Practice Test #4 Questions Flashcards

1
Q

A user attempted to go to their favorite social media website this morning from their laptop. When they typed in Facebook.com, their browser redirected them to MalwareInfect.com instead. You asked the user to clear their cache, history, and cookies, but the problem remains. What should you do NEXT to solve this problem?

a) Conduct an antivirus scan
b) Upgrade their web browser
c) Check the hosts file
d) Disable System Restore

A

c) Check the hosts file

The hosts file is a local plain text file that maps servers or hostnames to IP addresses. It was the original method to resolve hostnames to a specific IP address. The hosts file is usually the first process in the domain name resolution procedure. When a user requests a webpage, the hosts.ini file is first checked for the IP address. If the IP address isn’t found in the hosts.ini file, then the workstation requests the IP address from the DNS server. Attackers often modify host.ini files to redirect users to a malicious webpage instead of one they would commonly use like Google, Facebook, and others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are working on a Windows 10 workstation with a 1 TB HDD and 16 GB of memory that is operating slowly when reading large files from its storage device. Which of the following commands should you use to speed up this workstation?

a) diskpart
b) chkdsk
c) ipconfig
d) format

A

b) chkdsk

*When a Windows 10 system is experiencing slowness while reading large files from the storage device, it often indicates potential issues with the hard drive, such as file system errors, bad sectors, or other disk problems. The chkdsk command (Check Disk) is used to check the integrity of the file system on a disk and can automatically fix many common file system issues that might be causing the slowdown. It can also mark bad sectors so that the system avoids using them. chkdsk scans and repairs logical file system issues, such as file corruption or missing file entries. It checks for and can attempt to fix bad sectors on the disk, which might be slowing down file reads.

Why not the other options?
a) diskpart: The diskpart command is used for partitioning and managing disks, not for diagnosing or fixing performance issues related to disk reading. It can be used to format or partition a disk, but it’s not designed to address the issues you’re describing.

c) ipconfig: The ipconfig command is related to network configuration. It displays IP address information and can release or renew network interfaces, but it has nothing to do with improving disk performance.

d) format: The format command is used to erase and prepare a disk for use, which would delete all the data on the disk. This command is not appropriate for resolving performance issues when reading files, as it would cause data loss and doesn’t address potential disk integrity problems.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

John is setting up 100 Windows 10 computers for a new corporate office. He wants to ensure that no one can change the boot order and boot from an unauthorized operating system. What feature should he ensure is enabled?

a) Full disk encryption
b) Secure Boot
c) RAM integrity checking
d) BIOS password required

A

d) BIOS password required

*In a corporate environment where you are setting up multiple computers, enabling a BIOS password is an important step to restrict unauthorized users from accessing the BIOS or UEFI firmware settings. Here’s why this could be considered correct:

BIOS password protection ensures that only authorized personnel can access the BIOS settings, including the boot order.
Without a BIOS password, an attacker or unauthorized user could enter the BIOS/UEFI settings during startup and change the boot order to boot from an unauthorized device (e.g., a USB drive or an external hard drive with a different operating system).
Enabling a BIOS password prevents this type of physical tampering by requiring the password before any changes can be made to the system configuration, including boot sequence settings.
Why Secure Boot (b) is still a valid security measure:
Secure Boot is an additional layer of security that ensures the system only boots trusted operating systems that are signed by authorized authorities. It prevents the system from booting unauthorized operating systems, including potential malware. However, this is effective at the boot process level but does not prevent someone from entering the BIOS settings and disabling Secure Boot or changing the boot order.
So, the distinction:
BIOS password primarily prevents unauthorized access to BIOS settings, ensuring that only authorized users can change the boot order.
Secure Boot protects the integrity of the boot process by only allowing signed and trusted operating systems to boot.
In your case, the focus is on preventing unauthorized users from changing the boot order, which is why d) BIOS password required could be the correct choice if we consider the primary objective: ensuring that no one can change the boot sequence in the BIOS.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following types of encryption should be selected on a SOHO access point if you are running a coffee shop and want all of your customers to be able to join it by default?

a) WPA2
b) WEP
c) Open
d) WPA

A

c) Open

If you’re running a coffee shop and want all of your customers to be able to join the Wi-Fi network by default without requiring any passwords or authentication, the Open encryption option is the most suitable choice. An Open network means that there is no encryption or password protection, allowing anyone within range to easily connect without any hassle. This setup is commonly used in public spaces like coffee shops where convenience for the user is prioritized over strict security.

