暗記メーカー
ログイン
DION#3
  • Mixtapes øf Hanna

  • 問題数 90 • 5/21/2024

    記憶度

    完璧

    13

    覚えた

    33

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    You are working as a defense contractor for the U.S. Army. The Army is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this sized organization to purchase?

    Enterprise

  • 2

    You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. Which of the following should you do FIRST to attempt to solve this problem?

    Clear the app's cache

  • 3

    A user contacts the help desk and complains they are getting an error when they attempt to open a 4 GB .dmg file on their Windows 10 workstation. Which of the following should you tell them?

    "You need to use macOS to open DMG files"

  • 4

    When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are abysmal, and the browser creates numerous pop-ups. Jonathan asks for your assistance in fixing this issue. Which TWO of the following actions do you recommend Jonathan perform first?

    Reset the web browser to the default settings and configuration, Uncheck any unapproved applications from the Startup tab in the Task Manager

  • 5

    Which of the following IP addresses is considered an APIPA address?

    169.254.125.154

  • 6

    Which of the following options in Windows 10 would create a small hibernation file saved on the storage device before shutting down the computer so that it reduces the time to boot up when powered on?

    Fast startup

  • 7

    Which of the following tools is used to duplicate all of the files in one directory to another in the Windows command line?

    xcopy

  • 8

    A recently hired security employee at a bank was asked to perform daily scans of the bank's intranet to look for unauthorized devices. The new employee decides to create a script that scans the network for unauthorized devices every morning at 2:00 am. Which programming language would work best to create this script?

    Python

  • 9

    Which command-line tool is used on a Linux system to display a list of the files and directories within the current path?

    ls

  • 10

    Which of the following types of screen locks uses a biometric authentication mechanism that relies upon mapping the geography of a user's eyes, nose, mouth, and other features before granting access to a mobile device?

    FaceID

  • 11

    Sally was checking her email when she noticed that she has several automated replies from emails she doesn't remember sending. What type of attack was Sally MOST likely the victim of?

    Hijacked email

  • 12

    Jason wants to configure his Windows 10 workstation to automatically block pop-ups when searching for websites online. Which of the following Control Panel sections should he use to achieve this?

    Internet Options

  • 13

    What does the command "shutdown /s" do on a Windows workstation?

    Shutdown the workstation

  • 14

    Which of the following file types are commonly used by scripts in a Linux command line environment?

    .sh

  • 15

    Which of the following file types are commonly used to create applications that can be run on Linux, macOS, and Windows?

    .py

  • 16

    A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. Which of the following tools should be used to allow both operating systems to exist on their MacBook Pro?

    Boot Camp

  • 17

    Which of the following types of backup would require the MOST time to complete?

    Full

  • 18

    A cybersecurity analyst is applying for a new job with a penetration testing firm. He received the job application as a secured Adobe PDF file, but unfortunately, the firm locked the file with a password so the potential employee could not fill in the application. Instead of asking for an unlocked copy of the document, the analyst decides to write a script in Python to attempt to unlock the PDF file by using passwords from a list of commonly used passwords until he can find the correct password or attempts every password in his list. Based on this description, what kind of cryptographic attack did the analyst perform?

    Dictionary attack

  • 19

    Dion Training will be hiring 10 college students as interns to work over the summer. Each year, the same interns will work for the company for 8 weeks, but then they will return to school. Next summer, they will return to the company and will need to reaccess their accounts. What is the BEST policy to use so that the interns can use the accounts during the summer but cannot log in during the school year?

    Disable the user accounts at the end of each summer

  • 20

    Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 workstations. When connected to a private network, the firewall has been configured to only allow inbound connections that match an existing rule and to only allow outbound connections that do not match any existing rules. What type of security posture has Dion Training implemented?

    Explicit allow for inbound, implicit allow for outbound

  • 21

    While troubleshooting the reason that the File Explorer is crashing on a Windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this?

    sfc

  • 22

    Which command would a Linux user need to enter to change their password?

    passwd

  • 23

    Which of the following data types would be used to store the value of TRUE?

    Boolean

  • 24

    Karen, a salesperson in your company, is currently on travel this week. She calls your company's help desk and is yelling because she cannot connect to her email using her hotel room's WiFi. Her laptop shows that it is connected to the "HotelWiFi" network, but Windows states it has "Limited or no connectivity." What action should Karen perform to fix this issue?

    Open a web browser and agree to the hotel's capture page AUP

  • 25

    Maria is trying to log in to her company's webmail and is asked to enter her username and password. Which type of authentication method is Maria using?

    Single-factor

  • 26

    A workstation at Dion Training's office is taking a long time to boot up. Once it finishes booting to the Windows 10 desktop, which of the following tools can a technician use to diagnose and fix the boot issues?

    msconfig.exe

  • 27

    Which of the following is used to communicate data and preferences to child processes within a script or batch file?

    Environmental variables

  • 28

    A small doctor's office has asked you to configure their network to use the highest levels of wireless security and desktop authentication. The office only uses cloud-based SaaS applications to store their patient's sensitive data. Which TWO of the following protocols or authentication methods should you implement for the BEST security?

