Created by - Mary Smith
Questions 1. As part of a BYOD program, the organization requires BYOD users to register devices prior to using them on the organization-s network. The registration process logs a unique identifier assigned to every mobile phone produced. Which of the following must be collected during the registration process?A) A. IMEIB) B. MIMOC) C. IMSID) D. MAPI2. A home server rack is being installed in the computer room and is outfitted with a power distribution block. Which of the following safety precautions is required?A) A. Cable managementB) B. Electrostatic discharge matC) C. Equipment groundingD) D. Uninterruptible power supply3. The office of admissions at a university has requested that all staff desktops be replaced with laptops. The staff members frequently go off-site for recruitment purposes and handle sensitive information. The technician is concerned about data leaks if a laptop is stolen. Which of the following is the BEST practice to use in this scenario?A) A. Cable locksB) B. Biometric securityC) C. Data encryptionD) D. Login time restrictionE) E. LoJack4. When starting a computer, a technician notices the computer displays a blue screen and reboots after POST. The technician completed several updates prior to encountering the blue screen. Which of the following tools would the technician use to resolve this issue?A) A. Disk ManagementB) B. Secure BootC) C. System RestoreD) D. msconfigE) E. fixboot5. A technician wants to deploy a solution that will detect and prevent sensitive information from being saved on external storage. Which of the following should the technician implement?A) A. IPSB) B. FTPSC) C. TPMD) D. DLP Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: CExplanation: 4. Right Answer: CExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following commands brings a system running SysV init into a state in which it is safe to perform maintenance tasks? (Choose TWO correct answers.)(Select 2answers)A) A. shutdown -R 1 nowB) B. shutdown -single nowC) C. init 1D) D. telinit 1E) E. runlevel 12. What is the first program that is usually started, at boot time, by the Linux kernel when using SysV init?A) A. /lib/init.soB) B. /sbin/initC) C. /etc/rc.d/rcinitD) D. /proc/sys/kernel/initE) E. /boot/init3. Which of the following commands will write a message to the terminals of all logged in users?A) A. bcastB) B. mesgC) C. printD) D. wallE) E. yell4. Which of the following kernel parameters instructs the kernel to suppress most boot messages?A) A. silentB) B. verbose=0C) C. nomesgD) D. quiet5. Which of the following options for the kernel's command line changes the systemd boot target to rescue.target instead of the default target?A) A. systemd.target=rescue.targetB) B. systemd.runlevel=rescue.targetC) C. systemd.service=rescue.targetD) D. systemd.default=rescue.targetE) E. systemd.unit=rescue.target Right Answer and Explanation: 1. Right Answer: C,DExplanation: 2. Right Answer: BExplanation: 3. Right Answer: DExplanation: 4. Right Answer: DExplanation: 5. Right Answer: EExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A security analyst is performing a quantitative risk analysis. The risk analysis should show the potential monetary loss each time a threat or event occurs. Given this requirement,which of the following concepts would assist the analyst in determining this value? (Select two.)(Select 2answers)A) ALEB) ROIC) EFD) AROE) AV2. During an application design,the development team specifics a LDAP module for single sign-on communication with the company's access control database. This is an example of which of the following?A) AuthenticationB) Application controlC) IdentificationD) Data in-transit3. A technician is configuring a wireless guest network. After applying the most recent changes the technician finds the new devices can no longer find the wireless network by name but existing devices are still able to use the wireless network. Which of the following security measures did the technician MOST likely implement to cause this Scenario?A) Implementation of MAC filteringB) Deactivation of SSID broadcastC) Activation of 802.1X with RADIUSD) Beacon interval was decreasedE) Reduction of WAP signal output power4. Due to regulatory requirements,server in a global organization must use time synchronization. Which of the following represents the MOST secure method of time synchronization?A) The server should connect to internal Stratum 0 NTP servers for synchronizationB) The server should connect to external Stratum 0 NTP servers for synchronizationC) The server should connect to external Stratum 1 NTP servers for synchronizationD) The server should connect to external Stratum 1 NTP servers for synchronization5. A user needs to transmit confidential information to a third party. Which of the following should be used to encrypt the message?A) SSLB) SHA-2C) AESD) RSA Right Answer and Explanation: 1. Right Answer: A,DExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A help desk technician receives a call from a user stating a program was installed and now random pop-ups are appearing on the computer. The technician notices a lot of suspicious network traffic generated by the user-s computer. The technician quarantines the computer and disables System Restore. Which