Why not the other options?
a) WPA2: WPA2 (Wi-Fi Protected Access 2) is a more secure form of encryption used to protect Wi-Fi networks by requiring users to input a password. While it’s great for securing private networks, it would not meet the need for easy, no-password access in a public space like a coffee shop.

b) WEP: WEP (Wired Equivalent Privacy) is an older and insecure encryption standard that is no longer recommended due to vulnerabilities that allow easy cracking of the password. It’s not a good choice, even if you were aiming for a secure option, as it doesn’t offer sufficient protection.

d) WPA: WPA (Wi-Fi Protected Access) is a more secure option than WEP but is also less secure than WPA2. Like WPA2, it requires a password and would prevent customers from joining the network easily without authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are configuring a SOHO network that will contain 7 devices, but you only have a single public IP address. Which of the following concepts should be configured to allow the 7 devices to share that single IP when connecting to the internet?

a) UPnP
b) NAT
c) Perimeter network
d) DHCP

A

b) NAT

*NAT (Network Address Translation) is the concept that should be configured to allow multiple devices on a local network (in this case, 7 devices) to share a single public IP address when connecting to the internet. NAT allows a router or gateway device to translate private, internal IP addresses (used within your SOHO network) to a single public IP address. When any of the 7 devices in your network attempt to access the internet, the router will translate the internal addresses to the public IP address, making it appear as though all devices are accessing the internet from the same IP.
When responses from the internet come back, NAT ensures that the data is routed correctly to the specific device in the internal network that made the request.
This is a standard practice in small office or home networks, where there is typically only one public IP address provided by an ISP, but multiple devices within the network need internet access.

Why not the other options?
a) UPnP (Universal Plug and Play): UPnP is a set of protocols that allows devices on the network to discover each other and establish network services automatically. While it can help with setting up services on the local network (like port forwarding), it is not used for sharing a public IP address among multiple devices.

c) Perimeter network: A perimeter network (also called a DMZ) is used to provide an isolated network for services that need to be accessible from the outside, such as web servers. It is not used for sharing a single public IP address for multiple internal devices to access the internet.

d) DHCP (Dynamic Host Configuration Protocol): DHCP assigns private IP addresses to devices on the local network. While it is used to manage IP addresses within your SOHO network, it does not help with sharing a single public IP address for internet access. NAT handles that task.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a connectionless protocol that utilizes on UDP?

a) TFTP
b) FTP
c) HTTPS
d) HTTP

A

a) TFTP

*TFTP is a connectionless protocol that uses UDP (User Datagram Protocol) for communication. Here’s why: TFTP is a simple file transfer protocol that operates over UDP, which is a connectionless protocol. UDP doesn’t establish a connection before sending data, and it doesn’t guarantee delivery, order, or error checking. This makes TFTP faster but less reliable compared to protocols that use TCP (like FTP). TFTP is typically used in situations where a lightweight, simple file transfer is needed, such as for transferring boot files to devices in network environments (e.g., network booting).

Why not FTP?
FTP (File Transfer Protocol), on the other hand, is a connection-oriented protocol that uses TCP (Transmission Control Protocol). TCP is a connection-based protocol that ensures reliable data transfer, error checking, and ordered delivery of packets. FTP requires a connection to be established between the client and server before transferring files, making it more reliable but slower compared to UDP-based protocols like TFTP.

Conclusion:
TFTP is the connectionless protocol that utilizes UDP, making a) TFTP the correct answer.
FTP is a connection-oriented protocol that uses TCP, so it does not fit the description of using UDP.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the minimum amount of memory required to install Windows 10 (x64) on a device?

a) 8 GB
b) 4 GB
c) 2 GB
d) 1 GB

A

c) 2 GB

For the Windows 10 (32-bit) operating system, the minimum requirements are a 1 GHz processor and 1 GB of RAM.
For the Windows 10 (64-bit) operating system, the minimum requirements are a 1 GHz processor and 2 GB of RAM.
For the Windows 11 (64-bit) operating system, the minimum requirements are a dual-core 1 GHz processor and 4 GB of RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A printing company uses an isolated Windows XP workstation to print out large format banners for its customers on a custom printer. Unfortunately, the printer does not support newer versions of Windows and would cost $50,000 to replace it. To mitigate this risk, the workstation is not connected to the internet or a local area network. When a customer needs a banner printer, the technician takes a copy of their PDF file and moves it to the Windows XP workstation using a USB thumb drive. The workstation recently became infected with malware when printing a customer’s file. The technician remediated the issue, but the workstation became infected again three weeks later. Which of the following actions did the technician forget to perform?

