asdf

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/106

flashcard set

Earn XP

Description and Tags

asdf

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

107 Terms

1
New cards

A company needs to set up perimeter security to control and monitor who can approach the building. Which of the following should the company use? (Select all that apply.)

Access control vestibule

Guard

Fencing

2
New cards

A company has backup storage located at a different location, which lowers the risk of losing both productions and backup copies of data. Which of the following is this backup storage?

Off-site backup storage

3
New cards

Which of the following alternatives can a customer select from when an issue cannot be resolved remotely?

Replace
Repair

4
New cards

A client administrator sets up a new system for GUID partition table (GPT) partitioning. What dependency will the administrator need to set?

UEFI

5
New cards

A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?

Port forwarding

6
New cards

What kind of software is often inadvertently installed by users, leading to recommendations for its removal due to potential security risks?

Potentially Unwanted Application (PUA)

7
New cards

A technician is cleaning a computer and notices dust forming over the fan blades and ventilation slots. What can the technician use to perform dust cleanup? (Select all that apply.)

PC vacuum cleaner

Compressed air blaster
Natural bristle brush

8
New cards

What method gets a system back up and running before the recommended amount of time elapses?

Rollback plan

9
New cards

An administrator uses a document list that identifies the discrete stages in the use of hardware and software. What is this document called?


Procurement life cycle

10
New cards

A computer administrator sets up a client workstation to join a centrally managed network. What options should the administrator configure to do this?

Access work or school

11
New cards

The IT Department has learned that a new employee starts on Monday and will need a computer just before the weekend. There is a used PC in the storeroom. A " no operating system found " message appears when the computer is rebooted after a technician installs Windows 10 on the computer with the hard drive partition style set to support Unified Extensible Firmware Interface (UEFI). Determine which of the following scenarios would generate that message.

Damaged hard drive

12
New cards

A transportation company wants to set up software that gathers statistics from the controller area network for trailers hauling loads, enabling them to adjust processes to optimize cost savings. What type of adapter will the company need to send the statistics back to their cloud network?

WWAN

13
New cards

A user is using AirDrop to send information to another device. What type of software is this?


File transfer

14
New cards

What is referred to as data on persistent storage like HDDs, SSDs, and thumb drives?

Data-at-rest encryption

15
New cards

A vulnerability manager investigates their mobile environment for overall risk posture and starts with identifying legacy systems. Who determines when an Android version is at the end of life?

Vendor

16
New cards

A server administrator sets up jobs that will copy over files on various servers. They want it to detect if the file was transferred successfully and, if not, resend the file. Which command is optimal for server administrators to perform this task?


robocopy

17
New cards

A curious user looks through their local logs and sees errors in region-coding copy-protection mechanisms. What type of device is generating these logs?

Optical media

18
New cards

A teenager hears from friends about a legitimate website to download games to their Samsung Galaxy phone that is not in the Google Play store. The teenager goes to the site and downloads some games. What best describes the teenager's behavior?


APK sideloading

19
New cards

A security analyst conducts an incident response investigation against suspected malware on a userbox. The analyst suspects a certain variant of malware known to beacon out to a command and control server. What command will help them investigate this?

netstat

20
New cards

What tool will distinguish client accounts and provide support for recording and reporting billable support activity?

RMM

21
New cards

Which of the following malware reconfigures browsers to allow tracking cookies?


Spyware

22
New cards

A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files? (Select all that apply.)


Files that are missing or renamed

Files with date stamps and file sizes that are different from known-good versions

23
New cards

Which of the following log-in options require a user to touch a device that takes a digital print?


Fingerprint scanner

24
New cards

A server administrator migrates their environment from physical servers to a virtualized environment. The administrator wants to install new virtual machine operating systems. What is the best approach to use regarding deploying virtualized OSs?

ISOs

25
New cards

If an individual is creating an account and unable to think of a strong key code word, the browser can suggest strong keycodes to use. What is this called?

Password manager

26
New cards

A customer uses their computer at a café, and an attacker watches the customer typing their login information. What is this called?


Shoulder surfing

27
New cards

Which of the following should generate an alert when the account is disabled or altered?


Change default administrator account.

28
New cards

Microsoft provides a repository of information about threats that Windows Defender discovers. What is the name of the repository?


