Practice Test Questions Flashcards
Karen, a salesperson in your company, is currently on travel this week. She calls your company’s help desk and is yelling because she cannot connect to her email using her hotel room’s WiFi. Her laptop shows that it is connected to the “HotelWiFi” network, but Windows states it has “Limited or no connectivity.” What action should Karen perform to fix this issue?
Open a web browser and agree to the hotel’s capture page AUP. The “Limited or no connectivity” message appears when a computer detects that the wireless network is present and operating, but the system cannot connect to the Internet. This is a common occurrence when connecting to a hotel or other public wireless networks. Many of these networks have a capture page that requires the user to agree to the company’s privacy policy or acceptable use policy before connecting the device to the internet. If the capture page doesn’t appear automatically, the user should open their web browser and visit any website to force the page to load.
What is the LEAST secure wireless security and encryption protocol?
WEP. Wired equivalent privacy (WEP) is an older mechanism for encrypting data sent over a wireless connection. WEP is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key. Wi-Fi protected access (WPA) is an improved encryption scheme for protecting Wi-Fi communications that was designed to replace WEP.
A corporate workstation was recently infected with malware. The malware was able to access the workstation’s credential store and steal all the usernames and passwords from the machine. Then, the malware began to infect other workstations on the network using the usernames and passwords it stole from the first workstation. The IT Director has directed its IT staff to develop a plan to prevent this issue from occurring again. What would BEST prevent this from reoccurring?
Install an anti-virus or anti-malware solution that uses heuristic analysis. The only solution that could stop this from reoccurring would be to use an anti-virus or anti-malware solution with heuristic analysis. The other options might be able to monitor and detect the issue but not stop it from spreading. Heuristic analysis is a method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild.
A cybersecurity analyst is auditing your company’s network logs and identifies that a USB mass storage device was previously inserted into many of the company’s servers. The logs also showed dozens of failed login attempts before a successful login occurred on the servers. Which TWO of the following actions are recommended to eliminate the vulnerabilities identified by the cybersecurity analyst?
Lockout the account after 3 failed login attempts and Modify the Auto Run settings. Since the USB mass storage device was used to connect to the servers, it is recommended to modify the Auto Run settings. To prevent the password guessing attacks used, the servers should be configured to lock out any account after 3 failed login attempts. The other options are all considered good security practices, but they do not directly address the issues presented in this scenario.
Last week, a technician remediated a malware infection on Karen’s laptop. Today, she shows up at the service desk, frustrated because her laptop appears to have been infected again. What step of the malware remediation process did the technician MOST likely forget to complete?
Educating the end User. (1) Investigate and verify malware symptoms, (2) Quarantine the infected systems, (3) Disable System Restore in Windows, (4) Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques (e.g., safe mode, pre-installation environment), (5) Schedule scans and run updates, (6) Enable System Restore and create a restore point in Windows, and (7) Educate the end user.
You just rebooted your Windows 10 workstation, and the desktop’s background picture looks strange. Upon closer examination, you notice that only a few hundred unique colors are being shown in the image. What settings should you reconfigure?
Color Depth. Color depth is either the number of bits used to indicate the color of a single pixel in a bitmapped image or video frame buffer or the number of bits used for each color component in a single pixel. In Windows 10, you can display up to 32-bits of color depth if your monitor supports it. A larger color depth number allows more unique colors to be displayed. If you only have 4-bit color, for example, you can only have 16 colors. With an 8-bit color depth, you can see 256 colors. Normally, most Windows systems are set to 16-bit (65,536 colors), 24-bit (16.7 million colors), or 32-bit (4.2 billion colors).
What devices should you NEVER disassemble during troubleshooting due to the risk of electrocution?
CRT display. A CRT monitor is an older-style computer monitor. It contains large capacitors that could retain high levels of electricity even after being disconnected. A technician should never open a CRT monitor or stick anything into its interior for fear of electrocution. Printers, tablets, and LCD panels all have field replaceable parts that a technician can install, remove, or replace.
Your company works as a contractor to the military and has just finished replacing about 500 workstations across its secure network. You have been asked to properly dispose of the workstations and destroy the data on their hard disk drives. What methods would be the MOST effective?
Degauss each of the hard drives. Degaussing is the process of erasing/wiping a hard disk drive or magnetic tape. When exposed to a powerful magnetic field, the magnetic data on a hard disk is neutralized or erased. Degaussing is the guaranteed form of hard drive erasure and is considered fast and efficient, especially with many hard drives.
What must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?
UPnP. Universal plug-and-play (UPnP) is a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall. UPnP is associated with several security vulnerabilities and is best disabled if not required. You should ensure that the router does not accept UPnP configuration requests from the external (internet) interface. If using UPnP, keep up-to-date with any security advisories or firmware updates from the router manufacturer.
What pairs of authentication factors should you choose to meet the requirements associated with MFA?
Thumbprint and passwords. Multi-factor authentication (MFA) requires a user to provide at least two different forms of authentication: something you know (username, password, pin), something you have (token, key fob, smartphone), something you are (fingerprint, retina scan), something you do (the way you speak a phrase or sign your name), or somewhere you are (location factor based on IP address or geolocation).
What commands is used on a Linux system to copy a file from one directory to another directory?
cp. The CP command is a command-line utility for copying files and directories. It supports moving one or more files or folders with options for taking backups and preserving attributes. Copies of files are independent of the original file, unlike the mv command. The mv command is a command-line utility that moves files or directories from one place to another.
A system administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The server manager decides to initiate a rollback. What describes what the system administrator should do next?
Return the system to the original state before the change. By performing a rollback, the administrator will change everything back to the last known good configuration before the change is started. Every change should be accompanied by a rollback (or back out) plan so that the change can be reversed if it has harmful or unforeseen consequences.
What authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?
TACACS+. TACACS+ is an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco. The Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.
What TWO of the following devices should have a grounding wire attached to them when installed per the manufacturer’s recommendations?
Server rack and UPS. A server rack and UPS should be installed with a grounding wire attached to them. Grounding is not required for functionality but rather for safety. Numerous issues are involved when there is no ground, including the potential for electric shock, signal attenuation, and unpredictable operation.
What command is used to create a new disk partition on a Windows system?
disk part. The disk part command is a command-line disk-partitioning utility available for Windows that is used to view, create, delete, and modify a computer’s disk partitions.
A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. What actions should the user take to increase their data speeds?
Increase the Wi-Fi signal being transmitted by their WAP. Slow data speeds can be caused by too much interference or a weak signal. Try changing the channel on Wi-Fi routers to less-used channels or boost the signal being transmitted, and the performance should increase. Alternatively, if the cellular signal is too low, you can install a signal booster or microcell in the home or office.
You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)
Disconnect the laptop from the network, update the anti-malware software, and disable system restore in windows. The seven steps of the malware removal procedures are (1) Investigate and verify malware symptoms, (2) Quarantine the infected systems, (3) Disable System Restore in Windows, (4) Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques (e.g., safe mode, pre-installation environment), (5) Schedule scans and run updates, (6) Enable System Restore and create a restore point in Windows, and (7) Educate the end user.
What mitigation provides the best return on investment by mitigating the most vulnerable attack vector in an enterprise network?
Provide end-user awareness training for office staff. An enterprise network’s end users are the most vulnerable attack vector. Studies have shown that an investment in end-user cybersecurity awareness training has the best return on investment of any risk mitigation strategy. While all of the options presented are valid security mitigations, only end-user awareness training mitigates the biggest network vulnerability we have: our users.