1/106
asdf
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A company needs to set up perimeter security to control and monitor who can approach the building. Which of the following should the company use? (Select all that apply.)
Access control vestibule
Guard
Fencing
A company has backup storage located at a different location, which lowers the risk of losing both productions and backup copies of data. Which of the following is this backup storage?
Off-site backup storage
Which of the following alternatives can a customer select from when an issue cannot be resolved remotely?
Replace
Repair
A client administrator sets up a new system for GUID partition table (GPT) partitioning. What dependency will the administrator need to set?
UEFI
A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?
Port forwarding
What kind of software is often inadvertently installed by users, leading to recommendations for its removal due to potential security risks?
Potentially Unwanted Application (PUA)
A technician is cleaning a computer and notices dust forming over the fan blades and ventilation slots. What can the technician use to perform dust cleanup? (Select all that apply.)
PC vacuum cleaner
Compressed air blaster
Natural bristle brush
What method gets a system back up and running before the recommended amount of time elapses?
Rollback plan
An administrator uses a document list that identifies the discrete stages in the use of hardware and software. What is this document called?
Procurement life cycle
A computer administrator sets up a client workstation to join a centrally managed network. What options should the administrator configure to do this?
Access work or school
The IT Department has learned that a new employee starts on Monday and will need a computer just before the weekend. There is a used PC in the storeroom. A " no operating system found " message appears when the computer is rebooted after a technician installs Windows 10 on the computer with the hard drive partition style set to support Unified Extensible Firmware Interface (UEFI). Determine which of the following scenarios would generate that message.
Damaged hard drive
A transportation company wants to set up software that gathers statistics from the controller area network for trailers hauling loads, enabling them to adjust processes to optimize cost savings. What type of adapter will the company need to send the statistics back to their cloud network?
WWAN
A user is using AirDrop to send information to another device. What type of software is this?
File transfer
What is referred to as data on persistent storage like HDDs, SSDs, and thumb drives?
Data-at-rest encryption
A vulnerability manager investigates their mobile environment for overall risk posture and starts with identifying legacy systems. Who determines when an Android version is at the end of life?
Vendor
A server administrator sets up jobs that will copy over files on various servers. They want it to detect if the file was transferred successfully and, if not, resend the file. Which command is optimal for server administrators to perform this task?
robocopy
A curious user looks through their local logs and sees errors in region-coding copy-protection mechanisms. What type of device is generating these logs?
Optical media
A teenager hears from friends about a legitimate website to download games to their Samsung Galaxy phone that is not in the Google Play store. The teenager goes to the site and downloads some games. What best describes the teenager's behavior?
APK sideloading
A security analyst conducts an incident response investigation against suspected malware on a userbox. The analyst suspects a certain variant of malware known to beacon out to a command and control server. What command will help them investigate this?
netstat
What tool will distinguish client accounts and provide support for recording and reporting billable support activity?
RMM
Which of the following malware reconfigures browsers to allow tracking cookies?
Spyware
A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files? (Select all that apply.)
Files that are missing or renamed
Files with date stamps and file sizes that are different from known-good versions
Which of the following log-in options require a user to touch a device that takes a digital print?
Fingerprint scanner
A server administrator migrates their environment from physical servers to a virtualized environment. The administrator wants to install new virtual machine operating systems. What is the best approach to use regarding deploying virtualized OSs?
ISOs
If an individual is creating an account and unable to think of a strong key code word, the browser can suggest strong keycodes to use. What is this called?
Password manager
A customer uses their computer at a café, and an attacker watches the customer typing their login information. What is this called?
Shoulder surfing
Which of the following should generate an alert when the account is disabled or altered?
Change default administrator account.
Microsoft provides a repository of information about threats that Windows Defender discovers. What is the name of the repository?
Microsoft Knowledge Base
A software engineer uses the “data protection” option for the apps on their mobile device. This option is subject to the second round of encoding using a key derived from and protected by the user’s credentials. What is this method?
Device encryption
A company has hundreds of employees who use the same software on their computers, so they offer a company product key to access the software. What is this product?
Corporate-use license
A user is only able to read data on the file. What account management policy is this?
Restrict user permission.
A researcher calls the help desk complaining of slow computer performance. When the technician arrives and probes for clues, the researcher explains that they frequently run multiple programs simultaneously and have a significant number of browser tabs open to aid with their research. Which of the following solutions should speed up the computer's performance?
Add RAM.
The Snapchat app on an iOS phone will not close. The user rebooted the device, but that was unsuccessful. Which of the following options would be the best for the user to try to fix the problem?
Uninstall then reinstall
What uses domain names of components loading on the web page against a vast blacklist?
Ad blocker
A Linux administrator sets up a development environment where they can install and test new packages. Which of the following commands will help the administrator accomplish this? (Select all that apply.)
apt-get
yum
A teacher wishes to reform education in their school system. They are looking for low-cost operating systems to support education. Which one is best geared towards accomplishing their goal?
ChromeOS
A company has employees sign a document that enforces the importance of protecting the organization from the security and legal implications of employees misusing its equipment. What is this document?