of the following is the NEXT step technician should take?A) A. Update the anti-malware softwareB) B. Perform a malware scan in safe modeC) C. Set up scheduled scans and updatesD) D. Educate the end user on best practices2. Users are reporting web browsers are not working. A technician confirms that the end users can navigate to websites using the site-s IP address. Which of the following is MOST likely causing this issue?A) A. Proxy serverB) B. DHCP serverC) C. DNS serverD) D. SMTP server3. A user reports personal files have been renamed and are undecipherable. Images have been to the user-s folder that request payment to unlock the files. The technician has quarantined the infected system and disabled System Restore. Which of the following should the technician do to unlock the user-s files?A) A. Perform a clean installation of WindowsB) B. Remove the malware and recover the files from a backupC) C. Initialize and repartition the hard drive to recover the filesD) D. Run safe mode to decrypt the user-s files4. To implement additional security on a small office wireless network, the administrator disables the DHCP server on the wireless router. To ensure traffic from specific network interfaces is able to traverse the router, which of the following should be used to limit traffic?A) A. DHCP reservationsB) B. SSID broadcast deactivationC) C. MAC filteringD) D. Two-factor authentication5. A user reports the screen on a mobile device frequently dims even when the device settings are not being changed. Which of the following is MOST likely the cause?A) A. Faulty back lightB) B. High contrast modeC) C. Auto-brightnessD) D. Power saving mode Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which SysV init configuration file should be modified to disable the ctrl-alt-delete key combination?A) A. /etc/keysB) B. /proc/keysC) C. /etc/inittabD) D. /proc/inittabE) E. /etc/reboot2. During a system boot cycle, what program is executed after the BIOS completes its tasks?A) A. The bootloaderB) B. The inetd programC) C. The init programD) D. The kernel3. Which run levels should never be declared as the default run level when using SysV init? (Choose TWO correct answers.)(Select 2answers)A) A. 0B) B. 1C) C. 3D) D. 5E) E. 64. Which of the following statements is correct when talking about /proc/?A) A. All changes to files in /proc/ are stored in /etc/proc.d/ and restored on reboot.B) B. All files within /proc/ are read-only and their contents cannot be changed.C) C. All changes to files in /proc/ are immediately recognized by the kernel.D) D. All files within /proc/ are only readable by the root user.5. What of the following statements are true regarding /dev/ when using udev? (Choose TWO correct answers.)(Select 2answers)A) A. Entries for all possible devices get created on boot even if those devices are not connected.B) B. Additional rules for udev can be created by adding them to /etc/udev/rules.d/.C) C. When using udev, it is not possible to create block or character devices in /dev/ using mknod.D) D. The /dev/ directory is a filesystem of type tmpfs and is mounted by udev during system startup.E) E. The content of /dev/ is stored in /etc/udev/dev and is restored during system startup. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: AExplanation: 3. Right Answer: A,EExplanation: 4. Right Answer: CExplanation: 5. Right Answer: B,DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. If two employees are encrypting traffic between them using a single encryption key,which of the following algorithms are they using?A) SHA-2B) DSAC) RSAD) 3DES2. A third-party penetration testing company was able to successfully use an ARP cache poison technique to gain root access on a server. The tester successfully moved to another server that was not in the original network. Which of the following is the MOST likely method used to gain access to the other host?A) BackdoorB) PivotingC) PersistanceD) Logic bomp3. During a lessons learned meeting regarding a previous incident,the security team receives a follow-up action item with the following requirements: Allow authentication from within the United States anytime Allow authentication if the user is accessing email or a shared file system Do not allow authentication if the AV program is two days out of date Do not allow authentication if the location of the device is in two specific countries Given the requirements,which of the following mobile deployment authentication types is being utilized?A) Two-factor authenticationB) Geofencing authenticationC) Context-aware authenticationD) Biometric authentication4. A user is presented with the following items during the new-hire onboarding process: -Laptop -Secure USB drive -Hardware OTP token -External high-capacity HDD -Password complexity policy -Acceptable use policy -HASP key -Cable lock Which of the following is one component of multifactor authentication?A) Hardware OTP tokenB) Secure USB driveC) HASP keyD) Cable lock5. As part of a new industry regulation,companies are required to utilize secure,standardized OS settings. A technical must ensure the OS settings are hardened. Which of the following is the BEST way to do this?A) Use a configuration compliance scanner.B) Use a vulnerability scanner.C) Use a protocol analyzer.D) Use a passive,in-line scanner. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: BExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A domain administrator has applied a Group Policy that restricts the installation of USB devices. The technician has asked the domain administrator to exempt this policy for a computer that needs to have a USB digital camera installed. Once the domain administrator has exempted the computer from the policy, which of the following is the BEST command for the technician to run locally on the computer so the digital camera can be installed without waiting?A) A. grupdate /?B) B. grupdate /bootingsC) C. grupdate /forceD) D. grupdate /logoffE) E. grupdate /sync2. A company wants to leverage a cloud infrastructure that allows it to keep confidential information away from other companies outside its industry while allowing data to be shared with other companies in the same field. Which of the following is the BEST option to accomplish this task?A) A. PublicB) B. HybridC) C. CommunityD) D. Private3. A technician was told that 50 new computers were delivered. The company-s standard Windows image needs to be installed on all of them. Which of the following would be the MOST efficient way to get the image on all 50 computers?A) A. Multi-boot installationB) B. Repair installationC) C. Unattended installationD) D. Clean installation4. A technician needs to upgrade 20 PCs that have the same hardware specifications. The PCs must be configured with identical settings tailored for the network.Which of the following provides the BEST solution with the LEAST administrative effort?A) A. PC backup and multi-boot setupB) B. PC backup and system image deploymentC) C. PC backup and OS upgradeD) D. PC backup and clean install5. A technician is attempting to troubleshoot a Linux home folder issue, but does not remember which directory is current. Which of the following tools should the technician use to find the current directory?A) A. dirB) B. sudoC) C. cdD) D. pwd Right Answer and Explanation: 1. Right Answer: EExplanation: 2. Right Answer: BExplanation: 3. Right Answer: CExplanation: 4. Right Answer: BExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following information is stored within the BIOS? (Choose TWO correct answers.)(Select 2answers)A) A. Boot device orderB) B. Linux kernel versionC) C. TimezoneD) D. Hardware configurationE) E. The system's hostname2. Which of the following commands reboots the system when using SysV init? (Choose TWO correct answers.)(Select 2answers)A) A. shutdown -r nowB) B. shutdown -r 'rebooting'C) C. telinit 6D) D. telinit 0E) E. shutdown -k now 'rebooting'3. Which of the following are init systems used within Linux systems? (Choose THREE correct answers.)(Select 3answers)A) A. startdB) B. systemdC) C. UpstartD) D. SysInitE) E. SysV init4. Which of the following environment variables overrides or extends the list of directories holding shared libraries?A) A. LD_LOAD_PATHB) B. LD_LIB_PATHC) C. LD_LIBRARY_PATHD) D. LD_SHARE_PATHE) E. LD_RUN_PATH5. Which RPM command will output the name of the package which supplied the file /etc/exports?A) A. rpm -F /etc/exportsB) B. rpm -qf /etc/exportsC) C. rpm -Kl /etc/exportsD) D. rpm -qp /etc/exportsE) E. rpm -qi /etc/exports Right Answer and Explanation: 1. Right Answer: A,DExplanation: 2. Right Answer: A,CExplanation: 3. Right Answer: B,C,EExplanation: 4. Right Answer: CExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Corporations choose to exceed regulatory framework standards because of which of the following incentives?A) It proves to investors that the company takes APT cyber actors seriouslyB) It gives a social defense that the company is not violating customer privacy laws.C) It results in overall industrial security standards being raised voluntarily.D) It improves the legal defensibility of the company.2. Malicious traffic from an internal network has been detected on an unauthorized port on an application server. Which of the following network-based security controls should the engineer consider implementing?A) NATB) MAC filteringC) HIPSD) ACLs3. A workstation puts out a network request to locate another system. Joe,a hacker on the network,responds before the real system does,and he tricks the workstation into communicating with him. Which of the following BEST describes what occurred?A) The hacker exploited weak switch configuration.B) The hacker-exploited improper key management.C) The hacker used a pass-the-hash attack.D) The hacker used a race condition.4. In a lessons learned report,it is suspected that a well-organized,well-funded,and extremely sophisticated group of attackers may have been responsible for a breach at a nuclear facility. Which of the following describes the type of actors that may have been implicated?A) Nation stateB) HacktivistC) CompetitorD) Insider5. A systems administrator has created network file shares for each department with associated security groups for each role within the organization. Which of the following security concepts is the systems administrator implementing?A) Separation of dutiesB) Standard naming conversationC) Permission auditingD) Least privilege Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: AExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review