暗記メーカー
ログイン
DION#5
  • Mixtapes øf Hanna

  • 問題数 89 • 5/21/2024

    記憶度

    完璧

    13

    覚えた

    33

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    A small business network was recently infected by a piece of malware from a USB drive that copied sensitive data from a computer, infected the system, and then spread across the network by infecting other systems. Which of the following actions could have prevented this type of attack from occurring?

    Disabling AutoRun on the computer

  • 2

    Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com." What should Michelle do to fix this problem?

    Reset the web browser's proxy setting

  • 3

    Which of the following types of installations would you use on a system with slow performance or one that you cannot isolate a single cause of the system's issues?

    Repair installation

  • 4

    A user's personal settings are not showing up on their computer. You suspect that their profile has become corrupted within Windows. You attempt to look at their profile folder but cannot find it in their profile directory. Which of the following options do you need to configure to see this file?

    Folder Options

  • 5

    A user has reported that their workstation is running very slowly. A technician begins to investigate the issue and notices a lot of unknown processes running in the background. The technician determines that the user has recently downloaded a new application from the internet and may have become infected with malware. Which of the following types of infections does the workstation MOST likely have?

    Trojan

  • 6

    A coworker is creating a file containing a script. You look over their shoulder and see "net use s:\\fileserver\videos" in the file. Based on this, what type of file extension should this script use?

    .bat

  • 7

    Matt has verified that a user's system has symptoms of being infected with malware. According to the malware removal procedures, what should Matt do NEXT?

    Quarantine the infected system by removing its network connectivity

  • 8

    Which of the following commands is used to display the amount of disk space available on the file system in Linux?

    df

  • 9

    A user is attempting to pay for their morning coffee using Apple Pay on their iPhone. The user quickly taps their phone against the payment terminal, but it fails to process. Which of the following should the user do to properly use NFC for payment? (Select all that apply)

    Manually select a card from your Apple Wallet and try again, Hold the phone on the payment terminal for at least 3 seconds

  • 10

    Dion Training has several Windows 10 Professional workstations with an internal 2 TB hard disk drive. The company wants to use full disk encryption to protect the contents of this hard drive. Which of the following security settings can be used to encrypt this storage device?

    BitLocker

  • 11

    Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues began to occur and remember that each time it happened the lights also dimmed momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router's power cycling. What should you (a network technician) do to solve this problem?

    Install a UPS

  • 12

    You need to determine the best way to test operating system patches in a lab environment before deploying them to your automated patch management system. Unfortunately, your network has several different operating systems in use, but you only have one machine available to test the patches on. What is the best environment to utilize to perform the testing of the patches before deployment?

    Virtualization

  • 13

    A technician wants to conduct a vulnerability scan on a server every morning at 3:00 am. Which of the following tools should the technician use?

    Task scheduler

  • 14

    You are configuring a wireless access point (WAP) in a large apartment building for a home user. The home user is concerned that their neighbor may try to connect to their Wi-Fi and wants to prevent it. Which THREE of the following actions should you perform to increase the wireless network's security?

    Reduce the transmission power, Disable the SSID broadcast, Enable WPA3 encryption

  • 15

    You are concerned that your servers could be damaged during a power failure or under-voltage event. Which TWO devices would protect against these conditions?

    Battery backup, Line conditioner

  • 16

    You are cleaning out the closet in your office and find several bottles of cleaner that need to be disposed of. Which of the following should you consult to determine the proper method of disposal?

    MSDS

  • 17

    Which of the following could be used to meet regulatory compliance requirements associated with the monitoring of employee actions on their work computer by providing a customizable dialog box with a textual warning to the user before they log in to their Windows 10 workstation?

    Splash screen

  • 18

    Which of the following commands is used to edit a text file on a Linux server?

    nano

  • 19

    Dion Training is creating a new security policy that states all access to system resources will be controlled based on the user's job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following policies or security practices is BEST described by this new policy?

    Least privilege

  • 20

    Jason checks the Dion Training server room and finds that it currently has over 80% humidity. Which of the following risks to the servers could occur due to this high humidity level?

    Corrosion of the servers

  • 21

    Marta's organization is concerned with the vulnerability of a user's account being vulnerable for an extended period of time if their password was compromised. Which of the following controls should be configured as part of their password policy to minimize this vulnerability?

    Password expiration

  • 22

    A user's workstation is opening up browser windows without any action from the user. A technician attempts to troubleshoot the workstation, but the machine is extremely slow when in use. Which of the following actions should the technician perform?

