問題一覧
1
Samantha works in the human resource department in an open floorplan office. She is concerned about the possibility of someone conducting shoulder surfing to read sensitive information from employee files while accessing them on her computer. Which of the following physical security measures should she implement to protect against this threat?
Privacy screen
2
What does the command "shutdown /s" do on a Windows workstation?
Shutdown the workstation
3
You are troubleshooting a network printer when a document is printed with sensitive employee data on it. Which of the following actions should you take?
Take the document to the office manager
4
Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another?
dd
5
You are working as part of a penetration testing team during an assessment of Dion Training's headquarters. Your boss has requested that you search the company's recycling bins for any information that might be valuable during the reconnaissance phase of your attack. What type of social engineering method are you performing?
Dumpster diving
6
Which of the following policies or plans would dictate the complexity requirements for a wireless network's shared secret key?
Password policy
7
Which of the following file types are commonly used to create applications that can be run on Linux, macOS, and Windows?
.py
8
Your mother says there is something wrong with her computer, but unfortunately, she doesn't know how to fix it. She asks if you can remotely connect to her computer and see if you can fix it. Which of the following technologies would BEST allow you to remotely access her computer and interact with her Windows 10 laptop?
RDP
9
Your smartphone's battery has been draining quickly. You have looked at the applications that are causing the drain and notice that a free game runs in the background, collecting GPS data even when you aren't using it. Which of the following threats is this an example of?
Unauthorized location tracking
10
Sally was checking her email when she noticed that she has several automated replies from emails she doesn't remember sending. What type of attack was Sally MOST likely the victim of?
Hijacked email
11
Which command-line tool could you use on a Windows system to enable an inactive administrator account?
net user
12
Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won't open. What should you do?
Verify the digital certificate is installed on the device
13
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. This is the third user with this error on an Android (model DTA) smartphone. The same app is working on your smartphone, but it is a model DTX. Which of the following should you do FIRST to attempt to solve this problem?
Update the smartphone's OS
14
Which of the following security controls provides Windows system administrators with an efficient way to deploy system configuration settings across many devices?
GPO
15
Which of the following is considered a form of regulated data?
PII
16
Karen, a salesperson in your company, is currently on travel this week. She calls your company's help desk and is yelling because she cannot connect to her email using her hotel room's WiFi. Her laptop shows that it is connected to the "HotelWiFi" network, but Windows states it has "Limited or no connectivity." What action should Karen perform to fix this issue?
Open a web browser and agree to the hotel's capture page AUP
17
How would you represent r-xrw-r-- in octal notation?
564
18
Which of the following is the MOST secure wireless security and encryption protocol?
WPA3
19
What kind of attack is an example of IP spoofing?
On-path attack
20
A cybersecurity analyst is applying for a new job with a penetration testing firm. He received the job application as a secured Adobe PDF file, but unfortunately, the firm locked the file with a password so the potential employee could not fill in the application. Instead of asking for an unlocked copy of the document, the analyst decides to write a script in Python to attempt to unlock the PDF file by using passwords from a list of commonly used passwords until he can find the correct password or attempts every password in his list. Based on this description, what kind of cryptographic attack did the analyst perform?
Dictionary attack
21
Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 workstations. When connected to a private network, the firewall has been configured to only allow inbound connections that match an existing rule and to only allow outbound connections that do not match any existing rules. What type of security posture has Dion Training implemented?
Explicit allow for inbound, implicit allow for outbound
22
A laptop is running Windows 10 with Windows Defender on it. A user believes their laptop may have become infected with malware, so they install a second antivirus program that supposedly includes real-time protection. Now, the laptop is sluggish and sometimes non-responsive. Which of the following should you do FIRST to resolve this problem?
Uninstall the real-time protection antivirus
23
Which command is used to create a new disk partition on a Windows system?
diskpart
24
Which of the following file types are commonly used by scripts in a web page?
.js
25
Chris just downloaded a new third-party email client for his smartphone. When Chris attempts to log in to his email with his username and password, the email client generates an error messaging stating that "Invalid credentials" were entered. Chris assumes he must have forgotten his password, so he resets his email username and password and then reenters them into the email client. Again, Chris receives an "Invalid credentials" error. What is MOST likely causing the "Invalid credentials" error regarding Chris's email client?
His email account requires multi-factor authentication
26
Dion Training wants to upgrade its employees’ workstations from Windows 10 to Windows 11. All of the employees’ data and files are saved to the company’s shared drive. The technician has been told to choose an installation type that will delete all of the existing data, settings, and applications on the workstations during the upgrade. Which of the following types of upgrades or installations should you perform on the workstations?
Clean install
27
Which of the following options in Windows 10 would create a small hibernation file saved on the storage device before shutting down the computer so that it reduces the time to boot up when powered on?
Fast startup
28
Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?
WEP
29
Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the proper WPA2 password?
Disable WPS
30
Joanne is having a drink at the coffee shop near her office. She takes out her Windows 10 laptop and connects it to the coffee shop’s wireless network to check her email. Which type of network should she select to hide their computer from other devices on the network and prevent file sharing with other patrons of the coffee shop?
