Practice Test #3 Questions Flashcards

1
Q

You are helping to set up a backup plan for your organization. The current plan states that all of the organization’s Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?

a) Create an additional copy of the backups in an off-site datacenter
b) Attempt to restore to a test server from one of the backup files to verify them
c) Set up scripts to automatically reattempt any failed backup jobs
d) Frequently restore the server from backup files to test them

A

b) Attempt to restore to a test server from one of the backup files to verify them

The only way to fully ensure that a backup will work when needed is to restore the files from the backups. To do that, it is best to restore them to a test server since this will not affect your production environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Gina just installed a 4 TB HDD into her Windows 10 computer and wants to assign the drive letter “M” to store her media files. Which type of partition should Gina use if she wants to mount the drive as a single partition?

a) FAT32
b) ISO
c) MBR
d) GPT

A

d) GPT

GPT is a newer way to partition disks that allows partition sizes over the 2 TB limit imposed by MBR. The GUID partition table (GPT) is a modern disk partitioning system allowing large numbers of partitions and very large partition sizes. The GPT is used in modern computers that support the UEFI standard and can support a maximum capacity of up to 9.7 ZB and up to 128 partitions. The master boot record (MBR) is a sector on a hard disk storing information about partitions configured on the disk.
The MBR holds the information on how the logical partitions that contain the file systems are organized on the physical disk. Systems that rely on BIOS utilize the MBR to determine which partitions are on a given hard disk. MBR partition tables have a maximum capacity of 2 TB and only 4 separation partitions.
An optical disc image (ISO) file is a file that contains all of the contents from an optical disc in a single file which can be mounted to the file system as though it were a physical optical drive. An ISO is a disk image that contains everything that would be written to an optical disc, disk sector by disc sector, including the optical disc file system. The file allocation table 32-bit (FAT32) is the 32-bit file system supported by Windows, macOS, and Linux computers.
FAT32 can support maximum volume sizes of up to 2 TB and maximum file sizes of up to 4 GB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. Which of the following tools should be used to allow both operating systems to exist on their MacBook Pro?

a) Boot Camp
b) Mission Control
c) Device Manager
d) Terminal

A

a) Boot Camp

Boot Camp is used to allow dual booting on a Macintosh computer. It allows the user to boot into either macOS (OS X) or Windows as the computer is rebooted. Boot Camp is only supported on Intel-based macOS systems, though.
The terminal in macOS is the equivalent to the Windows Command Prompt window. The terminal is used to run network troubleshooting utilities such as the ping command and other advanced commands to modify the macOS environment.
Mission Control is an application for facilitating multiple desktops in the macOS environment.
The Device Manager is used to view and control the hardware attached to the computer. The device manager will highlight a piece of hardware that is not working so that a technician can repair or replace it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jason has built a custom Android application that he wants to install on an Android tablet without having to install it through the Play Store. Which of the following would be required to allow him to install the app’s APK on the device?

a) Jailbroken device
b) Sideloading
c) Developer mode
d) Rooted device

A

b) Sideloading

An android application package (APK) is a third-party or custom program that is installed directly on an Android device to give users and business the flexibility to install apps directly on Android devices. Android supports sideloading through the APK package format. An APK file contains all of that program’s code, including .dex files, resources, assets, certificates, and manifest files. Jailbreaking is conducted on an iOS device to remove manufacturer restrictions on the device and allow other software, operating systems, or networks to work with a device.
A rooted device is an Android device that has been hacked to provide the user with administrative rights to install unapproved apps, update OS, delete unwanted apps, underclock or overclock the processor, replace firmware and customize anything else. A rooted device is not required just to install an APK outside of the Play Store, though, on an Android device.
Devleoper mode is used on an Android device to show additional diagnostic information when using apps or making network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are working as a mobile device technician for a large corporation’s enterprise service desk. A user complains that every time they attempt to launch the company’s mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. Which of the following should you do FIRST to attempt to solve this problem?

a) Clear the app’s cache
b) Reinstall the email app
c) Update the smartphone’s OS
d) Rollback the app to an earlier version

A

c) Update the smartphone’s OS

  • Normally, your first step would be to uninstall and reinstall the application. But, since this issue is occurring on multiple devices with the same model, it would be a better first step to update the smartphone’s OS. Based on the scenario, you know that the app works on a different smartphone model. With Android devices, the OS is usually modified by the smartphone manufacturer, specifically for their devices. If the app doesn’t work on one model, but it does on another, it may be an operating system issue.*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jason wants to configure his Windows 10 workstation to automatically block pop-ups when searching for websites online. Which of the following Control Panel sections should he use to achieve this?