    Perform an anti-malware scan of the workstation

  • 23

    A user's workstation is running slowly and cannot open some larger program files. The user complains that they often get a warning that states memory is running low on their Windows 10 workstation. Which of the following should you configure until more memory can be installed to help alleviate this problem?

    Increase the pagefile size

  • 24

    You are applying for a job at a cybersecurity firm. The application requests you enter your social security number, date of birth, and email address to conduct a background check as part of the hiring process. Which of the following types of information have you been asked to provide?

    PII

  • 25

    You are trying to open your company's internal shared drive from your Windows 10 laptop but cannot reach it. You open your web browser and can connect to DionTraining.com without any issues. Which of the following commands should you use to determine if the internal shared drive is mapped to your computer properly?

    net use

  • 26

    Which of the following commands would a technician use to find the comprehensive documentation for any command from the Linux terminal?

    man

  • 27

    A user's computer was running out of storage space, so they decided to install a new second 1 TB hard disk drive (HDD) into their Windows 10 computer. Whenever they attempt to boot up the computer, an error of "No Operating System Found" is displayed on their screen. You unplugged the new 1 TB HDD, and then the computer boots up without any errors. You have just reconnected the 1 TB HDD. What step should you attempt NEXT to fix this issue?

    Verify the boot order in the BIOS/UEFI

  • 28

    Which of the following types of remote access technologies should NOT be used in a network due to its lack of security?

    Telnet

  • 29

    Dion Training is creating troubleshooting guides and frequently asked questions for its new customer service technicians. Which of the following would MOST likely contain these documents?

    Knowledge base articles

  • 30

    You noticed that your personal files in your Dropbox had been accessed while you were sleeping. Which of the following threats is this an example of?

    Unauthorized account access

  • 31

    You are working at the service desk when you receive a call from an upset user because their workstation cannot receive any emails. Which of the following should you use to document this phone call?

    Incident report

  • 32

    Tim connects his Windows 10 laptop to his office’s wireless network to print out a report for his boss. Which type of network should he select to discover the printer on the office’s wireless network?

    Private

  • 33

    Joseph contacted the service desk because his Windows 10 desktop is acting strangely. He cannot use his mouse, speakers, or printer connected to his workstation by USB. Yesterday, everything worked normally. He attempted to reboot the computer to fix the issue, but it remains. Which of the following actions should be performed NEXT?

    Rollback any system updates or changes since yesterday

  • 34

    You were troubleshooting a recently installed NIC on a workstation and decided to ping the NIC's loopback address. Which of the following IPv4 addresses should you ping?

    127.0.0.1

  • 35

    Which of the following Windows tools should a technician use to import and install data in the x.509 format?

    Certificate manager

  • 36

    Your Windows 10 machine has just crashed. Where should you look to identify the cause of the system crash and how to fix it?

    BSOD

  • 37

    You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their own SOHO wireless router to that same switch port. Which of the following security features would BEST accomplish this goal?

    Port security

  • 38

    You are working in a doctor's office and have been asked to set up a kiosk to allow customers to check in for their appointments. The kiosk should be secured, and only customers to access a single application used for the check-in process. You must also ensure that the computer will automatically log in whenever the system is powered on or rebooted. Which of the following types of accounts should you configure for this kiosk?

    Guest

  • 39

    Which command-line tool is used on a Windows system to display a list of the files and directories within the current directory or path?

    dir

  • 40

    Which of the following commands is used on a Linux system to change the ownership of a file or directory on a system?

    chown

  • 41

    Your company's wireless network was recently compromised by an attacker who utilized a brute force attack against the network's PIN to gain access. Once connected to the network, the attacker modified the DNS settings on the router and spread additional malware across the entire network. Which TWO of the following configurations were most likely used to allow the attack to occur?

    Default administrative login credentials, WPS enabled

  • 42

    Which of the following is required for evidence to be admissible in a court of law?

    Chain of custody

  • 43

    Which command-line tool in Windows would you use to end one or more processes that have begun hung on the system?

    taskkill

  • 44

    Sam and Mary both work in the accounting department and use a web-based SaaS product as part of their job. Sam cannot log in to the website using his credentials from his computer, but Mary can log in with her credentials on her computer. Sam asks Mary to login into her account from his computer to see if the problem is with his account or computer. When Mary attempts to log in to Sam's computer, she receives an error. Mary noticed a pop-up notification about a new piece of software on Sam's computer when she attempted to log in to the website. Which TWO of the following steps should Mary take to resolve the issue with logging in from Sam's computer?

