Created by - Mary Smith
Questions 1. An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the vulnerability by developing new malware. After installing the malware,the attacker is provided with access to the infected machine. Which of the following is being described?A) Zero-day exploitB) Remote code executionC) Session hijackingD) Command injection2. An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card. The attacker then user a function of the sniffer to push those packets back onto the network again,adding another $20 to the gift card. This can be done many times. Which of the following describes this type of attack?A) Integer overflow attackB) Smurf attackC) Replay attackD) Buffer overflow attackE) Cross-site scripting attack3. An attacker wearing a building maintenance uniform approached a company's receptionist asking for access to a secure area. The receptionist asks for identification,a building access badge and checks the company's list approved maintenance personnel prior to granting physical access to the secure are. The controls used by the receptionist are in place to prevent which of the following types of attacks?A) TailgatingB) Shoulder surfingC) ImpersonationD) Hoax4. An attack that is using interference as its main attack to impede network traffic is which of the following?A) Introducing too much data to a targets memory allocationB) Utilizing a previously unknown security flaw against the targetC) Using a similar wireless configuration of a nearby networkD) Inundating a target system with SYN requests5. An audit found that an organization needs to implement job rotation to be compliant with regulatory requirements. To prevent unauthorized access to systems after an individual changes roles or departments,which of the following should the organization implement?A) Permission auditing and reviewB) Exit interviewsC) OffboardingD) Multifactor authentication Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: CExplanation: 4. Right Answer: CExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following types of RAID is MOST likely in use?A) A. RAID 0B) B. RAID 1C) C. RAID 5D) D. RAID 102. A technician has just upgraded RAM on a user-s workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings. Which of the following should be entered for the -Min portion of the page file setting if using these best practices?A) A. 4096MBB) B. 8192MBC) C. 12288MBD) D. 16328MB3. A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives?A) A. RecyclingB) B. ShreddingC) C. OverwritingD) D. Reformatting4. A technician is working on a user-s PC. After testing the theory of the cause, which of the following could the technician perform NEXT? (Select TWO).(Select 2answers)A) A. Resolve issueB) B. Inform userC) C. New theory or escalateD) D. Document issueE) E. Verify system functionality5. A user is unable to find the preferred default network printer in the printers list in the user profile. Which of the following is the FIRST step that should be taken?A) A. Map printerB) B. Reboot computerC) C. Check to see if printer is turned onD) D. Log in as a different user and see if printer is mapped Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: A,CExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician has just finished setting up a SOHO wireless router but the client does not want the PC on the wireless network for security reasons. The technician connects an RJ-45 cable to the computer and the router, but does not receive network connectivity. Which of the following is the NEXT step to diagnose the problem?A) A. Change the IP address on the computer to match the router.B) B. Reseat the power cable on the computer and reboot.C) C. Check for link light activity on the computer and the router.D) D. Change the hostname of the router to match the computer's network.2. Which of the following is an advantage of using cloud-based collaborative applications and storage, rather than local applications and storage?A) A. Decreased software licensing costsB) B. Higher security encryptionC) C. Limited storage space for filesD) D. Increased accessibility to files3. Which of the following data connections would provide a user the BEST Internet availability while traveling?A) A. Workstation with only RJ-45 connectorsB) B. Smartphone with cellular serviceC) C. Laptop with Bluetooth wireless connectivityD) D. Tablet connected to a SOHO wireless network4. A technician is configuring a wireless router for a small office and the business owner would like the wireless network to be secured using the strongest encryption possible. Which of the following should the technician choose?A) A. WPA2B) B. WAPC) C. WPAD) D. WEP5. A user's laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user's laptop. How could the user have prevented this breach?A) A. Disable file and print sharing on the laptop.B) B. Delete unused drives from network.C) C. Remove shared keys from the key ring.D) D. Set the read-only attribute on the files. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An audit has revealed that database administrators are also responsible for auditing database changes and backup logs. Which of the following access control methodologies would BEST mitigate this concern?A) Time of day restrictionsB) Principle of least privilegeC) Role-based access controlD) Separation of duties2. An audit reported has identifies a weakness that could allow unauthorized personnel access to the facility at its main entrance and from there gain access to the network. Which of the following would BEST resolve the vulnerability?A) Faraday cageB) Air gapC) MantrapD) Bollards3. An employee in the finance department receives an email,which appears to come from the Chief Financial Officer (CFO),instructing the employee to immediately wire a large sum of money to a vendor. Which of the following BEST describes the principles of social engineering used? (Choose two.)(Select 2answers)A) FamiliarityB) ScarcityC) UrgencyD) AuthorityE) Consensus4. An employee receives an email,which appears to be from the Chief Executive Officer (CEO),asking for a report of security credentials for all users. Which of the following types of attack is MOST likely occurring?A) Policy violationB) Social engineeringC) WhalingD) Spear phishing5. An employer requires that employees use a key-generating app on their smartphones to log into corporate applications. In terms of authentication of an individual,this type of access policy is BEST defined as:A) Something you have.B) Something you know.C) Something you do.D) Something you are. