Deck 20: Computer Security and Deployment

Full screen (f)
exit full mode
Question
A new technician has been hired by a company that provides technical services to small businesses.Most businesses want both a wired network and a wireless network.Which of the following wireless security protocols is least secure?

A)WEP
B)WPA
C)WPA2-Personal
D)WPA-Enterprise
Use Space or
up arrow
down arrow
to flip the card.
Question
A tablet mounted in a restaurant for Internet access has multiple web pages open by themselves,and the tablet is running slowly even when playing locally installed games.What should the technician do?

A)Enable a pop-up blocker
B)Restart the tablet
C)Ensure that anti-malware software is installed and up-to-date
D)Change the firewall profile to public
Question
Which security technique would most likely be needed for a nosy admin assistant who happens to wander by when you are logging into your computer?

A)Privacy screen
B)Anti-malware
C)Mantrap
D)Key fob
Question
Which type of network environment would be best for a company that has 30 computers and wants the following capabilities: wired and wireless access,file server,networked printer,centralized authentication to be able to sign on to any computer,shared folders across the network,and a networked scanner?

A)Workgroup
B)HomeGroup
C)Domain
D)VPN
Question
If 50 computers were being upgraded with a new image using Windows Deployment Services,which boot method would a technician use to initiate the deployment?

A)PXE
B)NTFS
C)Optical drive
D)GRUB
Question
What should a technician do if the Windows installation process shows no storage devices,but the BIOS/UEFI shows a hard drive?

A)Obtain third-party drivers
B)Flash the BIOS/UEFI
C)Start the installation process again
D)Restart the computer and then start the process again
Question
What is open source software?

A)Software that is free but that will not fail
B)Software that requires Internet connectivity in order to operate
C)Software that can be used on mobile devices that connect to wireless networks
D)Software that contains the core source code that is modifiable
Question
Which security tool would help prevent a zero-day attack?

A)Screensaver password
B)Mantrap
C)Biometrics
D)Patch management
Question
A technician has been asked to update a salesperson's laptop from Windows 7 Home Premium to Windows 10 Pro.What should the technician do first?

A)Verify that the laptop meets the requirements
B)Back up the data from the hard disk
C)Purchase a license for Windows 10 Pro
D)Defragment the hard drive
Question
A technician is copying files from an NTFS partition to a FAT32 partition.What happens to the permissions assigned to the files?

A)A prompt appears,asking if the technician would like the permissions transferred
B)They are kept without any indication of this
C)They are lost
D)They are imported into the FAT32 permissions
Question
A corporate employee notices that all of his social media apps are updating his precise location.What mobile feature should the employee disable to prevent this from happening?

A)Airplane Mode
B)Geotracking
C)Tethering
D)WiFi
Question
Which macOS feature allows a technician to view all virtual machines as well as open applications?

A)Mission Control
B)Dock
C)Control Panel
D)Launchpad
Question
A company is reviewing its data protection plan.Which of the following should be done on a regular basis in order to prevent data loss if a hard disk fails?

A)Run chkdsk
B)Perform a factory reset
C)Create a backup
D)Restore the system
Question
Which type of partition would a technician deploy on a 4 TB drive?

A)Primary
B)FAT32
C)MBR
D)GPT
Question
Which security measure would be best for a mobile device?

A)Fingerprint lock
B)Facial recognition
C)Privacy filter
D)Numeric passcode lock
Question
Which Linux command is used to search text or a specific file for lines that match a specific text string?

A)search
B)ls
C)apt-get
D)grep
Question
What is the best way to prevent unknown devices from connecting to a SOHO wireless router?

A)Disable SSID broadcasting
B)Enable MAC filtering
C)Implement a network domain
D)Toughen the password requirements
Question
After a technician sets up a computer share for an administrative assistant,the next day the assistant calls the technician to report that the share is no longer accessible.What can the technician do so that this doesn't happen every day?

A)Connect the computer to a UPS
B)Train the user in using the Sleep power option
C)Run anti-malware
D)Enable the Reconnect at Logon option
Question
With which type of network security attack is a man-in-the-middle attack associated?

A)DoS
B)DDoS
C)Smurf
D)Spoofing
Question
An employee who wants to be a technician stands behind a network administrator and watches the administrator type the server password.Later,the employee uses the password to gain access to the server and create a secret administrator account.What specific security threat is this?

