Created by - Mary Smith
Questions 1. A company has noticed multiple instances of proprietary information on public websites. It has also observed an increase in the number of email messages sent to random employees containing malicious links and PDFs. Which of the following changes should the company make to reduce the risks associated with phishing attacks? (Select TWO)(Select 2answers)A) Update the X.509 certificates on the corporate email serverB) Block access to personal email on corporate systemsC) Update corporate policy to prohibit access to social media websitesD) Implement a redundant email serverE) Install an additional firewallF) Review access violation on the file server2. A company is evaluating cloud providers to reduce the cost of its internal IT operations. The company's aging systems are unable to keep up with customer demand. Which of the following cloud models will the company MOST likely select?A) BaaSB) PaaSC) SaaSD) IaaS3. A datacenter manager has been asked to prioritize critical system recovery priorities. Which of the following is the MOST critical for immediate recovery?A) Communications softwareB) Financial and production softwareC) Operating system softwareD) Weekly summary reports to management4. A company is currently using the following configuration: IAS server with certificate-based EAP-PEAP and MSCHAP Unencrypted authentication via PAP A security administrator needs to configure a new wireless setup with the following configurations: PAP authentication method PEAP and EAP provide two-factor authentication Which of the following forms of authentication are being used? (Select two.)(Select 2answers)A) PEAPB) MSCHAPC) PAPD) EAP-PEAPE) EAPF) PEAP- MSCHAP5. A customer calls a technician and needs to remotely connect to a web server to change some code manually. The technician needs to configure the user - s machine with protocols to connect to the Unix web server,which is behind a firewall. Which of the following protocols does the technician MOST likely need to configure?A) SNMPB) SFTPC) HTTPSD) SSH Right Answer and Explanation: 1. Right Answer: B,CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: B,CExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following file types should be opened when executing a PowerShell script?A) A. .batB) B. .vbsC) C. .shD) D. .ps1E) E. .psd2. A customer is pressuring a project manager to get things done on time. Which of the following has the project manager failed to do in this case?A) A. Follow up with the customer after project completionB) B. Maintain a positive attitude during the project.C) C. Disclose project experiences on social mediaD) D. Communicate with the customer clearly.3. An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO).(Select 2answers)A) A. Close applications when tasks are completed.B) B. Increase the time to dim the screen automatically.C) C. Increase the frequency for syncing corporate email.D) D. Set the smartphone display to maximum brightness.E) E. Connect to the office WiFi network automatically.F) F. Disable 802.11ac and use mobile data exclusively.4. Which of the following BEST describes the Guest account on a Windows system?A) A. This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system.B) B. This account is designed to provide basic permission for completing common daily tasks. Users of this account are restricted from performing things like installing new software.C) C. This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones.D) D. This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions.5. Which of the following threats uses personalized information in an attempt at obtaining information?A) A. WhalingB) B. ImpersonationC) C. SpoofingD) D. Spear phishing Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: DExplanation: 3. Right Answer: A,EExplanation: 4. Right Answer: DExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following extension types are associated with document files? (Select THREE).(Select 3answers)A) A. .txtB) B. .odfC) C. .msiD) D. .rtfE) E. .mp3F) F. .tar [1]2. A home user wants to share files between two different computers. The user wants the files to be available to either computer, regardless of whether either computer is turned on. Which of the following is the BEST storage method?A) A. USB storageB) B. Internal storageC) C. Direct attached storageD) D. Network attached storage3. Which of the following is the component responsible for interconnectivity of internal system devices?A) A. System caseB) B. Power supplyC) C. MotherboardD) D. Expansion card4. Which of the following storage methods provides the HIGHEST redundancy and availability?A) A. Cloud-based storageB) B. Storage Area NetworkC) C. Locally attached storageD) D. Network Attached Storage5. Which of the following is a benefit of setting up a computer to receive automatic updates from the OS vendor?A) A. Arranges the hard drive files in orderB) B. Restores missing files that were lost or deletedC) C. Keeps the software current and applies security patchesD) D. Provides the latest virus definitions to keep the computer safe Right Answer and Explanation: 1. Right Answer: A,B,DExplanation: 2. Right Answer: DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A company was recently audited by a third party. The audit revealed