Practice Test Qs #2 Flashcards

1
Q

A user calls the help desk complaining that Windows freezes to a blue screen every time it tries to boot. When the technician arrives, they boot the computer in Safe Mode. After evaluating this situation, what is the BEST reason the technician wants to enter Safe Mode to begin troubleshooting?

a) CHKDSK can be run in Safe Mode
b) Safe Mode is necessary for troubleshooting
c) Safe Mode loads only the minimum amount of drivers and services to start the system.
d) Antivirus scans can be run in Safe Mode.

A

c) Safe Mode loads only the minimum amount of drivers and services to start the system.

*By using only essential drivers and services to boot, Safe Mode can boot the computer when a normal boot fails, as in this scenario.

The blue screen of death (BSoD) is mostly due to faulty hardware, especially at startup. CHKDSK scans the hard drive to find and repair errors, and it can be run in Safe Mode and many other analysis and recovery tools.

Safe Mode allows antivirus scans to run in an environment that will not trigger viruses or malware.

While Safe Mode provides a favorable environment for troubleshooting, it is not required to use the many troubleshooting tools available in Windows, such as Task Manager, Resource Manager, and Device Manager.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?

a) MSRA
b) RDP
c) RMM
d) VPN

A

a) MSRA

*Microsoft Remote Assistance (MSRA) allows a user to ask for help from a technician or co-worker by an invitation file protected by a passcode. The helper opens the invitation file to connect to the remote system.

Remote Monitoring and Management (RMM) tools are principally designed for use by managed service providers (MSPs).

Remote Desktop Protocol (RDP) implements terminal server and client functionality. RDP authentication and session data are always encrypted.

A virtual private network (VPN) establishes a tunneled link that joins a local computer to a remote network. Establish a VPN link and then use a remote desktop to connect to a host on the private network.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A server administrator tests connectivity between two statically assigned servers in a forest with different domains. What should they check first in this case?

a) Gateway
b) Subnet mask
c) IP addressing scheme
d) DNS settings

A

d) DNS settings

*Because the servers are on different domains, DNS should be checked first. The administrator probably uses the hostname instead of the fully qualified domain name (FQDN). If not specified, the host will likely try to resolve to the same domain.

The IP addressing scheme would not be part of the troubleshooting process because the administrator relies on DNS resolution.

The subnet mask could be an issue, but the most likely issue is the different domains.

The gateway could also be configured improperly, although if that were the case, they would not be able to reach out at all, not just the one other server.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician detected and reported an incident, resulting in the appropriate unit being notified and tasked with acting as first responders, taking charge of the situation, and formulating the appropriate response. What is this unit called?

a) Open-Source
b) Chain of custody
c) CSIRT (The computer security incident response team)
d) IRP

A

c) CSIRT

*The computer security incident response team (CSIRT) is used in some larger organizations to provide a range of decision-making and technical skills required to deal with different types of incidents.

An open-source license makes it free to use, modify, and share and makes the program code used to design it available.

An incident response plan (IRP) sets the procedures and guidelines that an IT team must adopt to deal with security incidents.

A chain of custody form records who collected the evidence, who has handled it subsequently, where they stored it, and must show access to the evidence at every point.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A server administrator locks down security on their golden client image but is concerned about potentially breaking things in the environment. They decided to set up a test image for test users in various departments before full implementation. What should the administrator use to make individual configuration changes to the image?

a) services.msc
b) gpedit.msc
c) shell:startup
d) regedit.exe

A

d) regedit.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What uses domain names of components loading on the web page against a vast blacklist?

a) Private browsing mode
b) Ad blocker
c) Clearing browsing data
d) Browser sign-in

A

b) Ad blocker

*An ad blocker is designed to prevent advertisements from loading on a web page. It often works by using a blacklist of known domains that are associated with advertising networks and other tracking services. When a web page is loaded, the ad blocker checks the domain names of components (such as images, scripts, and iframes) against this blacklist and blocks any that are identified as serving ads or tracking users.