a) Power Options
b) Indexing Options
c) Internet Options
d) File Explorer Options

A

c) Internet Options

The Internet Options section of the Control Panel allows a technician to manage the Internet settings for their computers, including the security settings, access settings, and add-on control settings. Using Internet Options, a technician can set the homepage of the browser, set up the proxy server connection details, and change the trust and security settings used by the system.
The Indexing Options is used to configure the method used by Windows when searching for content within the storage devices. When indexing is properly configured, the system will catalog the information on the computer using the words within the files and their metadata to more easily find the content when requested by a user.
The Power Options section of the Control Panel allows technicians to customize how a computer manages its power to either conserve energy at the expense of performance or to maximize performance at the expense of energy savings by creating a power plan.
The File Explorer Options section of the Control Panel allows technicians to customize the display of files and folders. For example, the File Explorer Options can enable or disable the ability to show hidden files, hide file extensions, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the FIFTH step of the seven-step malware removal process?

a) Remediate the infected systems
b) Enable System Restore and create a restore point in Windows
c) Schedule scans and run updates
d) Investigate and verify malware symptoms

A

c) Schedule scans and run updates

The seven steps of the malware removal procedures are:
(1) Investigate and verify malware symptoms,
(2) Quarantine the infected systems,
(3) Disable System Restore in Windows,
(4) Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques (e.g., safe mode, pre-installation environment),
(5) Schedule scans and run updates,
(6) Enable System Restore and create a restore point in Windows, and
(7) Educate the end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the minimum processor required to install Windows 10 (x64) on a device?

a) 1 GHz single-core processor
b) 2 GHz dual-core processor
c) 2 GHz single-core processor
d) 1 GHz dual-core processor

A

a) 1 GHz single-core processor

For the Windows 10 (32-bit) operating system, the minimum requirements are a 1 GHz processor and 1 GB of RAM.
For the Windows 10 (64-bit) operating system, the minimum requirements are a 1 GHz processor and 2 GB of RAM.
For the Windows 11 (64-bit) operating system, the minimum requirements are a dual-core 1 GHz processor and 4 GB of RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 workstations. When connected to a private network, the firewall has been configured to only allow inbound connections that match an existing rule and to only allow outbound connections that do not match any existing rules. What type of security posture has Dion Training implemented?

a) Implicit allow for inbound, explicitly allow for outbound
b) Explicit allow for inbound, explicit allow for outbound
c) Explicit allow for inbound, implicit allow for outbound
d) Implicit allow for inbound, implicit allow for outbound

A

c) Explicit allow for inbound, implicit allow for outbound

  • Explicit allow refers to a security posture where the system will only allow an item to traverse the firewall if the traffic matches an existing rule.
    Implicit allow refers to a security posture where the system will allow all traffic to traverse the firewall unless there is a specific rule to prevent it.*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is considered a form of regulated data?

a) DMCA
b) PII
c) DRM
d) AUP

A

b) PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four forms of regulated data covered by the exam?

A

1) PII (Personally Identifiable Information)
2) PCI (Payment Card Industry)
3) GDPR (General Data Protection Regulation)
4) PHI (Protected Health Information).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A laptop is running Windows 10 with Windows Defender on it. A user believes their laptop may have become infected with malware, so they install a second antivirus program that supposedly includes real-time protection. Now, the laptop is sluggish and sometimes non-responsive. Which of the following should you do FIRST to resolve this problem?

a) Enable real-time protection in Windows Defender
b) Uninstall the real-time protection antivirus
c) Install and run Spybot Search & Destroy on the laptop
d) Run the Windows Update utility

A

b) Uninstall the real-time protection antivirus

*You should not have two antivirus or antimalware solutions running simultaneously on a single computer. Since the issues began for the user when they installed the real-time protection scanner, it should be uninstalled FIRST.
Then, you could enable real-time protection in Windows Defender to provide this functionality. While you can have two antivirus and antimalware solutions installed, you should only have one set up for real-time protection at a time. The other could be used to scan the computer during the bootup process if desired. Windows Defender, by default, already has real-time protection enabled. This is why the installation of the second real-time protection service was causing issues on this laptop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A recently hired security employee at a bank was asked to perform daily scans of the bank’s intranet to look for unauthorized devices. The new employee decides to create a script that scans the network for unauthorized devices every morning at 2:00 am. Which programming language would work best to create this script?

