Security Flashcards

(53 cards)

1
Q

Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware?

A. Run System Restore.
B. Place in recovery mode.
C. Schedule a scan.
D. Restart the PC.

A

C. Schedule a scan

Explanation:
Running a scan with antivirus or antimalware software is the best way to remove malware from a device.

Breakdown of Each Choice:
* A. Run System Restore.
o Incorrect: Focuses on restoring system settings, not specifically for
malware removal.
* B. Place in recovery mode.
o Incorrect: Typically used for troubleshooting or OS reinstallation, not
specifically for malware removal.
* C. Schedule a scan.
o Correct: Most effective for detecting and removing malware.
* D. Restart the PC.
o Incorrect: Temporarily interrupts malware but doesn’t remo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When visiting a particular website, a user receives a message stating, “Your
connection is not private”. Which of the following describes this issue?
A. Certificate warning
B. Malware
C. JavaScript error
D. Missing OS update

A

a. Certificate warning

Explanation:
When a user receives a message stating “Your connection is not private,” it typically indicates a problem with the SSL/TLS certificate of the website. This warning alerts users that the website’s certificate is invalid, expired, or not issued by a trusted certificate authority, potentially compromising the security of the connection.

Breakdown of Each Choice:
* A. Certificate warning:
o Correct: Indicates an issue with the SSL/TLS certificate of the website,leading to an insecure connection.
* B. Malware:
o Incorrect: Malware typically refers to malicious software that can infect a system, but it’s not directly related to SSL/TLS certificate
issues.
* C. JavaScript error:
o Incorrect: JavaScript errors may affect the functionality of a website, but they don’t directly cause a “Your connection is not private” message.
* D. Missing OS update:
o Incorrect: Missing OS updates ccould potentially lead to security vulnerabilities, but they don’t directly cause a certificate warning message in the browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is also known as something you know, something you have, and something you are?
A. ACL
B. MFA
C. SMS
D. NFC

A

B. MFA

Explanation:
MFA involves “something you know” (like a password), “something you have” (like a
token or smartphone), and “something you are” (like biometric data). It enhances
security by requiring multiple forms of verification.

Breakdown of Each Choice:
* A. ACL (Access Control List):
o Incorrect: Defines permissions, not authentication factors.
* B. MFA (Multi-Factor Authentication):
o Correct: Requires multiple forms of verification for security.
* C. SMS (Short Message Service):
o Incorrect: Text messaging service, not authentication factors.
* D. NFC (Near Field Communication):
o Incorrect: Communication technology, not authentication factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following authentication types is the most secure?
A. WPA3
B. WEP
C. RADIUS
D. TACACS+
E. WPS

A

A. WPA3

Explanation:
WPA3 (Wi-Fi Protected Access 3) is the latest and most secure wireless
authentication protocol, offering enhanced security features compared to older
protocols.

Breakdown of Each Choice:
* A. WPA3:
o Correct: The most secure wireless authentication protocol with
advanced encryption and security features.
* B. WEP:
o Incorrect: An outdated and insecure wireless protocol easily broken
by modern attacks.
* C. RADIUS:
o Incorrect: While secure, RADIUS is an authentication server protocol,
not a direct comparison to WPA3 for wireless security.
* D. TACACS+:
o Incorrect: A secure network protocol for authentication, but not
directly comparable to WPA3 in terms of wireless security.
* E. WPS:
o Incorrect: A convenience feature for connecting devices to a wireless
network, known to have significant security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user’s laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?
A. Scan for malware and ransomware.
B. Perform a system restore.
C. Check the network utilization.
D. Update the antivirus software.

A

A. Scan for malware and ransomware.

Explanation:
The symptoms described—slow performance, website redirections, and random pop-ups—are indicative of a malware infection. The first step to resolve the issue is to scan the laptop for malware and ransomware to identify and remove any malicious software causing these problems.

Breakdown of Each Choice:
* A. Scan for malware and ransomware:
o Correct: Directly addresses the likely cause of the symptoms and is
the first step in identifying and removing malicious software.
* B. Perform a system restore:
o Incorrect: While this can help revert the system to a previous state, it
may not completely remove malware and should be considered after a
malware scan if necessary.
* C. Check the network utilization:
o Incorrect: This can help diagnose network-related issues but doesn’t
directly address the symptoms of malware.
* D. Update the antivirus software:
o Incorrect: While updating antivirus software is important, the
immediate step should be to perform a malware scan. Updating can
be done as part of the preparation for the scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?
A. Disable System Restore.
B. Remediate the system.
C. Educate the system user.
D. Quarantine the system

A

D. Quarantine the system

Explanation:
When ransomware is suspected on a machine, the first step is to isolate or
quarantine the system to prevent further spread of the infection to other machines
or network resources. This helps contain the ransomware and prevents additional
damage.
Breakdown of Each Choice:
* A. Disable System Restore:
o Incorrect: Disabling System Restore may prevent the recovery of
encrypted files but does not address the immediate need to contain
the ransomware.
* B. Remediate the system:
o Incorrect: While remediation is necessary, it should occur after the
system has been quarantined to prevent further spread of the
ransomware.
* C. Educate the system user:
o Incorrect: While user education is important for preventing future
incidents, it is not the immediate action needed when ransomware is
suspected.
* D. Quarantine the system:
o Correct: The first step is to isolate or quarantine the system to prevent
further spread of the ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an example of MFA?
A. Fingerprint scan and retina scan
B. Password and PIN
C. Username and password
D. Smart card and password