Microsoft Knowledge Base

29
New cards

A software engineer uses the “data protection” option for the apps on their mobile device. This option is subject to the second round of encoding using a key derived from and protected by the user’s credentials. What is this method?


Device encryption

30
New cards

A company has hundreds of employees who use the same software on their computers, so they offer a company product key to access the software. What is this product?


Corporate-use license

31
New cards

A user is only able to read data on the file. What account management policy is this?


Restrict user permission.

32
New cards

A researcher calls the help desk complaining of slow computer performance. When the technician arrives and probes for clues, the researcher explains that they frequently run multiple programs simultaneously and have a significant number of browser tabs open to aid with their research. Which of the following solutions should speed up the computer's performance?

Add RAM.

33
New cards

The Snapchat app on an iOS phone will not close. The user rebooted the device, but that was unsuccessful. Which of the following options would be the best for the user to try to fix the problem?


Uninstall then reinstall

34
New cards

What uses domain names of components loading on the web page against a vast blacklist?


Ad blocker

35
New cards

A Linux administrator sets up a development environment where they can install and test new packages. Which of the following commands will help the administrator accomplish this? (Select all that apply.)


apt-get

yum

36
New cards

A teacher wishes to reform education in their school system. They are looking for low-cost operating systems to support education. Which one is best geared towards accomplishing their goal?

ChromeOS

37
New cards

A company has employees sign a document that enforces the importance of protecting the organization from the security and legal implications of employees misusing its equipment. What is this document?


Acceptable use policy

38
New cards

An employee uses a cryptographic contactless technique that allows access to a building. What is this technique?

Badge reader

39
New cards

A user notices that their device has a leaking component and needs to take careful measures to minimize any risk and discard the approved component at the proper waste facility. Which of the following disposal is this?

Battery

40
New cards

A technician helps a customer with a ticket request and needs to record that the customer has accepted that the ticket can be closed. Which of the following fields reflect this part of the ticket life cycle?

Problem resolution

41
New cards

A manager received a document identifying underlying causes and recommended remediation steps to mitigate the risk of repeating an issue. What is this document called?

Incident report

42
New cards

A company has experienced a power outage, but activation of an alternative source has kicked in. What is this alternative source called?

UPS

43
New cards

An endpoint machine administrator configures specific Apple computers designated for users with disability. Where should the administrator look to configure these settings?

Accessibility

44
New cards

A progressive healthcare provider sets up color-filter modes on client machines and tailors them to specific users who are color blind. Where can the healthcare administrator configure this?

Accessibility

45
New cards

Which of the following can prevent, detect, and remove software threats that consist of ransomware, Trojans, spyware, and rootkits?

Anti-malware

46
New cards

A threat actor uses a technique that allows devices to connect to an open authentication and then redirect the user’s browser to a fake captive portal that encourages the user to enter their network password. What is this technique?

Evil twin

47
New cards

A user has just set up their network and needs to make sure that their network is secure, and no one can log in to the network. Which of the following should the user do?

Change default passwords.

48
New cards

A digital forensics expert investigates a laptop that was not completely powered down. They are looking for a hibernation file on the local hard drive. Which power mode would perform this?

Hibernate

49
New cards

A user implements a method that requires a one-time code within a given time frame to get access to their email account. What is this method?

Soft token

50
New cards

An administrator wants to listen to music through headphones to help with productivity during work. However, the administrator is having issues connecting the headphones via Bluetooth. Where should they go first to look?

Devices

51
New cards

A helpdesk manager assesses older Windows 7 computers their company owns and tries to determine available upgrade paths. Which of the following can NOT be upgraded?


Windows 7 Home to Windows 10 Enterprise

52
New cards

An administrator uses a method that assigns permissions and rights to a collection of user accounts. What is this called?

Security group

53
New cards

A lawyer opens an email attachment that appears to be a court summons, but it is malware. The law firm's IT consultant quarantines the lawyer's system and then disables System Restore. Which of the following should IT disable?

File History

54
New cards

An IT specialist removes malware from a computer system and then re-enables System Restore. Then a new restore point is created, all security-critical services and settings are validated, and the DNS configuration is verified. However, when the specialist runs a final antivirus scan, it detects malware. Considering all the steps taken, which would explain why there was still malware on the system?

