Created by - Mary Smith
Questions 1. A technician receives a call regarding a PC-s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT?A) A. Reload the OS using FAT32 instead of NTFS.B) B. Change the disk from basic to dynamic.C) C. Run chkdsk with the /r switch and reboot the PC.D) D. Open the defrag utility and run a drive analysis.2. Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Joe is then required to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screen-lock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue?A) A. Domain-level group policiesB) B. Antivirus domain-level policiesC) C. Corrupted registry settingsD) D. Incorrect local-level user policies3. An IPS appliance is installed on the network. Which of the following is the purpose of the IPS?A) A. To check the network for unwanted activityB) B. To check and stop unwanted activityC) C. To provide connectivity to the networkD) D. To test the resilience of the network4. In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed FIRST?A) A. Use safety gogglesB) B. Remove jewelryC) C. Put on an ESD strapD) D. Disconnect power5. A user-s email inbox is suddenly receiving dozens of rejection messages from various mail servers. Which of the following would the technician perform to BEST solve the issue?A) A. Change the user-s email password.B) B. Enable spam filtering on the email account.C) C. Change the email account from POP to IMAP.D) D. Disable the user-s email account. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query?A) A. dnsqB) B. digC) C. hostnameD) D. dnslookupE) E. zoneinfo2. What of the following can be done by the command ifconfig? (Choose TWO correct answers.)(Select 2answers)A) A. Set a network interface active or inactive.B) B. Specify the kernel module to be used with a network interface.C) C. Allow regular users to change the network configuration of a network interface.D) D. Change the netmask used on a network interface.E) E. Specify which network services are available on a network interface.3. Which of the following programs can be used to determine the routing path to a given destination?A) A. digB) B. netstatC) C. pingD) D. routeE) E. traceroute4. Given the following routing table:Kernel IP routing table -Destination Gateway Genmask Flags Metric Ref Use Iface0.0.0.0 192.168.178.1 0.0.0.0 UG 0 0 0 wlan0192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0192.168.2.0 192.168.1.1 255.255.255.0 U 0 0 0 eth0192.168.178.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan0How would an outgoing packet to the destination 192.168.2.150 be handled?A) A. It would be passed to the default router 192.168.178.1 on wlan0.B) B. It would be directly transmitted on the device eth0.C) C. It would be passed to the default router 255.255.255.0 on eth0.D) D. It would be directly transmitted on the device wlan0.E) E. It would be passed to the router 192.168.1.1 on eth0.5. Which of the following is a valid IPv6 address?A) A. 2001:db8:3241::1B) B. 2001::db8:4581::1C) C. 2001:db8:0g41::1D) D. 2001%db8%9990%%1E) E. 2001.db8.819f..1 Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: D,EExplanation: 3. Right Answer: EExplanation: 4. Right Answer: EExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An office recently completed digitizing all its paper records. Joe,the data custodian,has been tasked with the disposal of the paper files,which include: Intellectual property Payroll records Financial information Drug screening results Which of the following is the BEST way to dispose of these items?A) SchreddingB) PulpingC) DeidentifyingD) Recycling2. An organization electronically processes sensitive data within a controlled facility. The Chief Information Security Officer (CISO) wants to limit emissions from emanating from the facility. Which of the following mitigates this risk?A) Upgrading facility cabling to a higher standard of protected cabling to reduce the likelihood of emission spillageB) Hardening the facility through the use of secure cabinetry to block emissionsC) Hardening the facility with a Faraday cage to contain emissions produced from data processingD) Employing security guards to ensure unauthorized personnel remain outside of the facility3. An organization employee resigns without giving adequate notice. The following day,it is determined that the employee is still in possession of several company- owned mobile devices. Which of the following could have reduced the risk of this occurring? (Choose two.)(Select 2answers)A) Proper offboarding proceduresB) Acceptable use policiesC) Non-disclosure agreementsD) Exit interviewsE) Background checksF) Separation of duties4. An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Management is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?A) Create multiple application accounts for each user.B) Provide secure tokens.C) Implement SSO.D) Utilize role-based access control.5. An organization has air gapped a critical system. Which of the following BEST describes the type of attacks that are prevented by this security measure?A) Attacks from another local network segmentB) Attacks exploiting USB drives and removable mediaC) Attacks that spy on leaked emanations or signalsD) Attacks that involve physical intrusion or theft Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: CExplanation: 3. Right