A

D. Smart card and password

Breakdown of Each Choice:
* A. Fingerprint scan and retina scan:
o Incorrect: Both are “something you are” (biometric factors) and do
not represent different types of authentication factors.
* B. Password and PIN:
o Incorrect: Both are “something you know” and do not represent
different types of authentication factors.
* C. Username and password:
o Incorrect: A username is not an authentication factor, and a password
alone is a single factor.
* D. Smart card and password:
o Correct: Combines “something you have” (smart card) and “something
you know” (password), representing true MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician is hardening a company file server and needs to prevent unauthorized
LAN devices from accessing stored files. Which of the following should the
technician use?
A. Software firewall
B. Password complexity
C. Antivirus application
D. Anti-malware scans

A

A. Software Firewall

Software Firewall: Implement a software firewall to control network traffic and
restrict access to authorized devices. Firewalls can block incoming and outgoing
connections based on predefined rules, enhancing security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user reports that an Android mobile device takes a long time to boot, and all
applications crash when launched. The user installed the applications from a thirdparty website. Which of the following steps should the technician complete to
diagnose the issue?
A. Scan the system for malware.
B. Clear the web browser cache.
C. Enroll the device in an MDM system.
D. Confirm the compatibility of the applications with the OS.

A

A. Scan the system for malware

Explanation:
Installing apps from third-party websites can introduce malware, causing slow boot
times and crashes. Scanning for malware addresses this issue.
Breakdown of Each Choice:
* A. Scan the system for malware:
o Correct: Targets malware, which is likely causing the problems.
* B. Clear the web browser cache:
o Incorrect: Does not address malware or performance issues.
* C. Enroll in an MDM system:
o Incorrect: Not relevant to immediate malware issues.
* D. Confirm app compatibility:
o Incorrect: Compatibility issues wouldn’t cause slow boot times or crash
all apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician is setting up a SOHO router in a user’s home. The user wants the
router to be configured to prevent access to malicious content and apply internet
access protection. Which of the following settings should the technician configure?
A. Port forwarding
B. Content filtering
C. Firmware updates
D. DHCP reservations

A

B. Content Filtering

Explanation:
Content filtering is a feature that allows a router to block access to certain websites
or types of content, such as malicious sites, providing a layer of internet access
protection.

Breakdown of Each Choice:
* A. Port forwarding:
o Incorrect: Used to direct incoming traffic to specific devices or
services within the network, not for blocking malicious content.
* B. Content filtering:
o Correct: Blocks access to specific websites or content types, helping to
prevent access to malicious content and provide internet protection.
* C. Firmware updates:
o Incorrect: Keeps the router software up to date but does not directly
filter content or block malicious sites.
* D. DHCP reservations:
o Incorrect: Assigns specific IP addresses to devices on the network, not
related to content filtering or internet protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?
A. Run one scan and schedule future scans.
B. Back up the uninfected files and reimage the computer.
C. Restore the clean backup copies of the infected files.
D. Run repeated remediation scans until the malware is removed.

A

D. Run repeated remediation scans until the malware is removed

Explanation:
After isolating and updating the anti-malware software on the infected system, it’s crucial to run multiple scans to ensure complete removal of the malware.

Breakdown of Each Choice:
* A. Run one scan and schedule future scans:
o Incorrect: One scan may not detect all malware, and relying solely on
future scans is insufficient for thorough removal.
* B. Back up uninfected files and reimage the computer:
o Incorrect: Reimaging is drastic and considered only if other remedies
fail, not the immediate next step.
* C. Restore clean backup copies of infected files:
o Incorrect: This doesn’t address the malware on the system; it’s for file
recovery.
* D. Run repeated remediation scans until malware is removed:
o Correct: Multiple scans ensure thorough removal of malware and
verify the effectiveness of the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer. Which of the following security
measures should the user take to ensure security and privacy?
A. Only accept calls from known people.
B. Disregard any suspicious emails.
C. Update the antivirus software.
D. Enable two-factor authentication.
E. Install a malware scanner.

A

A. Only accept calls from known people.

The user received the call, only answer phone calls if we are expecting a call or
know the individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user clicks a link in an email. A warning message in the user’s browser states the
site’s certificate cannot be verified. Which of the following is the most appropriate
action for a technician to take?
A. Click proceed.
B. Report the employee to the human resources department for violating company policy.
C. Restore the computer from the last known backup.
D. Close the browser window and report the email to IT security.

A

D. Close the browser window and report the email to IT security.

Explanation:
This action helps prevent potential security breaches and ensures that the
suspicious email is investigated properly. Closing the browser window avoids any
immediate risk, and reporting the email to IT security helps protect the organization
from potential threats.

