Created by - Mary Smith
Questions 1. A technician has been tasked with remotely imaging a computer tab. The imaging process is failing because there is no response from the computers over the network. Which of the following should the technician perform to resolve the issue? (Choose two.)(Select 2answers)A) A. Configure remote desktop connectionB) B. Configure BIOS to enable Wake-on-LANC) C. Configure BIOS to enable SSHD) D. Configure automatic updatesE) E. Configure startup applicationsF) F. Configure BIOS to enable PXE boot2. An employee installed a new application on a shared Windows 10 PC. The next day, it becomes the employee who installed the application is the only one who has access to the application. Which of the following types of user accounts does the employee MOST likely have?A) A. AdministratorB) B. GuestC) C. Super userD) D. Standard userE) E. Limited user3. Which of the following are examples of possession authentication? (Choose three.)(Select 3answers)A) A. Key fobB) B. RFID badgeC) C. PassphraseD) D. PINE) E. PasswordsF) F. Smartphone4. A home user reports the PC is running slow, and pop-up advertisements are appearing on screen. The user can access the Internet and performs an antivirus scan. A technician is now troubleshooting the problem and cannot update the antivirus to the latest definitions or navigate to the vendor-s support website. Which of the following is the BEST next step to resolve this issue?A) A. Uninstall the antivirus program and apply operating system patchesB) B. Utilize a different antivirus program and scan methodC) C. Format and reinstallD) D. Reinstall the antivirus program from a shared executable5. An administrator needs to create a new folder on a Windows PC. Which of the following commands should the administrator use?A) A. cdB) B. mdC) C. scD) D. ftpE) E. mkdir Right Answer and Explanation: 1. Right Answer: A,BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: A,B,FExplanation: 4. Right Answer: BExplanation: 5. Right Answer: EExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. When removing a package, which of the following dpkg options will completely remove the files including configuration files?A) A. --cleanB) B. --deleteC) C. --purgeD) D. 'remove2. Which file should be edited to select the network locations from which Debian installation package files are loaded?A) A. /etc/dpkg/dpkg.cfgB) B. /etc/apt/apt.confC) C. /etc/apt/apt.conf.dD) D. /etc/apt/sources.listE) E. /etc/dpkg/dselect.cfg3. Which of the following commands overwrites the bootloader located on /dev/sda without overwriting the partition table or any data following it?A) A. dd if=/dev/zero of=/dev/sda bs=512B) B. dd if=/dev/zero of=/dev/sda bs=512 count=1C) C. dd if=/dev/zero of=/dev/sda bs=440 count=1D) D. dd if=/dev/zero of=/dev/sda bs=4404. After modifying GNU GRUB's configuration file, which command must be run for the changes to take effect?A) A. kill -HUP $(pidof grub)B) B. grub-installC) C. grubD) D. No action is required5. Which of the following commands is used to update the list of available packages when using dpkg based package management?A) A. apt-get updateB) B. apt-get upgradeC) C. apt-cache updateD) D. apt-get refreshE) E. apt-cache upgrade Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Every morning,a systems administrator monitors failed login attempts on the company's log management server. The administrator notices the DBAdmin account has five failed username and/or password alerts during a ten-minute window. The systems administrator determines the user account is a dummy account used to attract attackers. Which of the following techniques should the systems administrator implement?A) Role-based access controlB) HoneypotC) Password crackerD) Rule-based access control2. A website administrator has received an alert from an application designed to check the integrity of the company's website. The alert indicated that the hash value for a particular MPEG file has changed. Upon further investigation,the media appears to be the same as it was before the alert. Which of the following methods has MOST likely been used?A) Covert timingB) Time of check/time of useC) SteganographyD) Man in the middleE) Cryptography3. In an effort to reduce data storage requirements,some company devices to hash every file and eliminate duplicates. The data processing routines are time sensitive so the hashing algorithm is fast and supported on a wide range of systems. Which of the following algorithms is BEST suited for this purpose?A) RIPEMDB) SHAC) AESD) MD54. In terms of encrypting data,which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?A) Using saltB) Using hash algorithmsC) Implementing PKID) Implementing elliptical curve5. A systems administrator found a suspicious file in the root of the file system. The file contains URLs,usernames,passwords,and text from other documents being edited on the system. Which of the following types of malware would generate such a file?A) RootkitB) BotC) RATD) Keylogger Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician is working on a computer when the PC suddenly experiences a blue screen and restarts before the technician can note the error message. The computer boots up normally, and the technician now wants to know which error message was displayed. Which