Created by - Mary Smith
Questions 1. A technician wants to decrease the risk of unauthorized users being able to use an unattended computer. Which of the following actions should the technician take to accomplish this goal?A) A. Restrict user permissions.B) B. Configure failed attempts lockout.C) C. Require screensaver password.D) D. Use data encryption.2. Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?A) A. An IP conflict is present.B) B. A corporate VPN is enabled.C) C. A firewall exception must be set.D) D. Home-group must be enabled.3. Utilizing login information for social media platforms or email providers without requiring additional credentials is commonly referred to as¦¦A) A. system federationB) B. mutual authenticationC) C. single sign-inD) D. multi-factor authentication4. An administrator is installing a WAP in a fitness center. There will only be five devices that should have access to this, and they are all company owned. Users do not want to put in a password when they connect these devices to the wireless. Given this scenario, which of the following is the MOST secure method of deployment?A) A. Disable SSID broadcastingB) B. Media access control filteringC) C. Disable ports 80 and 443 on the access pointD) 5. A technician needs to format a new drive on a workstation. The technician will need to configure read attributes to specific local files and write extended attributes to specific folders. Which of the following will allow the technician to configure these settings in a Windows environment?A) A. ext4B) B. HFS+C) C. FAT32D) D. NTFS Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. What is the default nice level when a process is started using the nice command?A) A. -10B) B. 10C) C. 20D) D. 02. What is the default action of the split command on an input file?A) A. It will break the file into new files of 1,024 byte pieces each.B) B. It will break the file into new files of 1,000 line pieces each.C) C. It will break the file into new files of 1,024 kilobyte pieces each.D) D. It will break the file into new files that are no more than 5% of the size of the original file.3. What is the difference between the i and a commands of the vi editor?A) A. i (interactive) requires the user to explicitly switch between vi modes whereas a (automatic) switches modes automatically.B) B. i (insert) inserts text before the current cursor position whereas a (append) inserts text after the cursor.C) C. i (independent rows) starts every new line at the first character whereas a (aligned rows) keeps the indentation of the previous line.D) D. i (interrupt) temporarily suspends editing of a file to the background whereas a (abort) terminates editing.4. Which of the following commands moves and resumes in the background the last stopped shell job?A) A. runB) B. bgC) C. fgD) D. back5. What is the effect of the egrep command when the -v option is used?A) A. It enables color to highlight matching parts.B) B. It only outputs non-matching lines.C) C. It shows the command's version information.D) D. It changes the output order showing the last matching line first. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: BExplanation: 3. Right Answer: BExplanation: 4. Right Answer: BExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician receives a device with the following anomalies: Frequent pop-up ads Show response-time switching between active programs Unresponsive peripherals The technician reviews the following log file entries: File Name Source MD5 Target MD5 Status antivirus.exe F794F21CD33E4F57890DDEA5CF267ED2 F794F21CD33E4F57890DDEA5CF267ED2 Automatic iexplore.exe 7FAAF21CD33E4F57890DDEA5CF29CCEA AA87F21CD33E4F57890DDEAEE2197333 Automatic service.exe 77FF390CD33E4F57890DDEA5CF28881F 77FF390CD33E4F57890DDEA5CF28881F Manual USB.exe E289F21CD33E4F57890DDEA5CF28EDC0 E289F21CD33E4F57890DDEA5CF28EDC0 Stopped Based on the above output,which of the following should be reviewed?A) The file integrity checkB) The data execution preventionC) The removable media controlD) The web application firewall2. Joe,a member of the sales team,recently logged into the company servers after midnight local time to download the daily lead form before his coworkers did. Management has asked the security team to provide a method for detecting this type of behavior without impeding the access for sales employee as they travel overseas. Which of the following would be the BEST method to achieve this objective?A) Install DLP software on the devices used by sales employees.B) Create an automated alert on the SIEM for anomalous sales team activity.C) Implement a filter on the mail gateway that prevents the lead form from being emailed.D) Configure time-of-day restrictions for the sales staff.3. A vulnerability scanner that uses its running service - s access level to better assess vulnerabilities across multiple assets within an organization is performing a:A) Passive scan.B) Privilege escalation test.C) Credentialed scan.D) Non-intrusive scan.4. A user receives an email from ISP indicating malicious traffic coming from the user's home network is detected. The traffic appears to be Linux-based,and it is targeting a website that was recently featured on the news as being taken offline by an Internet attack. The only Linux device on the network is a home surveillance camera system. Which of the following BEST describes what is happening?A) The camera system is infected with a bot.B) The camera system is infected with a Trojan.C) The camera system is infected with a