a) Disable System Restore and remove the previous restore points
b) Manually update the antivirus on the workstation and set it to perform on-access scans
c) Connect the workstation to the Internet to receive the latest Windows XP patches
d) Perform a data wipe operation on the USB thumb drive before its next use

A

b) Manually update the antivirus on the workstation and set it to perform on-access scans

This is a legacy workstation since it is running Windows XP. Since Windows XP is considered end-of-life, there are no security patches or updates available for it. To mitigate this risk, the workstation should be run only as an isolated workstation. Since the workstation is not connected to a network and receives files through the connection of a USB thumb drive, this would be the only way a piece of malware could enter the system.
The technician most likely neglected to update the antivirus/antimalware software on this workstation during the remediation. The technician should manually update the antivirus/antimalware definitions weekly. The workstation should also be configured to conduct on-access/on-demand scanning, as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Christina is attempting to install Windows 10 (32-bit) on an older netbook-style laptop. The installation is continually failing and producing an error. The device has a 1.1 GHz processor, 1 GB of memory, an 8 GB hard drive, and a 720p display. Which component would need to be fixed to allow Windows 10 (32-bit) to be installed on this device?

a) Number of CPU cores
b) Amount of memory
c) The screen resolution
d) Amount of hard drive space

A

d) Amount of hard drive space

The amount of hard drive space needs to be increased. For the Windows 10 (32-bit) operating system, the minimum requirements are a 1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space.
For the Windows 10 (64-bit) operating system, the minimum requirements are a 1 GHz processor, 2 GB of RAM, and at least 20 GB of hard drive space.
For the Windows 11 (64-bit) operating system, the minimum requirements are a dual-core 1 GHz processor, 4 GB of RAM, and at least 64 GB of hard drive space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the BIOS of the system. Which of the following commands should you use to repair the first 512-byte sector on the hard disk?

a) bootrec /rebuildbcd
b) bootrec /fixboot
c) diskpart list
d) bootrec /fixmbr

A

d) bootrec /fixmbr

*1) bootrec /fixmbr (for mbr/bios)
2) bootrec /fixboot (for uefi/gpt)
3) bootrec /rebuildbcd (for boot camp / multiple os environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user’s Android smartphone is sluggish in responding when the user tries to open any of its apps. The smartphone has 2 GB of memory and a 16 GB internal storage device. The technician saw that the smartphone currently has 1.7 GB of memory in use and 412 MB of free storage space on the internal storage device. Which of the following should the technician perform to improve the device’s performance?

a) Replace the device’s screen
b) Replace the device’s battery
c) Upgrade the internal storage device
d) Uninstall any unneeded apps

A

d) Uninstall any unneeded apps

The smartphone is likely running out of memory, attempting to move data from the memory to the swap file, and the swap file is running low on space due to the internal storage device being almost full. Most smartphones do not allow the internal storage to be upgraded by technicians or end users. Some Android devices will have an external memory card slow that can be used for additional storage, but that was not an option presented in this scenario. To increase the performance of the smartphone, the technician should find any unnecessary applications and uninstall them with the consent of the user to free up additional internal storage space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

a) Quarantine the machine and report it as infected to your company’s cybersecurity department for investigation
b) Reinstall or reimage the operating system
c) Document the pop-ups displayed and take a screenshot
d) Clear the browser’s cookies, history, and enable the pop-up blocker

A

a) Quarantine the machine and report it as infected to your company’s cybersecurity department for investigation

This is a tricky question because many technicians might try to fix the issue by clearing the browser or reinstalling/reimaging the machine. If this were a home user’s machine, this would be an appropriate response, but you should follow the company’s procedures since this is a corporate workstation. Most companies require any machines suspected of malware infection to be scanned/analyzed by the cybersecurity department before remediating or reimaging them. Therefore, the best thing to do is to remediate the system. This also follows the malware removal process since the technician just investigated and verified the malware symptoms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as?

