1/807
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Which Linux command is used to print the full contents of a file to the screen at once?
cat
Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?
dd
The customer service manager at Dion Training is having issues with her Windows 10 laptop. A technician believes that the operating system may have been corrupted by a piece of malware. The technician has removed the malware and wants to perform an installation or upgrade that will recopy the system files and revert most of the system settings to their default configurations while still preserving the user’s personalization settings, data files, and any applications installed through the Windows store. The technician has been told that they may delete any applications installed by the user, though, since they may have been infected by the malware. Which of the following types of upgrades or installations should the technician use?
Refresh installation
Which of the following is required for evidence to be admissible in a court of law?
Chain of custody
Strongest Wi-Fi encryption standard and should be enabled for better wireless security
WPA3 encryption
Limits Wi-Fi signal range so neighbors cannot detect or connect to the network
Reduce transmission power
Hides the network name so nearby users cannot easily locate it
Disable SSID broadcast
Most important action before granting remote access to a server to prevent infection
Install latest security updates and patches
Document showing the physical layout of cables, ports, and hardware
Physical network diagram
Protocol that allows devices like game consoles or VoIP handsets to automatically configure firewall ports
UPnP
Key fob device generating time-synchronized one-time passwords for authentication
Hardware token
Recommended workaround for a cracked laptop screen when internal hardware keys prevent replacement
External 15" tablet/monitor
Best action when a customer needs immediate smartphone functionality after water damage
Offer replacement phone
Best method to prevent malware that spreads using stolen credentials
Anti-virus with heuristic analysis
Not required in a DHCP scope for clients to access the internet
Reservations
Windows tool used to import and manage x.509 digital certificates
Certificate manager
Command used to rebuild Boot Configuration Data when Windows installation is missing
bootrec /rebuildbcd
Reason an offsite backup facility cannot destroy old tapes during a forensic investigation
Legal hold
Best way to isolate an internet-accessible FTP server to protect the internal network
Screened subnet