the company - s network devices were transferring files in the clear. Which of the following protocols should the company use to transfer files?A) SNMPv3B) HTTPSC) LDAPSD) SCP2. A company exchanges information with a business partner. An annual audit of the business partner is conducted against the SLA in order to verify:A) Data ownership is being maintained and auditedB) Backups are being performed and testedC) Performance and service delivery metricsD) Risk awareness is being adhered to and enforced3. A company is planning to utilize its legacy desktop systems by converting them into dummy terminals and moving all heavy applications and storage to a centralized server that hosts all of the company - s required desktop applications. Which of the following describes the BEST deployment method to meet these requirements?A) PaaSB) VDIC) IaaSD) VM sprawl4. A datacenter recently experienced a breach. When access was gained,an RF device was used to access an air-gapped and locked server rack. Which of the following would BEST prevent this type of attack?A) AlarmsB) Faraday cageC) Infrared detectionD) Smart cards5. A company is investigating a data compromise where data exfiltration occurred. Prior to the investigation,the supervisor terminates an employee as a result of the suspected data loss. During the investigation,the supervisor is absent for the interview,and little evidence can be provided form the role-based authentication system in use by the company. The situation can be identified for future mitigation as which of the following?A) Lack of trainingB) Insider threatC) Log failureD) Job rotation Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?A) A. Local AdministratorB) B. Standard UserC) C. Power UserD) D. Guest User2. A company has just experienced a data breach that affected all mobile devices.Which of the following would BEST secure access to user-s mobile devices? (Choose two.)(Select 2answers)A) A. Full device encryptionB) B. Remote backup applicationC) C. SSO authenticationD) D. Device profiles updateE) E. OS security updatesF) F. Biometric authentication3. A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop.Which of the following is the most likely NEXT step?A) A. Disable System Restore.B) B. Create a restore point.C) C. Apply system updates.D) D. Restart into safe mode.4. A technician accessed a network share from a computer joined to a workgroup. The technician logged in as -user1 and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the -user1 account.Which of the following would allow the technician to log in using the -administrator username?A) A. Use the command: net use Z: \fileservershareB) B. Go to the Sync Center and disable the offline files feature.C) C. Delete the -user account for the network share in Credential Manager.D) D. Join the computer and file server to a domain and delegate administrator rights to -user1.E) E. Use the Advanced Sharing options in the Network and Sharing Center and enable -turn on network discovery. Co5. A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the -My Documents folder is empty, and personal settings are reset.Which of the following would be required to resolve the issue?A) A. Remove the registry entry and rename the local account folderB) B. Delete or rename the local user folderC) C. Run DISM and re-add the local power user accountD) D. Remove the user account in Credential Manager and restart the PC Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: A,FExplanation: 3. Right Answer: DExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following application types is MOST often used for doing a mail merge?A) A. PDF softwareB) B. Word processorC) C. Presentation softwareD) D. Personal information manager2. Which of the following security threats includes suspicious activity, such as reviewing someone's screen display without permission?A) A. MalwareB) B. Shoulder surfingC) C. PhishingD) D. Password cracking3. A user reports an inability to access the Internet on a new SOHO router. On further investigation, a technician notices that the wireless network is not visible.Which of the following is the MOST likely cause?A) A. SSID broadcast is disabledB) B. Wireless password has changedC) C. Firmware update is requiredD) D. WPA2 is enabled4. Which of the following storage methods is MOST likely used in corporate settings to save large amounts of data in a secured manner?A) A. HTTPB) B. HTTPSC) C. FTPSD) D. FTP5. Which of the following describes the difference between open source and commercial operating systems?A) A. Open source operating systems only run on desktop computers, whereas commercial operating systems run on servers.B) B. Open source operating systems run on standard and non-standard hardware, whereas commercial operating systems only run on specific hardware.C) C. Open source operating systems can be downloaded and used by everyone, whereas commercial operating systems can only be used by companies.D) D. Open source operating systems are usually provided free of charge, whereas most commercial operating systems are usually provided at some cost. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: CExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A malicious system continuously sends an extremely large number of SYN packets to a server. Which of the following BEST describes the resulting effect?A) The server will crash when trying to reassemble all the fragmented packetsB) The server's firewall will be unable to effectively filter traffic due to the amount of data transmittedC) The server will exhaust its memory maintaining half-open connectionsD) The server will be unable to server clients due to lack of bandwidth2. A company - s IT staff is given the task of securely disposing of 100 server HDDs. The security team informs the IT staff that the data must not be accessible by a third party after disposal. Which of the following is the MOST time-efficient method to achieve this goal?A) Use software to zero fill all of the hard drives.B) Remove the platters from the HDDs and shred them.C) Use a degausser to sanitize the drives.D) Perform a quick format of the HDD drives.3. A Chief Information Security Officer (CISO) has tasked a security analyst with assessing the security posture of an organization and which internal factors would contribute to a security compromise. The analyst performs a walk-through of the organization and discovers there are multiple instances of unlabeled optical media on office desks. Employees in the vicinity either do not claim ownership or disavow any knowledge concerning who owns the media. Which of the following is the MOST immediate action to be taken?A) Confiscate the media and wait for the owner to claim it. If it is not claimed within one month,shred it.B) Confiscate the media,insert it into a computer,make a copy of the disc,and then return the original to where it was found.C) Confiscate the media,insert it into a computer,find out what is on the disc,and then label it and return it to where it was found.D) Confiscate the media and dispose of it in a secure manner as per company policy.4. An administrator intends to configure an IPSec solution that provides ESP with integrity protection,but not confidentiality protection. Which of the following AES modes of operation would meet this integrity-only requirement?A) HMACB) CBCC) GCMD) PCBCE) CFB5. A company is developing a new system that will unlock a computer automatically when an authorized user sits in front of it,and then lock the computer when the user leaves. The user does not have to perform any action for this process to occur. Which of the following technologies provides this capability?A) Motion detectorB) Facial recognitionC) Fingerprint scannerD) Smart cards Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: DExplanation: 4. Right Answer: AExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?A) A. BranchCacheB) B. Swap partitionC) C. Domain accessD) D. Proxy server2. Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for an inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server.Which of the following is the FIRST step the technician should take to correct this issue?A) A. See if Joe-s email address has been blacklistedB) B. Change the password on Joe-s email accountC) C. Update the antivirus and perform a full scan on the PCD) D. Isolate Joe-s computer from the network3. Which of the following would a technician use to store memory chips from a laptop safely after an upgrade?A) A. Mylar bagsB) B. Cardboard boxesC) C. Antistatic containersD) D. Paper envelopes4. A user-s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive.Which of the following actions should the IT department perform NEXT?A) A. Preserve data integrityB) B. Identify violations of acceptable useC) C. Collect evidence of illegal activityD) D. Report through proper channels5. A network administrator has given technician documentation detailing the switchports the technician will need to patch in for a network upgrade.Which of the following documents did the network administrator MOST likely give to the technician?A) A. Process diagramB) B. Physical network diagramC) C. Fiber backbone diagramD) D. Logical topology diagram Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following is MOST important to ensure a computer temperature is maintained within normal limits?A) A. Maintaining constant power outputB) B. Ensuring sufficient airflowC) C. Keeping the case openD) D. Turning the wireless off when not needed2. An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using?A) A. LTEB) B. GSMC) C. VoIPD) D. CDMA3. Which of the following allows for hands-free operation of a wireless device?A) A. EncryptionB) B. Wireless passwordC) C. Bluetooth pairingD) D. Internet connectivity4. Joe, a user, is setting up a new computer and wants to minimize the risk of a malicious software infection over the network. Which of the following should be configured on the new computer? (Select THREE).(Select 3answers)A) A. Password policiesB) B. Multiple user accountsC) C. Software firewallD) D. Driver updatesE) E. Operating system updatesF) F. Anti-malware software5. Which of the following is the primary goal in performing a backup verification?A) A. Ensure backup data can be correctly restoredB) B. Prove the media has sufficient space for the dataC) C. Configure frequency of backupsD) D. Adhere to legal backup storage requirements Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: CExplanation: 3. Right Answer: CExplanation: 4. Right Answer: C,E,FExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review