Breakdown of Each Choice:
* A. Click proceed:
o Incorrect: Proceeding could expose the system to malware or other
security threats.
* B. Report the employee to the human resources department for
violating company policy:
o Incorrect: This may be premature without first addressing the
immediate security concern.
* C. Restore the computer from the last known backup:
o Incorrect: This is unnecessary unless the system is already
compromised, and it does not address the immediate need to report
the suspicious email.
* D. Close the browser window and report the email to IT security:
o Correct: This action prevents potential harm and ensures the incident
is properly investigated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An employee has repeatedly contacted a technician about malware infecting a work
computer. The technician has removed the malware several times, but the user’s
PC keeps getting infected. Which of the following should the technician do to
reduce the risk of future infections?
A. Configure the firewall
B. Restore the system from backups.
C. Educate the end user.
D. Update the antivirus program.

A

c. Educate the end user

People are the weakest link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A new spam gateway was recently deployed at a small business. However, users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems. Which of the
following is the most effective method for dealing with this issue?
A. Adjusting the spam gateway
B. Updating firmware for the spam appliance
C. Adjusting AV settings
D. Providing user training

A

D. Providing user training

Explanation:
User training is the most effective way to prevent users from opening spam and
infecting the network.
Breakdown of Each Choice:
* A. Adjusting the spam gateway: Improves filtering but won’t catch all spam.
* B. Updating firmware for the spam appliance: Ensures optimal
performance but doesn’t address user behavior.
* C. Adjusting AV settings: Helps detect malware but doesn’t prevent
interaction with spam.
* D. Providing user training: Educates users on handling spam, reducing
infection risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

After a security event, a technician removes malware from an affected laptop anddisconnects the laptop from the network. Which of the following should the technician do to prevent the operating system from automatically returning to an infected state?
A. Enable System Restore.
B. Disable System Restore.
C. Enable antivirus.
D. Disable antivirus.
E. Educate the user.

A

B. Disable System Restore

Explanation:
Disabling System Restore prevents the operating system from reverting to a
previous restore point that might still contain the malware, thus avoiding
reinfection.

Breakdown of Each Choice:
* A. Enable System Restore: Could reintroduce malware if infected restore
points exist.
* B. Disable System Restore: Prevents reverting to potentially infected
restore points.
* C. Enable antivirus: Important but does not prevent reversion to infected
state.
* D. Disable antivirus: Not advisable; antivirus should be enabled.
* E. Educate the user: Important but does not directly prevent OS from
reverting to an infected state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user’s PC is infected with ransomware. Which of the following should the technician do FIRST?

A. Scan and remove the malware.
B. Schedule automated malware scans.
C. Quarantine the system.
D. Disable System Restore.

A

C. Quarantine the system

Explanation:
The first step when dealing with ransomware is to quarantine the system to prevent the malware from spreading to other systems on the network. Quarantining isolates the infected device and reduces further damage or compromise.

Why the Other Options Are Incorrect:
A. Scan and remove the malware:

Malware removal is necessary but should only be performed after the system has been quarantined. Removing the malware prematurely may risk further spread or incomplete containment.
B. Schedule automated malware scans:

Automated scans are preventive measures, not immediate actions for an active infection.
D. Disable System Restore:

While this can prevent reinfection through restore points, it is not the first priority. The immediate concern is containment through quarantine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?

A. Run a startup script that removes files by name.
B. Provide a sample to the antivirus vendor.
C. Manually check each machine.
D. Monitor outbound network traffic.

SOHO environment
Above normal system baselines
Unknown executable with a random string name
Antivirus not detecting the threat
Concern about other machines being infected
Looking for the MOST effective way to check other machines.

A

C. Manually check each machine

In a SOHO environment, where the number of machines is relatively small, manually checking each system is the fastest way to detect and address the issue right now. It ensures you can verify the status of each system immediately, without waiting for external analysis (as in Option B).
While providing the file to the antivirus vendor (Option B) is a good long-term solution, manual checks in a small environment will allow for quicker identification of other infected machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

A. Application updates
B. Anti-malware software
C. OS reinstallation
D. File restore

A

C. OS reinstallation

Explanation:
A rootkit is a type of malware that is deeply integrated into the operating system, making it difficult for anti-malware software to detect and remove. The best way to completely remove a rootkit is to reinstall the operating system. This ensures all traces of the rootkit are eliminated from the system.

Why the Other Options Are Incorrect:
A. Application updates:
Application updates may address vulnerabilities but won’t remove a rootkit once it’s already installed.
B. Anti-malware software:
Anti-malware software may not detect rootkits effectively because they operate at a low level in the system.
D. File restore:
Restoring files will not remove the rootkit, and the infection could reappear after files are restored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?

A. WPA2 with TKIP
B. WPA2 with AES
C. WPA3 with AES-256
D. WPA3 with AES-128

A

B. WPA2 with AES

Explanation:
For a SOHO wireless router that is about ten years old, WPA2 with AES is the most secure option that is compatible with older hardware. AES (Advanced Encryption Standard) is a strong encryption protocol, and WPA2 is currently one of the most secure standards available for many devices.

