CompTIA A+ 220-1001 & 220-1002 Jason Dion - CompTIA A+ 1002 Exam Prep #1
A Battery Backup (UPS) keeps systems running during brownouts or power outages, allowing safe shutdown. A Line Conditioner stabilizes voltage, corrects waveform distortions, and filters electrical noise.
You are concerned that your services could be damaged during a power failure or under-voltage event. Which Two Devices would protect against these conditions?
You are concerned that your services could be damaged during a power failure or under-voltage event. Which Two Devices would protect against these conditions?
Surge Suppressor
Battery Backup
Grounding the Server Rack
Line Conditioner
Battery Backup
Line Conditioner
Explanation:
Line Conditioner - Protects equipment from Power Surges, helps to correct voltage and waveform distortions, and removes external electrical noise (IE: Frequency, Electromagnetic Interference) caused by devices such as radios and motors.
Battery Backup - Like a UPS (Uninterruptable Power Supply), have protections against Sags or Brownouts and will keep a System running for a limited amount of time, enough time to properly save your work and power down.
Key Terms
You are concerned that your services could be damaged during a power failure or under-voltage event. Which Two Devices would protect against these conditions?
Surge Suppressor
Battery Backup
Grounding the Server Rack
Line Conditioner
Battery Backup
Line Conditioner
Explanation:
Line Conditioner - Protects equipmen...
Whenever you reboot your domain controller, you notice it takes a very long time to boot up. As the server is booting, you hear noises that sound like a steady series of clicks coming from the hard drive. Which of the following is the BEST action to help speed up the boot time of the Server?
Perform a Disk Cleanup
Terminate Processes in the Task Manager
Remove unnecessary applications from Startup
Defragment the Hard Drive
Defragment the Hard Drive
Explanation:
Defragging is a simple process when file frag...
Which of the following commands is used on a Linux System to delete all the files and directories in a Linux System’s filesystem?
rm -rf .
rm -rf /
rm /
rm .
rm -rf /
Explanation:
The “rm -rf /” command is the most dangerous command to issue ...
Your companies share drive has several folders that have become encrypted by a piece of ransomware. During your investigation, you found that only the Sales Department folders were encrypted. You continue your investigation and find that a salesperson’s workstation was also encrypted. You suspect that this workstation was the original source of the infection. Since it was connected to the Sales department share drive as mapped S:\ drive, it was also encrypted. You have unplugged the network cable from this workstation. What Action should you perform NEXT to restore the company’s network to normal operation?
Schedule a Full Disk Anti-Malware Scan on the Workstation
Schedule Weekly Scans and Enable On-Access Scanning
Disable System Restore on the Workstation
Restore the Sales Department Folders from Backups
Restore the Sales Department Folders from Backups
Explanation: (My Take)
The KEY pie...
What is the Symbolic representation of the OCTAL Numeric Permission 644?
rw-r–r–
rw——-
rwx-r-xr-x
r–rw-rw-
rw-r–r–
Explanation:
r = 4
w = 2
x = 1
Knowin...
Dion Training’s offices are frequently experiencing brownouts and sags. Which of the Following Solutions would protect all of their workstations and servers from these under-voltage events?