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: C,DExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporation-s domain. Which of the following utilities will the administrator access to configure this setting?A) A. System PropertiesB) B. System InformationC) C. System ProtectionD) D. System Management2. A user states that the computer takes a long time to load the desktop after login. Which of the following tools should be used to help remediate the problem?A) A. Disk ManagementB) B. FIXMBRC) C. MSCONFIGD) D. SFC3. A technician needs to install a clean Windows OS on several laptops in the office. The office is running a 100Base-T network. The owner would like the installations completed as soon as possible. Which of the following installation methods should the technician use?A) A. FireWire External Hard DriveB) B. PXE-based Network InstallationC) C. USB 3.0 Flash DriveD) D. DVD-ROM4. A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair?A) A. The technician should replace the power supplyB) B. The technician should review disposal regulationsC) C. The technician should check the environmentD) D. The technician should remove jewelry5. A technician is remotely connecting to a workstation using SSH to transfer a security hotfix. Which of the following command line tools would the technician use to create a directory to store the hotfix?A) A. dirB) B. rdC) C. cdD) D. md Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: CExplanation: 4. Right Answer: DExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Joe, a user, needs to store a large amount of data, but does not have enough space on his local computer. Which of the following are the BEST options for him to use? (Select TWO).(Select 2answers)A) A. Network attached storageB) B. External hard driveC) C. Optical driveD) D. USB thumb driveE) E. Another computer2. When connecting a printer to a network, which of the following is needed to complete the process? (Select TWO).(Select 2answers)A) A. IP addressB) B. User's passwordC) C. Computer's nameD) D. Subnet maskE) E. HTTP portF) F. Fax number3. Which of the following protocols is used to secure communications between sender and receiver?A) A. SIPB) B. SNMPC) C. SSLD) D. SMTP4. Which of the following connections provide data with the MOST secure protection from interception?A) A. WiredB) B. WiFiC) C. IRD) D. Cellular5. A technician has been tasked with changing the settings for a used SOHO router, but does not have the administrator password because the previous owner changed it. Which of the following actions will resolve this issue?A) A. Click 'Forgot password.'B) B. Use a password cracker.C) C. Hold the reset button.D) D. Use the password: password. Right Answer and Explanation: 1. Right Answer: A,BExplanation: 2. Right Answer: A,DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented in the administrator does not want to provide the wireless password or he certificate to the employees?A) WPSB) 802.1xC) WPA2-PSKD) TKIP2. A network administrator is brute forcing accounts through a web interface. Which of the following would provide the BEST defense from an account password being discovered?A) Password historyB) Account lockoutC) Account expirationD) Password complexity3. A network administrator is creating a new network for an office. For security purposes,each department should have its resources isolated from every other department but be able to communicate back to central servers. Which of the following architecture concepts would BEST accomplish this?A) Air gapped networkB) Load balanced networkC) Network address translationD) Network segmentation4. A network administrator needs to allocate a new network for the R&D group. The network must not be accessible from the Internet regardless of the network firewall or other external misconfigurations. Which of the following settings should the network administrator implement to accomplish this?A) Configure the OS default TTL to 1B) Use NAT on the R&D networkC) Implement a router ACLD) Enable protected ports on the switch5. A network administrator wants to ensure that users do not connect any unauthorized devices to the company network. Each desk needs to connect a VoIP phone and computer. Which of the following is the BEST way to accomplish this?A) Enforce authentication for network devicesB) Configure the phones on one VLAN,and computers on anotherC) Enable and configure port channelsD) Make users sign an Acceptable use Agreement Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: BExplanation: 3. Right Answer: DExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone-s knowledge. Which of the following would prevent this from occurring?A) A. Change to user MAC filteringB) B. Change default usernames and passwordsC) C. Disable the SSID from broadcastingD) D. Enable static IP addresses2. A user is experiencing a software application error. The user contacts a technician for support. Which of the following will allow the user to issue an invitation to the technician in this scenario?A) A. Remote desktopB) B. Remote assistanceC) C. telnetD) D. FTP3. Which of the following would a technician use to search for a specific string within a file name?A) A. grepB) B. chmodC) C. wgetD) D. sudo4. When securing a mobile device, which of the following types of screen locks is the MOST secure?A) A. Fingerprint lockB) B. Swipe lockC) C. Pass-code lockD) D. Face lock5. A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technician should use the LIST function of which of the following commands?A) A. extractB) B. diskpartC) C. bootrecD) D. chkdsk Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: AExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A user is setting up an older wireless access point that has only WEP for encryption. Which of the following additional steps will help to secure the network?(Select TWO).(Select 2answers)A) A. Disable SSID broadcast.B) B. Refresh the MAC address.C) C. Filter the MAC address.D) D. Refresh the IP address.E) E. Use CAT6 cables.2. When setting up a new workstation, which of the following should be configured during the initial OS setup wizard?A) A. Additional softwareB) B. Date and time settingsC) C. Peripheral devicesD) D. Security software3. Which of the following is the BEST reason to backup data?A) A. To ensure data encryptionB) B. To ensure data stabilityC) C. To ensure data securityD) D. To ensure data availability4. Which of the following is a safety feature of cloud-based backups?A) A. Incremental copy of dataB) B. Local copy of dataC) C. Offsite storage of dataD) D. Full backup of PC data5. A technician is setting up a computer that was shipped. After everything is plugged in, the computer will not turn on. Which of the following should the technician do FIRST to identify the issue?A) A. Check for physical damage on the computer.B) B. Search for a solution on the Internet.C) C. Reference the manufacturer's documentation.D) D. Ensure the power supply is set at the correct voltage. Right Answer and Explanation: 1. Right Answer: A,CExplanation: 2. Right Answer: BExplanation: 3. Right Answer: DExplanation: 4. Right Answer: CExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review