Why the Other Options Are Incorrect:
A. WPA2 with TKIP:
TKIP (Temporal Key Integrity Protocol) is less secure than AES and should be avoided for the most secure network.
C. WPA3 with AES-256:
WPA3 is the most secure standard, but older routers may not support it. AES-256 is an even stronger encryption than AES-128 but might not be supported on older hardware.
D. WPA3 with AES-128:
Although WPA3 with AES-128 is very secure, WPA3 may not be supported by a router that is about ten years old.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A user connected a smartphone to a coffee shop’s public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity. A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do to best address these security and privacy concerns? (Choose two.)
A. Disable Wi-Fi autoconnect.
B. Stay oine when in public places.
C. Uninstall all recently installed applications.
D. Schedule an antivirus scan.
E. Reboot the device.
F. Update the OS

A

A. Disable Wi-Fi autoconnect.
D. Schedule an antivirus scan.

Explanation:
A. Disable Wi-Fi autoconnect: Prevents automatic connection to insecure networks, reducing future risks.
D. Schedule an antivirus scan: Helps detect and remove malware from the device.

Why Others Are Incorrect:
B: Staying offline is impractical and doesn’t address the current infection.
C: Uninstalling apps may help, but doesn’t guarantee malware removal.
E: Rebooting may stop malware temporarily but doesn’t remove it.
F: Updating the OS helps security but doesn’t guarantee immediate malware removal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key. Which of the following is the
best way for a technician to return the device to service safely?
A. Run an AV scan.
B. Reinstall the operating system.
C. Install a software firewall.
D. Perform a system restore
E. Comply with the on-screen instructions.

A

B. Reinstall the operating system.

The device is infected with ransomware, which encrypts files and compromises the system.
Reinstalling the OS ensures complete removal of the malware and restores the workstation safely.

Why others are incorrect:
A. Run an AV scan: Won’t decrypt files or ensure full removal.
C. Install a software firewall: Prevents future attacks but doesn’t fix the current infection.
D. Perform a system restore: Ransomware often disables restore points.
E. Comply with instructions: Paying is risky, unethical, and often illegal.

23
Q

A user’s iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?
A. Fingerprint and pattern
B. Facial recognition and PIN code
C. Primary account and password
D. Recovery contact and recovery key

A

C. Primary account and password.

When an iPhone is permanently locked, restoring access requires signing in with the primary Apple ID account and password associated with the device. This is part of Apple’s Activation Lock feature, designed to prevent unauthorized access or theft. It ensures that only the rightful owner can restore and access the device.

Why the other options are incorrect:
A. Fingerprint and pattern: These methods unlock the device but are not used to restore access after a permanent lock.
B. Facial recognition and PIN code: These are used for regular unlocking, not for restoring a locked device.
D. Recovery contact and recovery key: Apple does not use recovery contacts or keys for iPhone unlocking or data restoration.

24
Q

A customer is accessing a public kiosk in a company’s lobby. Which of the following should be enforced to mitigate the risk of customer data
being accidentally saved to the kiosk?
A. Manually clearing browsing data
B. Private-browsing mode
C. Browser data synchronization
D. Password manager

A

B. Private-browsing mode

Private-browsing mode prevents the browser from saving cookies, browsing history, or form data locally on the kiosk. This reduces the risk of customer data being accidentally stored and accessed by others after the session.

Why the other options are incorrect:
A. Manually clearing browsing data: While effective, it relies on the user to remember to clear the data, which is not foolproof.
C. Browser data synchronization: Syncing data across devices could increase the risk of exposing personal information if the kiosk browser is linked to the customer’s account.
D. Password manager: This helps secure passwords but doesn’t prevent browsing data from being saved.