a) Python
b) ASP.NET
c) PHP
d) C#

A

a) Python

*Python is a commonly used scripting language used in cybersecurity. Python is a general-purpose programming language that can develop many different kinds of applications. It is designed to be easy to read, and the programs use fewer lines of code compared to other programming languages. The code runs in an interpreter. Python is preinstalled on many Linux distributions and can be installed on Windows. Python scripts are saved using the .py extension.
PHP is used as a scripting language for web applications.
C# and ASP.NET are both compiled languages, not scripting languages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following policies or plans would dictate the complexity requirements for a wireless network’s shared secret key?

a) Password policy
b) Data loss prevention policy
c) Remote access policy
d) Acceptable use policy

A

a) Password policy

A password policy is a set of rules created to improve computer security by motivating users to create dependable, secure passwords and then store and utilize them properly. This document promotes strong passwords by specifying a minimum password length, complexity requirements, requiring periodic password changes, and placing limits on the reuse of passwords.
An acceptable use policy (AUP) is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used.
A data loss prevention policy is a document that defines how organizations can share and protect data. It guides how data can be used in decision-making without it being exposed to anyone who should not have access to it. The goal of a data loss prevention policy is to minimize accidental or malicious data loss.
A remote access policy is a document that outlines and defines acceptable methods of remotely connecting to the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the command “shutdown /s” do on a Windows workstation?

a) Enter sleep mode
b) Log off the workstation
c) Reboot the workstation
d) Shutdown the workstation

A

d) Shutdown the workstation

Using the /r option will reboot the computer.
Using the /s option will shut down the computer.
Using the /l option will log off the current user.
Using the /h option will enter sleep or hibernation mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of “connected clients” and see that “Bob’s Laptop” is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the proper WPA2 password?

a) Disable WPS
b) Disable SSID broadcast
c) Disable WPA3
d) Enable WEP

A

a) Disable WPS

WPS was created to ease the setup and configuration of new wireless devices by allowing the router to automatically configure them after a short eight-digit PIN was entered. Unfortunately, WPS is vulnerable to a brute-force attack and is easily compromised. Therefore, WPS should be disabled on all wireless networks. If Bob could enter your apartment and press the WPS button, he could have configured his laptop to use your wireless network without your WPA2 password.
While disabling the SSID broadcast could help prevent someone from seeing your network, the issue was someone connecting to your network without having the password. Disabling the SSID broadcast would not solve this issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?

a) ext4
b) NFS
c) ext3
d) Swap partition

A

d) Swap partition

The swap partition on a Linux system is a portion of the hard disk formatted with a minimal kind of file system and used in situations when the operating system runs out of physical memory and needs more of it. It can only be used by the memory manager and not for the storage of ordinary data files.
The third extended filesystem (ext3) is a journaled file system commonly used by the Linux kernel. The ext3 file system can support a maximum volume size of up to 32 TB.
The fourth extended filesystem (ext4) is a journaled file system that is used natively by modern Linux operating systems such as Debian and Ubuntu. The ext4 file system can support a maximum volume size of up to 1 EB.
The network file system (NFS) is used to mount remote storage devices into the local file system on a Linux system. It allows you to mount your local file systems over a network and remote hosts to interact with them while mounted locally on the same system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?

a) WEP
b) WPS
c) WPA2
d) WPA

A

a) WEP

Wired equivalent privacy (WEP) is an older mechanism for encrypting data sent over a wireless connection. WEP is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key. Wi-Fi protected access (WPA) is an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP.
WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme. Wi-Fi protected access version 2 (WPA2) replaced the original version of WPA after the completion of the 802.11i security standard.
WPA2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.
The Wi-Fi Protected Setup (WPS) is a mechanism for auto-configuring a WLAN securely for home users. On compatible equipment, users push a button on the access point and connect adapters to associate them securely. WPS is subject to brute force attacks against the PIN used to secure them, making them vulnerable to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A workstation at Dion Training’s office is taking a long time to boot up. Once it finishes booting to the Windows 10 desktop, which of the following tools can a technician use to diagnose and fix the boot issues?