A)Social engineering
B)Shoulder surfing
C)Trojan
D)Spear phishing
Question
A technician has tested a video adapter,and it works fine.However,when the video card is placed in a computer,it doesn't work.What Windows tool should the technician use to troubleshoot the adapter?

A)System Restore
B)regedit
C)Task Manager
D)Device Manager
Question
A customer brings in an older computer that has Windows XP installed and is used to run an online business.The technician recommends an operating system upgrade.Which operating system does the technician recommend?

A)Windows 10
B)Windows 8
C)Windows 8.1
D)Windows 7
Question
Which method does a hacker use to quickly find a password by comparing hash values used to encrypt the password?

A)Spoofing
B)TCP/IP hijacking
C)Rainbow table
D)Zombie
Question
Which of the following does social engineering use to bypass or manipulate corporate security policies?

A)Malware
B)Trojan
C)Man-in-the-middle attack
D)Human interaction
Question
A technician is setting up a network configuration for a particular type of server.Which type of server acts as an intermediary between a client or an application seeking resources and another server that would require configuration by the technician?

A)Print
B)File
C)Proxy
D)Mail
Question
What is the most secure way for a technician to get rid of personal data on several hard drives that were removed from employee computers and are no longer wanted?

A)Repartition the drives
B)Physical destruction
C)Place the drives near a magnet
D)Format the drives
Question
When would a technician use the mstsc command?

A)When remotely accessing a Windows computer
B)When fixing a Windows problem that cannot be fixed with a Control Panel utility
C)When repairing a system that has boot issues
D)When network connectivity is an issue
Question
A user reports that her PC doesn't work.Which of the following would be the best question to ask the user?

A)Do you have a UPS attached?
B)What isn't working on the computer?
C)Is this a BYOD device?
D)Do you think it is the motherboard or power supply that is not working?
Question
When a technician is writing a script,what would the technician use to create a dynamic value that is given a name?

A)Loop
B)Variable
C)Comment
D)String
Question
If a salesperson has a corporate cell phone that contains customer data,and the company does not want an automatic wipe done on it,what security measure would be the best choice?

A)TPM chip
B)Key fob
C)Fingerprint lock
D)USB lock
Question
Which security measure would be good for a mobile device that has sensitive data stored on it and has been stolen?

A)Biometrics
B)Remote wipe
C)Facial recognition
D)Smart card
Question
Every time a user enters a different web page URL into a browser,the same web page appears.What will help in this situation?

A)Anti-malware
B)Device Manager
C)Task Manager
D)Firewall
Question
Which of the following is relevant to a EULA?

A)Commercial license
B)Trojan
C)Malware
D)Power surge
Question
When would a technician use BranchCache?

A)When moving files from one computer to another one
B)When a virus or other malware has infected a system
C)When remote information needs to be stored locally for faster access
D)When a RAID array has failed
Question
Which device protects a computer from power that is over the recommended input level using the path of least resistance?

A)UPS
B)Surge protector
C)SPS
D)Phone isolator
Question
A pharmaceutical company allows chemical engineers to take home corporate laptops to do company tasks.The laptops have sensitive corporate information stored on the drives.Which security measure would be best for this situation?

A)Require a 12-character password
B)Require multifactor authentication
C)Require the drive contents to be encrypted
D)Require biometrics
Question
When would a technician use the ping command?

A)When troubleshooting a network problem
B)When troubleshooting a Windows registry problem
C)When initiating a sequence to bring a new or updated image to the machine from a remote server
D)When testing a video connection
Question
A technician needs to configure a computer for a proxy server.Which Internet Options tab will the technician use?

A)Advanced
B)Content
C)General
D)Connections
Question
What term is associated with a compromised mobile operating system?

A)Spear phishing
B)Phishing
C)Rooting
E)Piracy
Question
A sales representative travels with a Windows laptop and uses wireless networks in both customer sites and the hotel.On one of the wireless networks,the user cannot access locally shared printers.What is most likely the issue?

A)The wireless NIC has been disabled
B)The firewall has blocked the wireless network
C)The user does not have Bluetooth enabled
D)The network location profile is set to public
Question
A technician is working on a Linux-based computer from a terminal window.Which Linux command can be used to display the current directory?

A)touch
B)dir
C)ls
D)pwd
Question
Which technique would most likely be used on a hard drive being removed from a corporate computer that a technician is going to use as a replacement drive for another computer in the future?

A)Drive wipe
B)Partitioning
C)Formatting
D)Defragmenting
Question
How do you dispose of a toner cartridge?