Acceptable use policy
An employee uses a cryptographic contactless technique that allows access to a building. What is this technique?
Badge reader
A user notices that their device has a leaking component and needs to take careful measures to minimize any risk and discard the approved component at the proper waste facility. Which of the following disposal is this?
Battery
A technician helps a customer with a ticket request and needs to record that the customer has accepted that the ticket can be closed. Which of the following fields reflect this part of the ticket life cycle?
Problem resolution
A manager received a document identifying underlying causes and recommended remediation steps to mitigate the risk of repeating an issue. What is this document called?
Incident report
A company has experienced a power outage, but activation of an alternative source has kicked in. What is this alternative source called?
UPS
An endpoint machine administrator configures specific Apple computers designated for users with disability. Where should the administrator look to configure these settings?
Accessibility
A progressive healthcare provider sets up color-filter modes on client machines and tailors them to specific users who are color blind. Where can the healthcare administrator configure this?
Accessibility
Which of the following can prevent, detect, and remove software threats that consist of ransomware, Trojans, spyware, and rootkits?
Anti-malware
A threat actor uses a technique that allows devices to connect to an open authentication and then redirect the user’s browser to a fake captive portal that encourages the user to enter their network password. What is this technique?
Evil twin
A user has just set up their network and needs to make sure that their network is secure, and no one can log in to the network. Which of the following should the user do?
Change default passwords.
A digital forensics expert investigates a laptop that was not completely powered down. They are looking for a hibernation file on the local hard drive. Which power mode would perform this?
Hibernate
A user implements a method that requires a one-time code within a given time frame to get access to their email account. What is this method?
Soft token
An administrator wants to listen to music through headphones to help with productivity during work. However, the administrator is having issues connecting the headphones via Bluetooth. Where should they go first to look?
Devices
A helpdesk manager assesses older Windows 7 computers their company owns and tries to determine available upgrade paths. Which of the following can NOT be upgraded?
Windows 7 Home to Windows 10 Enterprise
An administrator uses a method that assigns permissions and rights to a collection of user accounts. What is this called?
Security group
A lawyer opens an email attachment that appears to be a court summons, but it is malware. The law firm's IT consultant quarantines the lawyer's system and then disables System Restore. Which of the following should IT disable?
File History
An IT specialist removes malware from a computer system and then re-enables System Restore. Then a new restore point is created, all security-critical services and settings are validated, and the DNS configuration is verified. However, when the specialist runs a final antivirus scan, it detects malware. Considering all the steps taken, which would explain why there was still malware on the system?
C&C network connection was detected.
An employee enters the web address of their local newspaper to check for news on the company, and a site pops up with many click-bait celebrity stories. The employee re-enters the address assuming a misspelling but returns to the same page. When the help desk technician arrives, which of the following troubleshooting steps would be appropriate?
Check HOSTS files for malicious entries.
A systems administrator for client machines has managed Windows machines for some time. The company is now adding Apple computers. The security team wants to implement an equivalent to Bitlocker. Which of the following should the administrator enable and configure?
FileVault
A security analyst notices a critical incident that has a widespread effect on customers that can eventually involve a potential data breach. The analyst creates a ticket with the vendor and sets the importance in order to trigger a faster response time. What describes what attribute of the ticket the analyst set?
Severity levels
A user receives an unsolicited call from a Microsoft support technician during a normal workday. The technician says the antivirus software on the user's computer alerted Microsoft of a new malware infection. The technician needs to remote into the user's computer to fix the problem. What is the technician trying to do?
Circumvent security software.
What are their options when a company wants to create and deliver a custom app for their employees without using a public store? (Select all that apply.)
Managed Google Play
Apple Business Manager
A security engineer runs a long tail analysis to determine the frequency of services and processes communicating to the internet. After baselining a large amount of normal traffic such as updates, they encounter a suspicious communication frequency every five minutes from a particular box. They have done a thorough job investigating running processes, memory analysis, and file integrity checks but find nothing. What else could the engineer check for persistence mechanisms that could send the communications?
taskschd.msc
What uses a 4-way handshake to allow a station to associate with an access point, authenticate its credential, and exchange a key to use for data encryption?
WPA2
A helpdesk professional assists a user with issues booting up their Mac computer. The user reports that there is no drive to boot from. Where will the computer boot from?
Web
A technician is talking to a customer about an issue, but the customer is not sure how to locate the issue on their computer, so the technician has the customer tell them step by step to figure out the issue. What type of technique is this?
Ask an open-ended question.
An employee is working with a substance that can potentially harm them. Which of the following should they use? (Select all that apply.)
Air filter mask
Safety goggles
A security awareness trainer spends a good portion of the training class talking about phishing, given its popularity as an attack vector. Phishing campaigns are getting more sophisticated, so the trainer is helping the class learn how to identify a phishing email. Which of the following is an indicator of phishing? (Select all that apply.)
Disguised links
Urgency
Inconsistent sender and reply to addresses
A user disables some of the laptops' services, thinking it would speed up performance. After restarting the laptop, "One or more services failed to start" appears. When the IT specialist opens the Services snap-in, they identify the failed service and restart it, but that does not fix it. Which of the following scenarios best explains why the restart did not work?