a) msinfo32.exe
b) msconfig.exe
c) resmon.exe
d) perfmon.msc

A

b) msconfig.exe

System configuration (msconfig.exe) is a system utility to troubleshoot the Microsoft Windows startup processes. MSConfig is used to disable or re-enable software, device drivers, and Windows services that run at startup, or to change boot parameters.
PerfMon is a performance monitoring and system monitoring utility in Windows that is used to monitor the activities on CPU and memory activity on a computer. Performance monitor is used for viewing performance data either in real-time or from a log file. The performance monitor can only monitor the resource utilization, but it cannot manage or terminate those processes. Resource monitor is a utility used to display information about the use of hardware (CPU, memory, disk, and network) and software (file handles and modules) resources in real-time.
The resource monitor helps check the performance counters of specific resources and decide a course of action to improve the performance.
System information (msinfo32.exe) is a utility that gathers information about your computer and displays a comprehensive list of hardware, system components, and the software environment that can be used to diagnose computer issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A user contacts the help desk and complains they are getting an error when they attempt to open a 4 GB .dmg file on their Windows 10 workstation. Which of the following should you tell them?

a) “You must be an administrator to open that file”
b) “Your workstation need to have 16 GB of RAM to open the file”
c) “You need to use macOS to open DMG files”
d) “Your hard drive must not have enough free space”

A

c) “You need to use macOS to open DMG files”

A .dmg file is a disk image file on a macOS computer. These file types normally are used to download and install applications for macOS. Essentially, a .dmg file on a macOS computer is like a .iso file on a Windows computer. Windows cannot open .dmg files without using special software tools.

21
Q

Which file system type is used to mount remote storage devices on a Linux system?

a) APFS
b) exFAT
c) NFS
d) NTFS

A

c) NFS

The Network File System (NFS) is used to mount remote storage devices into the local file system on a Linux system. It allows you to mount your local file systems over a network and remote hosts to interact with them while mounted locally on the same system.
The extensible file allocation table (exFAT) is a file system optimized for external flash memory storage devices such as USB flash drives and SD cards. exFAT supports a maximum volume size of up to 128 PB with a recommended maximum volume size of 512 TB for the best reliability.
The Apple file system (APFS) is the default file system for Mac computers using macOS 10.13 or later and features strong encryption, space sharing, snapshots, fast directory sizing, and improved file system fundamentals.
The NT file system (NTFS) is a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas. NTFS can support a maximum volume size of up to 8 PB.

22
Q

You are working as a defense contractor for the U.S. Army. The Army is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this sized organization to purchase?

a) Business
b) Personal
c) Enterprise
d) Open-source

A

c) Enterprise

An enterprise license is like a business license, but for an unlimited number of users and is designed for large corporate and government networks.
A business license is the standard licensing option for organizations and business entities. With Microsoft, a company can purchase anywhere from 1 to 300 user licenses under the business license program.
A Personal license is an option for private individuals who purchase a license with their own funds and solely for their own use. Personal licenses are not to be purchased, refunded, or in any way financed by companies. Open source is software that also makes the program code used to design it available. Generally, open-source software is free to use and distribute, but you may need to pay for ongoing support if you have technical issues. The idea is that other programmers can investigate the program and make it more stable and useful.
An open-source license does not forbid commercial use of applications derived from the original, but it is likely to impose the same conditions on further redistributions.

23
Q

What kind of attack is an example of IP spoofing?

a) On-path attack
b) ARP poisoning
c) Cross-site scripting
d) SQL injections

A

a) On-path attack

*An on-path attack (formerly known as a man-in-the-middle attack) intercepts communications between two systems. For example, in an HTTP transaction, the target is the TCP connection between client and server. Using different techniques, the attacker splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the server. This often uses IP spoofing to trick a victim into connecting to the attack.
SQL injection is a code injection technique used to attack data-driven applications. Malicious SQL statements are inserted into an entry field for execution, such as dumping the database contents to the attacker.
An on-path attack is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.
ARP Poisoning, also known as ARP Spoofing, is a type of cyber attack carried out over a Local Area Network (LAN) that involves sending malicious ARP packets to a default gateway on a LAN to change the pairings in its IP to MAC address table. Cross-Site Scripting (XSS) attacks are a type of injection in which malicious scripts are injected into otherwise benign and trusted websites.
XSS attacks occur when an attacker uses a web application to send malicious code, generally in a browser side script, to a different end-user.

24
Q

Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?

a) Regedit
b) Notepad
c) MMC
d) Services

A

ab) Notepad

*The HOSTS file is a simple text file located in the C:\Windows\System32\drivers\etc\ directory. To edit this file, you need a text editor with administrator privileges. Notepad is a suitable text editor that can open and modify the HOSTS file.