a) Under-voltage event
b) Power failure
c) Power spikes
d) Power surge

A

a) Under-voltage event

  • An under-voltage event is a reduction in or restriction on the availability of electrical power in a particular area. The irregular power supply during an under-voltage event can ruin your computer and other electronic devices. Electronics are created to operate at specific voltages, so any fluctuations in power (both up and down) can damage them. To protect against an under-voltage event, you can use either a battery backup or a line conditioner. If the reduction lasts for minutes or hours, as opposed to short-term voltage sag (or dip). A significant over-voltage event that occurs for a very short period of time is known as a power spike.
    A power spike is a very short pulse of energy on a power line. Power spikes can contain very high voltages up to and beyond 6000 volts but usually last only a few milliseconds instead of longer but lower voltage power surges. An extended over-voltage event is known as a power surge.
    A power surge is basically an increase in your electrical current. A power surge often has levels of 10-30% above the normal line voltage and lasts from 15 milliseconds up to several minutes.*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your company is expanding its operations in the European Union and is concerned about additional governmental regulations that may apply. Which of the following regulations applies when processing personal data within the European Union?

a) GDPR
b) PCI
c) PHI
d) PII

A

a) GDPR

The General Data Protection Regulation (GDPR) is a regulation created in the European Union that creates provisions and requirements to protect the personal data of European Union (EU) citizens. Transfers of personal data outside the EU Single Market are restricted unless protected by like-for-like regulations, such as the US’s Privacy Shield requirements.
Personally identifiable information (PII) is data used to identify, contact, or locate an individual. Information such as social security number (SSN), name, date of birth, email address, telephone number, street address, and biometric data is considered PII.
Protected health information (PHI) refers to medical and insurance records, plus associated hospital and laboratory test results.
The peripheral component interconnect (PCI) bus is used to provide low-speed connectivity to expansion cards but has been mostly replaced by the faster PCIe bus. The Payment Card Industry Data Security Standard (PCI-DSS) applies to companies of any size that accept credit card payments. If your company intends to accept card payment and store, process, and transmit cardholder data, you need to securely host your data and follow PCI compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following components presents the largest risk of electrical shock to a technician?

a) Laptop battery
b) CRT monitor
c) LCD monitor
d) Hard drive

A

b) CRT monitor

A CRT monitor is an older-style computer monitor that contains large capacitors which retain high levels of electricity even after being disconnected. A CRT should be disposed of carefully. A technician should never open a CRT monitor or stick anything into its interior for fear of electrocution.
Hard drives, LCD monitors, and laptop batteries do not contain high voltage levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your company recently suffered a small data breach caused by an employee emailing themselves a copy of the current customer’s names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which of the following logical security concepts should you implement to prevent a trusted insider from stealing your corporate data?

a) Strong passwords
b) DLP (Data Loss Prevention)
c) Firewall
d) MDM

A

b) DLP (Data Loss Prevention)

Data loss prevention software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in use (endpoint actions), in-motion (network traffic), and at rest (data storage).
Since the user was an authorized user (employee), changing your password policy, reconfiguring the firewall, or setting up an MDM solution would not solve this problem. Instead, a DLP solution must be implemented.

17
Q

What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card’s hardware address?

a) Disable SSID broadcast
b) WEP
c) WPS
d) Mac filtering

A

d) Mac filtering

*MAC filtering is a wireless security measure that restricts network access to only devices with specific MAC (Media Access Control) addresses. Each network interface card (NIC) has a unique MAC address, and network administrators can configure the access point to only allow devices with a predefined list of MAC addresses to connect.

However, MAC filtering can easily be defeated by a hacker because the MAC address is transmitted in the clear during the wireless connection process and can be easily spoofed. A hacker can intercept the MAC address of an authorized device (using tools like packet sniffers) and then change their own device’s MAC address to match the legitimate one, effectively bypassing the MAC filtering restrictions.

Why not the other options?
a) Disable SSID broadcast: Disabling SSID broadcast hides the network name from being publicly advertised, making the network less visible. While this can add some security by obscurity, it can easily be bypassed by a determined attacker who knows how to scan for hidden networks. Disabling SSID broadcast does not involve any authentication or encryption and is not easily defeated by spoofing.

b) WEP (Wired Equivalent Privacy): WEP is an outdated and insecure encryption standard that can be easily cracked by attackers. While it’s a security measure, it is far more vulnerable to attacks (such as key cracking) than MAC filtering. WEP does not rely on MAC addresses for security and is generally considered insecure.

