restraints.
Permissions Creep, also known as privilege creep, is what happens when an employee moves between roles in an organization and keeps the access or permissions of the previous role.
Directory permissions are used to determine which users can access, read, write, and delete files or directories within a given directory.
A blocklist is a list of IP addresses, ports, or applications that are not allowed to be run or used on a given system.
What is the minimum processor required to install Windows 10 (x86) on a device?
a) 2 GHz single-core processor
b) 1 GHz dual-core processor
c) 2 GHz dual-core processor
d) 1 GHz single-core processor
d) 1 GHz single-core processor
*For the Windows 10 (32-bit) operating system, the minimum requirements are a 1 GHz processor, 1 GB of RAM, and at least 32 GB of hard drive space.
For the Windows 10 (64-bit) operating system, the minimum requirements are a 1 GHz processor, 2 GB of RAM, and at least 32 GB of hard drive space.
For the Windows 11 (64-bit) operating system, the minimum requirements are a dual-core 1 GHz processor, 4 GB of RAM, and at least 64 GB of hard drive space.*
A network administrator has set up a firewall and set up only three allow rules so that traffic can be sent over ports 21, 110, and 25. Next, they added a final rule of “deny any any” to the end of the ACL to minimize the attack surface and better secure the network. Unfortunately, now the administrator is receiving complaints from users that they cannot access any web pages using their URLs, such as DionTraining.com. Which of the following should the administrator do to correct this issue?
a) Add a rule to the ACL to allow traffic on ports 110 and 389
b) Add a rule to the ACL to allow traffic on ports 143 and 22
c) Add a rule to the ACL to allow traffic on ports 139 and 445
d) Add a rule to the ACL to allow traffic on ports 80 and 53
d) Add a rule to the ACL to allow traffic on ports 80 and 53
Port 80 is used for HTTP traffic (web traffic)
Port 53 is used for DNS queries (to resolve domain names like DionTraining.com to IP addresses)
Why not the others?
The ports in options a), b), and c) are related to email (POP3, IMAP), remote administration (SSH), and file sharing (SMB, NetBIOS). They do not address web browsing or DNS issues.
Which of the following Control Panel sections would allow a technician to add or remove an external scanner from a Windows 10 computer?
a) Devices and Printers
b) System
c) Programs and Features
d) Device Manager
a) Devices and Printers
The Devices and Printers section of the Control Panel allows a technician to manage and add printers, scanners, and other external devices to connect to a Windows computer.
The Device Manager is used to view and control the hardware that is attached to the computer. The device manager will highlight a piece of hardware that is not working so that a technician can repair or replace it.
A cybersecurity analyst notices that an attacker is trying to crack the WPS pin associated with a wireless printer. The device logs show that the attacker tried 00000000, 00000001, 00000002 and continued to increment by 1 number each time until they found the correct PIN of 13252342. Which of the following type of password cracking was being performed by the attacker?
a) Brute-force
b) Rainbow table
c) Dictionary
d) Hybrid
a) Brute-force
A brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. In a traditional brute-force attack, the passcode or password is incrementally increased by one letter/number each time until the right passcode/password is found.
A dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.
A rainbow table is a precomputed list of possible hashes used when trying to speed up the process of password cracking.
A hybrid password cracking attack combines the use of a brute-force attack with a dictionary attack by using words from the dictionary’s list as the basis for the brute-force attack. For example, if the diction had the word Jason in it, the hybrid attack might try Jason123, Jason!@#, and J@$0n as possible combinations based on the word Jason.
What does the command “shutdown /h” do on a Windows workstation?
a) Log off the workstation
b) Enter hibernation mode
c) Shutdown the workstation
d) Reboot the workstation
b) Enter hibernation mode
The shutdown command allows a user or administrator to shut down or restart local or remote computers, one at a time.
Using the /r option will reboot the computer.
Using the /s option will shut down the computer.
Using the /l option will log off the current user.
Using the /h option will enter sleep or hibernation mode.
What umask should be set for a directory to have 700 as its octal permissions?
a) rwx——
b) rwxrwxrwx
c) r–r–r–
d) rwx—rwx
a) rwx——
RWX is 7 and — is 0.
In Linux, you can convert letter permissions to octal.
R = 4 | R is for read-only
W = 2 | W is for write
X = 1 | X is for execute
— = 0
The permissions strings are written to represent the owner’s permissions, the group’s permissions, and the other user’s permissions.
You have just installed a new photo-sharing social media app on your smartphone. When you try to take a photo with the app, you hear the picture-taking sound. Unfortunately, when you check the app and your photo album, you cannot find any new pictures. Which of the following actions should you take to fix this issue?
a) Perform a firmware update
b) Update all the smartphone’s apps
c) Verify the app has the correct permissions
d) Uninstall and reinstall the app
c) Verify the app has the correct permissions
Each app has to have the proper permissions to use the smartphone’s various components, such as the microphone, camera, and storage. If the app has the correct permissions for the camera but not the storage, it will not store the photos being taken. This issue can be quickly corrected by checking the permissions under the app’s settings and the smartphone’s settings.
Dion Training wants to implement a new wireless network in their offices. Which of the following types would support encryption for traffic being sent and received over the network while still allowing users to connect to the open network without a password, passphrase, or digital certificate?
a) WEP
b) WPA
c) WPA2
d) WPA3
d) WPA3
One of the features of WPA3 (WIFI6) is enhanced open. Enhanced Open enables encryption for traffic being sent and received over a wireless network when still using open authentication. WEP, WPA, WPA2 do not provide encryption of traffic sent over the network unless the network is protected by a password, passphrase, or digital certificate.
Your company wants to increase the security of its server room. Which TWO of the following should they install to protect the server room’s contents?
a) Privacy window shades
b) Biometric lock
c) Bollard
d) Strong passwords
e) Badge reader
b) Biometric lock & e) Badge reader
A badge reader and biometric lock can be used on a server room door to provide multifactor authentication. Biometrics are identifying features stored as digital data that can be used to authenticate a user.
A badge reader can be used to read a security badge using RFID, a smart card, or a barcode to authenticate a user.
Cable locks are used for laptops, not servers or server rooms.
A bollard is used in the parking lot or the front of a building.
Strong passwords are used for the servers, not the server room itself.
Privacy windows shades could be used, but they are not as strong of a defense as a badge reader and biometric keypad on the door to the server room.