Line Conditioner
Uninterruptible Power Supply
Diesel Generator
Surge Suppressor
Line Conditioner
Explanation:
Line Conditioners are used to protect an entire power ...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Surge Suppressor | Battery Backup Explanation: Battery Backup - Like a UPS (Uninterruptable Power Supply), have protections against Sags or Brownouts and will keep a System running for a limited amount of time, enough time to properly save your work and power down. |
Perform a Disk Cleanup | Defragment the Hard Drive Explanation: My Explanation: |
rm -rf . | rm -rf / Explanation: The -r option means that the command will recursively delete the folder and its subfolders. The -f option means that even read-only files wil be removed without asking the user. The use of / indicates that the remove command should begin at the ROOT directory ( / ) and recursively force all files and folders to be deleted under the ROOT. This would delete everything on the System. The . would only be deleting from the current working directory and then delete all files and folders further down the directory structure, not the entire file system. |
Schedule a Full Disk Anti-Malware Scan on the Workstation | Restore the Sales Department Folders from Backups Explanation: (My Take) |
rw-r–r– | rw-r–r– Explanation: Knowing this, that means RW = 6, R = 4, and R = 4 over the 3 layers of Linux Permissions. |
Line Conditioner | Line Conditioner Explanation: Because the question’s requirement must protect ALL of the Workstations, a Line Conditioner is the Best Option. An uninterruptible power supply or UPS is an electrical apparatus that provides emergency power to a load when the input power source becomes too low or the main power fails. UPS provides near-instantaneous protection from input power interruptions by using a battery backup. |
The user’s workstation is infected with ransomware | The user is the victim of a rogue antivirus attack |
Downgrade the PC to a working patch level | Rollback the drivers to the previous version |
request type=ns | set type=ns Explanation: The “set type=ns” tells nslookup only reports information on name servers. If you used “set type=mx” instead, you would receive information only on mail exchange servers. |
PII | PHI (Personal Health Information) Explanation: PII (Personal Identifiable Information) refers to data that can be used to identify, contact, or locate an individual. Information such as a Social Security Number, name, date of birth, email address, telephone number, street address, biometric data is considered PII. IP (Intellectual Property) or Proprietary Information is information created and owned by the company. CUI (Controlled Unclassified Information) is federal non-classified information that must be safeguarded by implementing a uniform set of requirements and information security controls to secure sensitive government information. |
rwxrwxrwx | rwx—— Explanation: Knowing this, that means RWX = 7, then there is 0 Permissions for the next 2 levels in Linux Permissions. |
Internet Options | Folder Options Explanation: The User Accounts section of the Control Panel allows techs to add user accounts, remove user accounts, change account types, reset account passwords, and other settings relevant to user accounts and their security. |
Thumbprint Reader | Access Control Vestibule Explanation: Thumbprint Reader or Cipher Lock will ensure that only an authorized user can open the door, but it won’t prevent someone from piggybacking and entering with them. Video Monitoring is passive security, it won’t prevent two people from entering at once. |
Reboot the workstation into the BIOS and reconfigure boot options | Reboot the workstation into Safe Mode and rollback the recent security update |
Which version should you use when installing a Linux OS and are concerned with End-Of-Life Support? Rolling Release | LTS Release Explanation: (My Take) Beta Release is a Pre-Release of software product that is given out to a large group of users for a LIMITED Time and is supported for a LIMITED Time. Developer Release is also a Pre-Release of a software product that is given out to software developers to TEST. Again, Supported for a LIMITED Time. Rolling Release is a CONCEPT of Software development where an application is frequently updated through the release of new features over time. |
Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar’s printer icon. Which of the following actions should Peter try FIRST to solve this issue? Check the status of the print server queue | Check the status of the print server queue Explanation: (My Take) |
Which of the following types of attacks involves changing the system’s MAC address before it connects to a Wireless Network? Spoofing | Spoofing (MAC Spoofing) |
You attempt to boot a Windows 10 laptop and receive an “Operating System Not Found” error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the boot sector of the hard disk? bootrec /fixmbr | bootrec /fixboot Explanation: “bootrec /fixmbr” is used to attempt to repair the MASTER BOOT RECORD of a Drive. The first 512-byte sector on a Hard Disk. “bootrec /rebuildbcd” command is used to add missing Windows Installation to the Boot Configuration Database (BCD). diskpart command is used in the command-line partitioning utility available for Windows that is used to view, create, delete, and modify a computers disk partition. |
Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard? Telnet | VNC (Virtual Network Computing) Explanation: (My Take) RDP is NOT Open-Source. RDP (Remote Desktop Protocol) uses Port 3389 and is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. |