Answer: A,DExplanation: 4. Right Answer: CExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician has successfully completed a gpupdate from a CMD box of a user-s PC and is ready to move to:(Select 2answers)A) A. View the CMD process in Task ManagerB) B. Type EXIT at the command prompt and press EnterC) C. Minimize the CMD box to the taskbarD) D. Click the -x in the top right of the CMD windowE) E. Select Switch User on the PC2. A customer has made several trouble calls to the help desk and is very irate. The technician that receives the call has learned that the issue has not yet been resolved. The technician politely asks the customer to explain the issue, and learns that the problem needs to be escalated. Which of the following should the technician do once the problem has been escalated?A) A. Communicate status with customer and ensure successful call transferB) B. Remain on the line until the issue is resolvedC) C. Inform the customer that the issue cannot be resolved at this levelD) D. Tell customer that patience will be needed3. A user-s smartphone runs very slow at the end of the day. When the user restarts the phone in the morning, it runs at its normal speed. Which of the following should be done throughout the day to BEST resolve this issue?A) A. Reset to the smartphone to factory default.B) B. Uninstall any unused apps.C) C. Close all running apps.D) D. Charge the smartphone.4. A technician is tasked with installing Windows on numerous network PCs. Which of the following is the QUICKEST method for getting a standard configuration to the PCs?A) A. Prebuilt image using PXEB) B. Single solid state/flash drive with answer fileC) C. Hot swappable image driveD) D. Internal hard drive partition with the image5. A user is configuring the email settings on a smartphone. Which of the following configurations will allow the user to synchronize email from multiple devices?A) A. IMAPB) B. S/MIMEC) C. POP3D) D. SMTP Right Answer and Explanation: 1. Right Answer: B,DExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following keywords can be used in the file /etc/resolv.conf? (Choose TWO correct answers.)(Select 2answers)A) A. substituteB) B. nameserverC) C. searchD) D. lookupE) E. method2. On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?A) A. The local routing information may be corrupted and must be re-validated using a routing protocol.B) B. One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout.C) C. There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default.D) D. DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.3. Which configuration file would be edited to change the default options for outbound SSH sessions?A) A. /etc/ssh/sshd_configB) B. /etc/ssh/sshC) C. /etc/ssh/clientD) D. /etc/ssh/ssh_configE) E. /etc/ssh/ssh_client4. Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?A) A. tcpdB) B. inetdC) C. fingerdD) D. mountdE) E. xinetd5. Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?A) A. coreB) B. edquotaC) C. ulimitD) D. quota Right Answer and Explanation: 1. Right Answer: B,CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: DExplanation: 4. Right Answer: AExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An organization has an account management policy that defines parameters around each type of account. The policy specifies different security attributes,such as longevity,usage auditing,password complexity,and identity proofing. The goal of the account management policy is to ensure the highest level of security while providing the greatest availability without compromising data integrity for users. Which of the following account types should the policy specify for service technicians from corporate partners?A) Guest accountB) User accountC) Shared accountD) Privileged user accountE) Default accountF) Service account2. An organization has several production-critical SCADA supervisory systems that cannot follow the normal 30- day patching policy. Which of the following BEST maximizes the protection of these systems from malicious software?A) Configure a firewall with deep packet inspection that restricts traffic to the systems.B) Configure a separate zone for the systems and restrict access to known ports.C) Configure the systems to ensure only necessary applications are able to run.D) Configure the host firewall to ensure only the necessary applications have listening ports3. An organization is comparing and contrasting migration from its standard desktop configuration to the newest version of the platform. Before this can happen,the Chief Information Security Officer (CISO) voices the need to evaluate the functionality of the newer desktop platform to ensure interoperability with existing software in use by the organization. In which of the following principles of architecture and design is the CISO engaging?A) Dynamic analysisB) Change managementC) BaseliningD) Waterfalling4. An organization is expanding its network team. Currently,it has local accounts on all network devices,but with growth,it wants to move to centrally managed authentication. Which of the following are the BEST solutions for the organization? (Select TWO)(Select 2answers)A) TACACS+B) CHAPC) LDAPD) RADIUSE) MSCHAPv25. An organization is moving its human resources system to a cloud services provider. The company plans