Created by - Mary Smith
Questions 1. A user is trying to connect to a new access point with a laptop. The laptop is already able to connect to older access points. The user can see the SSID, but the new access point will not allow the user to connect. The user verifies the correct password is being used. Recently issued devices are able to connect to the new access point. Which of the following is the BEST way to restore this situation?A) A. Enable DHCP on the wireless networkB) B. Disable the firewall on the laptopC) C. Upgrade the radio firmwareD) D. Clear the DNS cache on the laptop2. Joe, an end user, reports that his computer is displaying numerous pop-up advertisements and is performing very slowly during the workday. Which of the following tools should the technician use FIRST to troubleshoot this issue?A) A. Reinstall the Internet browser softwareB) B. Run a trusted antivirus scanC) C. Perform a System RestoreD) D. Enable the local firewall3. A company wants all new PCs to have a standard sleep and hibernate schedule. Which of the following would allow this to be accomplished?A) A. Adjust the power plan to Energy SaverB) B. Schedule nightly shutdownsC) C. Import a customized power planD) D. Change the settings in the BIOS4. A technician in a call center is on a particularly frustrating repair call. Which of the following BEST represents what the technician should do during the call?A) A. Insist the customer call back laterB) B. Ensure the customer takes a satisfaction surveyC) C. Document all relevant facts regarding the callD) D. Escalate the call to the next tier of support5. A coworker asks a technician for help understanding an email request while the technician is on a call assisting a user. Which of the following is the BEST response the technician can give the coworker?A) A. Inform the coworker help will be given when the call is overB) B. Multitask and assist the coworker while on the callC) C. Politely ask if the user minds being placed on holdD) D. Refer the coworker to a supervisor Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: BExplanation: 3. Right Answer: CExplanation: 4. Right Answer: CExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following commands can be used to create a USB storage media from a disk image?A) A. gdiskB) B. ddC) C. ccD) D. fdiskE) E. mount2. In Bash, inserting 1>&2 after a command redirectsA) A. standard error to standard input.B) B. standard input to standard error.C) C. standard output to standard error.D) D. standard error to standard output.E) E. standard output to standard input.3. What command will generate a list of user names from /etc/passwd along with their login shell?A) A. column -s : 1,7 /etc/passwdB) B. chop -c 1,7 /etc/passwdC) C. colrm 1,7 /etc/passwdD) D. cut -d: -f1,7 /etc/passwd4. In a nested directory structure, which find command line option would be used to restrict the command to searching down a particular number of subdirectories?A) A. -dirmaxB) B. -maxdepthC) C. -maxlevelsD) D. -nE) E. -s5. Which of the following statements is correct regarding the command foo 1> bar?A) A. The stdout from the command foo is appended to the file bar.B) B. The stdout from the command foo overwrites the file bar.C) C. The command foo receives its stdin from the file bar.D) D. The command foo receives its stdin from the stdout of the command bar.E) E. The stderr from the command foo is saved to the file bar. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: CExplanation: 3. Right Answer: DExplanation: 4. Right Answer: BExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician has installed new vulnerability scanner software on a server that is joined to the company domain. The vulnerability scanner is able to provide visibility over the patch posture of all company's clients. Which of the following is being used?A) Credentialed scanB) Bypassing security controlsC) Passive scanD) Gray box vulnerability testing2. A technician needs to implement a system which will properly authenticate users by their username and password only when the users are logging in from a computer in the office building. Any attempt to authenticate from a location other than the office building should be rejected. Which of the following MUST the technician implement?A) Dual factor authenticationB) Biometric authenticationC) Single factor authenticationD) Transitive authentication3. Audit logs from a small company - s vulnerability scanning software show the following findings: Destinations scanned: -Server001- Internal human resources payroll server -Server101-Internet-facing web server -Server201- SQL server for Server101 -Server301-Jumpbox used by systems administrators accessible from the internal network Validated vulnerabilities found: -Server001- Vulnerable to buffer overflow exploit that may allow attackers to install software -Server101- Vulnerable to buffer overflow exploit that may allow attackers to install software -Server201-OS updates not fully current -Server301- Accessible from internal network without the use of jumpbox -Server301-Vulnerable to highly publicized exploit that can elevate user privileges Assuming external attackers who are gaining unauthorized information are of the highest concern,which of the following servers should be addressed FIRST?A) Server101B) Server301C) Server001D) Server2014. A user needs to send sensitive information to a colleague using PKI. Which of the following concepts apply when a sender