However, to ensure changes are saved, you need to run Notepad as an administrator:

Right-click on the Notepad icon and select “Run as administrator.”
Navigate to the C:\Windows\System32\drivers\etc\ folder and open the HOSTS file.
Make the necessary changes and save the file.
Why not the other options?
a) Regedit: This is the Registry Editor used for modifying the Windows registry, not the HOSTS file.
c) MMC (Microsoft Management Console): This is a framework for managing different system tools, but it’s not used for editing the HOSTS file.
d) Services: This is used for managing Windows services, not for editing system files like HOSTS.*

25
Q

Which of the following IP addresses is considered an APIPA address?

a) 172.16.13.12
b) 10.5.34.15
c) 192.168.2.14
d) 169.254.125.154

A

d) 169.254.125.154

The APIPA/link-local autoconfiguration range is from 169.254.0.0 to 169.254.255.255.
Private IP addresses are any addresses in a specified range that are not allowed to be routed over the Internet. This allows companies to use these private IP addresses in their local area networks without having to purchase them from an internet registry. The class A private IP address range contains the addresses from 10.0.0.0 to 10.255.255.255.255. The class B private IP address range contains the addresses from 172.16.0.0 to 172.31.255.255. The class C private IP address range contains the addresses from 192.168.0.0 to 192.168.255.255.

26
Q

You are working at the Dion Training headquarters in Puerto Rico. The island just suffered a power outage due to a hurricane. The server room in the headquarters has power, but the rest of the office does not. You verify that the diesel generator is running at full electrical load capacity. Which of the following solutions should you recommend to Dion Training to allow them to continue working during a long-term power outage?

a) Purchase a 1500VA battery backup for each workstation in the office
b) Increase the capacity of their backup generator to support a larger load
c) Migrate their servers to the cloud whenever a hurricane is approaching
d) Replace all the lightbulbs in the building with LEDs to reduce the electrical load

A

b) Increase the capacity of their backup generator to support a larger load

When a hurricane causes a power outage on an island, it can be hours, days, or even months before the power is fully restored. Since the Dion Training headquarters is located in Puerto Rico, they should have a large capacity diesel generator to power their entire office during a long-term power outage. After Hurricane Maria in 2017, some parts of Puerto Rico went without grid power for nine-month. We have multiple redundant and high-capacity power sources at the Dion Training offices to ensure we can remain online and work even without any grid power available

27
Q

Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company’s owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donating them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?

a) Wiping
b) Shredding
c) Degaussing
d) Purging

A

a) Wiping

Data wiping or clearing occurs by using a software tool to overwrite the data on a hard drive to destroy all electronic data on a hard disk or other media. Data wiping may be performed with a 1x, 7x, or 35x overwriting, with a higher number of times being more secure. This allows the hard drive to remain functional and allows for hardware reuse.
Degaussing a hard drive involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once it has been degaussed. Therefore, it is a bad solution for this scenario.
Purging involves removing sensitive data from a hard drive using the device’s internal electronics or an outside source such as a degausser, or by using a cryptographic erase function if the drive supports one.
Shredding involves the physical destruction of the hard drive. This is a secure method of destruction but doesn’t allow for device reuse.

28
Q

Your Android device’s battery is advertised to last 12 hours, but it drains almost completely within 90 minutes. What should you do FIRST to try and solve this problem?

a) Dim your phone’s display
b) Enable airplane mode to save battery
c) Check which apps are using the most battery life
d) Reboot your phone

A

c) Check which apps are using the most battery life

If your battery is dying faster than in the past, see whether apps are using too much battery. You can force stop or uninstall problem apps. If your device is infected with malware, this can also drastically reduce your battery life, and the malware should be removed.
The display on a smartphone is normally one of the largest users of battery life, but even a brightly lit display will not consume the entire battery in only 90 minutes.

29
Q

A network technician is tasked with designing a firewall to improve security for an existing FTP server on the company network. The FTP server must be accessible from the Internet. The security team is concerned that the FTP server could be compromised and used to attack the domain controller hosted within the company’s internal network. What is the BEST way to mitigate this risk?

a) Upgrade the FTP server to an SFTP server since it is more secure
b) Add a deny rule to the firewall’s ACL that blocks port 21 outbound
c) Migrate the FTP server from the internal network to a screened subnet
d) Configure the firewall to utilize an implicit deny statement