25
An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts? A. SSID B. DHCP C. Firewall D. SSD
A. SSID ## Footnote Disabling the SSID (Service Set Identifier) broadcast hides the Wi-Fi network from public view, making it less visible to unauthorized users or devices attempting to connect. This reduces constant connection attempts while still allowing authorized devices to connect by manually entering the SSID. Why the other options are incorrect: B. DHCP: Disabling DHCP would stop automatic IP address assignment but would not directly prevent connection attempts to the Wi-Fi network. C. Firewall: A firewall protects the network from threats but doesn’t prevent connection attempts. D. SSD: This refers to solid-state drives and is unrelated to Wi-Fi or networking.
26
Which of the following involves sending arbitrary characters in a web page request? A. SMS B. SSL C. XSS D. VPN
C. XSS ## Footnote Cross-Site Scripting (XSS) involves injecting malicious scripts or arbitrary characters into web page requests or input fields. These scripts are then executed by the web browser of other users viewing the page, potentially compromising data or security. Why the other options are incorrect: A. SMS: Refers to Short Message Service for text messaging, unrelated to web page requests or scripting. B. SSL: Refers to Secure Sockets Layer, a protocol for encrypting communications, not injecting characters. D. VPN: Refers to Virtual Private Network, used for secure and private network connections, not scripting attacks.
27
A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Choose two.) A. Implementing data-at-rest encryption B. Disabling AutoRun C. Restricting user permissions D. Restricting log-in times E. Enabling a screen lock F. Disabling local administrator accounts
D. Restricting log-in times E. Enabling a screen lock ## Footnote Explanation: D. Restricting log-in times: Prevents user accounts from being accessed during the night shift. E. Enabling a screen lock: Automatically locks computers when inactive, blocking unauthorized access. Incorrect Options: A: Protects data but doesn’t block access to the system. B: Prevents malware via USB but doesn’t restrict access. C: Limits permissions but doesn’t stop logins. F: Reduces risks but doesn’t prevent access.
28
Which of the following types of malicious software is most likely to demand payments in cryptocurrency? A. Ransomware B. Keylogger C. Cryptomining D. Rootkit
A. Ransomeware ## Footnote Explanation: Ransomware is a type of malicious software that encrypts a victim's data and demands payment, often in cryptocurrency, to unlock it. Cryptocurrency is commonly used due to its anonymity and ease of transfer. Why the other options are incorrect: B. Keylogger: Records keystrokes to steal sensitive information but does not demand payments. C. Cryptomining: Uses a system's resources to mine cryptocurrency for the attacker but does not request payments. D. Rootkit: Provides unauthorized access to a system and hides malicious activities but does not typically demand payments.
29
Which of the following would allow physical access to a restricted area while maintaining a record of events? A. Hard token B. Access control vestibule C. Key fob D. Door Lock
B. Access control vestibule ## Footnote An access control vestibule (also called a mantrap) allows physical access to a restricted area while maintaining a record of events. It often includes logging mechanisms like keycard readers, biometrics, or surveillance systems to track who enters and exits. A. Hard token: Authenticates but doesn’t log physical access. C. Key fob: Grants access but doesn’t inherently log events. D. Door lock: Secures access but doesn’t track events.
30
A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns? A. UAC B. MDM C. LDAP D. SSO
B. MDM ## Footnote MDM solutions help secure, monitor, and manage BYOD (Bring Your Own Device) policies. They can enforce security policies, detect and mitigate malware, and restrict data sharing to reduce the risk of data disclosure. Why the other options are incorrect: A. UAC (User Account Control): UAC is a Windows feature that minimizes the impact of malware on a system but does not specifically address BYOD concerns or manage devices. C. LDAP (Lightweight Directory Access Protocol): LDAP is used for directory services like authentication and user management but does not manage mobile devices or prevent malware-related data leaks. D. SSO (Single Sign-On): SSO simplifies authentication across systems but does not directly address device security or malware protection.
31
Which of the following is used to ensure users have the appropriate level of access to perform their job functions? A. Access control list B. Multifactor authentication C. Least privilege D. Mobile device management
C. Least privilege ## Footnote Least privilege ensures users only have the minimum level of access needed to perform their job functions, reducing the risk of unauthorized access or data breaches. Why the other options are incorrect: A. Access control list (ACL): Specifies permissions for resources but does not inherently ensure users have only the necessary level of access. B. Multifactor authentication (MFA): Enhances authentication security but doesn’t regulate the level of access granted. D. Mobile Device Management (MDM): Manages and secures devices but does not directly control access levels for user functions.
32
Which of the following social engineering tactics is best avoided by shredding sensitive documents? A. Dumpster diving B. Phishing C. Whaling D. Shoulder surfing
A. Dumpster Diving ## Footnote Shredding documents prevents attackers from retrieving sensitive information from trash, which is a tactic used in dumpster diving. B. Phishing: Not related to physical documents. C. Whaling: Targets individuals via phishing, not physical documents. D. Shoulder surfing: Involves observing someone in person, not document disposal.
33
A user notices a small USB drive is attached to the user’s computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is most likely occurring? A. Trojan B. Rootkit C. Cryptominer D. Keylogger
D. Keylogger ## Footnote A keylogger is a type of malware designed to record keystrokes to capture sensitive information such as usernames, passwords, or credit card details. The presence of grabber.exe (which likely refers to the malicious program) and output.txt (where the captured data may be stored) suggests this is a keylogger operation. A. Trojan: Trojans disguise as legitimate software but don’t typically capture keystrokes or store them in files like output.txt. They focus on broader malicious actions, not just logging keystrokes. B. Rootkit: Rootkits hide malware and operate at a deeper level, often without visible files. The grabber.exe and output.txt files suggest visible data capture, which is not typical for rootkits. C. Cryptominer: Cryptominers mine cryptocurrency and don’t typically generate files like output.txt to store captured data. They focus on using system resources, not logging keystrokes.