A)Perform the steps outlined in the EULA
B)Incinerate it
C)Recycle it
D)Open the lid until the toner evaporates and then throw it in the trash
Question
Which Linux command grants root access?

A)ls
B)admin
C)elev
D)sudo
Question
Which security measure must be enabled in order for a directly connected printer to be visible across a network?

A)Anti-malware
B)VPN
C)File and Print Sharing
D)Windows Firewall
Question
Which security technique makes it possible to use one username and password to access multiple corporate applications and resources?

A)TPM
B)SSO
C)EFS
D)WPS
Question
A technician has been directed by a software app developer to modify the registry in order to fix a problem with a particular application.Which Windows command would be used to edit the registry?

A)regedit
B)regsvr32
C)edit
D)msconfig
Question
A user in a small company is trying to set his password,but he keeps getting the message that it doesn't meet complexity requirements.Where does a technician go to set the complexity requirements?

A)Internet Options
B)Windows Firewall
C)User Accounts
D)Local Security Policy
Question
What is the administrator account in Linux known as?

A)Root
B)Tooler
C)Higher being
D)Admin
Question
What is the difference between Windows share permissions and NTFS permissions?

A)Share permissions are stronger
B)Share permissions have fewer options than NTFS permissions
C)Share permissions can be used on non-Windows operating systems,and NTFS permissions cannot
D)Share permissions override NTFS permissions
Question
What macOS X tool is used to search for files,directories,or contacts?

A)Keychain
B)Spotlight
C)Mission Control
D)Explorer
Question
In what instance would a PC technician need to use the msconfig command?

A)When controlling programs that launch when the computer boots
B)When operating system files are missing or corrupted
C)When editing the registry
D)When controlling computer access to a domain environment
Question
A company is planning to go to a cloud-based wireless AP controller.The network manager over the wireless networks has put together a plan that includes the reasons to upgrade,the scope of the project,a budget,and a risk analysis.What else should the manager include as part of this network request?

A)A redundancy plan
B)A counter proposal
C)Vendor bids
D)A backout plan
Question
After a user reports suspicious activity on a desktop corporate computer,the technician determines that malware is on the computer.What should the technician do next?

A)Report the issue to the technician's supervisor
B)Report the issue to the supervisor of the area where the infected computer is located
C)Re-image the computer
D)Remove the computer from the network
Question
Which type of security measure would be applied to sensitive corporate documents?

A)Mantrap
B)Botnet
C)Shredding
D)Phishing
Question
Which iOS setting is used to determine what apps have requested access to the camera if a user suspects that someone has remotely activated the camera on a mobile device?

A)GPS
B)Root
C)Privacy
D)Multimedia
Question
A company is merging with a larger company,and together they are considering authentication options.Which types of servers would be used to authenticate users in a corporate environment? (Choose two. )

A)RADIUS
B)Proxy
C)WPS
D)TKIP
E)TACACS
Question
A technician is configuring virtualization.Which option is a security requirement?

A)Any VM should have antivirus software installed
B)All operating systems should have the administrator account disabled
C)All operating systems should be installed on separate hard drives
D)All operating systems should be installed on separate hard drives,and the hard drives should be encrypted
Question
On a corporate mobile device,the user can reach neither internal network resources nor external ones.Which problems would most likely be causing this issue? (Choose two. )

A)Incorrect proxy server configuration
B)Incorrect or no IP address
C)Disabled NIC
D)Browser configuration
E)Incorrect default gateway
Question
A technician is investigating a problem related to computer slowness.Which Disk Management status should a technician expect for a hard disk that is functioning properly?

A)Unknown
B)Foreign
C)Online
D)Disabled
Question
Which of the following scripting files would contain the command echo Your system will be rebooted in 60 seconds as part of an IT maintenance action.

A).bat
B).js
C).py
D).sh
Question
What mobile technology is used to display a map showing where a car is currently located in order to find a stolen mobile device in the car?

A)EyeSpy
B)Synchronization
C)Digitization
D)Locator app
Question
What should an organization require when an outside company provides a service for shredding and disposal of sensitive corporate documents?

A)A quitclaim document
B)Proof of final burial
C)Proof of final wetting
D)Proof of incineration
Question
What security features would help a department store that has experienced security breaches resulting in leaked user passwords?

A)Airplane Mode
B)User training
C)Multifactor authentication
D)Geotracking
E)Principle of least privilege
Question
A technician is new to working in a large company domain-based environment.A new computer has been delivered,imaged,and added to the domain for a new employee.What should the technician do next?