A

c) Migrate the FTP server from the internal network to a screened subnet\

A screened subnet (formerly called a demilitarized zone or DMZ) is a perimeter network that protects an organization’s internal local area network (LAN) from untrusted traffic. A screened subnet is placed between the public internet and private networks. Public servers, such as the FTP server, should be installed in a screened subnet so that additional security mitigations like a web application firewall or application-aware firewall can be used to protect them. SFTP (Secure File Transfer Protocol) is a file transfer protocol that leverages a set of utilities that provide secure access to a remote computer to deliver secure communications by leveraging a secure shell (SSH) connection to encrypt the communication between the client and the server. This will prevent an attacker from eavesdropping on the communications between the SFTP server and a client, but it will not prevent an attacker from exploiting the SFTP server itself. An implicit deny is when a user or group is not granted specific permission in the security settings of an object, but they are not explicitly denied either. This is a best practice to enable, but the FTP server would still have some open ports, such as ports 20 and 21, to operate. These ports could then be used by the attacker to connect to the FTP server and exploit it. Adding a deny rule to the firewall’s ACL that blocks port 21 outbound would simply prevent internal network users and servers from accessing external FTP servers. This would in no way prevent the exploitation of the company’s FTP server since it has port 21 open and listening for inbound connections.

30
Q

Which command is used to create a new disk partition on a Windows system?

a) chkdsk
b) diskpart
c) format
d) dd

A

b) diskpart

The diskpart command is a command-line disk-partitioning utility available for Windows that is used to view, create, delete, and modify a computer’s disk partitions.
The chkdsk command is used to check the file system and file system metadata of a volume for logical and physical errors. If used without parameters, chkdsk displays only the status of the volume and does not fix any errors. If used with the /f, /r, /x, or /b parameters, it fixes errors on the volume.
The format command creates a new root directory and file system for the disk. It can check for bad areas on the disk, and it can delete all data on the disk.
To use a new disk, you must first use the format command to format the disk. The dd command is a Linux utility that is used to copy and convert raw data from one source to another such as a hard disk to an image file.

31
Q

An employee’s inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses ending in spamyou.com. Which of the following actions should you take to help reduce the amount of spam this and other users in your organization are receiving?

a) Create a domain-based email filter
b) Establish an allow list of trusted senders
c) Mark each email as spam or junk
d) Click the unsubscribe button of each email

A

a) Create a domain-based email filter

Email filtering is any technique used to prevent a user from being overwhelmed with spam or junk email. By creating a domain-based email filter, all emails from the spamyou.com domain could be blocked and prevented from being delivered to the user. Spam can be blocked from reaching an organization using a mail gateway to filter messages.
At the user level, the software can redirect spam to a junk folder or similar. Anti-spam filtering needs to balance blocking illegitimate traffic with permitting legitimate messages. Anti-spam techniques can also use lists of known spam servers by establishing a blocklist. If an allow list is used, only a small number of senders could send emails to the user.

32
Q

Which of the following options in Windows 10 would create a small hibernation file saved on the storage device before shutting down the computer so that it reduces the time to boot up when powered on?

a) Fast startup
b) USB selective suspend
c) Lock mode
d) Sleep mode

A

a) Fast startup

Fast startup is a mode in between a full shutdown and a hibernation mode. With a fast startup, the computer will log out of the computer close all of its open files when being shut down. Before the system powers off, though, a small hibernation file is created to help speed up the bootup process when the computer is powered on again.
Sleep or standby mode is used to save the current session to memory and put the computer into a minimal power state to save battery life when the system is not being used. The computer takes less time to start up again from the sleep or standby mode than it does from the hibernate mode. A lock will secure the desktop with a password while leaving programs running.

33
Q

Which command-line tool is used on a Linux system to display a list of the files and directories within the current path?

a) chkdsk
b) sfc
c) ls
d) pwd

A

c) ls

**The ls command lists the files or directories in the current path on a Linux system. When invoked without any arguments, ls lists the files in the current working directory.
The pwd command displays the present working directory (current directory) path to the terminal or display. If you are working on a Linux system and are unsure of where you are in the directory structure, type “pwd” and hit enter to display the path to the screen.
The chkdsk command is used to check the file system and file system metadata of a volume for logical and physical errors.
The system file checker (SFC) command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line.*

34
Q

Tim has created a new iOS application that he wants to install on an iPad without having to install it through the official App Store. To save some money, he has not purchased a developer certificate from Apple since he isn’t planning to sell this app to others. Which of the following would allow Tim to install this unofficial app on his own iPad for testing?

a) Jailbroken device
b) Developer mode
c) Rooted device
d) APK installer

A

a) Jailbroken device

Jailbreaking allows users to bypass Apple’s restrictions, which can enable the installation of apps from outside the App Store. In this case, Tim could install his app without needing a developer certificate. Jailbreaking gives full control over the device, allowing Tim to install and run any software, including his unofficial app.
Developer Mode was introduced by Apple to offer a more secure, official, and Apple-approved way to install apps directly onto an iOS device for development and testing purposes. It’s a safer and more legitimate option than jailbreaking.