backdoor.D) The camera system is infected with a RAT.5. A user has attempted to access data at a higher classification level than the user - s account is currently authorized to access. Which of the following access control models has been applied to this user - s account?A) RBACB) DACC) ABACD) MAC Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: BExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An employee was arrested after it was determined that an office computer was used for illegal activity that damaged the company. Which of the following MUST be documented on the employee-s computer to ensure the evidence is admissible on court?A) A. Software inventoryB) B. Personality identifiable informationC) C. Security best practicesD) D. Chain of custody2. A computer repair technician must open a computer case to remove and replace a graphics card. An ESD mat and strap are not available. Which of the following should be done PRIOR to touching the components? (Select two.)(Select 2answers)A) A. Touch both hands to a bare-metal portion of the chassis.B) B. Take off shoes and any head-wear.C) C. Remove all jewelry.D) D. Remove the power supply unit.E) E. Place the chassis on a non-metal surface.3. Which of the following is a physical device used to prevent tailgating into a facility?A) A. Privacy filterB) B. ID badgeC) C. Retinal scannerD) D. Man-trap4. Which of the following is used for building entry and computer access?A) A. Smart cardB) B. Personal identity verification cardC) C. Hardware tokensD) D. Key fobs5. A technician is running a Cat 5 cable from the IDF to a user-s PC in the office. Which of the following should the technician use for safety reasons?A) A. Dusk maskB) B. ESD strapC) C. Multi-meterD) D. Cable tester Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: A,CExplanation: 3. Right Answer: DExplanation: 4. Right Answer: BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. What does the ? symbol within regular expressions represent?A) A. Match the preceding qualifier one or more times.B) B. Match the preceding qualifier zero or more times.C) C. Match the preceding qualifier zero or one times.D) D. Match a literal ? character.2. In the vi editor, how can commands such as moving the cursor or copying lines into the buffer be issued multiple times or applied to multiple rows?A) A. By using the command :repeat followed by the number and the command.B) B. By specifying the number right in front of a command such as 4l or 2yj.C) C. By selecting all affected lines using the shift and cursor keys before applying the command.D) D. By issuing a command such as :set repetition=4 which repeats every subsequent command 4 times.3. Which of the following files, located in the user home directory, is used to store the Bash history?A) A. .bash_historyB) B. .bash_histfileC) C. .historyD) D. .bashrc_historyE) E. .history_bash4. Which of the following commands displays the contents of a gzip compressed tar archive?A) A. gzip archive.tgz | tar xvf -B) B. tar ztf archive.tgzC) C. gzip -d archive.tgz | tar tvf -D) D. tar cf archive.tgz5. Which grep command will print only the lines that do not end with a / in the file foo?A) A. grep '/$' fooB) B. grep '/#' fooC) C. grep -v '/$' fooD) D. grep -v '/#' foo Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A system administrator wants to implement an internal communication system that will allow employees to send encrypted messages to each other. The system must also support non- repudiation. Which of the following implements all these requirements?A) PGPB) SHAC) BlowfishD) Bcrypt2. Joe a computer forensic technician responds to an active compromise of a database server. Joe first collects information in memory,then collects network traffic and finally conducts an image of the hard drive. Which of the following procedures did Joe follow?A) Order of volatilityB) Recovery procedureC) Chain of custodyD) Incident isolation3. A systems administrator has been assigned to create accounts for summer interns. The interns are only authorized to be in the facility and operate computers under close supervision. They must also leave the facility at designated times each day. However,the interns can access intern file folders without supervision. Which of the following represents the BEST way to configure the accounts? (Select TWO.)(Select 2answers)A) Create privileged accounts.B) Implement time-of-day restrictions.C) Access executive shared portals.D) Enforce least privilege.E) Modify archived data.4. Before an infection was detected,several of the infected devices attempted to access a URL that was similar to the company name but with two letters transposed. Which of the following BEST describes the attack vector used to infect the devices?A) DNS poisoningB) URL hijackingC) Typo squattingD) Cross-site scripting5. During a data breach cleanup,it is discovered that not all of the sites involved have the necessary data wiping tools. The necessary tools are quickly distributed to the required technicians,but when should this problem BEST be revisited?A) Lessons LearnedB) MitigationC) ReportingD) Preparation Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: AExplanation: 3. Right Answer: A,BExplanation: 4. Right Answer: CExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. To prevent electrical damage to a PC while working on it, which of the following should be disconnected before work begins?A) A. Power cableB) B. Video cableC) C. USB cableD) D. Serial cable2. A technician wants to delete all