A)Add a user account to Active Directory
B)Install applications
C)Verify Internet connectivity
D)Make a backup of the computer
Question
What do you do with crashed mechanical hard drives that contain sensitive data from a government finance company?

A)Donate them to a local college or school
B)Use a drive overwrite program,drill holes through the platters,and then use a hammer to further destroy the pieces
C)Use a data vacuum
D)Use the cipher command
Question
What Windows utility allows a technician to remotely access a user's computer and does not prompt the user for permission before the technician is allowed to connect?

A)Disk Management
B)Remote Assistance
C)Remote Desktop
D)EyeSpy
Question
Which component would be part of a SOW?

A)Purpose of the change
B)Risk analysis
C)Backout plan
D)Statement of change
Question
Why would a technician use a basic loop in a script?

A)To provide an explanation of what the script is doing when it is repeating a step or skipping a step
B)To specify whether the type of data being used is to be incremented or have a mathematical calculation applied
C)To set a parameter for the operating system
D)To repeat an instruction a number of times or until a specific condition is met
Question
A DDoS attack has occurred within a corporate environment,The security assessment team has determined that the attack was launched from multiple computers within the company and was aimed at other company computers.Which types of infection are probably on the computers that are launching the attack? (Choose two. )

A)Spyware
B)Ransomware
C)Worms
D)Honey pot
E)Zombies
Question
At a local college,students are hired as temporary employees in the summer to re-image devices,wipe drives,clean computers,tidy wiring closets,and perform other IT tasks.They are typically hired during their freshman year and are kept through their senior year.The college security policy says that temporary employees are not allowed to have college IDs past their employment period.How should the person responsible for user accounts handle this situation?

A)Delete the accounts after the summer and re-create them each year
B)Disable the accounts during non-summer terms
C)Have the students use generic IDs that have the passwords changed after the summer term
D)Create time-based permissions for the accounts and restrict access during any time period other than summer
Question
Which technology is used as part of an inventory management system?

A)Cloud storage
B)Virtualization
C)Change board
D)Barcodes
Question
What is an administrative share?

A)A share that is automatically created by Microsoft for drive volumes and folders
B)A share that has the attribute A in Windows Explorer or File Explorer
C)A folder that has been shared from a hard drive on a PC or mobile device
D)A share that is grayed out when viewed in the Microsoft Computer Management Console (Shared Folders option)
Question
Which security technology is used to limit the number of users allowed to use a scanner attached to the network?

A)Geotracking
B)ACL
C)scanner allocation services
D)Safe Mode
Question
In a particular city,the power provided by the power company is not consistently the same voltage.What would help with this? (Choose two. )

A)UPS
B)Surge protector
C)Line conditioner
D)Auto save feature on the application
E)Phone line isolator
Question
A help desk technician receives a call from a user who thinks someone else is accessing her e-mail and sending messages using her account.What should the technician recommend doing first?

A)Waiting 12 to 24 hours and then report it to the authorities
B)Reinstalling the e-mail software
C)Rebooting the computer
D)Changing the user's e-mail password
Question
A user reports seeing an error message which says that Windows updates did not install properly.The technician tries to do the updates but gets the same message.What should the computer technician do next?

A)Research the number associated with the failed update
B)Re-image the computer
C)Roll the computer back to a previous date by using System Restore
D)Look at the error log to obtain more information
Question
After fixing a hard drive problem by replacing the drive and data,the technician asks the customer to verify that the system is working.The customer says the computer now seems to have a sound problem,and the system volume cannot be increased.The technician tells the customer that this happens sometimes after solving a problem.What operational procedure is the technician failing to meet?

A)Avoid arguing with the customer
B)Document and provide feedback
C)Don't dismiss a customer problem
D)Don't disclose experiences via social media outlets
Question
A technician is listening to a user explain a problem.The technician sees another technician waiting near the door and gesturing frantically for the technician to come to the door.What should the technician do?

A)Ignore the technician
B)Explain to the customer that the person at the door is from the same company and apologize for the interruption
C)Leave the room and talk to the other technician
D)Gesture to the technician to wait and allow the user to finish explaining the problem
Question
An IT intern from a local college has been given the assignment of installing IP phones.The supervisor of the project gives the intern some documentation showing which switch ports the intern is to attach the phones to.What documentation is given to the intern?

A)A physical network diagram
B)A logical topology diagram
C)An IP address chart
D)A change management plan
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/361
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 20: Computer Security and Deployment
1
A new technician has been hired by a company that provides technical services to small businesses.Most businesses want both a wired network and a wireless network.Which of the following wireless security protocols is least secure?

