1/107
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A supervised macOS can be restricted in terms of app installation and uninstallation policies. Corporate apps can be pushed to devices via
the Business Manager portal.
When users reboot an Apple Mac, if the startup drive is not available for any reason and it is connected to the internet, the computer will try to boot from
a web-based drive.
Which of the following alternatives can a customer select from when an issue cannot be resolved remotely?
Replace & Repair
Over the course of a day, a user's computer becomes slow, and pop-ups randomly appear on the screen. Later, these pop-ups become more frequent, and the user notices that Internet searchers are using Google versus the selected default web browser, Firefox. Once the computer starts repeatedly crashing, the user calls tech support for help. Considering these data points, which is the best diagnosis for the observed problem?
Adware or spyware infection
The goal of ransomware
encrypts files to shut down access to data until payment is made., extortion
While conducting an online search for cleaning services, a homeowner clicks on the link for one of the results. When the website loads, the page says, "Warning: Potential Security Risk Ahead." What would cause this message to appear?
-The certificate has expired.
-Malware is trying to redirect the browser to a spoofed page.
-The certificate is issued by an untrusted CA.
An administrator assists the human resources department in testing access to their new cloud-based training site. Unfortunately, the site cannot be accessed due to the organizational security policy. Which of the following should the administrator use to assist them?
certmgr.msc
A user downloaded a script, but the file was in a text file format. The user needs to change the extension to a PowerShell script to run it, but they do not see the extension. Where can the user configure this setting?
File Explorer View tab
On the File Explorer View tab
among many other options, users can configure hidden extensions, hidden files, and hide operating system files.
On the File Explorer General tab
users can set options for the layout of Explorer windows and switch between the single-click and double-click styles of opening shortcuts.
Ease of Access settings
configures input and output options to best suit each user. There are three main settings groups.
The Internet Options Control Panel applet
exposes the configuration settings for Microsoft’s Internet Explorer (IE) browser. The Security tab restricts what types of potentially risky active content are allowed to run.
An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?
MSRA
Microsoft Remote Assistance (MSRA)
allows a user to ask for help from a technician or co-worker by an invitation file protected by a passcode. The helper opens the invitation file to connect to the remote system.
Remote Monitoring and Management (RMM)
tools are principally designed for use by managed service providers (MSPs).
Remote Desktop Protocol (RDP)
implements terminal server and client functionality. RDP authentication and session data are always encrypted.
A virtual private network (VPN)
establishes a tunneled link that joins a local computer to a remote network. Establish a VPN link and then use a remote desktop to connect to a host on the private network.
the system firmware must be set to use the Unified Extensible Firmware Interface (UEFI) boot method.
When the disk uses GPT partitioning
The disk will not be recognized as a boot device if the boot method is set to BIOS.
requires a CPU or motherboard supporting trusted platform module (TPM) version 2.
Windows 11
The master boot record (MBR) partition style
stores a partition table in the first 512-byte sector on the disk, which is different from UEFI.
A client uses this software that allows access to a given computer. What is this software?
Screen-sharing
is software that is designed to work over HTTPS across the internet. This is secure because the connection is encrypted but also easier to implement as it does not require special firewall rules.
Screen-sharing
users can choose a file-sharing protocol that can be used across all connected hosts. It allows configuring permissions on the share and provisioning user accounts that are recognized by both the server and client.
With file transfer
Desktop management
these suites are designed for deployment by a single organization and focus primarily on access control and authorization.
The System Restore tool in Windows is used to roll back configuration changes to an earlier date or restore point. One option for creating restore points is to use Task Scheduler. What other actions will create a restore point? (Select all that apply.)
-Whenever an application or program is installed, a restore point is created.
-A restore point is also created whenever an application or program is updated.
Surge suppressors
are passive protection devices that can filter out the effects of surges and spikes.
A compressed air blaster
can be used to dislodge dust from difficult-to-reach areas. When performing this sort of maintenance within a controlled area, wear an appropriate air-filter mask and goggles.
are packages that reduce the risk of ESD because it is coated with a conductive material.Â
Antistatic bags
should fit snugly around the wrist or ankle so that the metal stud makes contact with the skin. Wearing an anti-ESD wrist strap causes the static charge to dissipate more effectively.
Anti-ESD wrist straps
The chain of custody
form records where, when, and who collected the evidence, handled it subsequently, and stored it.
The Certificate Manager (certmgr.msc) console shows
which console shows certificates that have been installed and provides a mechanism for requesting and importing new certificates.
The Disk Management (diskmgmt.msc) console displays
a summary of any fixed and removable disks, which includes hard disk drives (HDDs), solid-state drives (SSDs), and optical drives.
The Task Scheduler (taskschd.msc)
runs software and scripts according to calendar or event triggers which would not help diagnose and troubleshoot internet connectivity issues.