34
An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable? A. Smart card B. Biometrics C. Hard token D. One-time password
B. Biometrics ## Footnote Biometrics (like fingerprint or facial recognition) is a built-in mobile device feature that can serve as a second authentication factor alongside a PIN. It’s easy to enforce, user-friendly, and aligns with common two-factor authentication (2FA) policies for mobile devices. ❌ A. Smart card Smart cards require external hardware/readers and are not typically used or supported natively on most mobile devices. ❌ C. Hard token Hard tokens are external physical devices, not a built-in feature of mobile phones. ❌ D. One-time password (OTP) OTPs are often used for remote login, not local device unlock, and usually require a separate app or service.
35
Which of the following describes a concept that requires using a combination of an ID, a password, and a biometric? A. Types of security B. Access control C. Principle of least privilege D. Multifactor authentication
D. Multifactor authentication ## Footnote Multifactor authentication (MFA) means using two or more different types of authentication factors: Something you know (e.g., password or PIN) Something you have (e.g., ID card, smartphone) Something you are (e.g., fingerprint, face scan) In this case, using an ID (something you have), a password (something you know), and a biometric (something you are) is a textbook example of MFA. ❌ A. Types of security This is a vague term — not specific enough to describe using multiple authentication factors. ❌ B. Access control Access control refers to who is allowed access and what they can do, but doesn’t specifically describe how they’re authenticated. ❌ C. Principle of least privilege This concept means users get only the access they need, not about how they log in.
36
Which of the following is used to prevent automobiles from crashing into a building? A. Cameras B. Bollard C. Lighting D. Biometrics
B. Bollard ## Footnote A bollard is a short, sturdy post designed to physically block vehicles from accessing certain areas. Commonly installed in front of buildings, stores, or pedestrian zones to prevent vehicle crashes, both accidental and intentional. ❌ A. Cameras Cameras provide surveillance, but they do not physically prevent vehicles from crashing. ❌ C. Lighting Lighting improves visibility and safety, but it doesn’t stop a vehicle. ❌ D. Biometrics Biometrics are used for identity verification, such as fingerprint or facial recognition — unrelated to vehicle control.
37
A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Choose two.) A. Uninstall the game application. B. Perform a factory reset of the device. C. Connect the device to an external charger. D. Install the latest security patches. E. Clear the application's cache. F. Enable the device's built-in anti-malware protection.
A. Uninstall the game application D. Install the latest security patches ## Footnote ✅ A. Uninstall the game application The problems started after installing the app. It’s likely malicious or poorly coded. Removing it can stop crashes and battery drain. ✅ D. Install the latest security patches Ensures the device has protection against known malware or exploits the app may have used. ❌ B. Perform a factory reset Too extreme for a first step. Try less drastic actions first. ❌ C. Connect to external charger Doesn’t fix the root cause (malware or bad app). ❌ E. Clear app cache May improve performance slightly but won’t remove malware or malicious behavior. ❌ F. Enable built-in anti-malware Good long-term, but doesn’t directly address the current issue if the app is already causing harm.
38
Which of the following authentication methods should be used for BYOD wireless devices? A. Local certificates B. TACACS+ C. RADIUS D. Captive portal
C. RADIUS ## Footnote ✅ C. RADIUS Used for secure authentication of users on enterprise wireless networks. Ideal for BYOD because it supports per-user credentials and integrates with directory services like Active Directory. Provides better control, auditing, and access management for a variety of personal devices. ❌ A. Local certificates Requires installing certificates on each personal device — not scalable for most BYOD environments. ❌ B. TACACS+ Typically used for administrative access to network devices, not end-user wireless authentication. ❌ D. Captive portal More suitable for guest access, not for securely authenticating employee-owned devices with user credentials.
39
A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS, the malware infection returned later that day. Which of the following is the most likely source? A. Trojan B. Boot sector virus C. Spyware D. Rootkit
B. Boot sector virus ## Footnote ✅ B. Boot sector virus Infects the boot sector or master boot record (MBR) of the drive. Remains active even after reinstalling the OS because it loads before the OS and can reinfect the system. ❌ A. Trojan Typically delivered through files or downloads, but does not persist through OS reinstall if storage is wiped properly. ❌ C. Spyware Usually detected and removed with proper malware tools; unlikely to survive a full OS reinstall. ❌ D. Rootkit Can hide deep in the OS but generally removed by a full OS reinstall unless combined with boot sector infection.
40
A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next? A. Isolate the machine from the network. B. Scan the system for hidden files. C. Disable unused ports. D. Install antivirus software. E. Reconfigure the firewall.
A. Isolate the machine from the network ## Footnote ✅ A. Isolate the machine from the network Prevents malware or attackers from spreading or communicating externally. Important first step to contain the infection or issue before further troubleshooting. ❌ B. Scan the system for hidden files Helpful later, but first you want to stop any possible spread. ❌ C. Disable unused ports Good security practice but not immediate priority in this scenario. ❌ D. Install antivirus software Important, but if the machine is infected, isolating first is safer. ❌ E. Reconfigure the firewall Useful for network security but not the first step here.
41