Public
31
A network technician is tasked with designing a firewall to improve security for an existing FTP server on the company network. The FTP server must be accessible from the Internet. The security team is concerned that the FTP server could be compromised and used to attack the domain controller hosted within the company's internal network. What is the BEST way to mitigate this risk?
Migrate the FTP server from the internal network to a screened subnet
32
A customer is complaining that there is are intermittent problems with their PC. As a technician, you don't know exactly what the errors are, so which tool should you use to determine what errors have previously occurred?
Event Viewer
33
What is the minimum processor required to install Windows 10 (x64) on a device?
1 GHz single-core processor
34
Jason wants to configure his Windows 10 workstation to automatically block pop-ups when searching for websites online. Which of the following Control Panel sections should he use to achieve this?
Internet Options
35
A workstation at Dion Training's office is taking a long time to boot up. Once it finishes booting to the Windows 10 desktop, which of the following tools can a technician use to diagnose and fix the boot issues?
msconfig.exe
36
A recently hired security employee at a bank was asked to perform daily scans of the bank's intranet to look for unauthorized devices. The new employee decides to create a script that scans the network for unauthorized devices every morning at 2:00 am. Which programming language would work best to create this script?
Python
37
Which of the following Windows tools can a technician use to display information about the performance of hardware and software resources in real-time?
resmon.exe
38
Which of the following IP addresses is considered an APIPA address?
169.254.125.154
39
What type of structure is "IF THEN ELSE" in scripting?
Branch
40
What is the FIRST step of the seven-step malware removal process?
Investigate and verify malware symptoms
41
You are helping to set up a backup plan for your organization. The current plan states that all of the organization's Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?
Attempt to restore to a test server from one of the backup files to verify them
42
An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses ending in spamyou.com. Which of the following actions should you take to help reduce the amount of spam this and other users in your organization are receiving?
Create a domain-based email filter
43
Which file system type is used to mount remote storage devices on a Linux system?
NFS
44
You are working as a defense contractor for the U.S. Army. The Army is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this sized organization to purchase?
Enterprise
45
Maria is trying to log in to her company's webmail and is asked to enter her username and password. Which type of authentication method is Maria using?
Single-factor
46
Which of the following Control Panel options should a technician configure to automatically adjust the volume of different sounds when the computer is being used to place or receive telephone calls?
Sound
47
Karen lives in an area that is prone to hurricanes and other extreme weather conditions. She asks you to recommend an electrical conditioning device that will prevent her files from being corrupted if the building's power is unstable or lost. Additionally, she would like the computer to maintain power for up to an hour of uptime to allow for a graceful shutdown of her programs and computer. Which of the following should you recommend?
Uninterruptible power supply
48
A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. Which of the following tools should be used to allow both operating systems to exist on their MacBook Pro?
Boot Camp
49
Gina just installed a 4 TB HDD into her Windows 10 computer and wants to assign the drive letter "M" to store her media files. Which type of partition should Gina use if she wants to mount the drive as a single partition?
GPT
50
What is the minimum amount of memory required to install Windows 10 (x86) on a device?
1 GB
51
A small doctor's office has asked you to configure their network to use the highest levels of wireless security and desktop authentication. The office only uses cloud-based SaaS applications to store their patient's sensitive data. Which TWO of the following protocols or authentication methods should you implement for the BEST security?
Multifactor, WPA2
52
A system administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The server manager decides to initiate a rollback. Which describes what the system administrator should do next?
Return the system to the original state before the change
53
Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?
Notepad
54
You are troubleshooting a network connectivity issue and need to determine the packet's flow path from your system to the remote server. Which of the following tools would best help you identify the path between the two systems?
tracert
55
Malware infected Natalie's iMac. The malware has deleted numerous files from the system and corrupted the operating system. Natalie needs to access some of her files from the computer that have been deleted by the malware. Which of the following built-in utilities could restore access to those files?
Time Machine
56
Which of the following file types are commonly used by scripts in a Linux command line environment?
.sh
57
Tim has created a new iOS application that he wants to install on an iPad without having to install it through the official App Store. To save some money, he has not purchased a developer certificate from Apple since he isn't planning to sell this app to others. Which of the following would allow Tim to install this unofficial app on his own iPad for testing?
Jailbroken device
58
Your Android device's battery is advertised to last 12 hours, but it drains almost completely within 90 minutes. What should you do FIRST to try and solve this problem?
Check which apps are using the most battery life
59
You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. Which of the following should you do FIRST to attempt to solve this problem?
Clear the app's cache
60
Which command would a Linux user need to enter to change their password?
passwd
61
A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming needs to store the amount of disk space in a temporary placeholder within the program that can be updated and changed during the script's execution. Which of the following would be used to store the value of the disk space needed?
Variable
62
Which of the following backup rotation schemes requires backups to be stored to at least two different types of media?
3-2-1 backup
63
Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?
Swap partition
64
Which of the following encryption types was used by WPA to better secure wireless networks than WEP?
TKIP
65
Which of the following tools is used to duplicate all of the files in one directory to another in the Windows command line?
xcopy
66
A customer runs frantically into your computer repair store. He says that his smartphone fell into a puddle, and now it won't turn on. He excitedly tells you that he needs the smartphone working again "right now" and cannot wait. What should you do?
Offer the customer the option to replace his phone
67
Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company's owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donating them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?
Wiping