    Multifactor, WPA2

  • 29

    Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?

    Swap partition

  • 30

    A customer is complaining that there is are intermittent problems with their PC. As a technician, you don't know exactly what the errors are, so which tool should you use to determine what errors have previously occurred?

    Event Viewer

  • 31

    You are troubleshooting a network printer when a document is printed with sensitive employee data on it. Which of the following actions should you take?

    Take the document to the office manager

  • 32

    A system administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The server manager decides to initiate a rollback. Which describes what the system administrator should do next?

    Return the system to the original state before the change

  • 33

    Which of the following Control Panel options should a technician configure to automatically adjust the volume of different sounds when the computer is being used to place or receive telephone calls?

    Sound

  • 34

    You run the command ipconfig on your laptop and see that you have been assigned an IP address of 169.254.0.56. Which category of IPv4 address is this?

    APIPA

  • 35

    A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming needs to store the amount of disk space in a temporary placeholder within the program that can be updated and changed during the script's execution. Which of the following would be used to store the value of the disk space needed?

    Variable

  • 36

    What is the minimum amount of memory required to install Windows 10 (x86) on a device?

    1 GB

  • 37

    Jason has built a custom Android application that he wants to install on an Android tablet without having to install it through the Play Store. Which of the following would be required to allow him to install the app's APK on the device?

    Sideloading

  • 38

    A laptop is running Windows 10 with Windows Defender on it. A user believes their laptop may have become infected with malware, so they install a second antivirus program that supposedly includes real-time protection. Now, the laptop is sluggish and sometimes non-responsive. Which of the following should you do FIRST to resolve this problem?

    Uninstall the real-time protection antivirus

  • 39

    You are working as a military defense contractor and have been asked to dispose of 5 laptop hard drives used in systems that processed classified information. Which of the following physical data destruction and disposal methods is MOST appropriate to ensure the data cannot be recovered?

    Degaussing of the HDDs

  • 40

    Which of the following macOS features is the equivalent of the Taskbar in Windows?

    Dock

  • 41

    Your Android device's battery is advertised to last 12 hours, but it drains almost completely within 90 minutes. What should you do FIRST to try and solve this problem?

    Check which apps are using the most battery life

  • 42

    A network technician is tasked with designing a firewall to improve security for an existing FTP server on the company network. The FTP server must be accessible from the Internet. The security team is concerned that the FTP server could be compromised and used to attack the domain controller hosted within the company's internal network. What is the BEST way to mitigate this risk?

    Migrate the FTP server from the internal network to a screened subnet

  • 43

    Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?

    dd

  • 44

    Which of the following is considered a form of regulated data?

    PII

  • 45

    Samantha works in the human resource department in an open floorplan office. She is concerned about the possibility of someone conducting shoulder surfing to read sensitive information from employee files while accessing them on her computer. Which of the following physical security measures should she implement to protect against this threat?

    Privacy screen

  • 46

    What type of structure is "IF THEN ELSE" in scripting?

    Branch

  • 47

    OYour Windows 10 workstation is currently running version 1909 and was flagged by the cybersecurity team as a threat to the network due to its outdated operating system. Which of the following actions should be performed to remediate this issue?

    Use the Windows Update to install the latest OS version

  • 48

    You are working at the Dion Training headquarters in Puerto Rico. The island just suffered a power outage due to a hurricane. The server room in the headquarters has power, but the rest of the office does not. You verify that the diesel generator is running at full electrical load capacity. Which of the following solutions should you recommend to Dion Training to allow them to continue working during a long-term power outage?

    Increase the capacity of their backup generator to support a larger load

  • 49

    A file currently has permissions of 755. Which of the following commands would change file permission to r-xr--r--?

    chmod 544 filename

  • 50

    You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. Which of the following should you do FIRST to attempt to solve this problem?

    Update the smartphone's OS

  • 51

    Your mother says there is something wrong with her computer, but unfortunately, she doesn't know how to fix it. She asks if you can remotely connect to her computer and see if you can fix it. Which of the following technologies would BEST allow you to remotely access her computer and interact with her Windows 10 laptop?

    RDP

  • 52

    What is the BEST way to update an app purchased from the Mac App Store on a Macbook?

    Open the Mac App Store and select the Updates button

  • 53

    Which of the following is the LEAST secure wireless security and encryption protocol?

    WEP

  • 54

    Which of the following security controls provides Windows system administrators with an efficient way to deploy system configuration settings across many devices?

    GPO

  • 55

    Joanne is having a drink at the coffee shop near her office. She takes out her Windows 10 laptop and connects it to the coffee shop’s wireless network to check her email. Which type of network should she select to hide their computer from other devices on the network and prevent file sharing with other patrons of the coffee shop?

    Public

  • 56

    How would you represent r-xrw-r-- in octal notation?

    564

  • 57

    Which file system type is used to mount remote storage devices on a Linux system?

    NFS

  • 58

    Which command-line tool could you use on a Windows system to enable an inactive administrator account?

    net user

  • 59

    Your smartphone's battery has been draining quickly. You have looked at the applications that are causing the drain and notice that a free game runs in the background, collecting GPS data even when you aren't using it. Which of the following threats is this an example of?