A)WEP
B)WPA
C)WPA2-Personal
D)WPA-Enterprise
A
2
A tablet mounted in a restaurant for Internet access has multiple web pages open by themselves,and the tablet is running slowly even when playing locally installed games.What should the technician do?

A)Enable a pop-up blocker
B)Restart the tablet
C)Ensure that anti-malware software is installed and up-to-date
D)Change the firewall profile to public
C
3
Which security technique would most likely be needed for a nosy admin assistant who happens to wander by when you are logging into your computer?

A)Privacy screen
B)Anti-malware
C)Mantrap
D)Key fob
A
4
Which type of network environment would be best for a company that has 30 computers and wants the following capabilities: wired and wireless access,file server,networked printer,centralized authentication to be able to sign on to any computer,shared folders across the network,and a networked scanner?

A)Workgroup
B)HomeGroup
C)Domain
D)VPN
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
5
If 50 computers were being upgraded with a new image using Windows Deployment Services,which boot method would a technician use to initiate the deployment?

A)PXE
B)NTFS
C)Optical drive
D)GRUB
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
6
What should a technician do if the Windows installation process shows no storage devices,but the BIOS/UEFI shows a hard drive?

A)Obtain third-party drivers
B)Flash the BIOS/UEFI
C)Start the installation process again
D)Restart the computer and then start the process again
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
7
What is open source software?

A)Software that is free but that will not fail
B)Software that requires Internet connectivity in order to operate
C)Software that can be used on mobile devices that connect to wireless networks
D)Software that contains the core source code that is modifiable
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
8
Which security tool would help prevent a zero-day attack?

A)Screensaver password
B)Mantrap
C)Biometrics
D)Patch management
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
9
A technician has been asked to update a salesperson's laptop from Windows 7 Home Premium to Windows 10 Pro.What should the technician do first?

A)Verify that the laptop meets the requirements
B)Back up the data from the hard disk
C)Purchase a license for Windows 10 Pro
D)Defragment the hard drive
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
10
A technician is copying files from an NTFS partition to a FAT32 partition.What happens to the permissions assigned to the files?

A)A prompt appears,asking if the technician would like the permissions transferred
B)They are kept without any indication of this
C)They are lost
D)They are imported into the FAT32 permissions
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
11
A corporate employee notices that all of his social media apps are updating his precise location.What mobile feature should the employee disable to prevent this from happening?

A)Airplane Mode
B)Geotracking
C)Tethering
D)WiFi
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
12
Which macOS feature allows a technician to view all virtual machines as well as open applications?

A)Mission Control
B)Dock
C)Control Panel
D)Launchpad
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
13
A company is reviewing its data protection plan.Which of the following should be done on a regular basis in order to prevent data loss if a hard disk fails?

A)Run chkdsk
B)Perform a factory reset
C)Create a backup
D)Restore the system
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
14
Which type of partition would a technician deploy on a 4 TB drive?

A)Primary
B)FAT32
C)MBR
D)GPT
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
15
Which security measure would be best for a mobile device?

A)Fingerprint lock
B)Facial recognition
C)Privacy filter
D)Numeric passcode lock
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
16
Which Linux command is used to search text or a specific file for lines that match a specific text string?

A)search
B)ls
C)apt-get
D)grep
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
17
What is the best way to prevent unknown devices from connecting to a SOHO wireless router?

A)Disable SSID broadcasting
B)Enable MAC filtering
C)Implement a network domain
D)Toughen the password requirements
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
18
After a technician sets up a computer share for an administrative assistant,the next day the assistant calls the technician to report that the share is no longer accessible.What can the technician do so that this doesn't happen every day?

A)Connect the computer to a UPS
B)Train the user in using the Sleep power option
C)Run anti-malware
D)Enable the Reconnect at Logon option
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
19
With which type of network security attack is a man-in-the-middle attack associated?

A)DoS
B)DDoS
C)Smurf
D)Spoofing
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
20
An employee who wants to be a technician stands behind a network administrator and watches the administrator type the server password.Later,the employee uses the password to gain access to the server and create a secret administrator account.What specific security threat is this?

A)Social engineering
B)Shoulder surfing
C)Trojan
D)Spear phishing
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
21
A technician has tested a video adapter,and it works fine.However,when the video card is placed in a computer,it doesn't work.What Windows tool should the technician use to troubleshoot the adapter?