Why the other options are incorrect:
a) Private browsing mode: Private browsing (or incognito mode) helps to protect user privacy by not saving browsing history, cookies, or cache. It does not specifically block domains from loading or check against a blacklist.

c) Clearing browsing data: This action removes the user’s browsing history, cookies, cache, and other stored data but does not block or compare domains against any blacklist.

d) Browser sign-in: Signing into a browser (like Google Chrome) allows syncing of data (such as bookmarks and history) across devices. It does not involve checking domain names or blocking components on a webpage.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Management provides employees with written policies and procedures to help them fulfill their tasks. Which of the following procedures requires employees to enroll and identify themselves using secure credentials?

a) End-user termination checklist
b) Procedures for custom installation of software package
c) New-user setup checklist
d) Assigned users

A

c) New-user setup checklist

*A New-user setup checklist typically includes procedures for enrolling and identifying new employees in a secure system, which often involves setting up secure credentials (such as usernames, passwords, multi-factor authentication tokens, etc.) to authenticate and authorize their access to the organization’s resources.

Why the other options are incorrect:
a) End-user termination checklist: This checklist focuses on steps to take when an employee leaves the company, such as revoking access to systems, recovering company property, and ensuring data security. It does not involve enrolling new employees or setting up credentials.

b) Procedures for custom installation of software package: This involves instructions for installing software, which may require user authentication, but it doesn’t directly relate to enrolling or identifying employees using secure credentials for accessing systems.

d) Assigned users: This option is a bit vague, but it generally refers to users who have already been assigned roles or credentials. It does not specifically describe a process that requires the enrollment or identification of new users via secure credentials.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backup that selects new files and files modified since the original full job.

A

Full with differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Backup that select only new files and files modified since the previous job.

A

Full with incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The period between backup jobs.

A

Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The period that any given backup job is kept for.

A

Retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

While browsing the internet, a user receives a pop-up that states, “We have detected a Trojan virus. Click OK to begin the repair process.” Out of fright, the user clicks OK. Given the following choices, what is the most likely outcome of the user’s response?

a) User starts experiencing drive-by downloads.
b) Unwanted notifications start popping up in Windows.
c) Nothing happens because Windows BitLocker blocks the Trojan virus.
d) UAC will need to be enabled.

A

b) Unwanted notifications start popping up in Windows.

*Malware often targets the browser, so clicking on a website pop-up is likely to deliver some type of infection, such as adware, which will deliver unwanted notifications.

A drive-by download will infect a computer with malware because a user visited a malicious site. However, in this scenario, the user was not passive. They actively interacted with the pop-up to install the adware.

BitLocker is an encryption tool, not an antivirus tool.

User Account Controls (UACs) prevent the unauthorized use of administrative privileges. They are enabled by default but can be disabled.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company has hundreds of employees who use the same software on their computers, so they offer a company product key to access the software. What is this product?

a) Personal license
b) Data retention requirements
c) Corporate-use license
d) DRM (Digital Rights Management)

A

c) Corporate-use license

*A corporate-use license is for multiple users, which means the company can install the software on an agreed-upon number of computers for its employees to use simultaneously. The company will offer a valid license with the product key. These can be non-expired licenses as well.

A personal license allows the product to be used by a single person at a time, though it might permit installation on multiple personal devices.

Data retention requirements are regulations that set a maximum period for data retention. The regulation might also demand that information be retained for a minimum period.

Digital music and video are often subject to copy protection and digital rights management (DRM).*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is this called when antivirus software scans a file before allowing or preventing it from opening?

a) Smart scanning
b) Quick scanning
c) On-access scanning
d) Scheduled scanning

A

c) On-access scanning

*On-access scanning is when the antivirus software intercepts an operating system call to open a file and scans the file before allowing or preventing it from being opened. Most security software is now configured to scan on-access.

A scheduled scan is run at a determined time and frequency. All security software supports scheduled scans.

A smart scan scans a computer’s critical areas, like system memory, hidden services, boot sectors, auto-run entries, registry keys, and important operating system files and folders.

A quick scan looks at all the locations where there could be malware, such as registry keys and known Windows startup folders.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The IT Department has learned that a new employee starts on Monday and will need a computer just before the weekend. There is a used PC in the storeroom. A “ no operating system found “ message appears when the computer is rebooted after a technician installs Windows 10 on the computer with the hard drive partition style set to support Unified Extensible Firmware Interface (UEFI). Determine which of the following scenarios would generate that message.

a) Application crash
b) Damaged hard drive
c) Corrupted MBR
d) Faulty motherboard

A

b) Damaged hard drive

*The hard drive stores the files for the operating system, so a damaged hard drive will generate the “no operating system found” message.

Applications do not load until after login, and the operating system would have to be found to load and display a login screen.

