Practice Test #6 Questions Flashcards
Jason wants to configure his Windows 10 laptop to more quickly find files when he is searching its hard drive. Which of the following Control Panel sections should he use to configure his laptop for optimal searching performance?
a) Internet Options
b) Power Options
c) Indexing Options
d) File Explorer Options
c) Indexing Options
The Indexing Options is used to configure the method used by Windows when searching for content within the storage devices. When indexing is properly configured, the system will catalog the information on the computer using the words within the files and their metadata to more easily find the content when requested by a user.
The File Explorer Options section of the Control Panel allows technicians to customize the display of files and folders. For example, the File Explorer Options can enable or disable the ability to show hidden files, hide file extensions, and more.
The Internet Options section of the Control Panel allows a technician to manage the Internet settings for their computers, including the security settings, access settings, and add-on control settings.
The Power Options section of the Control Panel allows technicians to customize how a computer manages its power to either conserve energy at the expense of performance or to maximize performance at the expense of energy savings by creating a power plan.
Which of the following backup rotation schemes uses a complex mathematical puzzle to extend the number of unique days of backups stored with the least amount of tapes?
a) Grandfather-father-son
b) FIFO Backup
c) Tower of Hanoi
d) 3-2-1 backup
c) Tower of Hanoi
The Tower of Hanoi is a backup rotation scheme that rotates backup media sets throughout the backup process to minimize wear and failure of tape backup media. For example, when using this method with four backup tapes labeled A, B, C, and D, a total of 16 days of backups can be maintained with just 4 tapes. Tape A is used every odd-numbered day for 16 days. Tape B is used on days 2, 6, 10, and 14. Tape C is used on days 4 and 12. Tape D is used on days 8 and 16. This allows Tape A to be overwritten every other day, while Tapes B is overwritten every four days and Tapes C and D are overwritten every 8 days.
The grandfather-father-son (GFS) backup rotation scheme is widely used to combine full and incremental backups to reduce backup time and enhance storage security. The grandfather is a full backup that is stored off-site once per month. The father is a weekly full backup that is conducted. The son is an incremental or differential backup conducted each day. For example, each Monday a full backup can be conducted which becomes the father. Then, each day of the week a son is created by performing an incremental or differential backup. Once per month, a full backup is conducted to become the grandfather. The 3-2-1 backup rule states that an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site.
The First In First Out (FIFO) backup scheme uses a set number of tapes and overwrites the oldest tape with the newest information. For example, if there are 7 tapes in use, every evening a new backup is conducted over the previous week’s daily backup. To have a longer amount of days of backups, a technician simply needs to increase the number of tapes from 7 to 14 or 21.
Which of the following types of wireless connections requires a pin to be entered as part of the pairing process before it is utilized?
a) Infrared
b) Bluetooth
c) NFC
d) Radiofrequency
b) Bluetooth
You are working for a government contractor who requires all users to use a PIV device when sending digitally signed and encrypted emails. Which of the following physical security measures is being implemented?
a) Key fob
b) Cable lock
c) Biometric reader
d) Smart card
d) Smart card
- A smart card is used in applications that need to protect personal information and/or deliver fast, secure transactions, such as transit fare payment cards, government, and corporate identification cards, documents such as electronic passports and visas, and financial payment cards. Often, smart cards are used as part of a multifactor authentication system in which the smart card and a PIN need to be entered for system authentication to occur. Biometrics are identifying features stored as digital data that can be used to authenticate a user. Typical features used include facial pattern, iris, retina, or fingerprint pattern, and signature recognition. This requires a relevant scanning device, such as a fingerprint reader, and a database of biometric information for authentication to occur.
The Kensington lock is a small hole found on almost every portable computer or laptop made after 2000. It allows a cable lock to be attached to a portable computer or laptop to lock it to a desk and prevent theft. These locks often use a combination lock or padlock type of locking system. These locks do not affect the user’s ability to use the laptop or device. It only prevents them from moving the laptop from the area.
