X ~ 0 (fully verified) Flashcards
- (1.5)
As part of a CYOD policy, a systems administrator needs to configure each user’s Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?
A. Use Settings to access Screensaver settings.
B. Use Settings to access Screen Timeout settings.
C. Use Settings to access General.
D. Use Settings to access Display.
A. Use Settings to access Screensaver settings.
Screensaver settings often include options for displaying the login screen after a period of inactivity, which is what the administrator needs.
B. Screen Timeout settings might control the display turning off, but wouldn’t directly affect password requirements.
C. General settings in Windows usually deal with broader system options and wouldn’t control password prompts.
D. Display settings primarily deal with visual aspects of the screen and wouldn’t manage password prompts.
- (3.2)
A user contacted the help desk to report pop-ups on a company workstation, indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Choose two)
A. Scan the computer with the company-provided antivirus software
B. Install a new hard drive and clone the user’s drive to it
C. Deploy an ad-blocking extension to the browser
D. Uninstall the company-provided antivirus software.
E. Click the link in the messages to pay for virus removal
F. Perform a reset on the user’s web browser
C. Deploy an ad-blocking extension to the browser
Pop-up messages appearing only when opening the web browser suggest adware or malicious browser extensions. Ad-blocking extensions can effectively block these unwanted pop-ups.
F. Perform a reset on the user’s web browser
Resetting the browser removes any malicious extensions or settings that might be causing the pop-ups.
A. ‘Scanning the computer with the company-provided antivirus software’ is less likely to resolve the issue because…
While a scan might be a good idea, the fact that the pop-ups only appear in the browser suggests they might not be traditional viruses that the antivirus is designed to detect.
- (?)
Once weekly, a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?
A. Install and run Linux and the required application in a PaaS cloud environment.
B. Install and run Linux and the required application as a virtual machine installed under the Windows OS.
C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive. Swap the drives as needed.
D. Set up a dual boot system by selecting the option to install Linux alongside Windows.
B. Install and run Linux and the required application as a virtual machine installed under the Windows OS.
A virtual machine offers several advantages:
Parallel Execution: A virtual machine (VM) allows running both Windows and Linux applications simultaneously on the same hardware
Isolation: The Linux environment remains isolated from the Windows system, enhancing security.
Efficiency: Resources allocated to the VM can be adjusted for optimal performance.
Flexibility: The user can easily shut down or pause the VM when not needed.
(Option D) Setting up a dual boot system requires restarting the computer to switch between OS’s, which can be disruptive.
(Option A - PaaS) Downloading a large Linux distribution and application in a cloud environment might not be ideal with limited bandwidth.
(Option C) Swapping physical drives is cumbersome and introduces potential physical damage risks.
- (2.1)
Which of the following provide the BEST way to secure physical access to a data center server room? (Choose two)
A. Biometric lock
B. Badge reader
C. USB token
D. Video surveillance
E. Locking rack
F. Access control vestibule
A. Biometric lock
B. Badge reader
These are both access control systems that require authorized personnel to possess a unique identifier (fingerprint, retina scan, or access badge) to gain entry. This significantly restricts physical access to only those who have the proper credentials.
C. USB token: While they can be part of an MFA system, they alone don’t secure physical access. Someone with a stolen badge and token could gain entry.
D. Video surveillance: While not directly preventing entry, video surveillance provides a crucial monitoring layer. It deters potential intruders and allows for identification and follow-up action in case of unauthorized access.
E. Locking rack: Locking racks secure equipment within the server room, but they don’t control access to the room itself.
F. Access control vestibule: This creates a secure entryway to the building, but it’s most effective when combined with another access control method like a biometric lock or badge reader.
- (1.6)
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?
A. Configure the network as private.
B. Enable a proxy server.
C. Grant the network administrator role to the user.
D. Create a shortcut to public documents.
A. Configure the network as private.
B. Enable a proxy server: Used for internet access, not for accessing files on a local network.
C. Grant the network administrator role to the user: Unnecessary and potentially risky for a user who just needs to access files.
D. Create a shortcut to public documents: This only provides access to the public documents folder, not necessarily the specific shared drive.
- (1.4)
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organisation has added to provide content filtering. Which of the following Windows utilities is the BEST choice for accessing the necessary configuration to complete this goal?
A. Security and Maintenance
B. Network and Sharing Center
C. Windows Defender Firewall
D. Internet Options
D. Internet Options
This control panel applet specifically deals with internet settings, including proxy server configuration. It allows you to define automatic or manual proxy settings, including the address and port.
A. Security and Maintenance is a general maintenance tool and doesn’t directly manage proxy server settings.
B. Network and Sharing Center provides network information, it doesn’t offer options for configuring proxy servers.
C. Windows Defender Firewall is used for security purposes and doesn’t manage proxy settings.
- (2.5)
A systems administrator is setting up a Windows computer for a new user. Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?
A. Power user account
B. Standard account
C. Guest account
D. Administrator account
B. Standard account
- (3.5)
A user receives a notification indicating the data plan on the user’s corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?
A. The GPS application is installing software updates.
B. The GPS application contains malware.
C. The GPS application is updating its geospatial map data.
D. The GPS application is conflicting with the built-in GPS.
B. The GPS application contains malware.
- (2.8)
A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Choose two.)
A. Standard formatting
B. Drilling
C. Erasing
D. Recycling
E. Incinerating
F. Low-level formatting
B. Drilling
E. Incinerating
- (2.2)
Which of the following wireless security features can be enabled to allow a user to use login credentials to attach to available corporate SSIDs?
A. TACACS+
B. Kerberos
C. Preshared key
D. WPA2/AES
B. Kerberos
TACACS+ and Kerberos are both authentication protocols, but Kerberos is specifically designed for network logon, making it more suited for WiFi access.
Preshared key (PSK) is used in WPA-Personal which relies on a single shared key for all users on the network. It doesn’t involve individual login credentials.
WPA2/AES is a strong encryption standard, but by itself, it doesn’t require user credentials. WPA2-Enterprise mode, however, can leverage protocols like Kerberos for user authentication.
- (2.1)
Which of the following would MOST likely be used to change the security settings on a user’s device in a domain environment?
A. Security groups
B. Access control list
C. Group Policy
D. Login script
A. Security groups
210 (2.3)
An internet café has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?
A. Spyware is redirecting browser searches.
B. A cryptominer is verifying transactions.
C. Files were damaged from a cleaned virus infection.
D. A keylogger is capturing user passwords.
B. A cryptominer is verifying transactions.
- (1.2)
A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to mirror the source data for the backup?
A. copy
B. xcopy
C. robocopy
D. Copy-Item
C. robocopy
copy and Copy-Item are basic copy commands that can’t handle complex tasks like mirroring a folder with extensive changes.
xcopy offers more options than the basic copy command, but it lacks features specifically designed for mirroring and efficiently handling a large number of file changes.
robocopy, on the other hand, is a robust command-line tool designed for advanced copying and mirroring. It provides features like:
Mirroring directory structures, including empty subdirectories and permissions.
Copying only changed files (newer, modified, or deleted).
Multithreading for faster transfers.
Logging and error handling for reliable backups.