35
Q

Which of the following tools is used to duplicate all of the files in one directory to another in the Windows command line?

a) dir
b) format
c) netstat
d) xcopy

A

d) xcopy

  • The xcopy tool copies all of the files from one directory to another. The format command creates a new root directory and file system for the disk. It can check for bad areas on the disk, and it can delete all data on the disk. To use a new disk, you must first use the format command to format the disk. The dir command is used to list a directory’s files and subdirectories. If used without parameters, this command displays the disk’s volume label and serial number, followed by a list of directories and files on the disk (including their names and the date and time each was last modified). The netstat command is used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics, and IPv6 statistics on a Windows machine.*
36
Q

Which of the following file types are commonly used to create applications that can be run on Linux, macOS, and Windows?

a) .vbs
b) .ps1
c) .py
d) .sh

A

c) .py

Python is a general-purpose programming language that can develop many different kinds of applications. It is designed to be easy to read, and the programs use fewer lines of code compared to other programming languages.
Shell is Linux
PowerShell is Windows
Visual BS is Microsoft

37
Q

Karen, a salesperson in your company, is currently on travel this week. She calls your company’s help desk and is yelling because she cannot connect to her email using her hotel room’s WiFi. Her laptop shows that it is connected to the “HotelWiFi” network, but Windows states it has “Limited or no connectivity.” What action should Karen perform to fix this issue?

a) Disable and enable her wireless adapter
b) Reboot into Safe Mode and perform an antivirus scan
c) Purchase an ethernet cable and use her room’s wired connection
d) Open a web browser and agree to the hotel’s capture page AUP

A

d) Open a web browser and agree to the hotel’s capture page AUP

The “Limited or no connectivity” message appears when a computer detects that the wireless network is present and operating, but the system cannot connect to the Internet. This is a common occurrence when connecting to a hotel or other public wireless networks. Many of these networks have a capture page that requires the user to agree to the company’s privacy policy or acceptable use policy before connecting the device to the internet. If the capture page doesn’t appear automatically, the user should open their web browser and visit any website to force the page to load.

38
Q

Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall’s ACL to see if the server’s outgoing email is being blocked. Which of the following ports should you ensure is open and not blocked by the firewall?

a) 143
b) 22
c) 110
d) 25

A

d) 25

The Simple Mail Transfer Protocol (SMTP) uses port 25 and is an internet standard communication protocol for electronic mail transmission.
Internet Message Access Protocol (IMAP) uses port 143 and is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection.
Post Office Protocol version 3 (POP3) uses port 110 and is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server.
Secure Shell (SSH) uses port 22 to securely create communication sessions over the Internet for remote access to a server or system.

39
Q

Which of the following encryption types was used by WPA to better secure wireless networks than WEP?

a) IV
b) AES
c) CCMP
d) TKIP

A

d) TKIP

Wi-Fi protected access (WPA) is an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
Wired equivalent privacy (WEP) is an older mechanism for encrypting data sent over a wireless connection. WEP is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key.
Wi-Fi protected access version 2 (WPA2) replaced the original version of WPA after the completion of the 802.11i security standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.

40
Q

Which of the following file types are commonly used by scripts in a Linux command line environment?

a) .vbs
b) .sh
c) .ps1
d) .js

A

b) .sh

41
Q

You run the command ipconfig on your laptop and see that you have been assigned an IP address of 169.254.0.56. Which category of IPv4 address is this?

a) Public
b) Private
c) Static
d) APIPA

A

d) APIPA

APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client if the DHCP server is unavailable.

42
Q

Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?

a) ls
b) mv
c) dd
d) cd

A

c) dd

The dd command is used to convert and copy files. On Unix and Unix-like operating systems like Linux, almost everything is treated as a file, even block devices like a hard disk drive. This makes dd useful to clone disks or wipe data from a drive.
The mv command is a command-line utility that moves files or directories from one place to another. The mv command supports moving single files, multiple files, and directories. The mv command can prompt before overwriting files and will only move files that are newer than the destination. When the mv command is used, the file is copied to the new directory and removed from the old directory.
The ls command lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, ls lists the files in the current working directory.
The cd command is used to change the directory. If used with the “cd ..” option, it will move up one directory in the file system’s directory structure. If used with the “cd .”