A key fob generates a random number code synchronized to a code on the server. The code changes every 60 seconds or so. This is an example of a one-time password. A SecureID token is an example of a key fob that is produced by RSA.*
You are troubleshooting a workstation and want to check if any S.M.A.R.T. errors are being reported. Which of the following tools should you use to troubleshoot this workstation?
a) Performance monitor
b) Task scheduler
c) DxDiag
d) DIsk managment
d) DIsk managment
The disk management tool is used to display the drive status, mount the drive, initialize the drive, and create/split/extend/shrink drive partitions. The utility displays a summary of any fixed and removable drives attached to the system. From the Disk Management console, you can see the S.M.A.R.T. status of each hard disk. The task scheduler is a tool included with Windows that allows predefined actions to be automatically executed whenever a certain set of conditions is met. For example, you can schedule a task to run a backup script every night or send you an email whenever a certain system event occurs. The DirectX diagnostic (dxdiag.exe) utility is used to collect info about devices to help troubleshoot problems with DirectX sound and video. It is a diagnostics tool used to test DirectX functionality and troubleshoot video-related or sound-related hardware problems. DirectX diagnostic can save text files with the scan results. Performance monitor (perfmon.msc) is a performance monitoring and system monitoring utility in Windows that is used to monitor the activities on CPU and memory activity on a computer. The performance monitor is used to view performance data either in real-time or from a log file. The performance monitor can only monitor the resource utilization, but it cannot manage or terminate those processes.
What anti-malware solution is installed as a dedicated on-premise appliance to scan all incoming traffic and prevent malware from being installed on any of your clients without requiring the installation of any software on your clients?
a) Signature-based anti-malware
b) Network-based anti-malware
c) Cloud-based anti-malware
d) Host-based anti-malware
b) Network-based anti-malware
The network-based anti-malware can help prevent malware attacks by scanning all incoming data to prevent malware from being installed and infecting a computer. Network-based anti-malware solutions can be installed as a rack-mounted, in-line network appliance in your company’s on-premise datacenter to protect every client and server on the network without having to install software on each of the clients. Network-based anti-malware solutions often come as part of a unified threat management (UTM) appliance.
Cloud antivirus is a programmatic solution that offloads antivirus workloads to a cloud-based server, rather than bogging down a user’s computer with a complete antivirus suite. Cloud-based solutions do not use on-premise appliances as part of their installation.
Host-based anti-malware relies upon the installation of an agent to detect threats such as viruses, spam, and rootkits to protect the client it is installed upon. Host-based malware often uses signatures to detect and remove malicious code. Signature-based anti-malware is a generic category of malware that may be implemented through host-based, network-based, or cloud-based anti-malware solutions. Anti-malware either operates using signature-based detection, behavioral-based detection, or heuristic-based detection.
An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives?
a) Home Folder
b) Security Groups
c) Credential Manager
d) Group Policy
b) Security Groups
A security group is a collection of user accounts that can be assigned permissions in the same way as a single user object. Security groups are used when assigning permissions and rights, as it is more efficient to assign permissions to a group than to assign them individually to each user. You can assign permissions to a user simply by adding the user to the appropriate group. In most corporate environments, security groups control access to share drives, mailing lists, and other network resources.
An offsite tape backup storage facility is involved with a forensic investigation. The facility has been told they cannot recycle their outdated tapes until the conclusion of the investigation. Which of the following is the MOST likely reason for this?
a) A notice of a legal hold
b) A data transport request
c) The process of discovery
d) A chain of custody breach
a) A notice of a legal hold
A legal hold is a process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated. If a legal hold notice has been given to the backup service, they will not destroy the old backup tapes until the hold is lifted. The process of discovery is the formal process of exchanging information between the parties about the witnesses and evidence they will present at trial.
The chain of custody is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence.
A data transport request is a formalized request to initiate a data transfer by establishing a circuit or connection between two networks.
