Created by - Mary Smith
Questions 1. Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue. Which of the following methods can the technician use?A) A. Initiate a factory resetB) B. Perform a hard resetC) C. Remove the MicroSD cardD) D. Rollback the OS update2. A user needs to connect securely to the company network while working from a hotel room. Which of the following would the user need available to accomplish this?A) A. AESB) B. VPNC) C. UTMD) D. WPA23. A user reports that any URL entered redirects to the same web page. A technician concludes that the user-s computer has been compromised. Which of the following tools would the technician use to resolve the issue?A) A. Last known good configurationB) B. Anti-malwareC) C. System restoreD) D. Rogue antivirus4. Which of the following is an example of client-side virtualization?A) A. Compatibility mode on a program icon properties menuB) B. Running a DOS application on a Windows 7 32-bit operating systemC) C. Cloud hosted office applicationsD) D. XP mode running in Windows 7 64-bit operating system5. A user updates the video driver on the computer and it requests a restart after installation. The computer never gets past the loading Windows page without rebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs?A) A. Emergency Repair DiskB) B. Restore from OEM imageC) C. System RecoveryD) D. Restore from backup Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: BExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Depending on the host's configuration, which of the following files can be used to turn on and off network services running on a host? (Choose TWO correct answers.)(Select 2answers)A) A. /etc/profileB) B. /etc/servicesC) C. /etc/inetd.confD) D. /etc/xinetd.confE) E. /etc/host.conf2. How do shadow passwords improve the password security in comparison to standard passwd passwords?A) A. Shadow passwords are stored in plain text and can be checked for weak passwords.B) B. Every shadow password is valid for 45 days and must be changed afterwards.C) C. The system's host key is used to strongly encrypt all shadow passwords.D) D. Shadow passwords are always combined with a public key that has to match the user's private key.E) E. Regular users do not have access to the password hashes of shadow passwords.3. What is true regarding public and private SSH keys? (Choose TWO correct answers.)(Select 2answers)A) A. Several different public keys may be generated for the same private key.B) B. The private key must never be revealed to anyone.C) C. For each user account, there is exactly one key pair that can be used to log into that account.D) D. To maintain the private key's confidentiality, the SSH key pair must be created by its owner.E) E. To allow remote logins, the user's private key must be copied to the remote server.4. Which of the following commands gets the GnuPG public key with the id 63B4835B from the keyserver example.com?A) A. gpg --keyserver hkp://example.com --recv-key 63B4835BB) B. gpg --search-key hkp://63B4835B@example.comC) C. gpg --keyserver gpg://example.com --get-key 63B4835BD) D. gpg --keyserver hkp://example.com --add-key 63B4835BE) E. gpg --keyserver gpg://example.com --key 63B4835B5. What is the difference between the commands test -e path and test -f path?A) A. They are equivalent options with the same behaviour.B) B. The -f option tests for a regular file. The -e option tests for an empty file.C) C. Both options check the existence of the path. The -f option also confirms that it is a regular file.D) D. The -f option tests for a regular file. The -e option tests for an executable file. Right Answer and Explanation: 1. Right Answer: C,DExplanation: 2. Right Answer: EExplanation: 3. Right Answer: B,DExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An organization plans to implement multifactor authentication techniques within the enterprise network architecture. Each authentication factor is expected to be a unique control. Which of the following BEST describes the proper employment of multifactor authentication?A) Proximity card,fingerprint scanner,PINB) Fingerprint scanner,voice recognition,proximity cardC) Smart card,user PKI certificate,privileged user certificateD) Voice recognition,smart card,proximity card2. An organization relies heavily on an application that has a high frequency of security updates. At present,the security team only updates the application on the first Monday of each month,even though the security updates are released as often as twice a week. Which of the following would be the BEST method of updating this application?A) Configure testing and automate patch management for the application.B) Configure security control testing for the application.C) Manually apply updates for the application when they are released.D) Configure a sandbox for testing patches before the scheduled monthly update.3. An organization requires users to provide their fingerprints to access an application. To improve security,the application developers intend to implement multifactor authentication. Which of the following should be implemented?A) Use a camera for facial recognitionB) Have users sign their name naturallyC) Require a palm geometry scanD) Implement iris recognition4. An organization's employees currently use three different sets of credentials to access multiple internal resources. Management wants to make this process less complex. Which of the