redo 7 Flashcards

1
Q

The NIST (National Institute of Standards and Technology) Computer Security Incident Handling Guide identifies stages in an incident response lifecycle. What stage is concerned with reporting the incident to stakeholders?

A

Detection and Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Windows utility command can be used to create a custom management console?

A

mmc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are troubleshooting an email server. You would like to check to see if the SMTP (Simple Mail Transfer Protocol) server is available and listening on port 25. Which remote utility could you use to remote to this port?

A

telent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which application is used to factory reset an iOS device and install the latest iOS software?

A

itunes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have been troubleshooting a user’s smartphone. Due to numerous applications freezing during use, you decide to restore the phone to factory defaults. What action will you be performing?

A

Hard resetting the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have configured a new Windows 10 PC, and for some reason it will not communicate properly on the network. You decide to ping the loopback address to test the PC’s TCP/IP (Transmission Control Protocol/Internet Protocol) settings. Which of the below is the loopback address?

A

127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is considered to be a security concern when using a mobile device in a public setting?

A

Connection type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are preparing a workstation as a Linux system for a user. You have created multiple partitions, each with differing file systems. Which file system is only accessed by the memory manager?

A

swap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A third-party, 64-bit application is causing problems on a Windows 10 computer and requires troubleshooting. In which of the following areas does an installed application typically NOT install or modify during installation?

A

The c:\windows\system32 folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are implementing a disaster recovery plan. The plan includes backing up mission critical servers. Which of the following backup types will require the longest time to restore?

A

Incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which one of the following terms is defined as the likelihood and impact or consequence of a threat actor exercising a weakness?

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two principal security challenges when it comes to mobile device security (choose two)?

A

portability and capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data must be classified based on the information it contains. Which security classification levels describe highly sensitive? (Select all that apply.)

A

secret and top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are examples of instruction sets that can be used for automating tasks? (Select TWO)

A

compiled program and script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Windows 10 power-saving mode uses an ACPI (Advanced Configuration and Power Interface) S0 low-power idle mode to maintain a network connection while saving energy?

A

modern standby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user is having problems with a PC after clicking an attachment in an email message. Which of the below would categorize high CPU utilization and threatening messages appearing on the screen?

A

poor performance

17
Q

Which of the following is NOT a government regulation that would affect technology installation and maintenance?

A

personal safety equipment

18
Q

You are configuring a wireless access point for the office you work in. You are configuring both 2.4 GHz (Gigahertz) and 5 GHz for users. Which wireless standard will only use the 5 GHz spectrum?

A

802.11ac

19
Q

You are managing a small business network with several Windows 10 computers and one Windows 2016 server. You want to create password policies that will be pushed out to the client computers. Which management snap-in will you use?

A

group policy