1/83
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A curious IT administrator notices issues with certain applications invoking the kernel. Which operating system would allow the administrator to change the underlying operating system?
Android
A digital forensics expert investigates a laptop that was not completely powered down. They are looking for a hibernation file on the local hard drive. Which power mode would perform this?
Hibernate
A manager for a large corporation is in charge of client machines and is currently undergoing a lifecycle hardware refresh. They want to optimize the machines to be powerful enough to run applications. The manager also wants to be sure that they are not underpowered either. What can the manager use to determine CPU optimization?
Privileged Time
A technician uses filesystem-level encryption on some files that need to be encrypted on their device. What is this called?
EFS
A technician needs this skill to give full attention to the customer, so there is no disagreement or misinterpretation of what was said. What is this skill?
Active Listening
A helpdesk operator looks at build numbers for Windows as they plan upgrade timelines. The operator investigates the significance of the build numbers. Which of the following are the build numbers based on? (Select all that apply.)
Time of Year, Year
A software developer is looking at installing a new 64-bit program that will help to streamline coding and optimize workflow. What types of systems can the developer install it on?
64-bit only
What technique is often used to exhibit fake antivirus and security warnings or other malicious advertising?
Pop-ups
A user is only able to read data on the file. What account management policy is this?
Restrict user permission
An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?
MSRA
A company has backup storage located at a different location, which lowers the risk of losing both productions and backup copies of data. Which of the following is this backup storage?
Off-site backup storage
A systems administrator wants to create a scheduled task throughout the environment, which does a basic health check at night when users are not working. Which command should the administrator use in their scheduled task?
chkdsk
A 3D animations expert is searching for a new computer. What should they ensure it has to handle their demanding software?
Dedicated graphics card
A technician is tasked to figure out why a user's Gmail app will not update on their mobile phone. The technician knows several reasons that would cause this to occur. Which of the following would be one of the reasons for this problem?
Storage
A marketing professional normally sends large files to other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, so the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only 20 people at a time seemed to be able to access it. What is causing the issue?
The share was created on a Windows desktop
An administrator is backup chaining a database with the type of backup that utilizes a moderate time and storage requirement. What type of backup is this?
Full with differential
An IT professional helps to fix their friend's computer. The computer is running extremely slow. The IT professional notices the operating system is running Home edition. Which of the following is the only service available for the Home edition?
RDP is not a workable feature when using Windows Home edition and enables the user to connect to the machine and operate it over the network
A new employee calls the help desk because their phone will not connect to the office Wi-Fi. When the technician asks about the phone model, the employee says it is an iPhone 5. The technician immediately knows the problem. Which of the following could be the problem?
Configuration
A technician suspects a computer system is infected with malware. Which of the following activities is the correct next step?
Sandboxing
What is referred to as data on persistent storage like HDDs, SSDs, and thumb drives?
Data-at-rest encryption
A user just installed a new application on their workstation, but the application has issues even starting up. The user has been working on the machine regularly up to this point without any prior issues. Which of the following is most likely the issue?
Firewall
When making major adjustments to a project, a security technician will have to assess the business and technical merits as well as the risks of the adjustment plan. What documentation will need to be submitted?
Change board approval
An administrator uses a method that assigns permissions and rights to a collection of user accounts. What is this called?
Security group
A transportation company wants to set up software that gathers statistics from the controller area network for trailers hauling loads, enabling them to adjust processes to optimize cost savings. What type of adapter will the company need to send the statistics back to their cloud network?
WWAN
The Instagram app on an Android phone will not launch. Which of the following options could fix the problem?
Force Stop
Malware encyclopedias are a resource that antivirus vendors often make available to IT professionals. What is their value for IT practitioners? (Select all that apply.)
They provide information about the type, symptoms, purpose, and removal of malware. + They are documentation of known malware.
A company has employees sign a document that enforces the importance of protecting the organization from the security and legal implications of employees misusing its equipment. What is this document?
Acceptable use policy
An IT specialist found a damaging package on a client’s computer disguised as something else. What did the specialist find?
Trojan
A server administrator sets up jobs that will copy over files on various servers. They want it to detect if the file was transferred successfully and, if not, resend the file. Which command is optimal for server administrators to perform this task?
robocopy
A server administrator experiences performance issues on a server and needs to narrow down the source of the problem. The server is an externally facing website with high visibility for the company. The longer the site is having issues, the more customers might notice and possibly damage the company's reputation. What can the administrator use to view and log performance statistics? (Select all that apply.)
resmon.exe + perfmon.msc
A Windows client administrator plans to upgrade their OS in the current environment. What is one of the most important considerations for the upgrade?
User training
A user requests a site’s certificate, but an evil twin intercepts the request and presents a spoofed certificate, which the user’s browser accepts. What has just happened? (Select all that apply.)
An on-path attack + Malware is in the middle of the session + The user thinks they have a secure connection
A technician is using a tool with a secure erase function that performs a zero-filling on HDDs and marks all blocks as empty on SSDs. The SSD firmware’s automatic garbage collectors then perform the actual erase of each block over time. What is this tool?