C&C network connection was detected.

55
New cards

An employee enters the web address of their local newspaper to check for news on the company, and a site pops up with many click-bait celebrity stories. The employee re-enters the address assuming a misspelling but returns to the same page. When the help desk technician arrives, which of the following troubleshooting steps would be appropriate?

Check HOSTS files for malicious entries.

56
New cards

A systems administrator for client machines has managed Windows machines for some time. The company is now adding Apple computers. The security team wants to implement an equivalent to Bitlocker. Which of the following should the administrator enable and configure?

FileVault

57
New cards

A security analyst notices a critical incident that has a widespread effect on customers that can eventually involve a potential data breach. The analyst creates a ticket with the vendor and sets the importance in order to trigger a faster response time. What describes what attribute of the ticket the analyst set?

Severity levels

58
New cards

A user receives an unsolicited call from a Microsoft support technician during a normal workday. The technician says the antivirus software on the user's computer alerted Microsoft of a new malware infection. The technician needs to remote into the user's computer to fix the problem. What is the technician trying to do?

Circumvent security software.

59
New cards

What are their options when a company wants to create and deliver a custom app for their employees without using a public store? (Select all that apply.)

Managed Google Play

Apple Business Manager

60
New cards

A security engineer runs a long tail analysis to determine the frequency of services and processes communicating to the internet. After baselining a large amount of normal traffic such as updates, they encounter a suspicious communication frequency every five minutes from a particular box. They have done a thorough job investigating running processes, memory analysis, and file integrity checks but find nothing. What else could the engineer check for persistence mechanisms that could send the communications?

taskschd.msc

61
New cards

What uses a 4-way handshake to allow a station to associate with an access point, authenticate its credential, and exchange a key to use for data encryption?

WPA2

62
New cards

A helpdesk professional assists a user with issues booting up their Mac computer. The user reports that there is no drive to boot from. Where will the computer boot from?

Web

63
New cards

A technician is talking to a customer about an issue, but the customer is not sure how to locate the issue on their computer, so the technician has the customer tell them step by step to figure out the issue. What type of technique is this?

Ask an open-ended question.

64
New cards

An employee is working with a substance that can potentially harm them. Which of the following should they use? (Select all that apply.)

Air filter mask

Safety goggles

65
New cards

A security awareness trainer spends a good portion of the training class talking about phishing, given its popularity as an attack vector. Phishing campaigns are getting more sophisticated, so the trainer is helping the class learn how to identify a phishing email. Which of the following is an indicator of phishing? (Select all that apply.)

Disguised links

Urgency

Inconsistent sender and reply to addresses

66
New cards

A user disables some of the laptops' services, thinking it would speed up performance. After restarting the laptop, "One or more services failed to start" appears. When the IT specialist opens the Services snap-in, they identify the failed service and restart it, but that does not fix it. Which of the following scenarios best explains why the restart did not work?

The user disabled a dependent service.

67
New cards

A user experiences issues searching their local computer for files. What is a common issue that the user should check?

Indexing options

68
New cards

A user uses a scripting language based on Microsoft’s Visual Basic programming language. Which of the following extensions is used?

.vbs

69
New cards

A client administrator for a video game development company wants to upgrade machines to support five primary partitions. The developers work with a lot of large files and might even need partitions larger than 2 TB. Which of the following should the administrator use?

GPT

70
New cards

A threat actor uses a technique that instills statements through an unfiltered user response. What is this technique?

SQL injection

71
New cards

A company uses an element that reminds users when logging in to the company’s device of the current software version. What is this called?

Splash screen

72
New cards

A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?

Frequency

73
New cards

A server administrator wants to run the latest technologies. What technology should the administrator start using which will replace the New Technology File System (NTFS)?

ReFS

74
New cards

A marketing professional normally sends large files to other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, so the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only 20 people at a time seemed to be able to access it. What is causing the issue?

The share was created on a Windows desktop.

75
New cards

During the IT team's weekly meeting, the topic of improving the overall cyber hygiene of the company turns into a discussion about the employee's lack of security awareness. Why would the IT team members focus on employee behavior? (Select all that apply.)