A webserver has a planned firmware upgrade for Saturday evening. During the upgrade, the power to the building is lost, and the firmware upgrade fails. Which of the following plans should be implemented to revert to the most recent working version of the firmware on the webserver? Contingency Plan | Rollback Plan Explanation: (My Take) BackUP Plan is a documented business process that identifies how data will be available for recovery by quickly copying critical data from a backup system to the production environment. Contingency Plan or Alternative Plan is a plan devised for an outcome other than the usual (Expected) plan. Often used in Risk Management for exceptional risk. |
Sam and Mary both work in the accounting department and use a web-based SaaS product as part of their job. Sam cannot log in to the website using his credentials from his computer, but Mary can log in with her credentials on her computer. Sam asks Mary to login into her account from his computer to see if the problem is with his account or computer. When Mary attempts to log in to Sam’s computer, she receives an error. Mary noticed a pop-up notification about a new piece of software on Sam’s computer when she attempted to log in to the website. Which TWO of the following steps should Mary take to resolve the issue with logging in from Sam’s computer? Choices: Have Sam attempt to log on to another website from Sam’s computer to see if it works. Have Sam clear his browser cache on his computer and then attempt to log on to the website again Verify Sam’s computer has the correct web browser configuration and settings. Ask Sam for his username/password to log on to the website from Mary’s computer. Install a new web browser, reboot Sam’s computer, and attempt to log on to the website again from Sam’s computer. | Ask Sam about the pop-up notification and determine what new programs he installed on his computer. |
Which of the following is considered a form of Regulated Data? DMCA | PII (Personal Identifiable Information) Explanation: AUP (Acceptable Use Policy |
An administrator arrives at work and is told that network users are unable to access the shared drive on a Windows Server. The administrator logs into the server and sees that some windows updates were automatically installed last night successfully, but now the network connection shows “Limited with no availability”. What rollback action should the tech perform? Web Browser | Server’s NIC Drivers Explanation: (My Take) Sometimes Windows Updates can install incompatible Drivers for your hardware and need to be rolled back. In this case, the NIC Card Drivers. |
Which of the following macOS features allows the user to search all of the hard drives, network shares, and files for a keyword or phrase? Finder | Spotlight Explanation: (My Take) Spotlight in macOS is like a SUPER SEARCH. |
What does the command "shutdown /s" do on a Windows workstation? Reboot the Workstation | Shutdown the Workstation Explanation: shutdown /s = shutdown shutdown /l = log off shutdown /h = hibernate or sleep mode shutdown /r = reboot |
You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe why the change will be installed during this maintenance window? Purpose | Purpose |
While troubleshooting the reason that the File Explorer is crashing on a Windows 10 machine, you determine that some of its files may have become corrupt. Which of the following utilities should you use to correct this? dxdiag | SFC (System File Checker) |
You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the UEFI/BIOS of the system. Which of the following commands should you use to repair the first 512-byte sector on the hard disk? bootrec /fixmbr | bootrec /fixmbr Explanation: If the disk cannot be detected, enter the system setup and try modifying settings (or even resetting the default settings). If the system firmware reports the disk's presence, but Windows still will not boot, use a startup repair tool to open a recovery mode command prompt and use the bootrec tool to repair the drive's boot information. The "bootrec /fixboot" command is used to attempt a repair of the boot sector of a drive. The "bootrec /rebuildbcd" command is used to add missing Windows installations to the Boot Configuration Database (BCD). The diskpart command is a command-line disk-partitioning utility available for Windows that is used to view, create, delete, and modify a computer's disk partitions. |
You have just finished installing a new workstation for a user in your office. They need to be able to see the other workstations on the company's workgroup. Which of the following settings should you ensure is enabled? Enable Network Discovery | Enable Network Discovery |
You are configuring a SOHO network for a small coffee shop. They have found that certain customers will buy a single coffee cup and then sit at the coffee shop all day to use the WiFi. The owner has asked you to block this customer's laptop from connecting by placing it on a blocklist. Which of the following configurations would you use to blocklist this customer's device based on its unique hardware identifier? Port Filtering | MAC Filtering |
You are helping to set up a backup plan for your organization. The current plan states that all of the organization's Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend? Attempt to restore to a test server from one of the backup files to verify them. | Attempt to restore to a test server from one of the backup files to verify them. |
A Windows 2019 server is crashing every evening at 2:35 am, but you are not sure why. Which of the following tools should you use to identify the cause of the system crash? System Information | Event Viewer |