The Local Users and Groups (lusrmgr.msc) console
provides an advanced interface for creating, modifying, disabling, and deleting user accounts.
An administrator assists the human resources department in testing access to their new cloud-based training site. Unfortunately, the site cannot be accessed due to the organizational security policy. Which of the following should the administrator use to assist them?
certmgr.msc
What is this called when antivirus software scans a file before allowing or preventing it from opening?is when the antivirus software intercepts an operating system call to open a file and scans the file before allowing or preventing it from being opened. .
On-access scanning
scans a computer's critical areas, like system memory, hidden services, boot sectors, auto-run entries, registry keys, and important operating system files and folders.
A smart scan
looks at all the locations where there could be malware, such as registry keys and known Windows startup folders.
A quick scan
A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files? (Select all that apply.)
-Files that are missing or renamed
-Files with date stamps and file sizes that are different from known-good versions
While malware will add additional files with names almost the same as authentic system files, the extensions .docx and.xlsx represent Word and Excel files, respectively. These are data files, not system files. System files have extensions such as .dll and .sys.
-System files do not have certificates. Certificates are a security tool used by websites to prove the server is trusted.
A helpdesk operator looks at build numbers for Windows as they plan upgrade timelines. The operator investigates the significance of the build numbers. Which of the following are the build numbers based on? (Select all that apply.)
-Year
-Time of Year
chkdsk
scans the file system and disk sectors for faults and can attempt to repair any problems detected.
format command
writes a new file system to a drive. This process deletes any data existing on the drive. This could be catastrophic if used in the wrong way.
xcopy command
is a utility that allows administrators to copy the contents of more than one directory at a time and retain the directory structure.
Diskpart
is the command interface underlying the Disk Management tool. it deals with partitions and management.
A marketing professional normally sends large files to other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, so the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only 20 people at a time seemed to be able to access it. What is causing the issue?
The share was created on a Windows desktop.
If more than 20 users access the share, the data should be stored on
file servers rather than local client computers.
Robocopy command (or "robust copy")
is another file copy utility. Microsoft now recommends using rather than xcopy. It is designed to work better with long file names and NTFS attributes.Windows
The xcopy command
is a utility that allows users to copy the contents of more than one directory at a time and retain the directory structure.Windows
The move command
provides the ability to transfer files contained in a single directory. It uses a three-part syntax: command Source Destination, where Source is the drive name, path, and name of the files to be moved/copied.Windows
The copy command
also allows transferring files contained in a single directory. Windows
A user calls the help desk complaining that Windows freezes to a blue screen every time it tries to boot. When the technician arrives, they boot the computer in Safe Mode. After evaluating this situation, what is the BEST reason the technician wants to enter Safe Mode to begin troubleshooting?
Safe Mode loads only the minimum amount of drivers and services to start the system.
The blue screen of death (BSoD) is mostly due to
faulty hardware, especially at startup. CHKDSK scans the hard drive to find and repair errors, and it can be run in Safe Mode and many other analysis and recovery tools.
Cryptominer
hijacks the resources of the host to perform cryptocurrency mining. Cryptomining is often performed across botnets which are also referred to as cryptojacking.
Spyware
is malware that can perform browser reconfigurations, such as allowing tracking cookies, changing default search providers, opening arbitrary pages at startup, adding bookmarks, and so on.
Viruses
are concealed within the code of an executable process image stored as a file on a disk.
Trojans
are malware concealed within an installer package for software that appears to be legitimate. The malware will be installed alongside the program and executed with the same privileges.
What is referred to as data on persistent storage like HDDs, SSDs, and thumb drives?
Data-at-rest encryption
A developer, working at Microsoft, is helping to develop the latest and greatest user interface for Windows. The developer is assigned to the team that works on the user interface's top level. What will the developer be working on?
Desktop
Microsoft provides a repository of information about threats that Windows Defender discovers. What is the name of the repository?
Microsoft Knowledge Base
A transportation company wants to set up software that gathers statistics from the controller area network for trailers hauling loads, enabling them to adjust processes to optimize cost savings. What type of adapter will the company need to send the statistics back to their cloud network?
WWAN
Wireless Wide Area Network (WWAN)
uses a cellular adapter to connect to the internet via a provider's network. These networks are typically metered with a set data limit.
A virtual private network (VPN)
connects the components and resources of two (private) networks over another (public) network.
While WWAN could be considered wireless, wireless generally refers to
a computer that connects to the 2.4 or 5 GHz spectrum with a limited physical range.
A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?
Port forwarding
Port forwarding
means that the router requests an internet host for a particular service and sends the request to a designated host on the LAN.
The Dynamic Host Configuration Protocol (DHCP) reservation
means that the DHCP server always assigns the same IP address to the host. A user can usually choose which IP address this should be.