Which of the following types of attacks involves changing the system’s MAC address before it connects to a wireless network?
a) Zombie
b) DDoS
c) Spoofing
d) Botnet
c) Spoofing
You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to add the Windows installation to the boot manager?
a) bootrec /rebuildbcd
b) bootrec /fixmbr
c) bootrec /fixboot
d) diskpart list
a) bootrec /rebuildbcd
he Boot Configuration Data (BCD) stores the list of known Windows installations that can be booted from a hard drive. If the Windows installation is not listed, the computer will be unable to boot into Windows. To add a missing Windows installation to the Boot Configuration Database (BCD), you should use the command “bootrec /rebuildbcd” and reboot the computer. If the disk cannot be detected, enter the system setup and try modifying settings (or even resetting the default settings). If the system firmware reports the disk’s presence, but Windows still will not boot, use a startup repair tool to open a recovery mode command prompt and use the bootrec tool to repair the drive’s boot information. The “bootrec /fixmbr” command is used to attempt a repair of the master boot record of a drive. The “bootrec /fixboot” command is used to attempt a repair of the boot sector of a drive. The diskpart command is a command-line disk-partitioning utility available for Windows that is used to view, create, delete, and modify a computer’s disk partitions.
Which version should you use when installing a Linux operating system and are concerned with end-of-life support?
a) Rolling release
b) Developer release
c) LTS (Long Term Support) release
d) Beta release
c) LTS (Long Term Support) release
The LTS (Long-Term Support) release is well-supported and will be regularly updated by the Linux distribution to support new hardware, performance, and security improvements. These LTS releases are supported for a long time (approximately 10 years), so they are great to use in production systems like servers.
A beta release is a pre-release of a software product that is given out to a large group of users to try under real conditions. Beta versions have gone through alpha testing in-house and are generally fairly close in look, feel and function to the final product.
A developer release is a pre-release of a software product that is given out to software developers to test and modify their existing products to the upcoming version of an operating system or application.
Rolling release is a concept in software development where an application is frequently updated through the release of new features over time.
You are troubleshooting an issue with a Windows desktop and need to display the machine’s active TCP connections. Which of the following commands should you use?
a) netstat
b) ping
c) net use
d) ipconfig
a) netstat
The netstat command is used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols) on a Windows machine. This is a useful command when determining if any malware has been installed on the system and maybe maintaining a remote connection with a command and control server.
The ipconfig tool displays all current TCP/IP network configuration values on a given system.
The ping command is used to test a host’s reachability on an Internet Protocol network.
The net use command is used to connect to, remove, and configure connections to shared resources such as mapped drives and network printers.
You have just finished installing a new workstation for a user in your office. They need to be able to see the other workstations on the company’s workgroup. Which of the following settings should you ensure is enabled?
a) Enable an RDP connection
b) Enable BitLocker
c) Enable network discovery
d) Enable file and folder sharing
c) Enable network discovery
- Network discovery allows Windows 10 to find other computers and devices on a network. This feature is automatically turned on when connected to private networks like the one in your home or workplace. Network discovery is turned off when you’re connected to public networks that shouldn’t be trusted, and you should not allow your PC to be discoverable on those networks. If your Windows 10 computer or device can’t view other computers on the network, two things are probably at fault: either the incorrect network profile is assigned (public instead or private), or network discovery is disabled.
Remote desktop protocol (RDP) is used to connect to a remote desktop session on a host computer or server. File and folder sharing is enabled to allow other users on a network to access files and folders on a computer or server.
Bitlocker is used on a Windows 10 Pro, Education, or Enterprise edition workstation to perform full disk encryption on the operating systems storage devices.*
Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system’s filesystem?
a) rm -rf .
b) rm .
c) rm /
d) rm -rf /
d) rm -rf /
The rm command is a command-line utility for removing files or directories. The “rm -rf /” is the most dangerous command to issue in Linux. The rm -rf command is one of the fastest ways to delete a folder and its contents. But a little typo or ignorance may result in unrecoverable system damage.
The -r option means that the command will recursively delete the folder and its subfolders.
The -f option means that even read-only files will be removed without asking the user. The use of / indicates that the remove command should begin at the root directory (/) and recursively force all files and folders to be deleted under the root. This would delete everything on the system.
The . would only begin deleting from the current working directory and then delete all files and folders further down the directory structure, not the entire file system.
Which of the following Control Panel sections contains various tools like computer management, disk cleanup, print management, and the registry editor?
a) Device Manager
b) Administrative Tools
c) System
d) Devices and Printers
b) Administrative Tools