A)System Restore
B)regedit
C)Task Manager
D)Device Manager
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
22
A customer brings in an older computer that has Windows XP installed and is used to run an online business.The technician recommends an operating system upgrade.Which operating system does the technician recommend?

A)Windows 10
B)Windows 8
C)Windows 8.1
D)Windows 7
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
23
Which method does a hacker use to quickly find a password by comparing hash values used to encrypt the password?

A)Spoofing
B)TCP/IP hijacking
C)Rainbow table
D)Zombie
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following does social engineering use to bypass or manipulate corporate security policies?

A)Malware
B)Trojan
C)Man-in-the-middle attack
D)Human interaction
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
25
A technician is setting up a network configuration for a particular type of server.Which type of server acts as an intermediary between a client or an application seeking resources and another server that would require configuration by the technician?

A)Print
B)File
C)Proxy
D)Mail
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
26
What is the most secure way for a technician to get rid of personal data on several hard drives that were removed from employee computers and are no longer wanted?

A)Repartition the drives
B)Physical destruction
C)Place the drives near a magnet
D)Format the drives
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
27
When would a technician use the mstsc command?

A)When remotely accessing a Windows computer
B)When fixing a Windows problem that cannot be fixed with a Control Panel utility
C)When repairing a system that has boot issues
D)When network connectivity is an issue
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
28
A user reports that her PC doesn't work.Which of the following would be the best question to ask the user?

A)Do you have a UPS attached?
B)What isn't working on the computer?
C)Is this a BYOD device?
D)Do you think it is the motherboard or power supply that is not working?
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
29
When a technician is writing a script,what would the technician use to create a dynamic value that is given a name?

A)Loop
B)Variable
C)Comment
D)String
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
30
If a salesperson has a corporate cell phone that contains customer data,and the company does not want an automatic wipe done on it,what security measure would be the best choice?

A)TPM chip
B)Key fob
C)Fingerprint lock
D)USB lock
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
31
Which security measure would be good for a mobile device that has sensitive data stored on it and has been stolen?

A)Biometrics
B)Remote wipe
C)Facial recognition
D)Smart card
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
32
Every time a user enters a different web page URL into a browser,the same web page appears.What will help in this situation?

A)Anti-malware
B)Device Manager
C)Task Manager
D)Firewall
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is relevant to a EULA?

A)Commercial license
B)Trojan
C)Malware
D)Power surge
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
34
When would a technician use BranchCache?

A)When moving files from one computer to another one
B)When a virus or other malware has infected a system
C)When remote information needs to be stored locally for faster access
D)When a RAID array has failed
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
35
Which device protects a computer from power that is over the recommended input level using the path of least resistance?

A)UPS
B)Surge protector
C)SPS
D)Phone isolator
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
36
A pharmaceutical company allows chemical engineers to take home corporate laptops to do company tasks.The laptops have sensitive corporate information stored on the drives.Which security measure would be best for this situation?

A)Require a 12-character password
B)Require multifactor authentication
C)Require the drive contents to be encrypted
D)Require biometrics
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
37
When would a technician use the ping command?

A)When troubleshooting a network problem
B)When troubleshooting a Windows registry problem
C)When initiating a sequence to bring a new or updated image to the machine from a remote server
D)When testing a video connection
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
38
A technician needs to configure a computer for a proxy server.Which Internet Options tab will the technician use?

A)Advanced
B)Content
C)General
D)Connections
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
39
What term is associated with a compromised mobile operating system?

A)Spear phishing
B)Phishing
C)Rooting
E)Piracy
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
40
A sales representative travels with a Windows laptop and uses wireless networks in both customer sites and the hotel.On one of the wireless networks,the user cannot access locally shared printers.What is most likely the issue?

A)The wireless NIC has been disabled
B)The firewall has blocked the wireless network
C)The user does not have Bluetooth enabled
D)The network location profile is set to public
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
41
A technician is working on a Linux-based computer from a terminal window.Which Linux command can be used to display the current directory?

A)touch
B)dir
C)ls
D)pwd
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
42
Which technique would most likely be used on a hard drive being removed from a corporate computer that a technician is going to use as a replacement drive for another computer in the future?

A)Drive wipe
B)Partitioning
C)Formatting
D)Defragmenting
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
43
How do you dispose of a toner cartridge?

A)Perform the steps outlined in the EULA
B)Incinerate it
C)Recycle it
D)Open the lid until the toner evaporates and then throw it in the trash
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
44
Which Linux command grants root access?