You are working at the service desk and just received the following email from an end-user who believes it is suspicious: FROM: user@diontraining.com TO: abuse@diontraining.com SUBJECT: You won a free iPhone! You have won a brand new iPhone!! Just click the following link to provide your address so we can ship it out to you this afternoon: http://www.freephone.io:8080/winner.php Thanks! Jonah Smith Free Phone Giveaway, LLC Options: Zero-Day Phishing Spoofing Spear Phishing | Phishing |
You are installing a new file server at the offices of Dion Training. The entire building has a diesel generator installed to protect it from power outages. The file server must have zero downtime once placed into production. Which of the following power sources should the file server utilize? A Surge Protector connected to a UPS | An Uninterruptible Power Supply (UPS) |
A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers? Trojan | Worm Explanation A virus is malicious software designed to infect computer files or disks when it is activated. A virus may be programmed to carry out other malicious actions, such as deleting files or changing system settings. A trojan is a type of malware that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network. The most common form of a trojan is a Remote Access Trojan (RAT), which allows an attacker to control a workstation or steal information remotely. To operate, a trojan will create numerous processes that run in the background of the system. Ransomware is a type of malware designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website. Once infected, a system or its files are encrypted, and then the decryption key is withheld from the victim unless payment is received. |
You are working as a server administrator at Dion Training. You unlock the server room door using your proximity badge and walk through the door. Before the door shuts, another person walks in behind you. What social engineering technique did this person utilize? Tailgating | Tailgating |
What is the FOURTH step of the seven-step malware removal process? Enable System Restore and Create a Restore Point in Windows | Remediate the Infected Systems Explanation: (1) Investigate and verify malware symptoms, |
You are working for a brand new startup company that allows you to use your laptop, tablet, or other devices while at work. The company does provide some rules and guidelines that you must follow based on their policy. Which of the following policies should you look at to ensure you understand these rules and guidelines? SLA | BYOD (Bring Your Own Device) Explanation A memorandum of understanding (MOU) is important because it defines the responsibilities of each party in an agreement, provides the scope and authority of the agreement, clarifies terms, and outlines compliance issues. A non-disclosure agreement (NDA) is a legal contract or part of a contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share for certain purposes but wish to restrict access to. A service level agreement (SLA) is a commitment between a service provider and a client for particular aspects of the service, such as quality, availability, or responsibilities. |
You have been asked to help a user upgrade their laptop from Windows 10 to Windows 11. The user has asked that all of their applications, user profiles, documents, and PST files be preserved during the upgrade. Which of the following types of upgrades or installations should you perform on this laptop? In-Place Upgrade | In-Place Upgrade |
Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to "click here" to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following best describes this type of attack? Phishing | Phishing Explanation: Spear phishing is the fraudulent practice of sending emails from a seemingly known or trusted sender to induce targeted individuals to reveal confidential information. Whaling is an email-based or web-based form of phishing that targets senior executives or wealthy individuals. A brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. |
Malware infected Natalie's iMac. The malware has deleted numerous files from the system and corrupted the operating system. Natalie needs to access some of her files from the computer that have been deleted by the malware. Which of the following built-in utilities could restore access to those files? Keychain | Time Machine |
Your company is concerned about the possibility of theft of sensitive information from their systems. The IT Director has directed that access to all USB storage devices be blocked on all corporate workstations to prevent this. The workstation should still use other USB devices, like scanners, printers, keyboards, and mice. Which of the following command-line tools should you use to install a Group Policy (GPO) to all workstations across the network to disable the use of USB storage devices? diskpart | gpupdate |
Which of the following commands is used on a Linux system to change a file's permissions or directory on a system? pwd | chmod Explanation: The chown command is used to change the owner of the file, directory, or link in Linux. The passwd command changes passwords for user accounts. A normal user may only change the password for their account, while the superuser may change the password for any user. The pwd command displays the present working directory (current directory) path to the terminal or display. If you are working on a Linux system and are unsure of where you are in the directory structure, type "pwd" and hit enter to display the path to the screen. |