It is unlikely that a faulty motherboard would lead to a “no operating system found” error. It is more likely to cause the system not to boot, not recognize peripherals, or suffer the blue screen of death (BSOD).

Unified Extensible Firmware Interface (UEFI) generally does not interact with the Master Boot Record (MBR). The MBR is part of the legacy BIOS boot process.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A video game development company is purchasing upgraded laptops to develop cutting-edge graphics for a new story they have been marketing. They want to be able to integrate persistent system RAM. What type of operating system should they use for support?

a) Pro
b) Pro for workstations
c) Home
d) Enterprise

A

b) Pro for workstations

*Windows Pro for Workstations has many of the same features as Pro but supports more maximum RAM and advanced hardware technologies, such as persistent system RAM (NVDIMM).

Windows Pro is designed for usage in small- and medium-sized businesses and can be obtained using original equipment manufacturer (OEM), retail, or volume licensing.

The Enterprise edition has several features not available in the Pro edition, such as support for Microsoft’s DirectAccess virtual private networking technology, AppLocker, and more.*

17
Q

A technician is tasked to figure out why a user’s Gmail app will not update on their mobile phone. The technician knows several reasons that would cause this to occur. Which of the following would be one of the reasons for this problem?

a) GPS
b) Bluetooth
c) Storage
d) Accelerometer

A

c) Storage

*If an app fails to update, there may be insufficient storage space (Gmail uses a lot of storage). It could also be that the update is incompatible with the existing operating system version, or there is no internet connection.

An accelerometer is a technology that detects when a device changes position and adjusts the screen orientation appropriately.

Bluetooth is used to connect peripheral devices to PCs and mobiles and to share data between two systems.

Global Positioning System (GPS) is a means of determining a receiver’s position based on information received from satellites.*

18
Q

A vulnerability manager is brainstorming different ways to enhance security for their cell phone devices. The company only uses Apple, and so one of the ideas the manager comes up with is to look for anomalistic files that do not belong with Apple for signs of possible malware which did not profile the device and instead just blasted malware out, hoping the operating system would be right. Which of the following would be anomalistic?

a) .dmg
b) .apk
c) .app
d) .pkg

A

b) .apk

*An .apk file is a format for Android. The vulnerability manager only has Apple in their environment. Unknown sources enable untrusted apps to be downloaded from a website and installed using the .APK file format.

DMG (disk image) format is used for simple installs where the package contents need to be copied to the Applications folder.

PKG format is used where app setup needs to perform additional actions, such as running a service or writing files to multiple folders.

The app is placed in a directory with a .APP extension in the Applications folder when it has been installed.*

19
Q

The electronic health records software application crashes during a busy day at a doctor’s office. The IT consultant for the practice knows that the application backs up data in real-time and has the latest update. Which of the following options is the only one that could potentially fix the crashing issue?

a) Uninstall and reinstall the application driver.
b) Uninstall and reinstall the application.
c) Try to recover data from temporary files.
d) Update the application driver.

A

b) Uninstall and reinstall the application.

*Since the most recent update to the application has been applied, uninstalling then reinstalling the software is the best option of the available choices.

Applications/software do not have drivers. Drivers are software that tells the operating system how to interact with their particular device/hardware. Drivers are updated to fix bugs and security holes or optimize the hardware. Uninstalling and reinstalling drivers is usually done when a device is malfunctioning.

20
Q

A security engineer runs a long tail analysis to determine the frequency of services and processes communicating to the internet. After baselining a large amount of normal traffic such as updates, they encounter a suspicious communication frequency every five minutes from a particular box. They have done a thorough job investigating running processes, memory analysis, and file integrity checks but find nothing. What else could the engineer check for persistence mechanisms that could send the communications?

a) msconfig.exe
b) Privileged time
c) lusrmgr.msc
d) taskschd.msc

A

d) taskschd.msc

*
The correct answer is:

d) taskschd.msc

Explanation:
taskschd.msc is the Task Scheduler utility in Windows, which allows users and administrators to schedule tasks to run at specific times or intervals. If there is suspicious communication occurring every five minutes, it’s possible that a scheduled task has been created to execute a process or script that triggers this communication.

This makes taskschd.msc the most likely place to look for any persistence mechanisms that could be causing the periodic network traffic. Attackers sometimes use scheduled tasks to maintain persistence on a compromised system, allowing them to execute malicious processes at specific intervals without needing to modify running processes or files directly.