    Unauthorized location tracking

  • 60

    What is the minimum processor required to install Windows 10 (x64) on a device?

    1 GHz single-core processor

  • 61

    Which of the following encryption types was used by WPA to better secure wireless networks than WEP?

    TKIP

  • 62

    You are troubleshooting a network connectivity issue and need to determine the packet's flow path from your system to the remote server. Which of the following tools would best help you identify the path between the two systems?

    tracert

  • 63

    You have just completed a repair for a customer's smartphone that took you three days. The customer complained that the repair took too long and began to question you about the steps you took to repair the device. What should you do NEXT?

    Provide documentation of the repair to the customer and thank them for their patience

  • 64

    An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses ending in spamyou.com. Which of the following actions should you take to help reduce the amount of spam this and other users in your organization are receiving?

    Create a domain-based email filter

  • 65

    Tim has created a new iOS application that he wants to install on an iPad without having to install it through the official App Store. To save some money, he has not purchased a developer certificate from Apple since he isn't planning to sell this app to others. Which of the following would allow Tim to install this unofficial app on his own iPad for testing?

    Jailbroken device

  • 66

    Which of the following file types are commonly used by scripts in a web page?

    .js

  • 67

    What is the FIFTH step of the seven-step malware removal process?

    Schedule scans and run updates

  • 68

    Which of the following policies or plans would dictate the complexity requirements for a wireless network's shared secret key?

    Password policy

  • 69

    Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?

    WEP

  • 70

    Which of the following Windows tools can a technician use to display information about the performance of hardware and software resources in real-time?

    resmon.exe

  • 71

    A customer runs frantically into your computer repair store. He says that his smartphone fell into a puddle, and now it won't turn on. He excitedly tells you that he needs the smartphone working again "right now" and cannot wait. What should you do?

    Offer the customer the option to replace his phone

  • 72

    Which of the following backup rotation schemes requires backups to be stored to at least two different types of media?

    3-2-1 backup

  • 73

    Dion Training wants to upgrade its employees’ workstations from Windows 10 to Windows 11. All of the employees’ data and files are saved to the company’s shared drive. The technician has been told to choose an installation type that will delete all of the existing data, settings, and applications on the workstations during the upgrade. Which of the following types of upgrades or installations should you perform on the workstations?

    Clean install

  • 74

    Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?

    Notepad

  • 75

    Chris just downloaded a new third-party email client for his smartphone. When Chris attempts to log in to his email with his username and password, the email client generates an error messaging stating that "Invalid credentials" were entered. Chris assumes he must have forgotten his password, so he resets his email username and password and then reenters them into the email client. Again, Chris receives an "Invalid credentials" error. What is MOST likely causing the "Invalid credentials" error regarding Chris's email client?

    His email account requires multi-factor authentication

  • 76

    Which of the following is the MOST secure wireless security and encryption protocol?

    WPA3

  • 77

    Which attack utilizes a wireless access point made to look as if it belongs to the network by mimicking the corporate network's SSID to eavesdrop on the wireless traffic?

    Evil twin

  • 78

    What kind of attack is an example of IP spoofing?

    On-path attack

  • 79

    Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the proper WPA2 password?

    Disable WPS

  • 80

    Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won't open. What should you do?

    Verify the digital certificate is installed on the device

  • 81

    Which of the following concepts is the MOST important for a company's long-term health in the event of a disaster?

    Off-site backups

  • 82

    You are working as part of a penetration testing team during an assessment of Dion Training's headquarters. Your boss has requested that you search the company's recycling bins for any information that might be valuable during the reconnaissance phase of your attack. What type of social engineering method are you performing?

    Dumpster diving

  • 83

    Karen lives in an area that is prone to hurricanes and other extreme weather conditions. She asks you to recommend an electrical conditioning device that will prevent her files from being corrupted if the building's power is unstable or lost. Additionally, she would like the computer to maintain power for up to an hour of uptime to allow for a graceful shutdown of her programs and computer. Which of the following should you recommend?

    Uninterruptible power supply

  • 84

    Malware infected Natalie's iMac. The malware has deleted numerous files from the system and corrupted the operating system. Natalie needs to access some of her files from the computer that have been deleted by the malware. Which of the following built-in utilities could restore access to those files?

    Time Machine

  • 85

    What is the FIRST step of the seven-step malware removal process?

    Investigate and verify malware symptoms

  • 86

    You are helping to set up a backup plan for your organization. The current plan states that all of the organization's Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?

    Attempt to restore to a test server from one of the backup files to verify them

  • 87

    Which command is used to create a new disk partition on a Windows system?

    diskpart

  • 88

    Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall's ACL to see if the server's outgoing email is being blocked. Which of the following ports should you ensure is open and not blocked by the firewall?

    25

  • 89

    Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company's owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donating them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?

    Wiping

  • 90

    Gina just installed a 4 TB HDD into her Windows 10 computer and wants to assign the drive letter "M" to store her media files. Which type of partition should Gina use if she wants to mount the drive as a single partition?

    GPT