Dion Training is worried about the security of the data on their corporate smartphones if lost or stolen. The Chief Security Officer has instructed that the devices be configured so that unauthorized users cannot access the data. Which TWO of the following settings would provide the BEST security and protection for the corporate smartphones' data? Configure the ability to perform a remote wipe | Configure the ability to perform a remote wipe Explanation: Additionally, by configuring the ability to wipe the device's storage remotely, the data would be erased before a thief can access it. The other options are all valid options to increase security, but they do not directly address the issues presented in the scenario. |
Which of the following allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state? Lock | Sleep Explanation: (My Take) Hibernate - Think of animals that "Hibernate" for the Winter, they generally aren't bothered and won't come out of it till the Winter is over. Exam Explanation: Hibernate mode is used to save the current session to disk before powering off the computer to save battery life when the system is not being used. The computer takes longer to start up again from hibernate mode than it does from the sleep or standby mode. Shutdown mode completely powers off the computer and does not save the current user session to disk. Instead, the shutdown will close all open files and log out the user during the shutdown process. A lock will secure the desktop with a password while leaving programs running. |
What type of structure is a "Do While" in scripting? Constant | Loop |
Which of the following data types would be used to store the value of TRUE? Boolean | Boolean |
The physical security manager has asked you to assist with the risk assessment of some proposed new security measures. The manager is concerned that during a power outage, the server room might be targeted for attack. Luckily, they have many different protection measures in place to keep intruders out of the server room. During a power outage, which of the following security controls would still be usable? Biometric Scanners | Door Locks |
Which attack method is MOST likely to be used by a malicious employee or insider trying to obtain another user's passwords? On-Path Attack | Shoulder Surfing |
A customer is complaining that they cannot connect to the local network share drive. You run the command 'ipconfig /all' from their workstation, and it returns an IP of 169.254.34.12. Which of the following is the problem with this workstation? The Workstation couldn't reach the DHCP Server | The Workstation couldn't reach the DHCP Server. |
Joseph contacted the service desk because his Windows 10 desktop is acting strangely. He cannot use his mouse, speakers, or printer connected to his workstation by USB. Yesterday, everything worked normally. He attempted to reboot the computer to fix the issue, but it remains. Which of the following actions should be performed NEXT? Disable System Restore in Windows | Rollback any System Updates or changes since yesterday |
Another technician tells you that they are PXE booting a computer. What is the technician MOST likely doing with the computer? Using a multiboot configuration | Installing an image to the computer over the network |
A small doctor's office has asked you to configure their network to use the highest levels of wireless security and desktop authentication. The office only uses cloud-based SaaS applications to store their patient's sensitive data. Which TWO of the following protocols or authentication methods should you implement for the BEST security? Multifactor SSO WEP WPS WPA2 RADIUS | Multifactor Explanation Wired equivalent privacy (WEP) is an older mechanism for encrypting data sent over a wireless connection. WEP is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key. The Wi-Fi Protected Setup (WPS) is a mechanism for auto-configuring a WLAN securely for home users. On compatible equipment, users push a button on the access point and connect adapters to associate them securely. WPS is subject to brute force attacks against the PIN used to secure them, making them vulnerable to attack. The Remote Authentication Dial-in User Service (RADIUS) is used to manage remote and wireless authentication infrastructure. Users supply authentication information to RADIUS client devices, such as wireless access points. The client device then passes the authentication data to an AAA (Authentication, Authorization, and Accounting) server that processes the request. Single sign-on (SSO) is a type of mutual authentication for multiple services that can accept the credential from one domain or service as authentication for other services. |
Which of the following types of mobile device screen locks uses biometrics to securely unlock the device? FaceID | FaceID | TouchID |
A developer uses a MacBook Pro when working from home, but they need access to both a Windows and macOS system to test their programs. Which of the following tools should be used to allow both operating systems to exist on their MacBook Pro? Terminal | Boot Camp |
An offsite tape backup storage facility is involved with a forensic investigation. The facility has been told they cannot recycle their outdated tapes until the conclusion of the investigation. Which of the following is the MOST likely reason for this? A data transport request | A notice of a legal hold Explanation The process of discovery is the formal process of exchanging information between the parties about the witnesses and evidence they will present at trial. The chain of custody is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence. A data transport request is a formalized request to initiate a data transfer by establishing a circuit or connection between two networks. |