The universal plug-and-play (UPnP) framework
sends instructions to the firewall with the correct configuration parameters to allow applications to work.
A mapped drive
is a share that has been assigned to a drive letter on a client device. To map a share as a drive, right-click it and select Map Network Drive.
A user just installed a new application on their workstation, but the application has issues even starting up. The user has been working on the machine regularly up to this point without any prior issues. Which of the following is most likely the issue?
In this scenario, one place to troubleshoot is the host-based firewall. Select "Allow an app through the firewall" to allow or block programs (configure exceptions) from the Windows Firewall status page.
While proxy settings could be an issue, if the user is working fine beforehand, proxy settings are not likely to be an issue.
If the user has been using the machine without any previous problems it is unlikely that the domain name system (DNS) is the issue.
A Windows administrator wants to learn how to use Linux by installing the Linux subsystem for Windows. What should their version of Windows have on the New Technology File System (NTFS) to support case-sensitive naming and hard links required by Linux?
POSIX
This is known as POSIX compliance
To support UNIX/Linux compatibility, Microsoft engineered NTFS to support case-sensitive naming, hard links, and other key features UNIX/Linux applications require.
When data is written to an NTFS volume, it is re-read, verified, and logged via journaling. In the event of a problem,
the sector concerned is marked as bad and the data relocated.
is a variant of FAT that uses a 32-bit allocation table, nominally supporting volumes up to 2 TB. The maximum file size is 4 GB minus 1 byte.
FAT32
The Indexing Service
creates a catalog of file and folder locations and properties, speeding up searches.
Advanced encryption standard (AES)
is the standard encryption used by WPA2 and the strongest encryption standard to use by Wi-Fi.
Temporal key integrity protocol (TKIP)
tries to mitigate the various attacks against WEP developed by producing a new 128-bit encryption key for every packet sent on the network.
Wi-Fi protected Access (WPA3)
uses passphrase-based group authentication of stations in private mode, and it changes the method by which this secret is used to agree with session keys. The simultaneous authentication of equals (SAE) protocol replaces the 4-way handshake.
Multifactor authentication (MFA)
allows the machine to establish a trust relationship and create a secure tunnel to transmit the user credentials or perform smart card authentication without a user password.
A server administrator receives a report that the company's external-facing web server is unresponsive. Rebooting the server would take too long, and they are not even completely certain the server would come back up. What utility should the administrator use to restart the website?
services.msc
The services console (services.msc)
starts, stops, and pauses processes running in the background. This utility would be useful in restarting an unresponsive web server.
The System Configuration Utility (msconfig.exe)
is used to modify various settings and files that affect how the computer boots and loads Windows.
The Windows registry
provides a remotely accessible database for storing operating system, device, and software application configuration information.
A computer administrator sets up a client workstation to join a centrally managed network. What options should the administrator configure to do this?
Access work or school
The Update & Security settings
provide a single interface to manage a secure and reliable computing environment.
The Apps group is used to
view and remove installed apps and Windows Features in the Settings app. Users can also configure which app should act as the default for opening, editing, and printing particular file types and manage which apps run at startup.
To create a directory, Windows
md
An administrator automates the creation of folders during a Windows install process. Which command should they use in their script?
md
To delete an empty directory, Windows
enter rd Directory or rmdirDirectory. If the directory is not empty, users can remove files and subdirectories using the /s switch.
command sets the focus to a different working directory. Users can change to any directory by entering the full path. Windows
cd
command to list the files and subdirectories from the working drive and directory or a specified path. Windows
dir
A technician makes sure that there is no faulty electrical equipment that can pose a risk and places extinguishers nearby. What is this called?
Electrical fire safety
A user uses a scripting language based on Microsoft’s Visual Basic programming language. Which of the following extensions is used?
.vbs
.bat
is the Windows batch file extension. A shell script for the basic Windows CMD interpreter is often described as a batch file.
.js
is the JavaScript file extension. JavaScript is a scripting language designed to implement interactive web-based content and web applications. Most web servers and browsers are configured with a JavaScript interpreter.
.py
is the Python file extension. Python is a general-purpose scripting and programming language that can develop both automation scripts and software applications.
is the VBScript file extension. VBScript predates PowerShell. The wscript.exe interpreter executes VBScript by default.
.vbs
Wi-Fi protected access 2 (WPA2)
used the AES cipher deployed within the counter mode, blocking the changing message CCMP.
Wi-Fi protected Access (WPA3)
uses passphrase-based group authentication of stations in private mode; it changes the method this secret is used to agree with session keys.
The Instagram app on an Android phone will not launch. Which of the following options could fix the problem?
first use Force Stop to quit it and try launching again. In Android, open Settings > Apps.