VNC (Virtual Network Computing) Show
Which of these applications is compatible with Mac OS Screen Sharing? -Microsoft Remote Desktop Buffer overflow An IPS (Intrusion Prevention System) is designed to stop known vulnerabilities traversing the network. The vulnerabilities may be operating system exploits, buffer overflows, cross-site scripting attacks, SQL injections, and more. Virus, URLs, and applications are not commonly blocked with an IPS. Which of the following would you commonly block with an IPS? -A URL category of "sports news" Schedule data backup -Because tar is easily scripted at the command line, it's commonly used when scheduling ongoing backups. Which of the following would be the most likely use of the Linux tar utility? -Copy files from one directory to another Command-Option-Escape Which of the following shortcut keys can be used to launch the Force Quit dialog in Mac OS? -Control-Alt-Delete IMAP Which of these protocols would be exclusively used to retrieve mail on an Android device? -HTTP file system consistency check fsck stands for? fsck Which of the following would be the best choice to check for file system problems in Linux? -chkdsk dd -The dd command in Linux is commonly used for creating disk images of files and partitions. Which of the following commands would be the best choice for backing up an entire Linux partition? -backupd IaaS Which of these architectures would be most closely associated with a web hosting provider? -SaaS .dmg -An Apple Disk Image file is labeled with a .dmg file extension, and will mount in the operating system as a normal file system. Which of these best describes the extension of an Apple Disk Image file? .img killall -The Linux killall command allows you to terminate a process by name instead of using the process ID (PID). Which of the following would be the best way to terminate a Linux process by name -kill PaaS -Platform as a Service (PaaS) is commonly used to modularly build applications without needing to build the entire application yourself. PaaS allows providers to offer a framework that allows the customers to build and customize their own applications and services. You'd like to build your own applications without the time and expense of writing everything from scratch. Which of the following would be a good choice for this requirement? -IaaS Timecard system -An embedded system does not commonly allow access to the operating system of the devices. Systems such as alarm systems, door security, and timecard systems are common examples of embedded systems. Which of these would best describe an embedded system? -Timecard system Testing an iOS application on a Mac OS desktop An emulator is a device that is running a process that was designed for a completely different architecture. For example, it's common for mobile device developers to run Android and iOS emulators on their computer desktops to test their applications without using the physical mobile device. Which of the following would best describe emulation? A. Running a Windows virtual machine on your Linux desktop System Information The System Information utility in Mac OS can provide you with detailed information about your hardware, network, and software. Which of the following would be the best way to view device driver information in Mac OS? A. Mission Control Define search categories in System Preferences / Spotlight The Mac OS Spotlight search provides integrated search for almost anything in the operating system, and online. You can modify the results by enabling or disabling search categories in the System Preferences. Which of these would be the best way to modify the Mac OS search results? A. Define search categories in System Preferences / Spotlight Finder The Mac OS Finder utility is the integrated file management system in Mac OS. Which of the following is the best utility to use when moving files from one volume to another in Mac OS? A. Filer SaaS Software as a Service (SaaS) is a common way to take advantage of applications without the requirement of hardware costs or on-site software installations. Which of these would best describe a provider that offers on-demand applications with no requirement of local installation or hardware costs? A. IaaS Lightning iOS devices can synchronize to a local computer using wireless networking over 802.11 networks and physical cabling over the proprietary Lightning interface. Which of these interface types would you use when synchronizing data on an iOS device? Pick two. A. Lightning Some CPUs include virtualization capabilities in hardware Intel CPUs with VT (Virtualization Technology) and AMD CPUs with AMD-V are designed with specialized virtualization features in the CPU. Some virtualization software requires these features to work, while some other virtualization software packages will operate less efficiently without these features. Which of these is true of virtual machines? A. The hypervisor's memory requirements are similar to a standard workstation mv The mv (move) command is used to "move" or rename a file from one name to another. How would you change the name of a file in Linux? A. ren Use a DVD-ROM drive on a remote device The Remote Disc feature allows you to use an optical drive that's located on a remote device. Which of these would be a reason for using Remote Disc on Mac OS? A. Connect to Windows shares SSID name The iwconfig command displays and modifies wireless network configurations, including SSID information, wireless frequencies, and more. Which of the following would be commonly seen in the output of the iwconfig command? A. Default route Network Access Control 802.1X defines Network Access Control, which is a way to securely provide access to a network. Which of these is most associated with the 802.1X standard? A. Ethernet topology The application will only have access to specific data sources Each application is designed to operate in its own little "world" where it has limited access to anything else on the mobile device. If required, the user can allow the application to access external data sources. For example, a contact list application may request permission to view the contact list on the mobile device, and the user must interactively provide this access. What does it mean when a mobile device application runs in a "sandbox?" A. The application has full access to the mobile device storage and memory Run the editor as Administrator During normal use, all user processes run normally without any special permissions. To perform a procedure that required elevated rights and permissions, you need to select the option to run the application as Administrator What process should you follow in Windows 8.1 to edit system configuration files? A. Run the editor as Administrator Anti-virus application An anti-virus and anti-malware application is designed to stop malicious code from executing on your computer. Which of the following would be the best way to stop malicious code when it tries to execute in main memory? A. Host-based firewall The recovery process should not be trivial The password recovery process is the only thing between your network resources and an illegitimate user. The process for resetting the password and recovering the account should be a formal process with many checks and balances. Which of the following would be true of a password recovery process? A. The process should be automated and seamless