encrypts the message hash with the sender's private key? (Select TWO)(Select 2answers)A) Email content encryptionB) Message integrityC) SteganographyD) Transport securityE) Non-repudiation5. Many employees are receiving email messages similar to the one shown below: From IT department To employee Subject email quota exceeded Pease click on the following link http:www.website.info/email.php?quota=1Gb and provide your username and password to increase your email quota. Upon reviewing other similar emails,the security administrator realized that all the phishing URLs have the following common elements,they all use HTTP,they all come from .info domains,and they all contain the same URI. Which of the following should the security administrator configure on the corporate content filter to prevent users from accessing the phishing URL,while at the same time minimizing false positives?A) DENY http://*.info/email.php?quota=1GbB) DROP http://'website.info/email.php?*C) BLOCK http://www.*.info/'D) Redirect http://www,*. Info/email.php?quota=*TOhttp://company.com/corporate_polict.html Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: B,EExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A user wants to restore an application-s security settings to an iOS device, but an Internet connection is unavailable. Which of the following tools can assist with mitigating this issue?A) A. Time machineB) B. Apple ConfigurationC) C. Device stageD) D. iCloud2. Which of the following statements is true regarding the differences between a 32-bit and 64-bit OS?A) A. A 32-bit version of the OS will not run on 64-bit hardware, but a 64-bit OS will run on 32-bit hardware.B) B. A 32-bit version of the OS requires twice the number of CPU clock cycles to write the same amount of data as a 64-bit OS.C) C. A 64-bit version of the OS will address memory in eight octets.D) D. A 64-bit version of the OS will write data to disk in block sizes of eight octets3. Which of the following combinations provides the STRONGEST authentication security?A) A. Hardware tokenB) B. Username and passwordC) C. Smart card with PIND) D. Voice then fingerprint recognition4. A Windows PC suffered a bad update, so a systems administrator removed the update. Which of the following tools should the systems administrator run to ensure the Windows files are not corrupted?A) A. MSConfigB) B. SfcC) C. DefragD) D. Chkdsk5. A home user receives a call from a technician who claims to be with a virus control company. The technician explains that the user-s PC is infected with harmful viruses. The technician instructs the user how to get to the Event Viewer where all errors can be seen. The technician claims this problem can be fixed for money.Which of the following threats has the user been a victim of?A) A. PhishingB) B. Social engineeringC) C. Man-in-the-middleD) D. Spoofing Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: DExplanation: 4. Right Answer: BExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following commands kills the process with the PID 123 but allows the process to 'clean up' before exiting?A) A. kill -PIPE 123B) B. kill -KILL 123C) C. kill -STOP 123D) D. kill -TERM 1232. What is the maximum niceness value that a regular user can assign to a process with the nice command when executing a new process?A) A. 9B) B. 19C) C. 49D) D. 993. Immediately after deleting 3 lines of text in vi and moving the cursor to a different line, which single character command will insert the deleted content below the current line?A) A. i (lowercase)B) B. P (uppercase)C) C. p (lowercase)D) D. U (uppercase)E) E. u (lowercase)4. A user accidentally created the subdirectory dir in his home directory. Which of the following commands will remove that directory?A) A. rmdir '~/dir'B) B. rmdir '~/dir'C) C. rmdir ~/'dir'D) D. rmdir ~/dirE) E. rmdir ~/\dir5. In compliance with the FHS, in which of the directories are man pages found?A) A. /usr/share/manB) B. /opt/manC) C. /usr/doc/D) D. /var/pkg/manE) E. /var/man Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: BExplanation: 3. Right Answer: CExplanation: 4. Right Answer: EExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician has discovered a crypto-virus infection on a workstation that has access to sensitive remote resources. Which of the following is the immediate NEXT step the technician should take?A) Determine the source of the virus that has infected the workstation.B) Sanitize the workstation - s internal drive.C) Disable the network connections on the workstation.D) Reimage the workstation for normal operation.2. A systems administrator has isolated an infected system from the network and terminated the malicious process from executing. Which of the following should the administrator do NEXT according to the incident response process?A) Wipe the system.B) Notify regulations of the incident.C) Document the lessons learned.D) Restore lost data from a backup.3. A wireless network uses a RADIUS server that is connected to an authenticator,which in turn connects to a supplicant. Which of the following represents the authentication architecture in use?A) Captive portalB) 802.1xC) Open systems authenticationD) RADIUS federation4. In a corporation where compute utilization spikes several times a year,the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?A) RedundancyB) ElasticityC) High availabilityD) Scalability5. A systems administrator has isolated an infected system from the network and terminated the malicious process from executing. Which of the following should the administrator do NEXT according to the incident response process?A) Document the lessons learned.B) Restore lost data from a backup.C) Determine the scope of impact.D) Wipe the system. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: BExplanation: 4. Right Answer: BExplanation: Elasticity is defined as the degree to which a system is able to adapt to workload changes by provisioning and de-provisioning resources in an autonomic manner,such that at each point in time the available resources match the current demand as closely as possible.5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician has contacted a vendor, informing them they need to RMA a faulty memory stick. Which of the following should the technician use to BEST protect this component from further damage during shipment?A) A. Anti-static bagsB) B. Plastic boxC) C. Cardboard boxD) D. Bubble wrapE) E. Padded envelope2. A company has drivers with PII and other sensitive information on them. There are several drives that need to be disposed of in a short time due to federal regulations, so a technician hires a media destruction company to perform the work. Which of the following should be requested from the company?A) A. Copy of the contract for the completed workB) B. Certificate for a Certificate AuthorityC) C. Certificate of destructionD) D. Receipt of payment for work completed3. A technician is troubleshooting a startup failure on a Windows domain controller DNS service. The technician discovers a third-party application is running a database server application that happens to capture the same high-numbered ports as the DNS service. The application service ports cannot be changed due to application design. Which of the following is the BEST solution to resolve this problem?A) A. Allow the database application to start up first, and set the DNS service to delayed startB) B. Allow the DNS server service to start up first, and set the application service to delayed startC) C. Move the third-party database application to a different domain controllerD) D. Contact the application vendor to find out if the ports it uses can be changed4. Which of the following technologies ensures full device encryption on a Windows mobile device?A) A. BitLockerB) B. UEFIC) C. TPMD) D. Passcode5. A user has become a victim of data harvesting. The user wants to know more about the potential for mobile device application security issues. Which of the following settings should a technician advise the user to change on the user-s mobile device? (Select three.)(Select 2answers)A) A. Location trackingB) B. Camera activationC) C. Data transmission limitD) D. System lockoutsE) E. Developer optionsF) F. Accessibility Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: CExplanation: 3. Right Answer: CExplanation: 4. Right Answer: CExplanation: 5. Right Answer: A,FExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following commands will send output from the program myapp to both standard output (stdout) and the file file1.log?A) A. cat < myapp | cat > file1.logB) B. myapp 0>&1 | cat > file1.logC) C. myapp | cat > file1.logD) D. myapp | tee file1.logE) E. tee myapp file1.log2. What is the purpose of the Bash built-in export command?A) A. It allows disks to be mounted remotely.B) B. It runs a command as a process in a subshell.C) C. It makes the command history available to subshells.D) D. It sets up environment variables for applications.E) E. It shares NFS partitions for use by other systems on the network.3. What is the output of the following command?echo 'Hello World' | tr -d aieouA) A. Hello WorldB) B. eooC) C. Hll WrldD) D. eoo Hll Wrld4. Which of the following characters can be combined with a separator string in order to read from the current input source until the separator string, which is on a separate line and without any trailing spaces, is reached?A) A.
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller,the systems administrator needs to provide the domain administrator credentials. Which of the following account types is the systems administrator using?A) Guest accountB) User accountC) Service accountD) Shared account2. A systems administrator is configuring a system that uses data classification labels. Which of the following will the administrator need to implement to enforce access control?A) Rule-based access controlB) Role-based access controlC) Mandatory access controlD) Discretionary access control3. Joe,a backup administrator,wants to implement a solution that will reduce the restoration time of physical servers. Which of the following is the BEST method for Joe to use?A) FullB) SnapshotsC) IncrementalD) Differential4. A technician must configure a firewall to block external DNS traffic from entering a network. Which of the following ports should they block on the firewall?A) 143B) 53C) 443D) 1105. During a routine audit,it is discovered that someone has been using a stale administrator account to log into a seldom used server. The person has been using the server to view inappropriate websites that are prohibited to end users. Which of the following could best prevent this from occurring again?A) Group policy managementB) Account expiration policyC) Credential managementD) Acceptable use policy Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: BExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review