1/11
POCKET PREP
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which part of the change management process includes detailing the item to be changed, the reason for the change, and a change plan?
Request form
The request form is the first part of the change management process. It is preliminary and involves outlining the most general parts of the change.
The scope is how many systems will be affected. Risk analysis outlines the potential failures resulting from the change. The rollback plan outlines how to revert back to the original state in case of unforeseen consequences.
A user finds an APK file online of a popular paid application. What is a major concern that the user should have before using this APK?
The APK could be a bootleg application.
A bootleg application is a real application that has been cracked, but will likely have malware. These files should not be installed on an Android device because of security issues.
An Android user puts a phone into developer mode by following a certain sequence. Airdropping is a feature of iPhones rather than Android devices. Windows computers, not Android devices, have a Blue Screen of Death error.
A company's website is showing that no traffic is hitting it, although the site appears live when they access it on their browsers. They then discover that their DNS records were changed so that their website domain is addressed to another server. What type of issue are they facing?
Browser redirection
With a browser redirection attack, a company's DNS servers have been altered to point domain name requests to an attacker's system. The company will need to regain control of its DNS entries to begin remediation of this issue.
Cross-site scripting is when malicious code is inserted into a website. An expired certificate is when a website's digital certificate for verification and encryption is no longer valid. A SQL injection attack is when a database server is sent input that contains malicious SQL code.
What are three options available when right-clicking on an application in the Programs and Features tool in Windows?
If a user is having issues with an application, they can use the Programs and Features tool to manage it. By right-clicking on the application in the list, they can uninstall, change, or repair the application. Resetting is not an option.
A user has two different sets of speakers attached to their system. The user wants to change which speakers are used by default, because the current speakers are not loud enough. Which applet can they use to change this?
Sound
The Sound applet has tabs for playback, recording, sounds, and communications. A playback device can be set to default, along with other configuration options.
The Device Manager is used to manage hardware device drivers. The Power Options applet is used for configuring power savings. The Programs and Features applet is used to manage applications.
A user wants to change the notification level for their system so that any time that a Windows setting is changed, they receive a notification. Which applet can they use to configure this?
User Accounts
In the User Accounts applet, a user can make changes to User Account Control (UAC) settings. These settings control how a user is notified when making changes to the system, such as installing an application or changing settings.
The Device Manager applet is used to configure hardware drivers. The File Explorer applet is used to configure how to navigate the filesystem. The Windows Defender Firewall applet is used to configure rules to block certain network traffic.
What is the correct format for UNC paths?
\\server\share
The Universal Naming Convention (UNC) is used to access network shares from File Explorer. It first specifies the server name and then the fileshare.
Which command lets an administrator manage accounts in a domain?
net user
The "net user" command can be used to manage user accounts on a domain. Actions like creating new accounts, deleting accounts, or changing passwords can be completed.
The "gpupdate" command is used to update Group Policy settings. The "sfc" command is used to repair system files. The "hostname" command is used to return the hostname of the computer it is run on.
A small company of 8 employees wants to keep a basic inventory of their computer assets. What would be an ideal solution for this?
An inventory list in an Excel spreadsheet
For a small organization, an inventory list can be kept in a simple spreadsheet. This list can keep track of hardware like computers, mice, and keyboards, as well as software licensing information.
Asset tagging and an asset management system would be required for a larger organization. Hand-written inventory lists will be harder to maintain than a digital ledger.
Which of the following security measures should be taken with a smartphone?
Mobile devices have different security concerns than workstations or servers. However, they still need to have their operating systems updated. They should also have remote wipe enabled to delete sensitive information if the device is lost.
Mobile devices do not use firewalls because they make outgoing rather than incoming connections. They typically use PINs, gestures, or biometrics instead of complex passwords.
A user discovers that their Android device is generating a lot of traffic on their network. They suspect that the device might be compromised by a malicious application. What troubleshooting steps could they take to determine what is causing the issue?
Close applications one by one and check the effect on the volume of traffic
To determine which application is causing the issue, a user can close each application individually and see the effect that has on the network. Once a system has been compromised, it is a good idea to reset it to its original configuration.
Task Manager is used in Windows. Activity Monitor is used with macOS. Developer Mode is used to install applications that a user is creating on an Android phone .
Which type of information is depicted in a physical network topology diagram that isn't on a logical network topology diagram?
Network interfaces
In a physical diagram, the exact interfaces on devices are predicted. They have typical names like "Eth1" or "Gi 0/2" and give a detailed account of how information flows through a network.
Clients, servers, and routers are depicted in both physical and logical network topology diagrams.