A high-level format can be performed by the operating system A high-level format is almost always done by the operating system, and it's designed to initialize the drive or partition for use by the OS. Which of these is true about high-level formatting? A. A drive cannot be used again after a high-level format NTFS The NTFS file system allows for many capabilities, and EFS (Encrypted File System) is one of those enhancements. If you're using a supported version of Windows, you can encrypt your files to prevent anyone else from seeing the contents. The encryption and decryption process is done seamlessly in the operating system. Which of the following file systems can support EFS? A. FAT Local email relay It's common to catch unsolicited email at centralized points, such as the local mail gateway or at a cloud-based spam filtering email gateway. Most firewalls will not provide any significant spam filtering. Which of the following would be common filtering points for spam? A. Local email
relay Sandbox On a mobile device, all applications run in a "sandbox," which limits the access of the application to the other portions of your mobile device. If an application needs access to resources such as your contact list, it must explicitly ask you for that permission. What security feature keeps mobile apps from accessing your private information? A. Sandbox Disable interactive logins on the account It's important to disable any unused accounts, but some accounts must remain active for certain system processes to work properly. In these cases, the best practice is to keep the account active but disable any interactive logins for the account. Which of the following would be the best way to allow a system account to operate properly, but prevent any logins across the network? A. Change the ownership of the user documents Credentials are only required during the initial login process SSO (Single Sign-On) is a process where you provide login credentials one time and access to other allowed resources are provided without any additional authentication. Which of these would be a characteristic of the Windows SSO process? A. Access times to stored data is increased Disabled completely In Windows 7, the AutoRun feature was completely disabled for any device that mounts as a USB drive. How does the Windows AutoRun feature work with USB drives in Windows 7? A. Enabled by default Authenticator app Instead of physical authenticators that would hang from your keychain, many authentication systems now use authenticator apps that can be installed on your mobile device. Which of these of mobile device apps is commonly used when connecting to a VPN? A. Authenticator app Store a password To protect the original password, the plaintext of the password is usually hashed. This hashed data is stored as the password and the hashing is recreated and compared with each authentication attempt. Since the hash cannot be reversed, the original password text remains private. Which of these events would commonly involve a hash? A. Copy data to a USB memory stick Virus A computer virus doesn't have the ability to replicate on its own, so it relies on humans to click a button or run an application to execute and spread. What is the security threat that best describes malicious software that uses humans as the method of distribution? A. Social engineering Read only When examining different NTFS and share rights, the most restrictive right always wins when a conflict occurs. You have applied some read-only NTFS permissions to an important folder containing spreadsheets, and you've applied it to all users. However, a member of the accounting department connects across the network and has share permissions that allow writing to the folder. What type of access to the spreadsheet would the accounting department user ultimately have? A. Read only Firewall Some firewalls can filter traffic by port number, application, and proxy network traffic flows. Which of these would be most likely to proxy network traffic? A. Anti-virus software Unencrypted credit card numbers Most DLP (Data Loss Prevention) solutions can identify sensitive data traversing the network. These DLP systems can send an alarm or block network traffic if this traffic is identified. Which of these would commonly be identified by DLP? A. Known operating system vulnerabilities sensitive data Most DLP (Data Loss Prevention) solutions can identify _______ traversing the network. WPA2 WPA2 is the most secure encryption type to use on wireless networks. Which of these would be the best encryption type to use on a wireless network? A. 802.1X All traffic is allowed, but certain traffic types are administratively blocked A network blacklist is a security technique that allows all traffic except the items listed on a blacklist. How does a blacklist of outbound traffic work in a SOHO network? A. All traffic is blocked by default, and only
specified traffic types are allowed It's easy to brute force the WPS PIN The WPS (Wi-Fi Protected Setup) feature on many wireless routers was designed to provide an easy way for other devices to connect to a secure network. Unfortunately, it's very easy to brute force the WPS PIN to gain unauthorized access to a WPS-enabled network. Which of the following would be the best reason not to use WPS on your wireless router? A. The WPS process contains a cryptographic vulnerability The original permissions are retained If a file is copied from one location to another, the newly created file will inherit the permissions from the parent object. If a file is moved, however, the only thing that changes is the pointer to the file location; the moved file is essentially the same file, so none of the permissions are modified. The moved file will have the exact same permissions it had before the move. You've moved a file from one folder on an NTFS volume to another folder on the same NTFS volume. What has happened to the