A)ls
B)admin
C)elev
D)sudo
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
45
Which security measure must be enabled in order for a directly connected printer to be visible across a network?

A)Anti-malware
B)VPN
C)File and Print Sharing
D)Windows Firewall
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
46
Which security technique makes it possible to use one username and password to access multiple corporate applications and resources?

A)TPM
B)SSO
C)EFS
D)WPS
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
47
A technician has been directed by a software app developer to modify the registry in order to fix a problem with a particular application.Which Windows command would be used to edit the registry?

A)regedit
B)regsvr32
C)edit
D)msconfig
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
48
A user in a small company is trying to set his password,but he keeps getting the message that it doesn't meet complexity requirements.Where does a technician go to set the complexity requirements?

A)Internet Options
B)Windows Firewall
C)User Accounts
D)Local Security Policy
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
49
What is the administrator account in Linux known as?

A)Root
B)Tooler
C)Higher being
D)Admin
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
50
What is the difference between Windows share permissions and NTFS permissions?

A)Share permissions are stronger
B)Share permissions have fewer options than NTFS permissions
C)Share permissions can be used on non-Windows operating systems,and NTFS permissions cannot
D)Share permissions override NTFS permissions
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
51
What macOS X tool is used to search for files,directories,or contacts?

A)Keychain
B)Spotlight
C)Mission Control
D)Explorer
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
52
In what instance would a PC technician need to use the msconfig command?

A)When controlling programs that launch when the computer boots
B)When operating system files are missing or corrupted
C)When editing the registry
D)When controlling computer access to a domain environment
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
53
A company is planning to go to a cloud-based wireless AP controller.The network manager over the wireless networks has put together a plan that includes the reasons to upgrade,the scope of the project,a budget,and a risk analysis.What else should the manager include as part of this network request?

A)A redundancy plan
B)A counter proposal
C)Vendor bids
D)A backout plan
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
54
After a user reports suspicious activity on a desktop corporate computer,the technician determines that malware is on the computer.What should the technician do next?

A)Report the issue to the technician's supervisor
B)Report the issue to the supervisor of the area where the infected computer is located
C)Re-image the computer
D)Remove the computer from the network
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
55
Which type of security measure would be applied to sensitive corporate documents?

A)Mantrap
B)Botnet
C)Shredding
D)Phishing
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
56
Which iOS setting is used to determine what apps have requested access to the camera if a user suspects that someone has remotely activated the camera on a mobile device?

A)GPS
B)Root
C)Privacy
D)Multimedia
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
57
A company is merging with a larger company,and together they are considering authentication options.Which types of servers would be used to authenticate users in a corporate environment? (Choose two. )

A)RADIUS
B)Proxy
C)WPS
D)TKIP
E)TACACS
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
58
A technician is configuring virtualization.Which option is a security requirement?

A)Any VM should have antivirus software installed
B)All operating systems should have the administrator account disabled
C)All operating systems should be installed on separate hard drives
D)All operating systems should be installed on separate hard drives,and the hard drives should be encrypted
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
59
On a corporate mobile device,the user can reach neither internal network resources nor external ones.Which problems would most likely be causing this issue? (Choose two. )

A)Incorrect proxy server configuration
B)Incorrect or no IP address
C)Disabled NIC
D)Browser configuration
E)Incorrect default gateway
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
60
A technician is investigating a problem related to computer slowness.Which Disk Management status should a technician expect for a hard disk that is functioning properly?

A)Unknown
B)Foreign
C)Online
D)Disabled
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following scripting files would contain the command echo Your system will be rebooted in 60 seconds as part of an IT maintenance action.

A).bat
B).js
C).py
D).sh
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
62
What mobile technology is used to display a map showing where a car is currently located in order to find a stolen mobile device in the car?

A)EyeSpy
B)Synchronization
C)Digitization
D)Locator app
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
63
What should an organization require when an outside company provides a service for shredding and disposal of sensitive corporate documents?

A)A quitclaim document
B)Proof of final burial
C)Proof of final wetting
D)Proof of incineration
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
64
What security features would help a department store that has experienced security breaches resulting in leaked user passwords?

A)Airplane Mode
B)User training
C)Multifactor authentication
D)Geotracking
E)Principle of least privilege
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
65
A technician is new to working in a large company domain-based environment.A new computer has been delivered,imaged,and added to the domain for a new employee.What should the technician do next?