    Verify Sam's computer has the correct web browser configuration and settings, Ask Sam about the pop-up notification and determine what new programs he installed on his computer

  • 45

    Dion Training uses a patch management server to control the distribution and installation of security patches. A technician needs to configure a new Windows 10 workstation to not perform Windows Updates automatically. Which of the following features in the Task Manager should the technician use to disable the Windows Update service?

    Services

  • 46

    Which of the following Control Panel sections would allow a technician to see which version and build of Windows 10 is installed on a computer?

    System

  • 47

    During a disaster recovery, which of the following statements is true?

    A virtual machine has less downtime than a physical server

  • 48

    A user's workstation is infected with malware. You have quarantined it from the network. When you attempt to boot it to the Windows 10 desktop, it fails. Which of the following should you do NEXT to begin remediating this system?

    Restart into Safe Mode and conduct an antivirus scan

  • 49

    A technician needs to add new features to an existing router on the network. Which of the following should be performed to add the new features?

    Firmware update

  • 50

    The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?

    WPA personal

  • 51

    You have just installed a second monitor for a salesperson's workstation. The user wants to clone the display so that both monitors show the exact same image. This will allow them to see one of the displays while their customer sees the other from across their desk. When you connect the second monitor and clone the display, the second monitor displays text twice as large as the other monitor. Which of the following settings should you configure?

    Resolution

  • 52

    Barbara has connected her personal wireless router to a network jack inside her office. The router cannot get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router's configuration to ensure it is set up to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address?

    Only allow listed MAC addresses can connect to the network

  • 53

    You are working for a brand new startup company that allows you to use your laptop, tablet, or other devices while at work. The company does provide some rules and guidelines that you must follow based on their policy. Which of the following policies should you look at to ensure you understand these rules and guidelines?

    BYOD

  • 54

    You have been asked to recycle 20 of your company's old laptops. The laptops will be donated to a local community center for underprivileged children. Which of the following data destruction and disposal methods is MOST appropriate to allow the data on the drives to be fully destroyed and the drives to be reused by the community center?

    Low-level formatting of the HDDs

  • 55

    A technician at Dion Training wants to identify which version and build of Windows 10 is installed on a laptop. Which of the following commands should the technician enter at the command line?

    winver

  • 56

    You are working as a desktop repair technician for a large corporation. The company uses the exact same desktop hardware for all of its user's workstations. Today, you have received multiple calls from users complaining that their screen becomes filled with static when moving their mouse. You believe the video card driver may be at fault. Which log would you review to determine if the video card driver has been updated recently?

    System log

  • 57

    Your supervisor has requested remote access to a particular server to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do before granting remote access to the server to your supervisor?

    Install the latest security updates and patches to the server

  • 58

    Dion Training uses DHCP to assign private Class C IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class C address?

    192.168.2.14

  • 59

    One of your Windows services is failing to start when you boot up your laptop. You have checked the service in the Windows Services tool and verified it is set to Automatic. What should you attempt to do NEXT to get the service to startup?

    Reboot into Safe Mode and see if the service starts

  • 60

    A user has asked you for a recommendation for a word processing program for their home computer. The user doesn't want to pay for a license to be able to use the word processor. Based on this, what type of license would you recommend to the user?

    Open license

  • 61

    Which of the following will close all of a user's open programs and services before powering off their Windows 10 computer?

    Shutdown

  • 62

    A user reports that every time they try to access https://www.diontraining.com, they receive an error stating "Invalid or Expired Security Certificate." The technician attempts to connect to the same site from other computers on the network, and no errors or issues are observed. Which of the following settings needs to be changed on the user's workstation to fix the "Invalid or Expired Security Certificate" error?

    Date and time

  • 63

    What does the command "shutdown /r" do on a Windows workstation?

    Reboot the workstation

  • 64

    Which of the following types of screen locks uses a secret PIN or password to prevent access to a mobile device?

    Passcode

  • 65

    Jonni is installing Windows 11 (64-bit) in a virtual machine on his Linux desktop. The installation is continually failing and producing an error. Jonni has configured the virtual machine with a dual-core 1.2 GHz processor, 4 GB of memory, a 32 GB hard drive, and a 1920 x 1080 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

    Amount of hard drive space

  • 66

    Which of the following commands is used on a Linux system to edit a text file on a server?

    vi

  • 67

    Your Windows 10 system is booting up very slowly. Which of the following should you do to speed up the boot process?