43
Q

What is the minimum amount of memory required to install Windows 10 (x86) on a device?

a) 1 GB
b) 2 GB
c) 4 GB
d) 8 GB

A

a) 1 GB

For the Windows 10 (32-bit) operating system, the minimum requirements are a 1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space.
For the Windows 10 (64-bit) operating system, the minimum requirements are a 1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space.
For the Windows 11 (64-bit) operating system, the minimum requirements are a dual-core 1 GHz processor, 4 GB of RAM, and at least 64 GB of hard drive space.

44
Q

You are working as a military defense contractor and have been asked to dispose of 5 laptop hard drives used in systems that processed classified information. Which of the following physical data destruction and disposal methods is MOST appropriate to ensure the data cannot be recovered?

a) Standard formatting of the HHDs
b) Low-level formatting of the HHDs
c) Degaussing of the HHDs
d) Secure Erase

A

c) Degaussing of the HHDs

The best option is to use degaussing on the hard drives. Degaussing exposes the disk to a powerful electromagnet that disrupts the magnetic pattern that stores the data on the disk surface. This renders the data on the disk inaccessible, but the disk will become unusable for other purposes. If the drive needs to be reused, repurposed, or recycled, you should not use degaussing. If the drive contains sensitive or classified information, then it should be degaussed or shredded.
Standard formatting of the drives could allow the data to be restored and make the data vulnerable to exposure.
Low-level formatting is a hard disk operation that will make recovering data from your storage devices difficult once the operation is complete.
Secure Erase involves zero filling which will get rid of much of the data. However, data remnants may still exist if only Secure Erase is used

45
Q

Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won’t open. What should you do?

a) Open the email using your device’s web browser and your corporate webmail
b) Ask your boss to resend the email in an unencrypted format
c) Ask your boss to resend the email to your Gmail account instead
d) Verify the digital certificate is installed on the device

A

d) Verify the digital certificate is installed on the device

If an encrypted email does not open in your mail app, you most likely need to verify that your digital certificates are properly installed on the device as these are used to decrypt encrypted emails. If the email was sent to your Gmail account, it would be sent unencrypted. You should not ask for the email to be sent unencrypted since it removes the confidentiality and privacy of the email. Regardless of whether you are using the email client or the mobile web browser, if the digital certificate is not properly installed then the encrypted email will not be able to be read.

46
Q

Which of the following is used to communicate data and preferences to child processes within a script or batch file?

a) Comments
b) Constants
c) Environmental variables
d) Variable

A

c) Environmental variables

  • Shell scripts and batch files use environment variables to communicate data and preferences to child processes. They can also be used to store temporary values for reference later in a shell script.*
47
Q

A file currently has permissions of 755. Which of the following commands would change file permission to r-xr–r–?

a) chmod u-rx,go-r filename
b) chmod u+w,go+x filename
c) chmod r-wr–r– filename
d) chmod 544 filename

A

d) chmod 544 filename

The chmod command is used to change a file or directory’s permissions from the command line or terminal. A technician can either use u+ to add user permission and g+ to add group permissions, or they can use the octal value. In this case, the octal value of r-wr–r– is 544.

In Linux, you can convert letter permissions to octal by giving 4 for each R, 2 for each W, and 1 for each X. R is for read-only, W is for write, and X is for execute. The permissions strings are written to represent the owner’s permissions, the group’s permissions, and the other user’s permissions.

47
Q

Maria is trying to log in to her company’s webmail and is asked to enter her username and password. Which type of authentication method is Maria using?

a) Multifactor
b) Single-factor
c) RADIUS
d) TACACS+

A

b) Single-factor

Single-factor authentication (SFA) is a process for securing access to a given system, such as a network or website, that identifies the party requesting access through only one category of credentials (something you know, something you have, something you are, something you do, or somewhere you are). The most common example of single-factor authentication occurs when a user is prompted to enter their username and password to authenticate.
Multifactor authentication requires credentials that include at least 2 of the 5 authentication factors.
The Remote Authentication Dial-in User Service (RADIUS) is used to manage remote and wireless authentication infrastructure. Users supply authentication information to RADIUS client devices, such as wireless access points. The client device then passes the authentication data to an AAA (Authentication, Authorization, and Accounting) server that processes the request.
The Terminal Access Controller Access Control System (TACACS+) is a proprietary alternative to RADIUS developed by Cisco for handling authentication.

48
Q

Which of the following file types are commonly used by scripts in a web page?

a) .vbs
b) .js
c) .sh
d) .ps1

A

b) .js

*JavaScript is a scripting language that is designed to create interactive web-based content and web apps. The scripts are executed automatically by placing the script in the HTML code for a web page so that when the HTML code for the page loads, the script is run. JavaScript is stored in a .js file or as part of an HTML file. *