Low-level formatting
A user disables some of the laptops' services, thinking it would speed up performance. After restarting the laptop, "One or more services failed to start" appears. When the IT specialist opens the Services snap-in, they identify the failed service and restart it, but that does not fix it. Which of the following scenarios best explains why the restart did not work?
The user disabled a dependent service
A security analyst notices an unauthorized disclosure of customers' data at the company. What type of data is breached?
PII
An accountant has an unlimited data plan and has set data usage limit triggers for their mobile phone. What concern does the accountant have with high data usage with an unlimited data plan? (Select all that apply.)
Cryptomining, DDoS
A client administrator for a video game development company wants to upgrade machines to support five primary partitions. The developers work with a lot of large files and might even need partitions larger than 2 TB. Which of the following should the administrator use?
GPT
Most vendors have recycling systems for what types of products? (Select all that apply.)
Toner, Device, Battery
A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files? (Select all that apply.)
Files with date stamps and file sizes that are different from known-good versions + Files that are missing or renamed
A penetration tester conducts the initial reconnaissance phase and is currently targeting externally facing servers for a certain company. Currently, they are trying to enumerate the domain name system (DNS) servers. Which built-in tool will help them perform this?
Dig
A company uses an element that reminds users when logging in to the company’s device of the current software version. What is this called?
Splash screen
A technician runs an isolated test that allows them to run the program without impacting the system. What is this called?
Sandbox
A server administrator has not used the command line in quite some time and is trying to remember what will help them with commands and how to use them. Which of the following should the administrator use?
/?
Which of the following malware tries to extort money from the victim?
Spyware (actually should be Ransomware IDK what CompTIA is thinking…)
A user receives a Windows dialog box pop-up that states 163 viruses were detected by antivirus software. When the user clicks on the pop-up, it states that to get rid of the viruses the user needs to purchase the software's full version. What type of antivirus does the user have in this scenario?
Rogue
A user uses a scripting language based on Microsoft’s Visual Basic programming language. Which of the following extensions is used?
.vbs
A threat actor uses a technique that allows devices to connect to an open authentication and then redirect the user’s browser to a fake captive portal that encourages the user to enter their network password. What is this technique?
Evil twin
A use wants to maximize resource dedication to 3D performance and frame rate. Where should the user go to do this?
Gaming
An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to enable the built-in Microsoft solution?
System Settings
An intern for a Windows server team is watching a server administrator verify the authenticity and integrity of an installer. Where did the administrator most likely get it from?
Internet download
A spouse plans a surprise birthday party for their significant other. The spouse wants to turn off activity history on their browser to make sure their significant other does not find out the surprise. Where can the spouse do this?
Privacy
A software company hires a new app developer. The corporate network denies access when the developer tries to connect their phone. Why would the network deny access from the developer's mobile phone?
Developer mode
A user performs a technique that allows them to connect their PlayStation to their network. What is this technique?
UPnP
The System Restore tool in Windows is used to roll back configuration changes to an earlier date or restore point. One option for creating restore points is to use Task Scheduler. What other actions will create a restore point? (Select all that apply.)
Updating an application + Installing a program
Which of the following scenarios would result in a website having an untrusted or invalid certificate? (Select all that apply.)
The certificate has expired + The certificate is self-signed + The certificate is revoked
An employee uses a cryptographic contactless technique that allows access to a building. What is this technique?
Badge reader
Rooting is typically an action related to Android, while jailbreaking is associated with iOS. They are both trying to do the same thing. What is that?
Gain unrestricted access
A user is using AirDrop to send information to another device. What type of software is this?
File transfer
A user has a Mac computer but likes Windows better for functionality and compatibility purposes. The user wants to sell their computer on an online marketplace and wipe their presence from the computer. Which of the following will help them accomplish this?
Disk Utility
Which of the following can prevent, detect, and remove software threats that consist of ransomware, Trojans, spyware, and rootkits?
Anti-malware
A manager received a document identifying underlying causes and recommended remediation steps to mitigate the risk of repeating an issue. What is this document called?
Incident report
A security administrator moves their proxy from on-premise to the cloud and wants to establish a client tunnel to the cloud proxy tunnel for web traffic. This way, the users are protected even while out in public and not connected to the domain. What should the administrator set up?
VPN
Users perform a technique that tends to select C, M, N, O, and S shapes. Which of the following is this?
Pattern
A helpdesk manager assesses older Windows 7 computers their company owns and tries to determine available upgrade paths. Which of the following can NOT be upgraded?
Windows 7 Home to Windows 10 Enterprise
A company’s IT support specialist is ready to start recommissioning a system a part of the malware removal process. What is the last step before removing the computer from quarantine?
Antivirus scan
A teenager hears from friends about a legitimate website to download games to their Samsung Galaxy phone that is not in the Google Play store. The teenager goes to the site and downloads some games. What best describes the teenager's behavior?
APK sideloading
What uses domain names of components loading on the web page against a vast blacklist?
Ad blocker