Which mobile device strategy is most likely to introduce vulnerable devices to a corporate network? COPE | BYOD (Bring Your Own Device) Explanation The BYOD (bring your own device) strategy opens a network to many vulnerabilities. People can bring their personal devices to the corporate network, and their devices may contain vulnerabilities that could be allowed to roam free on a corporate network. COPE (company-owned/personally enabled) means that the company provides the users with a smartphone primarily for work use, but basic functions such as voice calls, messaging, and personal applications are allowed, with some controls on usage and flexibility. With CYOD, the user can choose which device they wish to use from a small selection of devices approved by the company. The company then buys, procures, and secures the device for the user. The MDM is a mobile device management system that gives centralized control over COPE company-owned personally enabled devices. |
Which of the following MacOS features is used to manage passwords cached by the OS and is the equivalent of the Credential Manager in Windows? Spotlight | Keychain |
Which of the following commands is used on a Linux system to change a user's password on the system? chmod | passwd Explanation: chmod command sets the permissions of files or directories on a Linux system. A set of flags associated with each file determines who can access that file and how they can access it. These flags are called file permissions or modes. The command name chmod stands for change mode and it restricts the way a file can be accessed. chown command is used to change the owner of the file, directory, or link in Linux. pwd command displays the present working directory (current directory) path to the terminal or display. If you are working on a Linux system and are unsure of where you are in the directory structure, type "pwd" and hit enter to display the path to the screen. |
You are trying to connect to another server on the network but are unable to ping it. You have determined that the other server is located on the 10.0.0.1/24 network, but your workstation is located on the 192.168.1.1/24 network. Which of the following tools should you use to begin troubleshooting the connection between your workstation and the server? netstat | traceroute Explanation: dig command is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information. ifconfig tool is used on Linux, Unix, and OS X devices to display the current TCP/IP network configuration, assign an IP address, and assign configure TCP/IP settings for a given network interface. |
Which of the following commands is used on a Linux system to change the ownership of a file or directory on a system? chmod | chown Explanation: The chmod command sets the permissions of files or directories on a Linux system. A set of flags associated with each file determines who can access that file and how they can access it. These flags are called file permissions or modes. The command name chmod stands for change mode and it restricts the way a file can be accessed. The passwd command changes passwords for user accounts. A normal user may only change the password for their account, while the superuser may change the password for any user. The pwd command displays the present working directory (current directory) path to the terminal or display. If you are working on a Linux system and are unsure of where you are in the directory structure, type "pwd" and hit enter to display the path to the screen. |
A user has asked you for a recommendation on which word processing software they should install. There are four different software packages they are considering, and each uses a different licensing type. The user states they do not want to pay for the software. Which of the following would MOST likely be the best option for them? Personal | Open-Source |
Christina recently purchased a new Android smartphone and is going on a trip. At the airport, she found a public wireless network called "FreeAirportWiFi" and connects to it. She noticed a question mark (?) icon showing in the toolbar next to the Wi-Fi icon. Christina attempts to open a webpage but gets an error of "The page cannot be displayed." She begins to troubleshoot the device by verifying that the airplane mode is disabled, Bluetooth is enabled, and tethering is enabled. Next, Christina attempts to make a phone call, which works without any issues. Which of the following is MOST likely the issue with Christina's smartphone? The smartphone does not have a valid data plan enabled | The smartphone is connected to the FreeAirportWIFI but is not authenticated yet. |
You have submitted an RFC to install a security patch on all of your company's Windows 2019 server on Friday at 11 pm using an automated patch installation process. Which of the following change request documents would describe any uncertainty or adverse effects that may occur during the installation process? Plan | Risk Analysis Explanation: The plan of the change defines how the change or installation will occur. The change request documentation should define the 5 W's (who, what, when, where, why, and how), with the plan documentation covering how the change is implemented. For example, the plan might say that the installation will be performed manually or through an automated patching process. It may also dictate that all servers will receive the update simultaneously or that five servers will receive it first, then another ten, then the remaining twenty. The purpose of the change defines why the change or installation will occur. The change request documentation should define the 5 W's (who, what, when, where, why, and how) to define the why behind the change. For example, the purpose might be "to remediate several category one vulnerabilities so that our security is improved." The change's scope defines the area, number, size, or scale of a particular change. The change request documentation should define the exact scope of the change. In this example, only some of the Windows 2019 servers will receive the patch. If 50% of them are listed by their asset tracking number will receive the patch, this would clearly define this change's scope. |
