1/12
POCKET PREP
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which type of battery does not contaminate the environment?
Li-ion
Lithium ion (Li-ion) batteries and Nickel-Metal Hydride (NiMH) are not considered hazardous. They can also be recycled.
Nickel-Cadmium (NiCd) contains cadmium, which is highly toxic. Alkaline batteries still contain some harmful chemicals like potassium hydroxide. Button cell batteries contain mercury.
A business needs to set up a backup strategy. They want to make a full backup once per week on Sundays and then make daily backups of each change that happened on each day. So, if they need to restore data on a Wednesday, they will need the full backup plus backup files for each day in between. Which type of backup strategy are they using?
Incremental
An incremental backup takes a full backup and then adds changes each day. Only files that have been changed since the last full or incremental backup are backed up each day.
A full backup backs up each file. A differential backup makes a full backup and then another backup so that only two steps need to be completed to restore the data. A copy is a full backup that does not reset the archive bits.
Which type of backup creates an exact replica of files but does not reset archive bits?
Copy
A copy is a full backup that does not reset the archive bits. It is useful for making a backup without interrupting the regular backup schedule.
A full backup resets all the archive bits. An incremental backup backs up files with the archive bit set and then resets the bit. A differential backup backs up files with the archive bit set, but does not reset the archive bit.
An employee for a company is suddenly able to install unapproved apps for their iPhone. What has MOST LIKELY happened?
Their device has been jailbroken
If an iPhone has been jailbroken, the user will be able to install any app on it without having to go through the App Store. This can be a security concern because it becomes easy to install malware.
Developer mode is used with Android phones. Low memory would not relate to the issue. Different iOS versions do not relate to installing apps without the App Store.
A technician is changing the RAM in a desktop computer. They want to be able to use the RAM in other systems even after taking it out of this one. After taking out the RAM sticks, where should they be placed?
On an ESD mat
An electrostatic discharge (ESD) mat will drain any charge left within the RAM. That will help prevent it from getting any damage from ESD.
A metal desk and a desktop case can cause ESD damage. An antistatic bag does not drain the charge but can protect it from the outside.
When requiring complex passwords that use lowercase letters, uppercase letters, numbers, and special characters, how many possible characters are in each position of the password?
95
When using complex passwords, there are 26 lowercase letters, 26 uppercase letters, 10 digits, and 33 special characters, which adds up to 95 different characters that can occupy each place in a password. An 8-character complex password would have 95 to the 8th power of possible combinations, or 6,547,408,607,889,473,600 possible combinations.
What is the first step when following best practices for malware removal?
Identify malware symptoms
The first step is to identify whether there is an issue. Proof of the type of malware present should be found before moving on to fixing the issue.
Quarantining the system can be done after the issue is identified. Disabling system restore can be done after quarantining so that the system does not return to an infected state. Running updates are done after remediating the system.
A multi-boot system has had trouble booting into Windows. An administrator wants to verify that the file that holds the locations of operating system files is still there.
Which file should they check?
BCD
The Boot Configuration Data (BCD) file contains information about operating systems that are on the system. If there is a problem with this file, it can be rebuilt by booting into the Windows Recovery Environment and using Startup Repair.
The ntbtlog.txt file stores information about boot events. The hiberfile.sys file holds information from memory when the system is coming back from a hibernated state. The Master Boot Record (MBR) loads and finds the boot sector before the BCD is read.
What are some different types of resources that can be shared in a Windows workgroup?
A Windows workgroup can share various resources, including files, applications, printers, scanners, and cameras. Sensitive information cannot be shared, such as operating system files, registry keys, or resources that require authentication, like certificates.
Which types of technology are used so that badges can be read by badge readers?
ID badges and badge readers are used as a form of physical security to only allow authorized users into an area. These badges use either magnetic strips for swiping or RFID (Radio-Frequency Identification) for authenticating wirelessly over short distances. Bluetooth and Wi-Fi work for longer distances and require their own power source.
What is the proper setup for using an ESD strap when adding RAM to a desktop computer?
One end wrapped around the wrist and the other clipped to the case
The proper way to use an electrostatic discharge strap is to wrap it around the wrist at one end and use the alligator clip to clip it to the case. The power supply should be plugged in, but not turned on, so that any ESD is discharged to the ground rather than to the case.
Which of the following situations are common symptoms that could indicate a security issue with a PC?
Common symptoms of a security issue include fake desktop alerts, sudden networking issues, and push notifications that look like they are coming from the operating system. A free antivirus program trying to sell additional products is not an indicator of a security threat.
When creating a support ticket to address a user's request, what is the first piece of information that a technician should get from the user?
User's name
The first piece of information that should be taken on a support call is the user's name. They can be referred to by their name throughout the call. Additionally, the best method to contact them should be retrieved, such as their phone number or email address.
A description of the problem, the user's device information, the severity of the problem, and the category of the problem can be taken later.