of the following should the technician use to help troubleshoot the issue?A) A. sfcB) B. msconfigC) C. regedit32D) D. eventvwrE) E. msinfo322. Which of the following is the MAIN reason that corporate policies protect access to PII?A) A. To protect proprietary company dataB) B. To reduce the likelihood of identity theftC) C. To maintain the integrity of knowledge management systemsD) D. To limit access to those who -need to know3. A technician is performing an OS upgrade and is provided with an ISO installation file. The customer-s computer is running Windows 8. The computer does not have an internal optical drive. Which of the following boot methods would be the BEST to perform the upgrade with the latest amount of effort?A) A. USBB) B. SSDC) C. PXED) D. CDR4. A user is experiencing unexpectedly long boot times and abnormally slow performance on a Windows computer. The technician opens the Task Manager and notices there is extremely high disk utilization with low network utilization, even after a reboot. Which of the following tools should a technician use to diagnose the issue?A) A. Regsvr32B) B. Computer ManagementC) C. Dr.WatsonD) D. MSConfig5. A technician at a corporation receives an instant message from a user who states the new department shared drive that was given through managed settings is missing from the user-s PC. Which of the following tools should the technician use to BEST troubleshoot the missing shared drive?A) A. chmodB) B. ipconfigC) C. msconfigD) D. nslookupE) E. gpresult Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: BExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following commands lists the dependencies of a given dpkg package?A) A. apt-cache depends-on packageB) B. apt-cache dependencies packageC) C. apt-cache depends packageD) D. apt-cache requires package2. Which of the following options is used in a GRUB Legacy configuration file to define the amount of time that the GRUB menu will be shown to the user?A) A. hidemenuB) B. splashC) C. timeoutD) D. showmenu3. What can the Logical Volume Manager (LVM) be used for? (Choose THREE correct answers.)(Select 3answers)A) A. To create RAID 9 arrays.B) B. To dynamically change the size of logical volumes.C) C. To encrypt logical volumes.D) D. To create snapshots.E) E. To dynamically create or delete logical volumes.4. Which of the following commands updates the linker cache of shared libraries?A) A. mkcacheB) B. soconfigC) C. mkldconfigD) D. lddconfigE) E. ldconfig5. Which of the following commands lists all currently installed packages when using RPM package management?A) A. yum --query --allB) B. yum --list --installedC) C. rpm --query --allD) D. rpm --list --installed Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: B,D,EExplanation: 4. Right Answer: EExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A water utility company has seen a dramatic increase in the number of water pumps burning out. A malicious actor was attacking the company and is responsible for the increase. Which of the following systems has the attacker compromised?A) DMZB) SCADAC) IoTD) RTOS2. In determining when it may be necessary to perform a credentialed scan against a system instead of a non-credentialed scan,which of the following requirements is MOST likely to influence this decision?A) The scanner must be able to audit file system permissionsB) The scanner must be able to check for open ports with listening services.C) The scanner must be able to enumerate the host OS of devices scanned.D) The scanner must be able to footprint the network.3. Company XYZ has decided to make use of a cloud-based service that requires mutual,certificate- based authentication with its users. The company uses SSL- inspecting IDS at its network boundary and is concerned about the confidentiality of the mutual authentication. Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new service or keys to decrypt that communication?A) Use of smartcards that store x.509 keys,signed by a global CAB) Use of a third-party,SAML-based authentication service for attestationC) Use of OATH between the user and the service and attestation from the company domainD) Use of active directory federation between the company and the cloud-based service4. During a third-party audit,it is determined that a member of the firewall team can request,approve,and implement a new rule-set on the firewall. Which of the following will the audit team most l likely recommend during the audit out brief?A) Separation of duties policy for the firewall teamB) Mandatory access control for the firewall teamC) Discretionary access control for the firewall teamD) Least privilege for the firewall team5. Joe,a user,wants to send Ann,another user,a confidential document electronically. Which of the following should Joe do to ensure the document is protected from eavesdropping?A) Encrypt it with Ann - s public keyB) Encrypt it with Joe - s public keyC) Encrypt it with Ann - s private keyD) Encrypt it with Joe - s private key Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: DExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Multiple users have reported latency issues. After troubleshooting the issue, the technician finds that bandwidth is saturated by non-corporate applications. Which of the following should resolve