The user disabled a dependent service.
A user experiences issues searching their local computer for files. What is a common issue that the user should check?
Indexing options
A user uses a scripting language based on Microsoft’s Visual Basic programming language. Which of the following extensions is used?
.vbs
A client administrator for a video game development company wants to upgrade machines to support five primary partitions. The developers work with a lot of large files and might even need partitions larger than 2 TB. Which of the following should the administrator use?
GPT
A threat actor uses a technique that instills statements through an unfiltered user response. What is this technique?
SQL injection
A company uses an element that reminds users when logging in to the company’s device of the current software version. What is this called?
Splash screen
A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?
Frequency
A server administrator wants to run the latest technologies. What technology should the administrator start using which will replace the New Technology File System (NTFS)?
ReFS
A marketing professional normally sends large files to other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, so the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only 20 people at a time seemed to be able to access it. What is causing the issue?
The share was created on a Windows desktop.
During the IT team's weekly meeting, the topic of improving the overall cyber hygiene of the company turns into a discussion about the employee's lack of security awareness. Why would the IT team members focus on employee behavior? (Select all that apply.)
Social engineering
Phishing
A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files? (Select all that apply.)
Files with date stamps and file sizes that are different from known-good versions
Files that are missing or renamed
A penetration tester conducts the initial reconnaissance phase and is currently targeting externally facing servers for a certain company. Currently, they are trying to enumerate the domain name system (DNS) servers. Which built-in tool will help them perform this?
dig
A server administrator hears weekly about companies breached by malware. What is the most significant impact the server administrator is likely worried about?
Applications
A technician detected and reported an incident, resulting in the appropriate unit being notified and tasked with acting as first responders, taking charge of the situation, and formulating the appropriate response. What is this unit called?
CSIRT
A user experiences significant system instability on their computer. It frequently shuts down, freezes, reboots, and powers off with no accompanying error messages. Which of the following problems would cause this instability? (Select all that apply.)
Failing CPU
Overheating
Misconfigured firewall
An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to enable the built-in Microsoft solution?
System Settings
A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?
Port forwarding
A user implements a method that requires a one-time code within a given time frame to get access to their email account. What is this method?
Soft token
An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?
MSRA
A server administrator receives a report that the company's external-facing web server is unresponsive. Rebooting the server would take too long, and they are not even completely certain the server would come back up. What utility should the administrator use to restart the website?
services.msc
A user wants to maximize resource dedication to 3D performance and frame rate. Where should the user go to do this?
Gaming
A Windows administrator wants to learn how to use Linux by installing the Linux subsystem for Windows. What should their version of Windows have on the New Technology File System (NTFS) to support case-sensitive naming and hard links required by Linux?
POSIX
A technician is cleaning a computer and notices dust forming over the fan blades and ventilation slots. What can the technician use to perform dust cleanup? (Select all that apply.)
PC vacuum cleaner
Natural bristle brush
Compressed air blaster
A user calls the help desk with issues consistent with a malware infection, although the user received no alert. The technician confirms that there was no malware alert. Which of the following options would be an appropriate next step? (Select all that apply.)
Scan the system using different antivirus software.
Update the antivirus software.
A forensic investigator is told that a server's processor that does not normally run high has been over-utilized lately, and they suspect possible malware. The investigator wants to start by investigating processes. Which command can they use to start the investigation? (Select all that apply.)
top
ps
After starting the computer and signing in, a user notices the desktop takes a long time to load. Evaluate the following Windows operating system problems to determine the one that best diagnoses what could be causing the slowness.
Corrupted user profile
An IT professional is preparing a presentation to the organization’s Windows users on the differences between Windows 10 Pro, Enterprise, Education, and Home editions. Which statement is accurate?
RDP is not a workable feature when using Windows Home edition and enables the user to connect to the machine and operate it over the network.
A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?
Frequency
When making major adjustments to a project, a security technician will have to assess the business and technical merits as well as the risks of the adjustment plan. What documentation will need to be submitted?
Change board approval
An .exe file is initiated on a Windows system and is running in silent mode. What technique is being performed in this instance?
Installation of applications
A user has owned the same personal computer for a while and thinks it might be time for an upgrade. Which of the following are upgrade considerations? (Select all that apply.)
Hardware compatibility
Application support
Backup files
A malware infection can manifest in many ways, often making it difficult to diagnose. Malware may cause which of the following computer issues? (Select all that apply.)
Windows update fails
Redirection
An administrator uses an access control system to shuttle authentication and authorization traffic between the supplicant and the AAA that encrypts an entire authentication rather than just the password. What is this method?
TACACS+
A threat actor uses a technique that allows devices to connect to an open authentication and then redirect the user’s browser to a fake captive portal that encourages the user to enter their network password. What is this technique?
Evil twin
A helpdesk operator looks at build numbers for Windows as they plan upgrade timelines. The operator investigates the significance of the build numbers. Which of the following are the build numbers based on? (Select all that apply.)
Time of year
Year