redo 7 Flashcards
The NIST (National Institute of Standards and Technology) Computer Security Incident Handling Guide identifies stages in an incident response lifecycle. What stage is concerned with reporting the incident to stakeholders?
Detection and Analysis
Which Windows utility command can be used to create a custom management console?
mmc
You are troubleshooting an email server. You would like to check to see if the SMTP (Simple Mail Transfer Protocol) server is available and listening on port 25. Which remote utility could you use to remote to this port?
telent
Which application is used to factory reset an iOS device and install the latest iOS software?
itunes
You have been troubleshooting a user’s smartphone. Due to numerous applications freezing during use, you decide to restore the phone to factory defaults. What action will you be performing?
Hard resetting the device
You have configured a new Windows 10 PC, and for some reason it will not communicate properly on the network. You decide to ping the loopback address to test the PC’s TCP/IP (Transmission Control Protocol/Internet Protocol) settings. Which of the below is the loopback address?
127.0.0.1
Which of the following is considered to be a security concern when using a mobile device in a public setting?
Connection type
You are preparing a workstation as a Linux system for a user. You have created multiple partitions, each with differing file systems. Which file system is only accessed by the memory manager?
swap
A third-party, 64-bit application is causing problems on a Windows 10 computer and requires troubleshooting. In which of the following areas does an installed application typically NOT install or modify during installation?
The c:\windows\system32 folder
You are implementing a disaster recovery plan. The plan includes backing up mission critical servers. Which of the following backup types will require the longest time to restore?
Incremental
Which one of the following terms is defined as the likelihood and impact or consequence of a threat actor exercising a weakness?
risk
What are the two principal security challenges when it comes to mobile device security (choose two)?
portability and capacity
Data must be classified based on the information it contains. Which security classification levels describe highly sensitive? (Select all that apply.)
secret and top secret
Which of the following are examples of instruction sets that can be used for automating tasks? (Select TWO)
compiled program and script
Which Windows 10 power-saving mode uses an ACPI (Advanced Configuration and Power Interface) S0 low-power idle mode to maintain a network connection while saving energy?
modern standby