c) WPS (Wi-Fi Protected Setup): WPS is a protocol designed to make it easier to connect devices to a wireless network by pressing a button or entering a PIN. However, WPS has vulnerabilities (particularly the 8-digit PIN method), but it is not directly related to spoofing MAC addresses. It is a separate method for connecting devices to the network and has its own weaknesses.*

18
Q

Which of the following remote access tools is a command-line terminal emulation program operating on port 23?

a) SSH
b) VNC
c) Telnet
d) RDP

A

c) Telnet

Secure Shell (SSH) uses port 22
Telnet runs over TCP port 23
(RDP) uses port 3389
VNC uses port Port 5900

19
Q

A user is complaining that when they attempt to access Google’s homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT?

a) Remove any proxy servers configured in their web browser
b) Disable the Windows Firewall
c) Download the latest security updates for Windows
d) Verify the user’s date and time zone are correctly listed in Windows

A

a) Remove any proxy servers configured in their web browser

*If a user is accessing a website, such as Google’s homepage, and it appears in a foreign language, this could indicate that the user is being routed through a proxy server located in a different country. Websites like Google often detect the user’s IP address and automatically adjust the language based on their geographic location. If a proxy server is being used, even if the user is physically located in the United States, their IP address might appear to come from a different country, causing the website to display in an unfamiliar language. To resolve this issue, you should: Check and remove any proxy settings in the user’s web browser or network settings that may be routing their traffic through an international server.

Why not the other options?
b) Disable the Windows Firewall: Disabling the Windows Firewall would not address the issue of language being displayed incorrectly on the website. In fact, disabling the firewall could create security risks. The problem seems to be related to the network settings, not the firewall configuration.

c) Download the latest security updates for Windows: While keeping the system up to date is always important for security, this action will not directly resolve the issue of a foreign language being displayed on a website. The problem appears to be related to network configuration, not a security vulnerability.

d) Verify the user’s date and time zone are correctly listed in Windows: While incorrect date and time settings can sometimes affect services or apps, they wouldn’t typically cause a web page to be displayed in a different language. The issue is more likely related to the network or browser settings.*

20
Q

Scheherazade, an IT technician, has been tasked with investigating a recent Windows upgrade and make a recommendation as to whether the company should upgrade its workstations. As she is thinking about the upgrade she checks the printer brands that her company uses and goes to the company’s website. Which upgrade consideration is she examining?

a) Third-party drivers
b) User preferences
c) Hardware compatibility
d) Application support

A

a) Third-party drivers

She is considering whether third party drivers are available for the new operating system. If third-party drivers aren’t available, the company may want to consider not upgrading Windows at this time. While third-party drivers are small pieces of software, they aren’t considered separate applications, so application support isn’t the right answer.
Hardware compatibility considerations isn’t correct because she isn’t looking at whether the printers are compatible, but whether drivers can be downloaded.
The scenario doesn’t indicate that she has asked users about their preferences.

21
Q

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as challenge/response and password encryption?

a) Multi-authentication
b) TACACS+
c) Network access control
d) ISAKMP

A

b) TACACS+

*TACACS+ is a AAA (accounting, authorization, and authentication) protocol to provide AAA services for access to routers, network access points, and other networking devices. TACACS+ is a remote authentication protocol, which allows a remote access server to communicate with an authentication server to validate user access onto the network. TACACS+ allows a client to accept a username and password, and pass a query to a TACACS+ authentication server.
Multifactor authentication is an authentication scheme that works based on something you know, something you have, something you are, something you do, or somewhere you are. These schemes can be made stronger by combining them (for example, protecting the use of a smart card certification [something you have] with a PIN [something you know]).
Network Access Control (NAC) is a means of ensuring endpoint security by ensuring that all devices connecting to the network conform to a health policy such as its patch level, antivirus/firewall configuration, and other factors.
Internet Security Association and Key Management Protocol (ISAKMP) is used for negotiating, establishing, modification, and deletion of SAs and related parameters in the IPSec protocol.

22
Q

You have connected your laptop to the network using a CAT 5e cable but received an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is most likely the cause of this issue?

a) DHCP failure
b) Duplicate IP address
c) Poisoned ARP cache
d) Failed DNS resolution

A

a) DHCP failure

Since you have received an APIPA address (169.254.13.52), this signifies a DHCP failure.
If a user is unable to access a website by using its domain name but can by its IP address, then this indicates a DNS resolution issue instead.
ARP caches rely on layer 2 addresses known as MAC addresses, not IP addresses.
Duplicate IP addresses will create an error on the screen instead of issuing an APIPA address as shown in this example.