    Disable unnecessary programs from automatically starting up

  • 68

    You have been asked to configure your neighbor's SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server?

    Perimeter network

  • 69

    Judith is installing Windows 10 (64-bit) in a virtual machine on her macOS laptop. The installation is continually failing and producing an error. Judith has configured the virtual machine with a dual-core 1 GHz processor, 2 GB of memory, a 15 GB hard drive, and a 1024x768 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

    Amount of hard drive space

  • 70

    Which of the following is the purpose of an ESD mat?

    Protects equipment against accidental static discharge

  • 71

    Your companies share drive has several folders that have become encrypted by a piece of ransomware. During your investigation, you found that only the Sales department folders were encrypted. You continue your investigation and find that a salesperson's workstation was also encrypted. You suspect that this workstation was the original source of the infection. Since it was connected to the Sales department share drive as a mapped S:\ drive, it was also encrypted. You have unplugged the network cable from this workstation. What action should you perform NEXT to restore the company's network to normal operation?

    Restore the Sales department folders from backups

  • 72

    Tony works for a company as a cybersecurity analyst. His company runs a website that allows public postings. Recently, users have started complaining about the website having pop-up messages asking for their username and password. Simultaneously, your security team has noticed a large increase in the number of compromised user accounts on the system. What type of attack is most likely the cause of both of these events?

    Cross-site scripting

  • 73

    Which of the following commands is used on a Linux system to terminate an unresponsive system process?

    kill

  • 74

    Dion Consulting Group has been hired by a large security operations center (SOC) to build a Windows 2019 domain environment. The SOC has a total of 150 Windows 10 Professional edition workstations that will connect to the domain for authentication, administration, and access to networked resources. Which of the following types of network models is being used by this security operations center in the domain environment?

    Client/server

  • 75

    Which of the following commands is used on a Linux system to safely turn off a server?

    shutdown

  • 76

    Dion Training has an open wireless network so that their students can connect to the network during class without logging in. The Dion Training security team is worried that the customers from the coffee shop next door may be connecting to the wireless network without permission. If Dion Training wants to keep the wireless network open for students but prevents the coffee shop's customers from using it, which of the following should be changed or modified?

    Signal strength or power level

  • 77

    Dion Training's offices are frequently experiencing under-voltage events, sags, and power failures. Which of the following solutions would protect their servers from these issues?

    Uninterruptible power supply

  • 78

    Which of the following data types would be used to store the number 3.14?

    Floating-point

  • 79

    You need to move a new desktop computer to another desk. Which of the following actions should you take?

    Lift with your legs and not your back

  • 80

    Tim has requested to install a security update to the Dion Training web server during the next maintenance window. At the change control board meeting, Tim presents the requested change and gains approval from the change board. Before Tim installs the update, which of the following should be documented as a result of the change board's approval?

    Date and time of the change

  • 81

    Which of the following should you use to fix an issue with a graphics card's drivers in Windows 10?

    Device Manager

  • 82

    Which of the following commands is used on a Linux system to delete a file from a directory?

    rm

  • 83

    What is the maximum amount of memory used in a 32-bit version of the Windows operating system?

    4 GB

  • 84

    Which of the following commands can a technician use on a Linux server to verify the IP address associated with diontraining.com?

    dig

  • 85

    A user contacts the service desk after they just finished attempting to upgrade their laptop to Windows 10. The upgrade failed, and the user asks you to explain why. Which of the following log files should you review to determine the cause of the upgrade failure?

    Setup

  • 86

    A user contacts the service desk and states that Microsoft Excel crashed while they were in the middle of updating their spreadsheet. Which of the following log files should you review to determine the cause of the crash?

    Application log

  • 87

    A technician is trying to locate a protected .dll file to edit, but they cannot see it in the System32 folder. Which Control Panel utility should the technician use to find the file?

    File Explorer Options

  • 88

    A system administrator has noticed that an employee's account has been attempting to log in to multiple workstations and servers across the network. This employee does not have access to these systems, and the login attempts are unsuccessful. Which of the following actions should the administrator do to this employee's account in Active Directory?

    Disable the user's account

  • 89

    One of the routers in your network just failed. You have been asked to replace it with the same model router from the spare inventory closet as part of an emergency change request. You find the new router in the closet and notice it was signed into inventory 13 months ago. You install the router and attempt to enable HTTPS in the configuration to allow for remote access. The failed router had this capability, but this spare does not, even though they are the same model and were purchased at the same time. What should you do to enable HTTPS access for this router?

    Update the firmware