Which TWO of the following devices should have a grounding wire attached to them when installed per the manufacturer's recommendations? Patch Panel Server Rack VIOP Device Modem Desktop Printer UPS | Server Rack | UPS |
A corporate network user contacts the service desk because there is an alert from Windows Defender stating their workstation may be infected with a virus. What action should be performed FIRST to remediate this workstation? Perform a full-disk antivirus scan | Disconnect the workstation from the network |
You are working as part of a penetration testing team during an assessment of Dion Training's headquarters. Your boss has requested that you search the company's recycling bins for any information that might be valuable during the reconnaissance phase of your attack. What type of social engineering method are you performing? Impersonation | Dumpster Diving |
Your company's wireless network was recently compromised by an attacker who utilized a brute force attack against the network's PIN to gain access. Once connected to the network, the attacker modified the DNS settings on the router and spread additional malware across the entire network. Which TWO of the following configurations were most likely used to allow the attack to occur? WPS Enabled TKIP Encryption Protocols Router with outdated Firmware Guest Network Enabled WPA2 Encryption Enabled Default administrative login credentials | WPS Enabled | Default Administrative Login Credentials |
A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be? VLAN hopping | Social Engineering |
Samantha works in the human resource department in an open floorplan office. She is concerned about the possibility of someone conducting shoulder surfing to read sensitive information from employee files while accessing them on her computer. Which of the following physical security measures should she implement to protect against this threat? Privacy Screen | Privacy Screen |
Which of the following macOS features is used to backup and restore files to an external hard disk? Time Machine | Time Machine |
Which command-line tool on a Windows system is used to display the resulting set of policy settings that were enforced on a computer for a specified user when they logged on? grpupdate | gpresult Explanation: The gpresult command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. Because you can apply overlapping policy settings to any computer or user, the Group Policy feature generates a resulting set of policy settings when the user logs on. The gpresult command displays the resulting set of policy settings that were enforced on the computer for the specified user when the user logged on. The gpupdate command-line tool is used to update the group policy settings on a Windows system. For an administrator to force a background update of all Group Policy settings regardless of whether they have changed, they need to run "gpupdate /force" from the command line. The deployment image servicing and management (DISM) is a command-line tool used to mount and service Windows images before deployment. The dism command with the /RestoreHealth option can run a scan to identify and repair any image or virtual hard drive corruption. The system file checker (SFC) command is a utility in Windows that allows users to scan for and restore corrupted Windows system files from the command line. |
Which of the following pairs of authentication factors should you choose to meet the requirements associated with MFA? Username and Password | Thumbprint and Password |
You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe how the installation of the change will be performed during this maintenance window? Plan | Plan |
You are the first help desk technician on the scene of a potential data breach. What is the FIRST thing you need to do as part of the incident response? Identify the Issue | Identify the Issue |
A user's workstation is running slowly and cannot open some larger program files. The user complains that they often get a warning that states memory is running low on their Windows 10 workstation. Which of the following should you configure until more memory can be installed to help alleviate this problem? Enable the Swap File | Increase the Pagefile Size |
You are troubleshooting a user's laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which of the following actions should you attempt to fix the problem in Windows 10? Rollback the USB drivers | Restart the Print Spooler Service Explanation: |
A user has reported that their workstation is running very slowly. A technician begins to investigate the issue and notices a lot of unknown processes running in the background. The technician determines that the user has recently downloaded a new application from the internet and may have become infected with malware. Which of the following types of infections does the workstation MOST likely have? Rootkit | Trojan Explanation: Ransomware is a type of malware designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website. Once infected, a system or its files are encrypted, and then the decryption key is withheld from the victim unless payment is received. A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. A rootkit is generally a collection of tools that enabled administrator-level access to a computer or network. They can often disguise themselves from detection by the operating system and anti-malware solutions. If a rootkit is suspected on a machine, it is best to reformat and reimage the system. A keylogger actively attempts to steal confidential information by capturing the data when entered into the computer by the user. This is done by recording keystrokes entered into a web browser or other application. A software keylogger can be run in the background on a victim's computer. A hardware keylogger may be placed between the USB port and the wired keyboard. |