Social engineering

Phishing

76
New cards

A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files? (Select all that apply.)

Files with date stamps and file sizes that are different from known-good versions

Files that are missing or renamed

77
New cards

A penetration tester conducts the initial reconnaissance phase and is currently targeting externally facing servers for a certain company. Currently, they are trying to enumerate the domain name system (DNS) servers. Which built-in tool will help them perform this?

dig

78
New cards

A server administrator hears weekly about companies breached by malware. What is the most significant impact the server administrator is likely worried about?

Applications

79
New cards

A technician detected and reported an incident, resulting in the appropriate unit being notified and tasked with acting as first responders, taking charge of the situation, and formulating the appropriate response. What is this unit called?

CSIRT

80
New cards

A user experiences significant system instability on their computer. It frequently shuts down, freezes, reboots, and powers off with no accompanying error messages. Which of the following problems would cause this instability? (Select all that apply.)

Failing CPU

Overheating

Misconfigured firewall

81
New cards

An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to enable the built-in Microsoft solution?

System Settings

82
New cards

A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?

Port forwarding

83
New cards

A user implements a method that requires a one-time code within a given time frame to get access to their email account. What is this method?

Soft token

84
New cards

An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?

MSRA

85
New cards

A server administrator receives a report that the company's external-facing web server is unresponsive. Rebooting the server would take too long, and they are not even completely certain the server would come back up. What utility should the administrator use to restart the website?

services.msc

86
New cards

A user wants to maximize resource dedication to 3D performance and frame rate. Where should the user go to do this?

Gaming

87
New cards

A Windows administrator wants to learn how to use Linux by installing the Linux subsystem for Windows. What should their version of Windows have on the New Technology File System (NTFS) to support case-sensitive naming and hard links required by Linux?

POSIX

88
New cards

A technician is cleaning a computer and notices dust forming over the fan blades and ventilation slots. What can the technician use to perform dust cleanup? (Select all that apply.)

PC vacuum cleaner

Natural bristle brush

Compressed air blaster

89
New cards

A user calls the help desk with issues consistent with a malware infection, although the user received no alert. The technician confirms that there was no malware alert. Which of the following options would be an appropriate next step? (Select all that apply.)

Scan the system using different antivirus software.

Update the antivirus software.

90
New cards

A forensic investigator is told that a server's processor that does not normally run high has been over-utilized lately, and they suspect possible malware. The investigator wants to start by investigating processes. Which command can they use to start the investigation? (Select all that apply.)

top

ps

91
New cards

After starting the computer and signing in, a user notices the desktop takes a long time to load. Evaluate the following Windows operating system problems to determine the one that best diagnoses what could be causing the slowness.

Corrupted user profile

92
New cards

An IT professional is preparing a presentation to the organization’s Windows users on the differences between Windows 10 Pro, Enterprise, Education, and Home editions. Which statement is accurate?

RDP is not a workable feature when using Windows Home edition and enables the user to connect to the machine and operate it over the network.

93
New cards

A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?

Frequency

94
New cards

When making major adjustments to a project, a security technician will have to assess the business and technical merits as well as the risks of the adjustment plan. What documentation will need to be submitted?

Change board approval

95
New cards

An .exe file is initiated on a Windows system and is running in silent mode. What technique is being performed in this instance?

Installation of applications

96
New cards

A user has owned the same personal computer for a while and thinks it might be time for an upgrade. Which of the following are upgrade considerations? (Select all that apply.)

Hardware compatibility

Application support

Backup files

97
New cards

A malware infection can manifest in many ways, often making it difficult to diagnose. Malware may cause which of the following computer issues? (Select all that apply.)

Windows update fails

Redirection

98
New cards

An administrator uses an access control system to shuttle authentication and authorization traffic between the supplicant and the AAA that encrypts an entire authentication rather than just the password. What is this method?

TACACS+

99
New cards

A threat actor uses a technique that allows devices to connect to an open authentication and then redirect the user’s browser to a fake captive portal that encourages the user to enter their network password. What is this technique?

Evil twin

100
New cards

A helpdesk operator looks at build numbers for Windows as they plan upgrade timelines. The operator investigates the significance of the build numbers. Which of the following are the build numbers based on? (Select all that apply.)

Time of year

Year