to continue using internal usernames and passwords with the service provider,but the security manager does not want the service provider to have a company of the passwords. Which of the following options meets all of these requirements?A) Two-factor authenticationB) Account and password synchronizationC) Smartcards with PINSD) Federated authentication Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: A,DExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT?A) A. Change the router firewall settingsB) B. Check for and apply a firmware updateC) C. Reconfigure the QoS settingsD) D. Change router user-names and passwords2. A user-s PC breaks and a technician needs to configure a new machine with a copy of their computer image stored on a remote server. Which of the following technologies would help RIS install this image?A) A. BRDB) B. DVDC) C. USBD) D. PXEE) E. CD3. A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless signal connection when the laptop screen is tilted forward or backward during operation. When this happens, the entire wireless signal drops out until the screen is left in position for a good minute or so. Which of the following MOST likely explains what is happening?A) A. The hinges on the laptop screen are not strong enough to support the wireless signal cables.B) B. The wireless card is losing contact to its socket when the screen is opening/closing.C) C. The laptop is designed to work optimally with wireless when the screen is at a perfect 90 degree angle.D) D. The wireless signal cables are being crimped when the screen is opening/closing.4. An administrator is in a Remote Assistance session, sharing a user-s desktop. While trying to map a shared network drive for the user, an -access denied error is encountered while using the user-s credentials. Which of the following should be the administrator-s NEXT step?A) A. Ensure the user-s account is not locked outB) B. Use the fully qualified domain name of the shareC) C. Open the location with administrator privilegesD) D. Try mapping with a different drive letter5. A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements?A) A. GPTB) B. LogicalC) C. MBRD) D. Extended Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: DExplanation: 3. Right Answer: DExplanation: 4. Right Answer: CExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?A) A. debugB) B. lsofC) C. nessusD) D. straceE) E. traceroute2. Which configuration file would be edited to change default options for the OpenSSH server?A) A. /etc/ssh/sshd_configB) B. /etc/ssh/sshC) C. /etc/ssh/serverD) D. /etc/ssh/ssh_configE) E. /etc/ssh/ssh_server3. Which configuration file does sudo read when determining if a user is permitted to run applications with root privileges?A) A. /etc/security.confB) B. /etc/supasswdC) C. /etc/sudoersD) D. /etc/sudo.conf4. Which of the following commands can be used to associate open TCP ports with the processes that opened the ports?A) A. ptraceB) B. straceC) C. debugD) D. nessusE) E. lsof5. Which of the following resources can be directly limited for a given user using ulimit? (Choose THREE correct answers.)(Select 3answers)A) A. Maximum seconds of CPU time spent.B) B. Maximum number of open file descriptors.C) C. Maximum number of processes available.D) D. Maximum number of concurrent login sessions.E) E. Maximum seconds of login duration per session. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: EExplanation: 5. Right Answer: A,B,CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An organization is providing employees on the shop floor with computers that will log their time based on when they sign on and off the network. Which of the following account types should the employees receive?A) Shared accountB) Privileged accountC) User accountD) Service account2. An organization is trying to decide which type of access control is most appropriate for the network. The current access control approach is too complex and requires significant overhead. Management would like to simplify the access control and provide user with the ability to determine what permissions should be applied to files,document,and directories. The access control method that BEST satisfies these objectives is:A) Rule-based access controlB) Role-based access controlC) Mandatory access controlD) Discretionary access control3. An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?A) False negativeB) True negativeC) False positiveD) True positive4. An organization is working with a cloud services provider to transition critical business applications to a hybrid cloud environment. The organization retains sensitive customer data and wants to ensure the provider has sufficient administrative and logical controls in place to protect its data. In which of the following documents would this concern MOST likely be addressed?A) Service level agreementB) Interconnection security agreementC) Non-disclosure agreementD) Business process analysis5. An organization needs to implement a large PKI. Network engineers are concerned that repeated transmission of the OCSP will impact network performance. Which of the following should the security analyst recommend is lieu of an OCSP?A) CSRB) CRLC) CAD) OID Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: DExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review