Why the other options are incorrect:
a) msconfig.exe: The System Configuration Utility (msconfig) is primarily used for managing startup items and system configuration. While it can help identify certain startup entries, it is less likely to reveal persistence mechanisms related to scheduled tasks or periodic communications.

b) Privileged time: This term is not a typical reference in the context of persistence mechanisms. It may be referencing time-related access or user activity, but it does not directly relate to scheduled tasks or network communication in the same way Task Scheduler does.

c) lusrmgr.msc: Local Users and Groups (lusrmgr.msc) is used to manage user accounts, groups, and permissions on a system. While it is important for checking user configurations, it is not typically used to identify scheduled tasks or persistence mechanisms tied to processes communicating with external services.*

21
Q

A security researcher wants to install an older operating system for research and testing. What is the most common medium that comes with a disc that the researcher should use?

a) Internet-based
b) Internal hard rive
c) USB
d) Optical media

A

d) Optical media

Historically, most attended installations and upgrades were run by booting from optical media (CD-ROM or DVD). The optical drive must be set as the priority boot device.

22
Q

A security engineer researches how to make backup and antivirus apps available to their iOS mobile devices. Where should the apps be pushed?

a) iCloud
b) Finder
c) Business Manager
d) Security & Privacy

A

c) Business Manager

*Apple Business Manager is a platform that allows organizations to deploy and manage apps, including backup and antivirus applications, on iOS devices. It is specifically designed for managing devices in a business or enterprise environment. Using Apple Business Manager, administrators can push apps to enrolled devices using a Mobile Device Management (MDM) solution, ensuring that the devices receive the necessary apps for security and backup.

Why the other options are incorrect:
a) iCloud: iCloud is Apple’s cloud storage and syncing service. While it provides backup functionality for personal data (like photos, documents, etc.), it is not used for pushing specific apps like backup or antivirus apps to devices. iCloud is primarily for syncing and storing user data across devices, not for enterprise app management.

b) Finder: Finder is a macOS application used to manage files and devices, including iPhones, when they are connected via USB. While it can be used to sync files or apps, it does not support pushing apps like backup or antivirus software to iOS devices in an enterprise setting.

d) Security & Privacy: The Security & Privacy settings on iOS devices deal with security-related configurations, like app permissions, location settings, and privacy controls. This section does not provide functionality for pushing apps like backup or antivirus software.*

23
Q

Which tab in File Explorer can users configure hidden extensions, hidden files, and hide operating system files.

A

File Explorer View tab

24
Q

Which tab in File Explorer can users set options for the layout of Explorer windows and switch between the single-click and double-click styles of opening shortcuts.