this issue?A) A. Assign static IP addressesB) B. Enable MAC filteringC) C. Enable content filteringD) D. Configure an IPS2. Joe, a user, reports he is unable to install an OS on a home computer. An investigation reveals Joe is using an enterprise license key. Which of the following is the MOST likely issue?A) A. The wrong media is being usedB) B. The media is corruptC) C. The hardware is unsupportedD) D. The boot order is incorrect3. Which of the following built-in accounts removed in Windows 10?A) A. Power UserB) B. AdministratorC) C. GuestD) D. Standard User4. A PC technician is configuring IP addresses on a Windows system that has multiple NICs. Which of the following commands would show the IP addresses configured on each network interface?A) A. netconfigB) B. ifconfigC) C. ipconfigD) D. netstat5. A technician responds to a user-s complaint of -stop errors being received when the user watches company training videos. The technician determines the problem must be a faulty video driver. After installing the latest video driver for the system, rebooting, and testing the system, the error is still present. Which of the following troubleshooting steps does the technician needs to complete at this stage?A) A. Verify functionality and implement preventive measuresB) B. Establish a plan of action to resolve the problemC) C. Document the findings, actions, and outcomesD) D. Formulate a new theory or escalate Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: CExplanation: 4. Right Answer: CExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following commands can be used to download the RPM package kernel without installing it?A) A. yum download --no-install kernelB) B. yumdownloader kernelC) C. rpm --download --package kernelD) D. rpmdownload kernel2. When using rpm --verify to check files created during the installation of RPM packages, which of the following information is taken into consideration? (ChooseTHREE correct answers.)(Select 3answers)A) A. TimestampsB) B. MD5 checksumsC) C. InodesD) D. File sizesE) E. GnuPG signatures3. Which of the following is correct when talking about mount points?A) A. Every existing directory can be used as a mount point.B) B. Only empty directories can be used as a mount point.C) C. Directories need to have the SetUID flag set to be used as a mount point.D) D. Files within a directory are deleted when the directory is used as a mount point.4. Which function key is used to start Safe Mode in Windows NT?A) A. F10B) B. F8C) C. F6D) D. Windows NT does not support Safe Mode5. What does the 'purge action with the dpkg command do?A) A. It removes the configuration file and resets them to the package's defaults.B) B. It removes the package but retains its configuration files.C) C. It removes the packages configuration files but retains its content.D) D. It removes the package and its configuration files. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: A,B,DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Joe,a user,reports to the help desk that he can no longer access any documents on his PC. He states that he saw a window appear on the screen earlier,but he closed it without reading it. Upon investigation,the technician sees high disk activity on Joe - s PC. Which of the following types of malware is MOST likely indicated by these findings?A) Crypto-malwareB) TrojanC) RootkitD) Keylogger2. Following the successful response to a data-leakage incident,the incident team lead facilitates an exercise that focuses on continuous improvement of the organization's incident response capabilities. Which of the following activities has the incident team lead executed?A) Root cause analysisB) Lessons learned reviewC) Corrective action exerciseD) Incident audit3. A system administrator wants to provide balance between the security of a wireless network and usability. The administrator is concerned with wireless encryption compatibility of older devices used by some employees. Which of the following would provide strong security and backward compatibility when accessing the wireless network?A) WPA using a preshared keyB) WPA2 using a RADIUS back-end for 802.1x authenticationC) WEP with a 40-bit keyD) Open wireless network and SSL VPN4. A user of the wireless network is unable to gain access to the network. The symptoms are: 1.) Unable to connect to both internal and Internet resources 2.) The wireless icon shows connectivity but has no network access The wireless network is WPA2 Enterprise and users must be a member of the wireless security group to authenticate. Which of the following is the MOST likely cause of the connectivity issues?A) The DHCP scope is fullB) The dynamic encryption key did not update while the user was offlineC) A remote DDoS attack against the RADIUS server is taking placeD) The user's laptop only supports WPA and WEPE) The wireless signal is not strong enough5. A technician is configuring a load balancer for the application team to accelerate the network performance of their applications. The applications are hosted on multiple servers and must be redundant. Given this scenario,which of the following would be the BEST method of configuring the load balancer?A) Round-robinB) WeightedC) Locality-basedD) Least connection Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review