SG: Practice Exam 1 Flashcards
You were working at a customer site when an employee told you that a new product was going to be launched next week that would be in high demand. A co-worker is now discussing that they would like to invest in the same company. What should you do?
A. Invest in the company with your co-worker
B. Direct your fellow co-worker to the employee you were speaking to
C. Direct your co-worker to invest and disclose why
D. Nothing
D. Nothing
Doing nothing is the most appropriate answer, because you were privileged to sensitive information that should not be disclosed. Investing in the company with your co-worker could be considered insider trading because you are using privileged information. Directing your co-worker to the employee is inappropriate. Directing your co-worker to invest and disclosing the information is illegal and inappropriate.
You purchased an adapter to mirror your Apple iOS device on a TV, but it is not displaying. What is most likely the problem?
A. The adapter does not support AirPlay.
B. Apple iOS does not support this function.
C. The adapter does not support Chromecast.
D. The adapter does not support HDMI.
A. The adapter does not support AirPlay.
Apple devices use a technology called AirPlay, which the adapter most likely does not support. Apple iOS supports the function of Airplay. Chromecast is an Android-only technology used to mirror devices. HDMI is a standard video interface for modern televisions.
Your users report that when they attempt to visit a banking site, a page that looks like the site appears, but it isn’t right site. What is this an example of?
A. Pop-ups
B. Pop-unders
C. Pharming
D. JavaScript errors
C. Pharming
This is most likely pharming, which is a tactic used with browser redirection to phish for credentials. Pop-ups are advertisements that “pop up” when you visit a website. Pop-unders are advertisements that spawn under a web page. JavaScript is a language and the primary method of creating pop-ups and pop-unders.
You have just successfully remediated the system from malware and want to make sure that Windows Defender’s definitions are up-to-date. Which utility should you use to manually update Windows Defender?
A. System Configuration
B. Windows Defender Security Center
C. Task Scheduler
D. System Startup
B. Windows Defender Security Center
The Windows Defender Security Center can be used to manually update Windows Defender. System Configuration is used to change the startup behavior of Windows. Task Scheduler is used to schedule tasks on the operating system, such as malware scanning. System Startup is used to change the operating system’s startup behavior.
You have been called to fix an application issue, but you test the application and find it in working order. What should you do?
A. Leave, since the issue is fixed
B. Call your manager for guidance
C. Reinstall the application for good measure
D. Ask the user to reproduce the problem
D. Ask the user to reproduce the problem
You should ask the user to reproduce the problem, since you have not been able to reproduce the problem or the problem is not how it was originally reported. Leaving is not an appropriate action, because the application could still be a problem for the user. Calling your manager for guidance will not help the situation. Reinstalling the application could introduce new problems.
You need to ship an electronic component that is potentially susceptible to ESD. What should you use?
A. An antistatic mat
B. An antistatic bag
C. An antistatic wrist strap
D. An antistatic spray
B. An antistatic bag
You should use an antistatic bag to ship an electronic component that is susceptible to ESD. An antistatic mat is used when working with electronic components. An antistatic wrist strap is used when handling electronic components. An antistatic spray is used in an area to eliminate a static charge.
When you choose to boot to Safe Mode, which of the following are not loaded?
A. Keyboard drivers
B. Storage system services
C. Networking drivers
D. Standard VGA drivers
C. Networking drivers
Safe Mode does not load networking drivers. Safe Mode loads the standard keyboard driver, the storage system services, and the standard VGA driver.
In Windows, which of the following contains a user’s login information, including their groups and privileges? (Choose the best answer.)
A. Access token
B. Kerberos
C. Single sign-on
D. Multifactor authentication
A. Access token
In Windows, the access token contains a user’s login information, including their groups and privileges. Kerberos is the authentication protocol used with Active Directory. Single sign-on (SSO) is a claims-based authentication method. Multifactor authentication requires two or more factors for authentication.
Which of the following is a share permission? (Choose the best answer.)
A. Modify
B. Write
C. Read & Execute
D. Change
D. Change
Change is a share permission; the similar permission in NTFS is Modify. Modify is an NTFS permission. Write is an NTFS permission. Read & Execute is an NTFS permission.
You work for an organization that works with information identifying citizens in the United States and Europe. Which regulations should you adhere to? (Choose two.)
A. PCI DSS
B. PII
C. GDPR
D. PHI
B. PII
C. GDPR
You should adhere to the regulations based on personally identifiable information (PII) and the General Data Protection Regulation (GDPR) for EU citizens. Payment Card Industry Data Security Standard (PCI DSS) is a standard of processes and procedures used to handle data related to transactions using payment cards. Protected health information (PHI) refers to any information used in the health-care industry to describe a patient or aliment.