A

File Explorer General tab

25
The IT department determines that the phone belonging to the company's vice president suffers a compromise and that the personal and corporate data contained on the phone has leaked. Which of the following should the IT team do next? a) Reboot the phone b) Quarantine all devices that could be connected to the leak. c) Wipe the phone d) Run an antivirus scan
**b) Quarantine all devices that could be connected to the leak.** *When a device is compromised, especially a device belonging to a high-ranking individual like a vice president, there could be potential wider exposure of sensitive information through connected devices, network access, or other related systems. If the compromised phone is connected to corporate systems or a larger ecosystem of devices (like through email, cloud services, or a corporate network), there could be a risk of further data exfiltration or malware spreading. Quarantining all devices that could be connected to the leak would ensure that no additional devices (phones, laptops, computers, etc.) that are part of the same ecosystem are exposed to the same threat, preventing the risk from spreading or compromising other sensitive data. Why the other options are still important but less prioritized: c) Wipe the phone: While wiping the compromised phone is essential to remove any data or malware, it does not address the potential for further leakage. If the phone is compromised and is part of a wider corporate network, simply wiping the device might not stop the flow of data or block other systems from being affected by the breach. Quarantining other devices and cutting off network access would help contain the threat. a) Reboot the phone: This is a temporary solution and doesn't address the core issue of the leak. It's not an effective long-term response to a breach. d) Run an antivirus scan: While this is a good practice for identifying malware on the phone, it may not fully address the threat if the compromise was more sophisticated or involved persistent malware that isn't easily detected by antivirus software. Additionally, running an antivirus scan does not stop further data leakage or prevent other connected devices from being compromised.*
26
A piece of a two-factor security token that generates a single-use login PIN to authorize computer services.
Soft token
27
Token that requires the user to physically possess their authentication device to gain access to a specific network.
Hard token
28
A helpdesk operator looks at build numbers for Windows as they plan upgrade timelines. The operator investigates the significance of the build numbers. Which of the following are the build numbers based on? (Select all that apply.) a) 32 bit vs. 64 bit b) Year c) Windows version d) Time of year
**b) Year** and **d) Time of year** *The number 16 in build 1607 corresponds to the year (2016) of release. The 07 portion of build 1607 represents the month (07/July) of release. The current version of Windows 10 at the time of writing is 21H2, released in the second half of 2021.*
29
Console that allows users to view and edit the properties of installed hardware. They can change hardware configuration settings, update drivers, or remove/disable devices.
Device Manager
30
A Linux server administrator meets with their Windows server administrator counterparts. A certain grouping of Linux and Windows servers is designated to run services that share files. What will the administrators need to enable sharing between the disparate systems? a) chmod b) ip c) mv d) samba
**d) samba**
31
Software that enables the integration of Linux and Windows systems. When added to a Linux workstation, that workstation can use the Windows file and print sharing protocol to access shared resources on a Windows host.
Samba
32
A user has a Mac computer but likes Windows better for functionality and compatibility purposes. The user wants to sell their computer on an online marketplace and wipe their presence from the computer. Which of the following will help them accomplish this? a) Disk Utility b) Finder c) Remote Disc d) Dock
**a) Disk Utility** *Disk Utility is a built-in macOS tool that allows users to manage disks, partitions, and volumes on their Mac. To wipe all of the user’s data and restore the computer to a clean state, the user can use Disk Utility to erase the drive. This would effectively remove any personal files, applications, or accounts, making it much harder for the next user to recover any data. Using Disk Utility, the user can: Erase the disk where macOS and the user’s data are stored Reformat the disk to remove data securely. This is the most appropriate method for removing all traces of the user’s presence on the Mac before selling it. Why the other options are incorrect: b) Finder: Finder is a file management tool that helps users locate, open, and organize files on their Mac. While it can be used to manually delete files, it doesn't provide a thorough method for erasing all user data or securely wiping the entire drive. c) Remote Disc: Remote Disc is a feature that allows a Mac to access an optical disc (CD/DVD) on another computer via a network. It is not related to wiping data or removing a user's presence on the computer. d) Dock: The Dock is a user interface feature for launching applications, switching between open apps, and accessing files and folders. It doesn’t provide functionality for erasing data or wiping the system.*
33
An administrator assists the human resources department in testing access to their new cloud-based training site. Unfortunately, the site cannot be accessed due to the organizational security policy. Which of the following should the administrator use to assist them? a) lusrgr.msc b) certmgr.msc c) taskschd.msc d) diskmgmt.msc
**b) certmgr.msc** *certmgr.msc (Certificate Manager) is used for managing certificates on a system, which may be necessary for establishing trust and secure connections to websites, especially cloud-based services. If the organizational security policy is causing access issues to a cloud-based training site, it might be due to certificate issues, such as the site requiring a specific certificate to establish a secure connection or the organization using a certificate authority (CA) for internal security measures. If there is a certificate validation issue or a misconfigured certificate store, the administrator can use certmgr.msc to check the certificates installed on the system, verify if the site’s SSL/TLS certificate is trusted, and ensure the necessary certificates are present and correctly configured to allow access. Why the other options are incorrect: a) lusrmgr.msc: This is used to manage local users and groups on the computer. It is useful for configuring user accounts and permissions but does not address issues related to accessing external sites, especially cloud-based ones. c) taskschd.msc: This is the Task Scheduler, used for automating tasks and scheduling processes on the computer. It does not help with troubleshooting access to websites or resolving certificate issues. d) diskmgmt.msc: This is the Disk Management tool, which is used to manage disks, partitions, and volumes. It has no relevance to solving connectivity or access issues with a cloud-based training site.*
34
A helpdesk manager assesses older Windows 7 computers their company owns and tries to determine available upgrade paths. Which of the following can NOT be upgraded? a) Windows 7 Home to Windows 10 Enterprise b) Windows 10 Home to Windows 10 Pro c) Windows 7 Home Premium to Windows 10 Pro d) Windows 7 Pro to Windows 10 Home
**a) Windows 7 Home to Windows 10 Enterprise** *Users cannot upgrade from a Home to an Enterprise edition. If users consider an in-place upgrade, they must check that the current OS version is supported as an upgrade path to the intended version.*