A company recently experienced a security incident in which a USB drive containing malicious software was able to covertly install malware on a workstation. Which of the following actions should be taken to prevent this incident from happening again? (Choose two.) A. Install a host-based IDS. B. Restrict log-ln times. C. Enable a BIOS password. D. Update the password complexity. E. Disable AutoRun. F. Restrict user permissions.
E. Disable AutoRun F. Restrict user permissions ## Footnote ✅ E. Disable AutoRun AutoRun (or AutoPlay) is a feature in Windows that can automatically execute programs on USB drives when they're inserted. Disabling AutoRun prevents malware from launching automatically, which is key to stopping this kind of USB-based attack. ✅ F. Restrict user permissions If users do not have administrative rights or permission to install software, malicious software on USB drives will be unable to install itself, even if it's executed manually. ❌ Incorrect Options Explained: A. Install a host-based IDS – While helpful for monitoring, it detects intrusions after they occur; it doesn't prevent USB-based malware installation. B. Restrict log-in times – Controls when users can access systems, but does nothing to prevent USB-based infections. C. Enable a BIOS password – Prevents BIOS access but is unrelated to USB drive activity within the operating system. D. Update the password complexity – Improves account security, but doesn't stop malware from installing via USB.
42
A user's work PC has been the target of multiple phishing attacks. Which of the following is a way for the user to prevent further attacks? A. Enabling Windows Firewall B. Activating the email spam filter C. Using a secure VPN connection D. Running vulnerability scans on a schedule
B. Activating the email spam filter ## Footnote ✅ B. Activating the email spam filter A spam filter helps prevent phishing emails from reaching the user's inbox by filtering out suspicious or malicious messages. This is the most direct and effective way to reduce phishing attempts. ❌ Incorrect Options: A. Enabling Windows Firewall A firewall blocks unauthorized network traffic, but it does not filter emails or stop phishing attacks. C. Using a secure VPN connection A VPN secures network traffic, especially on public networks, but it doesn’t prevent phishing emails from being received or opened. D. Running vulnerability scans on a schedule Scans help identify system weaknesses, but they don’t block phishing attempts directly.
43
When a user attempts to open an email using a company-issued smartphone, the user receives a message stating the email is encrypted and cannot be opened. The user forwards the email to a personal account and receives the same message. The user then contacts the IT department for assistance. The technician instructs the user to contact the sender to exchange information in order to decode the message. Which of the following will the user receive from the sender? A. Keys B. Token C. Password D. Root CA
A. Keys ## Footnote ✅ A. Keys Encrypted emails use public key encryption. To decrypt the message, the user must have the appropriate private key, and sometimes the sender and receiver must exchange public keys beforehand. The technician's advice to "exchange information to decode the message" refers to this key exchange process. ❌ Incorrect Options: B. Token Tokens are usually used in multi-factor authentication (MFA), not for decrypting email content. C. Password While some encrypted emails may be opened with a password, that’s not the standard for enterprise email encryption, which typically uses key pairs (public/private keys). D. Root CA A Root Certificate Authority (CA) is part of a certificate hierarchy and is used to validate certificates, not decrypt individual messages. It’s not what the user would receive from the sender.
44
Which of the following ports should be opened to allow for DNS recursion? A. 1 B. 53 C. 80 D. 123 E. 445
B. 53 ## Footnote ✅ B. 53 Port 53 is used by DNS (Domain Name System) for both queries and responses, including DNS recursion, over UDP and TCP. DNS recursion is the process by which a DNS server queries other DNS servers on behalf of the client to resolve a domain name. ❌ Incorrect Options: A. 1 Port 1 is the TCP Port Service Multiplexer (TCPMUX), which is rarely used and not related to DNS. C. 80 Port 80 is used for HTTP (web traffic), not DNS. D. 123 Port 123 is used for NTP (Network Time Protocol), which synchronizes clocks between systems. E. 445 Port 445 is used for Microsoft-DS (Direct SMB over TCP/IP), primarily for file sharing in Windows environments.
45
A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement? A. Multifactor authentication B. Encryption C. Increased password complexity D. Secure password vault
A. Multifactor authentication ## Footnote ✅Multifactor authentication (MFA) is the best defense against brute-force attacks because it requires more than just a password — even if an attacker correctly guesses or cracks the password through brute force, they still need another factor (like a code from an app or a fingerprint). This greatly reduces the chances of unauthorized access. ❌ Breakdown of Incorrect Answers: B. Encryption Encryption protects data at rest or in transit, not login access specifically. It doesn’t prevent brute-force attacks directly. C. Increased password complexity While complexity helps, it only slows down brute-force attacks — it doesn’t stop them, especially with automated tools and large password lists. D. Secure password vault A password vault helps users manage strong passwords, but it doesn’t directly protect against an attacker brute-forcing a login page.
46
An administrator configured security features on company-owned mobile devices to help protect against data loss. Which of the following is the best way to protect data on a misplaced device? A. Remote wipe B. Device encryption C. PIN codes D. Locator applications
A. Remote wipe ## Footnote ✅ Remote wipe allows an administrator to erase all data on a lost or stolen mobile device remotely. This is the best method to protect sensitive data from being accessed if a device is misplaced and cannot be recovered. ❌ Breakdown of Incorrect Options: B. Device encryption 🔒 Helpful for protecting data, but only effective if the attacker can't bypass the lock screen. It doesn’t prevent access if the device remains unlocked. C. PIN codes 🔢 Adds a basic level of security, but can be bypassed or brute-forced with enough time or tools. D. Locator applications 📍 Useful to find a lost device, but do not secure or delete the data if recovery isn't possible.
47