following would be the BEST option to meet this goal?A) Transitive trustB) Single sign-onC) FederationD) Secure token5. An organization's file server has been virtualized to reduce costs. Which of the following types of backups would be MOST appropriate for the particular file server?A) SnapshotB) FullC) IncrementalD) Differential Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part?A) A. Ground the computer and remove jewelry.B) B. Self ground and handle the new card by the edges.C) C. Place the computer on an ESD mat.D) D. Attach an ESD strap to the new card during handling.2. A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?A) A. Require bio-metric identification to log into the laptop.B) B. Require multi-factor authentication to log into laptop.C) C. Require laptop hard drives to be encrypted.D) D. Require users to change their password at frequent intervals.E) E. Require users to have strong passwords.3. A user calls the help-desk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices?A) A. Identify symptoms, quarantine infected system, and create restore point.B) B. Quarantine infected system, identify symptoms, and create restore point.C) C. Identify symptoms, educate end user, and create restore point.D) D. Create restore point, identify symptoms, and quarantine infected system.4. Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a message that updates are being installed. Which of the following is the MOST likely cause of this issue?A) A. Time of day restrictions are enabled on the machineB) B. Scheduled antivirus scans and updates are enabled on the machineC) C. Remote desktop is enabled and an administrator has logged into the machineD) D. Automatic Windows Update is enabled on the machine5. A technician is in need of a device that would give the BEST network protection within a single device. Which of the following devices would the technician use?A) A. NLXB) B. IDSC) C. UTMD) D. ATX Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: CExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only?A) A. unset -v FOOBAR;./myscriptB) B. set -a FOOBAR='';./myscriptC) C. env -u FOOBAR./myscriptD) D. env -i FOOBAR./myscript2. What output will the following command produce?seq 1 5 20A) A. 1B) B. 1C) C. 1D) D. 2E) E. 53. Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?A) A. CASEB) B. FROMC) C. WHERED) D. IF4. Which of the following commands lists all defined variables and functions within Bash?A) A. envB) B. setC) C. env -aD) D. echo $ENV5. Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?A) A. SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;B) B. SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;C) C. COUNT(SELECT order_type FROM orders);D) D. SELECT COUNT(*) FROM orders ORDER BY order_type;E) E. SELECT AUTO_COUNT FROM orders COUNT order_type; Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: BExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An organization - s primary datacenter is experiencing a two-day outage due to an HVAC malfunction. The node located in the datacenter has lost power and is no longer operational,impacting the ability of all users to connect to the alternate datacenter. Which of the following BIA concepts BEST represents the risk described in this scenario?A) SPoFB) RTOC) MTBFD) MTTR2. An organization uses SSO authentication for employee access to network resources. When an employee resigns,as per the organization - s security policy,the employee - s access to all network resources is terminated immediately. Two weeks later,the former employee sends an email to the help desk for a password reset to access payroll information from the human resources server. Which of the following represents the BEST course of action?A) Approve the former employee - s request,as a password reset would give the former employee access to only the human resources server.B) Deny the former employee - s request,since the password reset request came from an external email address.C) Deny the former employee - s request,as a password reset would give the employee access to all network resources.D) Approve the former employee - s request,as there would not be a security issue with the former employee gaining access to network resources.3. An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the data files,the organization wants to ensure a secure exchange of keys. Which of the following algorithms is appropriate for securing the key exchange?A) DESB) BlowfishC) DSAD) Diffie-HellmanE) 3DES4. An organization wants to ensure network access is granted only after a user or device has been authenticated. Which of the following should be used to achieve this objective for both wired and wireless networks?A) CCMPB) PKCS#12C) IEEE 802.1XD) OCSP5. An organization wants to implement a method to correct risks at the system/application layer. Which of the following is the BEST method to accomplish this goal?A) IDS/IPSB) IP tunnelingC) Web application firewallD) Patch management Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: DExplanation: 4. Right Answer: CExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. Which of the following is the BEST step the user can take to fix this problem?A) A. Perform a force stopB) B. Reset to factory defaultC) C. Upgrade to a larger batteryD) D. Close running apps2. A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue?A) A. The PC-s Windows firewall is misconfiguredB) B. The PC has an incorrect IP address configuredC) C. The PC is on the wrong wireless networkD) D. The PC does not have remote assistance turned on3. A technician is attempting to manually migrate a user-s profile from one Windows PC to another. Files in the user-s My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur?A) A. exFATB) B. COMPRESSEDC) C. EFSD) D. NTFS4. Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slow performance after a couple of hours and that the problem worsens as the day goes by. If Ann restarts the device, it works fine for a couple of hours and then starts to run slow again. Which of the following is the BEST action to troubleshoot this problem?A) A. Check running appsB) B. Reset to factory defaultC) C. Disable cloud syncingD) D. Replace the device-s battery5. A new help desk technician receives a trouble call from a user. The issue is something the technician has never encountered before, and does not know where to begin troubleshooting. The FIRST course of action is for the technician to:A) A. tell the customer the issue needs to be escalated to a higher tier technician.B) B. ask the customer if they would mind holding for no more than two minutes to check resources.C) C. tell the customer this is the first time encountering the issue and to please be patient.D) D. ask the customer to please hold while a senior technician is consulted regarding the issue. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. What is the purpose of the file /etc/profile?A) A. It contains the welcome message that is displayed after login.B) B. It contains security profiles defining which users are allowed to log in.C) C. It contains environment variables that are set when a user logs in.D) D. It contains default application profiles for users that run an application for the first time.2. Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)(Select 3answers)A) A. The user issuing the command must be in the group script.B) B. The script file must be found in the $PATH.C) C. The script file must have the executable permission bit set.D) D. The script must begin with a shebang-line (#!) that points to the correct interpreter.E) E. The file system on which the script resides must be mounted with the option scripts.3. Which file used by XDM specifies the default wallpaper?A) A. /etc/X11/xdm/XsetupB) B. /etc/X11/xdm.confC) C. /etc/X11/xdm/DefaultsD) D. /etc/X11/defaults.conf4. The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section?A) A. It is placed in curly brackets as in Section SectionName { ... }.B) B. It is placed between a line containing Section 'SectionName' and a line containing EndSection.C) C. It is placed between the tags and D) D. It is placed after the row [SectionName].E) E. It is placed after an initial unindented Section 'SectionName' and must be indented by exactly one tab character.5. What is the purpose of a screen reader?A) A. It reads text displayed on the screen to blind or visually impaired people.B) B. It reads the parameters of the attached monitors and creates an appropriate X11 configuration.C) C. It displays lines and markers to help people use speed reading techniques.D) D. It manages and displays files that contain e-books. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: B,C,DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: BExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An organization wants to implement a solution that allows for automated logical controls for network defense. An engineer plans to select an appropriate network security component,which automates response actions based on security threats to the network. Which of the following would be MOST appropriate based on the engineer - s requirements?A) NIPSB) HIDSC) Web proxyD) Elastic load balancerE) NAC2. An organization wants to utilize a common,Internet-based third-party provider for authorization and authentication. The provider uses a technology based on OAuth 2.0 to provide required services. To which of the following technologies is the provider referring?A) Open ID ConnectB) SAMLC) XACMLD) LDAP3. A number of employees report that parts of an ERP application are not working. The systems administrator reviews the following information from one of the employee workstations: Execute permission denied: financemodule.dll Execute permission denied: generalledger.dll Which of the following should the administrator implement to BEST resolve this issue while minimizing risk and attack exposure?A) Update the application blacklistB) Verify the DLL - s file integrityC) Whitelist the affected librariesD) Place the affected employees in the local administrator - s group4. A penetration tester finds that a company - s login credentials for the email client were being sent in clear text. Which of the following should be done to provide encrypted logins to the email server?A) Enable IPSec and configure SMTP.B) Enable SSH and LDAP credentials.C) Enable MIME services and POP3.D) Enable an SSL certificate for IMAP services.5. A penetration tester has written an application that performs a bit-by-bit XOR 0xFF operation on binaries prior to transmission over untrusted media. Which of the following BEST describes the action performed by this type of application?A) HashingB) Key exchangeC) EncryptionD) Obfusication Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: DExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review