Which key sequence will send a wake-up signal to the monitor, if you have a black screen?
A. F5
B. Ctrl+F5
C. Windows key+Shift+Ctrl+B
D. Alt+Tab
C. Windows key+Shift+Ctrl+B
The key sequence of Windows key+Shift+Ctrl+B will send a wake-up signal to the monitor. The F5 key will perform a refresh in programs such as web browsers. The Ctrl+F5 key combination will perform a requested refresh in web browsers and can be used to override cache. Alt+Tab will switch between applications.
You have created policies on the desktop operating system and want to make sure that no one circumvents the security. What should be done to assure security is not circumvented?
A. Require complex passwords
B. Require a BIOS/UEFI password
C. Disable autorun
D. Disable Guest
B. Require a BIOS/UEFI password
You can protect the desktop operating system by requiring a BIOS/UEFI password. This will prevent a user from circumventing the policies in place, by booting to a live operating system. Complex passwords will not prevent security from being circumvented. Disabling autorun will not assure security in not circumvented. Disabling Guest will not assure security in not circumvented.
You need to install an update to your iPhone, but you want to make sure you have the latest backup. What is the quickest way to synchronize your iPhone?
A. Wi-Fi
B. USB
C. Bluetooth
D. MicroSD card
B. USB
Synchronizing via USB to iTunes is the fastest way to back up your iPhone. Wi-Fi would also work as an option, but it is not the quickest way to synchronize. Bluetooth is not an option to synchronize your iPhone. A MicroSD card is not an option to synchronize your iPhone.
You notice a number of password attacks actively going on. What can you implement to mitigate the risk of a password being guessed? (Choose the best answer.)
A. Account lockout restrictions
B. Time restrictions
C. Complex passwords
D. Password expiration
A. Account lockout restrictions
Implementing account lockout restrictions is the best way to mitigate the risk of a password being guessed. Time restrictions will not mitigate the risk of a password being guessed. Complex passwords will help, but they will not completely mitigate the risk of a password being guessed. Password expiration will not mitigate the risk of a password being guessed.
Which mobile device screen lock uses the factor of biometrics to secure your device?
A. Passcode lock
B. Swipe lock
C. Face lock
D. All of the above
Jimmy just copied a folder on the same partition. What will happen with the permissions for the folder?
A. The permissions will be the same as they were before the move.
B. The permissions will be inherited from the new parent folder.
C. The permissions will be configured as the root folder for the drive letter.
D. The permissions will be blank until configured.
B. The permissions will be inherited from the new parent folder.
The permissions will be inherited from the new parent folder, because the copy is considered a new entity. The permission will not be the same as before the move. The permissions will not be configured the same as the root folder. The permissions will not be blank.
You need Windows to load an unsigned driver. Which utility allows you to perform this action?
A. System Startup
B. Task Manager
C. Windows Preinstallation Environment
D. Device Manager
A. System Startup
System Startup allows you to disable driver signature enforcement during boot. Task Manager is used to view running processes. Windows Preinstallation Environment is used during installation of the operating system. Device Manager will not allow you to perform this function.
What is the most common type of power protection for personal computers during a power outage?
A. A line-interactive UPS
B. A surge protector
C. A standby UPS
D. An online UPS
C. A standby UPS
A standby uninterruptable power supply (UPS) is the most common type of power protection used for personal computers. A line-interactive UPS is common in server racks to protect network equipment. A surge protector protects against power surges and voltage spikes. An online UPS is commonly found in datacenters.
Which of the following operations rewrites files so that the data appears contiguously?
A. Analyzing
B. Defragmentation
C. Degaussing
D. ReadyBoost
B. Defragmentation
Defragmentation, also called drive optimization, is the process of rewriting data on the hard drive so that it appears contiguously for improved access. Analyzing is a function of the drive-optimization tool, but it does not rewrite the files; it only analyzes fragmentation. Degaussing is the act of using a large magnetic source to destroy a hard drive. Although ReadyBoost will speed up file access, it does not rewrite data to appear contiguously.
Why would you want to lower power levels on wireless access points?
A. To increase the coverage area for clients
B. To increase security
C. To decrease the coverage area for clients
D. To decrease security
B. To increase security
You should lower power levels on wireless access points to increase security. Lowering power limits how far a signal will propagate outside of the organization’s physical perimeter. Lowering power levels will decrease the distance of clients. Lowering power levels will decrease coverage area for clients. Lowering power will not decrease security; it will increase security.