information from a laptop so it is not recoverable, but needs to repurpose the laptop drive for future use. Which of the following is the BEST option to accomplish this task?A) A. DegaussB) B. OverwriteC) C. Standard formatD) D. Low-level format3. A corporate customer has contacted a technician about a database issue. After a reboot, no one can connect to the database. When the technician arrives on-site, the database service is not started. The technician starts the service, and the database comes up without issue. After some testing, the technician realizes the database service is coming up to quickly on startup before dependent services can start. Which of the following is the BEST solution?A) A. Set the database service to -Automatic (Delayed Start)B) B. Show the customer how to manually start the serviceC) C. Create a scheduled task that will start the service on reboot.D) D. Set the service to manual and write a script to start it on reboot.4. A user wants to see the file extensions for all files when navigating the desktop-s file structure. Which of the following Control Panel utilities should the technician access to configure the display of file extensions?A) A. SystemB) B. User AccountsC) C. PersonalizationD) D. Administrative ToolsE) E. Folder Options5. A technician is installing a new router at a computer that wants to protect the configuration of the DMZ. To prevent unauthorized remote access, which of the following should the technician perform when installing a new wireless router?A) A. Secure the room the router is stored inB) B. Change the default password on the router.C) C. Disable SSID broadcastingD) D. Ensure that all cables to the router are shielded Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: EExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following commands is used to change options and positional parameters for a running Bash?A) A. historyB) B. setC) C. bashconfD) D. setshE) E. envsetup2. Which of the following commands replaces each occurrence of 'bob' in the file letter with 'Bob' and writes the result to the file newletter?A) A. sed '/bob/Bob' letter > newletterB) B. sed s/bob/Bob/ letter < newletterC) C. sed 's/bob/Bob' letter > newletterD) D. sed 's/bob/Bob/g' letter > newletterE) E. sed 's/bob, Bob/' letter > newletter3. From a Bash shell, which of the following commands directly executes the instruction from the file /usr/local/bin/runme.sh without starting a subshell? (Please select TWO answers.)(Select 2answers)A) A. source /usr/local/bin/runme.shB) B. . /usr/local/bin/runme.shC) C. /bin/bash /usr/local/bin/runme.shD) D. /usr/local/bin/runme.shE) E. run /usr/local/bin/runme.sh4. Regarding the command:nice -5 /usr/bin/progwhich of the following statements is correct?A) A. /usr/bin/prog is executed with a nice level of -5.B) B. /usr/bin/prog is executed with a nice level of 5.C) C. /usr/bin/prog is executed with a priority of -5.D) D. /usr/bin/prog is executed with a priority of 5.5. Which shell command is used to continue background execution of a suspended command?A) A. &B) B. bgC) C. contD) D. execE) E. :& Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: DExplanation: 3. Right Answer: A,BExplanation: 4. Right Answer: BExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician suspects that a system has been compromised. The technician reviews the following log entry: WARNING- hash mismatch: C:WindowSysWOW64user32.dll WARNING- hash mismatch: C:WindowSysWOW64kernel32.dll Based solely ono the above information,which of the following types of malware is MOST likely installed on the system?A) RootkitB) RansomwareC) TrojanD) Backdoor2. A web developer improves client access to the company's REST API. Authentication needs to be tokenized but not expose the client's password. Which of the following methods would BEST meet the developer's requirements?A) ShibbolethB) LDAPC) SAMLD) OAuth3. During a monthly vulnerability scan,a server was flagged for being vulnerable to an Apache Struts exploit. Upon further investigation,the developer responsible for the server informs the security team that Apache Struts is not installed on the server. Which of the following BEST describes how the security team should reach to this incident?A) The Apache software on the server needs to be patched and updatedB) The server has been compromised by malware and needs to be quarantined.C) The finding is a false positive and can be disregardedD) The Struts module needs to be hardened on the server4. A software developer is concerned about DLL hijacking in an application being written. Which of the following is the MOST viable mitigation measure of this type of attack?A) The DLL of each application should be set individuallyB) The affected DLLs should be renamed to avoid future hijackingC) All calls to different DLLs should be hard-coded in the applicationD) Access to DLLs from the Windows registry should be disabled5. Datacenter employees have been battling alarms in a datacenter that has been experiencing hotter than normal temperatures. The server racks are designed so all 48 rack units are in use,and servers are installed in any manner in which the technician can get them installed. Which of the following practices would BEST alleviate the heat issues and keep costs low?A) Airgap the racks.B) Utilize exhaust fans.C) Use hot and cold aisles.D) Use a secondary AC unit. Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: CExplanation: 4. Right Answer: CExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review