1102 Mock Exam #1 Missed Questions

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

flashcard set

Earn XP

Description and Tags

POCKET PREP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Which type of battery does not contaminate the environment?

Li-ion

  • Lithium ion (Li-ion) batteries and Nickel-Metal Hydride (NiMH) are not considered hazardous. They can also be recycled.

  • Nickel-Cadmium (NiCd) contains cadmium, which is highly toxic. Alkaline batteries still contain some harmful chemicals like potassium hydroxide. Button cell batteries contain mercury. 

2
New cards

A business needs to set up a backup strategy. They want to make a full backup once per week on Sundays and then make daily backups of each change that happened on each day. So, if they need to restore data on a Wednesday, they will need the full backup plus backup files for each day in between. Which type of backup strategy are they using?

Incremental

  • An incremental backup takes a full backup and then adds changes each day. Only files that have been changed since the last full or incremental backup are backed up each day.

  • A full backup backs up each file. A differential backup makes a full backup and then another backup so that only two steps need to be completed to restore the data. A copy is a full backup that does not reset the archive bits. 

3
New cards

Which type of backup creates an exact replica of files but does not reset archive bits?

Copy

  • A copy is a full backup that does not reset the archive bits. It is useful for making a backup without interrupting the regular backup schedule.

  • A full backup resets all the archive bits. An incremental backup backs up files with the archive bit set and then resets the bit. A differential backup backs up files with the archive bit set, but does not reset the archive bit.

4
New cards

An employee for a company is suddenly able to install unapproved apps for their iPhone. What has MOST LIKELY happened?

Their device has been jailbroken

  • If an iPhone has been jailbroken, the user will be able to install any app on it without having to go through the App Store. This can be a security concern because it becomes easy to install malware.

  • Developer mode is used with Android phones. Low memory would not relate to the issue. Different iOS versions do not relate to installing apps without the App Store.

5
New cards

A technician is changing the RAM in a desktop computer. They want to be able to use the RAM in other systems even after taking it out of this one. After taking out the RAM sticks, where should they be placed?

On an ESD mat

  • An electrostatic discharge (ESD) mat will drain any charge left within the RAM. That will help prevent it from getting any damage from ESD.

  • A metal desk and a desktop case can cause ESD damage. An antistatic bag does not drain the charge but can protect it from the outside.

6
New cards

When requiring complex passwords that use lowercase letters, uppercase letters, numbers, and special characters, how many possible characters are in each position of the password?

95

  • When using complex passwords, there are 26 lowercase letters, 26 uppercase letters, 10 digits, and 33 special characters, which adds up to 95 different characters that can occupy each place in a password. An 8-character complex password would have 95 to the 8th power of possible combinations, or 6,547,408,607,889,473,600 possible combinations.

7
New cards

What is the first step when following best practices for malware removal?

Identify malware symptoms

  • The first step is to identify whether there is an issue. Proof of the type of malware present should be found before moving on to fixing the issue.

  • Quarantining the system can be done after the issue is identified. Disabling system restore can be done after quarantining so that the system does not return to an infected state. Running updates are done after remediating the system.

8
New cards

A multi-boot system has had trouble booting into Windows. An administrator wants to verify that the file that holds the locations of operating system files is still there.

Which file should they check?

BCD

  • The Boot Configuration Data (BCD) file contains information about operating systems that are on the system. If there is a problem with this file, it can be rebuilt by booting into the Windows Recovery Environment and using Startup Repair.

  • The ntbtlog.txt file stores information about boot events. The hiberfile.sys file holds information from memory when the system is coming back from a hibernated state. The Master Boot Record (MBR) loads and finds the boot sector before the BCD is read.

9
New cards

What are some different types of resources that can be shared in a Windows workgroup?

A Windows workgroup can share various resources, including files, applications, printers, scanners, and cameras. Sensitive information cannot be shared, such as operating system files, registry keys, or resources that require authentication, like certificates.

10
New cards

Which types of technology are used so that badges can be read by badge readers?

ID badges and badge readers are used as a form of physical security to only allow authorized users into an area. These badges use either magnetic strips for swiping or RFID (Radio-Frequency Identification) for authenticating wirelessly over short distances. Bluetooth and Wi-Fi work for longer distances and require their own power source.

11
New cards

What is the proper setup for using an ESD strap when adding RAM to a desktop computer?

One end wrapped around the wrist and the other clipped to the case

  • The proper way to use an electrostatic discharge strap is to wrap it around the wrist at one end and use the alligator clip to clip it to the case. The power supply should be plugged in, but not turned on, so that any ESD is discharged to the ground rather than to the case.

12
New cards

Which of the following situations are common symptoms that could indicate a security issue with a PC?

Common symptoms of a security issue include fake desktop alerts, sudden networking issues, and push notifications that look like they are coming from the operating system. A free antivirus program trying to sell additional products is not an indicator of a security threat.

13
New cards

When creating a support ticket to address a user's request, what is the first piece of information that a technician should get from the user?

User's name

  • The first piece of information that should be taken on a support call is the user's name. They can be referred to by their name throughout the call. Additionally, the best method to contact them should be retrieved, such as their phone number or email address.

  • A description of the problem, the user's device information, the severity of the problem, and the category of the problem can be taken later.