A)Add a user account to Active Directory
B)Install applications
C)Verify Internet connectivity
D)Make a backup of the computer
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
66
What do you do with crashed mechanical hard drives that contain sensitive data from a government finance company?

A)Donate them to a local college or school
B)Use a drive overwrite program,drill holes through the platters,and then use a hammer to further destroy the pieces
C)Use a data vacuum
D)Use the cipher command
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
67
What Windows utility allows a technician to remotely access a user's computer and does not prompt the user for permission before the technician is allowed to connect?

A)Disk Management
B)Remote Assistance
C)Remote Desktop
D)EyeSpy
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
68
Which component would be part of a SOW?

A)Purpose of the change
B)Risk analysis
C)Backout plan
D)Statement of change
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
69
Why would a technician use a basic loop in a script?

A)To provide an explanation of what the script is doing when it is repeating a step or skipping a step
B)To specify whether the type of data being used is to be incremented or have a mathematical calculation applied
C)To set a parameter for the operating system
D)To repeat an instruction a number of times or until a specific condition is met
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
70
A DDoS attack has occurred within a corporate environment,The security assessment team has determined that the attack was launched from multiple computers within the company and was aimed at other company computers.Which types of infection are probably on the computers that are launching the attack? (Choose two. )

A)Spyware
B)Ransomware
C)Worms
D)Honey pot
E)Zombies
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
71
At a local college,students are hired as temporary employees in the summer to re-image devices,wipe drives,clean computers,tidy wiring closets,and perform other IT tasks.They are typically hired during their freshman year and are kept through their senior year.The college security policy says that temporary employees are not allowed to have college IDs past their employment period.How should the person responsible for user accounts handle this situation?

A)Delete the accounts after the summer and re-create them each year
B)Disable the accounts during non-summer terms
C)Have the students use generic IDs that have the passwords changed after the summer term
D)Create time-based permissions for the accounts and restrict access during any time period other than summer
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
72
Which technology is used as part of an inventory management system?

A)Cloud storage
B)Virtualization
C)Change board
D)Barcodes
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
73
What is an administrative share?

A)A share that is automatically created by Microsoft for drive volumes and folders
B)A share that has the attribute A in Windows Explorer or File Explorer
C)A folder that has been shared from a hard drive on a PC or mobile device
D)A share that is grayed out when viewed in the Microsoft Computer Management Console (Shared Folders option)
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
74
Which security technology is used to limit the number of users allowed to use a scanner attached to the network?

A)Geotracking
B)ACL
C)scanner allocation services
D)Safe Mode
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
75
In a particular city,the power provided by the power company is not consistently the same voltage.What would help with this? (Choose two. )

A)UPS
B)Surge protector
C)Line conditioner
D)Auto save feature on the application
E)Phone line isolator
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
76
A help desk technician receives a call from a user who thinks someone else is accessing her e-mail and sending messages using her account.What should the technician recommend doing first?

A)Waiting 12 to 24 hours and then report it to the authorities
B)Reinstalling the e-mail software
C)Rebooting the computer
D)Changing the user's e-mail password
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
77
A user reports seeing an error message which says that Windows updates did not install properly.The technician tries to do the updates but gets the same message.What should the computer technician do next?

A)Research the number associated with the failed update
B)Re-image the computer
C)Roll the computer back to a previous date by using System Restore
D)Look at the error log to obtain more information
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
78
After fixing a hard drive problem by replacing the drive and data,the technician asks the customer to verify that the system is working.The customer says the computer now seems to have a sound problem,and the system volume cannot be increased.The technician tells the customer that this happens sometimes after solving a problem.What operational procedure is the technician failing to meet?

A)Avoid arguing with the customer
B)Document and provide feedback
C)Don't dismiss a customer problem
D)Don't disclose experiences via social media outlets
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
79
A technician is listening to a user explain a problem.The technician sees another technician waiting near the door and gesturing frantically for the technician to come to the door.What should the technician do?

A)Ignore the technician
B)Explain to the customer that the person at the door is from the same company and apologize for the interruption
C)Leave the room and talk to the other technician
D)Gesture to the technician to wait and allow the user to finish explaining the problem
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
80
An IT intern from a local college has been given the assignment of installing IP phones.The supervisor of the project gives the intern some documentation showing which switch ports the intern is to attach the phones to.What documentation is given to the intern?

A)A physical network diagram
B)A logical topology diagram
C)An IP address chart
D)A change management plan
Unlock Deck
Unlock for access to all 361 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 361 flashcards in this deck.