Tim, a help desk technician, receives a call from a frantic executive who states that their company-issued smartphone was stolen during their lunch meeting with a rival company’s executive. Tim quickly checks the MDM administration tool and identifies that the user’s smartphone is still communicating with the MDM, and displays its location on a map. What should Tim do next to ensure the stolen device's data remains confidential and inaccessible to the thief? Perform a Remote Wipe of the Device | Perform a Remote Wipe of the Device |
Which of the following commands is used on a Linux system to list the currently running processes on a system? kill | ps Explanation: kill command sends a signal to specified processes or process groups, causing them to act according to the signal. When the signal is not specified, it defaults to -15 (-TERM), which terminates the specified process by gracefully stopping it. If "kill -9" is used instead, it will immediately kill the process. grep is a command-line utility for searching plain-text data sets for lines that match a regular expression. The grep command works on Unix, Linux, and macOS operating systems. Grep is an acronym that stands for Global Regular Expression Print. ls command lists the files or directories in the current path of a Unix, Linux, or Mac operating system. When invoked without any arguments, ls lists the files in the current working directory. |
You are troubleshooting a desktop on the corporate network and have verified that it is infected with malware. What is the NEXT action you should perform? Create a System Restore Point and perform a full system backup | Moving the desktop from the production network to a quarantined VLAN |
A user receives the following error message: "Windows Update cannot currently check for updates because the service is not running." The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT? Restart the Network Services | Reboot the Computer Explanation: |
You have just completed a repair for a customer's smartphone that took you three days. The customer complained that the repair took too long and began to question you about the steps you took to repair the device. What should you do NEXT? Listen to the customer's complains with concern and then post about the encounter on Facebook | Provide documentation of the repair to the customer and thank them for their patience |
Karen lives in an area that is prone to hurricanes and other extreme weather conditions. She asks you to recommend an electrical conditioning device that will prevent her files from being corrupted if the building's power is unstable or lost. Additionally, she would like the computer to maintain power for up to an hour of uptime to allow for a graceful shutdown of her programs and computer. Which of the following should you recommend? Line Conditioner | Uninterruptible Power Supply |
You are working as a file server administrator. You are backing up the files on the server when you observe numerous inappropriate photos and videos stored on the corporate share drive by the user jsmith. These files are clearly in violation of the company's AUP. What should you do FIRST? Notify your immediate supervisor | Notify your immediate supervisor |
You are troubleshooting a computer that is not producing any sounds through its speakers. Which of the following tools should you use to troubleshoot this workstation? Taks Scheduler | Device Manager |
Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device? IDS | UTM (Unified Threat Management) Explanation: An intrusion detection system (IDS) is a device or software application that monitors a network or system for malicious activity or policy violations. Any malicious activity or violation is typically reported to an administrator or collected centrally using a security information and event management system. Unlike an IPS, which can stop malicious activity or policy violations, an IDS can only log these issues and not stop them. An intrusion prevention system (IPS) conducts the same functions as an IDS but can also block or take actions against malicious events. A Syslog server is a server that collects diagnostic and monitoring data from the hosts and network devices across a given network. |
Which RAID solution will provide the BEST speed and redundancy for a backup and disaster recovery server? RAID 0 | RAID 10 Explanation: A RAID 0 provides disk striping (speed/performance) but not mirroring with a minimum of two disks. A RAID 1 provides mirroring (redundancy) but not disk striping with a minimum of two disks. A RAID 5 provides block-level striping with distributed parity to provide redundancy using a minimum of three disks. |
You have just installed a second monitor for a salesperson's workstation. The user wants to clone the display so that both monitors show the exact same image. This will allow them to see one of the displays while their customer sees the other from across their desk. When you connect the second monitor and clone the display, the second monitor displays text twice as large as the other monitor. Which of the following settings should you configure? Extended Mode | Resolution |
Which low power mode is used with Windows 10 laptops to save power, but it takes longer to turn back on and resume where the user left off? Power Saver | Hibernate |