23
Q

Fail to Pass Solutions has requested that its employees have a mobile device so that they can respond to questions when they are out of the office. Each employee is responsible for buying their Android smartphone and cellular plan service. To access the corporate network and its data, the employees need to install a company-provided APK on their device. This app contains access to their company-provided email, cloud storage, and customer relationship management (CRM) database. Which of the following policies BEST describes Fail to Pass’s mobile device deployment model?

a) CYOD
b) COBO
c) COPE
d) BYOD

A

d) BYOD

24
Q

When Jason needs to log in to his bank, he must use a hardware token to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to log in?

a) Key fob
b) Biometric lock
c) Smart card
d) PIV (Personal Identity Verification) card

A

a) Key fob

A key fob is a hardware token that generates a random number code synchronized to a code on the server. The code changes every 60 seconds or so. This is an example of a one-time password. A SecureID token is an example of a key fob that is produced by RSA.
A smart card, chip card, PIV card, or integrated circuit card is a physical, electronic authorization device used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit chip. In high-security environments, employee badges may contain a smart card embedded chip that must be inserted into a smart card reader to log in or access information on the system.
A biometric lock is any lock that can be activated by biometric features, such as a fingerprint, voiceprint, or retina scan. Biometric locks make it more difficult for someone to counterfeit the key used to open the lock or a user’s account. A smart card is a form of hardware token.

25
Q

A user receives the following error message: “Windows Update cannot currently check for updates because the service is not running.” The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT?

a) Register the Windows Update service’s DLL files
b) Reboot the computer
c) Restart the network services
d) Rollback the device drivers

A

b) Reboot the computer

If any of the .DLL files involved with Windows Update are not correctly registered, you may also encounter this problem. To solve it, open services.msc and stop the Windows Update service. Then, open a Command Prompt as the administrator and use regsvr32 for each of the 6 Windows Update DLL files (wuapi.dll, wuaueng.dll, wups.dll, wups2.dll, wuwebv.dll, and wucltux.dll). Then, open services.msc and restart the Windows Update service. Finally, restart your computer for these changes to take effect.

26
Q

Which file system type should you format a 4 TB USB flash drive to use with both Windows and macOS laptops?

a) APFS
b) FAT32
c) exFAT
d) NTFS

A

c) exFAT

The extensible file allocation table (exFAT) is a file system optimized for external flash memory storage devices such as USB flash drives and SD cards. exFAT supports a maximum volume size of up to 128 PB with a recommended maximum volume size of 512 TB for the best reliability. exFAT is supported natively by both Windows and macOS.
The NT file system (NTFS) is a Windows file system that supports a 64-bit address space and can provide extra features such as file-by-file compression and RAID support as well as advanced file attribute management tools, encryption, and disk quotas. NTFS can support a maximum volume size of up to 8 PB. NTFS is not supported natively by macOS.
The Apple file system (APFS) is the default file system for Mac computers using macOS 10.13 or later and features strong encryption, space sharing, snapshots, fast directory sizing, and improved file system fundamentals. APFS is not supported natively by Windows.
The file allocation table 32-bit (FAT32) is the 32-bit file system supported by Windows, macOS, and Linux computers. FAT32 can support maximum volume sizes of up to 2 TB and maximum file sizes of up to 4 GB.

27
Q

Dion Training is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this small company to purchase?

a) Business
b) Open-source
c) Enterprise
d) Personal

A

a) Business

28
Q

The Chief Financial Officer has asked Maria for a recommendation on how the company could reduce its software licensing costs while still maintaining the ability to access its application server remotely. Which of the following should Maria recommend?

a) Install and deploy Windows 10 Home edition on each user’s thick client
b) Use a Remote Desktop Protocol (RDP) application on a Windows 10 desktop
c) Use a Virtual Network Client (VNC) on a Windows 2019 server
d) Install and deploy thin clients without an operating system for each user

A

d) Install and deploy thin clients without an operating system for each user

  • A thin client is a small device that can operate with or without an operating system installed on the client device. Instead, it can boot directly from a network-based operating system on a common server and access applications on the company’s application server. This type of architecture can drastically reduce the need for operating system licenses and reduce deployment costs. A thin client runs from resources stored on a central server instead of a localized hard drive. Thin clients work by connecting remotely to a server-based computing environment where most applications, sensitive data, and memory are stored.*