A company is creating an access control system that uses something you have and something you are. Which of the following will be required for user authentication? (Choose two.) A. Password manager B. Encryption keys C. Biometric scanner D. Smartcard reader E. Host-based IDS F. PIN code
C. Biometric scanner D. Smartcard reader | Something you have (a physical item) Something you are (biometric data) ## Footnote ✅ Correct Answers: C. Biometric scanner 🧬 → “Something you are” Uses physical characteristics (e.g., fingerprint, facial recognition). D. Smartcard reader 💳 → “Something you have” Requires possession of a physical smartcard to authenticate. ❌ Incorrect Answers: A. Password manager 🔐 Manages credentials (e.g., usernames/passwords), but not a form of authentication itself. B. Encryption keys 🗝️ Used for securing data, not a factor in physical or biometric access. E. Host-based IDS 🛡️ Monitors for threats; not related to authentication. F. PIN code 🔢 “Something you know”, not “something you are” or “have”.
48
Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware? A. Run System Restore. B. Place in recovery mode. C. Schedule a scan. D. Restart the PC.
C. Schedule a scan. ## Footnote When malware is installed after clicking a suspicious link, the best immediate step is to run a full malware/antivirus scan to detect and remove malicious software. It allows antivirus or anti-malware software to detect and remove malware. Scanning helps identify all affected files. It’s a standard, safe, and effective first step in malware removal. ❌ Why the Other Options Are Incorrect: A. Run System Restore 🔻 Might not remove the malware completely; malware can infect restore points. B. Place in recovery mode 🔻 Not a common or direct method for malware removal; recovery mode is more for system recovery or reinstall. D. Restart the PC 🔻 Restarting alone does nothing to remove malware; it might even trigger malware to activate.
49
When visiting a particular website, a user receives a message stating, “Your connection is not private”. Which of the following describes this issue? A. Certificate warning B. Malware C. JavaScript error D. Missing OS update
A. Certificate warning ## Footnote ✅The message "Your connection is not private" typically appears when there is an issue with the website’s SSL/TLS certificate. This warning indicates that the browser cannot verify the identity of the website, often due to an expired, invalid, or untrusted certificate. ❌ Why the Other Options Are Incorrect: B. Malware 🔻 Malware causes different warnings or symptoms, not specifically this message. C. JavaScript error 🔻 JavaScript errors usually cause functionality issues or script errors, not security warnings about privacy. D. Missing OS update 🔻 Missing OS updates rarely cause browser privacy warnings directly.
50
Which of the following is also known as something you know, something you have, and something you are? A. ACL B. MFA C. SMS D. NFC
B. MFA ## Footnote MFA (Multi-Factor Authentication) uses multiple types of factors to verify identity, often described as: Something you know (e.g., password or PIN) Something you have (e.g., smartcard, token, or phone) Something you are (e.g., fingerprint or other biometric) ❌ Why the Other Options Are Incorrect: A. ACL (Access Control List) 🔻 Defines permissions for users or groups but is not about authentication factors. C. SMS (Short Message Service) 🔻 A communication method; sometimes used for 2FA codes, but not the full concept of multiple factors. D. NFC (Near Field Communication) 🔻 A technology for short-range communication, sometimes used for contactless authentication, but not a factor type.
51
Which of the following authentication types is the most secure? A. WPA3 B. WEP C. RADIUS D. TACACS+ E. WPS
A. WPA3 ## Footnote ✅Explanation: WPA3 is the latest Wi-Fi security protocol, providing stronger encryption and better protection against brute-force attacks than previous standards. It’s currently the most secure wireless authentication method for home and small business networks. ❌ B. WEP Explanation: WEP is an outdated and insecure wireless encryption protocol that can be easily cracked. It is no longer recommended or considered secure. ❌ C. RADIUS Explanation: RADIUS is an authentication protocol often used in enterprise wireless networks to authenticate users, but it is not itself an authentication type. It relies on other authentication methods and typically works with WPA2-Enterprise or WPA3-Enterprise. ❌ D. TACACS+ Explanation: TACACS+ is a protocol used for centralized authentication, authorization, and accounting, mostly in network device management, not a wireless authentication type. ❌ E. WPS Explanation: WPS (Wi-Fi Protected Setup) is a convenience feature meant to simplify connecting devices to a network but is vulnerable to attacks and considered insecure.
52
A user’s laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue? A. Scan for malware and ransomware. B. Perform a system restore. C. Check the network utilization. D. Update the antivirus software.
A. Scan for malware and ransomware ## Footnote ✅ A. Scan for malware and ransomware Since the laptop is redirecting to unfamiliar websites and showing random pop-ups—both clear symptoms of a malware infection—the first step should be to scan for malware and ransomware using a reliable anti-malware tool. Identifying and removing the infection is necessary before taking any further recovery or optimization steps. ❌ Incorrect Options: ❌ B. Perform a system restore System Restore can help revert system files to a previous state, but doing this before removing malware may preserve or reactivate malicious software. ❌ C. Check the network utilization This might reveal suspicious traffic, but it doesn’t address the root cause or fix the problem. ❌ D. Update the antivirus software While important, updating antivirus software should be done before scanning, not as the first and only step. If malware is already active, it may interfere with updates.
53
A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan is unable to locate the source of an infection. Which of the following should the technician check NEXT? A. Windows updates B. DNS settings C. Certificate store D. Browser plug-ins
D. Browser plug-ins ## Footnote ✅ Malicious browser plug-ins or extensions are a common source of persistent pop-ups and adware-like behavior. If a malware scan doesn't detect anything, the next best step is to check installed browser extensions. ❌ A. Windows updates – Keeping Windows updated is good practice but unlikely to fix pop-up adware issues directly. ❌ B. DNS settings – Incorrect DNS can redirect sites, but pop-ups are usually more related to browser activity. ❌ C. Certificate store – This affects site authentication, not ad pop-ups.