permissions of the file after the move? A. The permissions are inherited from the new parent object Smart card A smart card often contains a digital certificate to create a unique card that cannot be duplicated elsewhere. It's common to use smart cards as authentication factors to use with passwords, PINs, fingerprints, and more. Which of the following commonly contain a digital certificate? A. DVD-ROM The device erases itself after 10 failed attempt If you have configured an iOS device with the "Erase Data" passcode lock option, all data will be deleted after 10 failed passcode attempts. What happens if the failed passcode lock attempt security option is activated in Apple iOS? A. The device erases itself after 10 failed attempt ACLs An access control list (ACL) is a way to associate permissions with an object. This is the method used to configure permissions in operating systems, network devices, file systems, and more. Which of the following best describes the list of permissions associated with operating system objects? A. Network shares
ACLs The method used to configure permissions in operating systems, network devices, file systems, and more. (no description version answer) Microsoft Exchange Microsoft supports full device encryption when the Windows Phone is used with Microsoft Exchange. Which of the following is required to enable full device encryption in the Windows Phone OS? A. NTFS The most permissive setting wins When calculating permissions, the most restrictive setting always wins. Which of the following is NOT true when determining NTFS vs. Share permissions? A. The most
permissive setting wins As soon as they are available Operating system patches often include security updates, so it's important to test and deploy any updates as soon as possible. How often should operating system patches be deployed? A. Once a month Something you have One authentication factor might be to verify something that might be physically associated with a person. Our phone is a very common personal physical item that can be used as an authentication method, and one way to do this is by sending a verification code to a phone using a text message (SMS). Which of these would best describe a code sent to your phone using SMS? A. Something you know Recovery Console Command Prompt The Windows Recovery Console and Command Prompt can provide you with many configuration and operating system options, including the modification or removal of files, enabling and disabling of devices, and the configuration of startup programs and services. Which of these would be the best choice for disabling a Windows service before the operating system starts? A. System Restore Windows Preinstallation Environment (Windows PE) A minimal Windows environment that's commonly used for troubleshooting and recovering from startup problems. (short answer) Error message on the screen A kernel panic is a non-recoverable fatal error, and it requires a reboot of the system to restore the system to operation. The panic could be caused by a hardware error, an operating system bug, or a similar issue. The error message displayed on the screen or in the error logs can provide you with more information about the error and give you some information on where to start troubleshooting. Where would you look to get information about a Linux kernel panic? A. Error message on the screen Run real-time anti-virus software Local anti-virus and anti-malware software is designed to identify and stop malicious software from executing on a computer. Make sure you keep your anti-virus and anti-malware signatures updated! Which of these would be the best way to prevent malicious software from executing in the local memory of a computer? A. Use a personal firewall -Check the Windows Event Log Once the computer login prompt appears, you know that the issue isn't related to the boot partition or the partition you're booting from. If a more detailed message isn't in the Event Log, you can try a different user to see if the issue is related to all users or just a single login name. When you login to your Windows 7 system, you receive an error message that does not display any application name. The error message is a series of numbers and doesn't appear to offer any additional references. Which of these methods would best assist you with troubleshooting this error? Pick two. A. Check the Windows Event Log Update the Control Panel / Default Programs The Control Panel applet for Default Programs will allow you to make file association changes in your Windows 7 operating system, and it's much easier than making changes to the registry. Some malware has removed a file association on your Windows 7 computer. Now that the malware has been removed, which of these would be the best way to restore this file association? A. Change the compatibility mode for the application *READ *READ System Configuration The System Configuration utility, or msconfig, includes a checkbox in the Boot tab that allows you to enable and disable a boot log. If you're having problems during startup, you can reference the boot log at C:\Windows\ntbtlog.txt to see the results of your last boot process. Which of these utilities can be used to easily enable a Windows boot log? A. BOOTLOG -Check access to all online backups If a breach has occurred, it's important to find out where the data leak might be. You'll want to check all of your installed apps, run an anti-malware scan, check access to all of your online backups, and ultimately perform a factory reset to guarantee that no malicious software is on your device. You're concerned that some of your private company information from your mobile phone may have been leaked to others outside of your organization. Which of the following would be a best practice if you suspect a breach? Pick two. A. Check access to all online backups System Configuration The Windows System Configuration utility, or MSCONFIG, identifies all of the services and applications that are run during the startup process, and the utility provides an easy checkbox method to enable or disable any of the apps. It may take some time to narrow down the troublemaker, but it's very easy to use. Your Windows 7 startup process is performing very slowly, but it's difficult to tell which application is causing the issue. Which of these utilities would be the most help to identify the problematic application? A. Event Viewer Update the system BIOS There are many reasons for Windows to have performance issues, but there's not much that a BIOS update can do to fix that issue. Which of the following would not commonly be a best practice for troubleshooting slow Windows system performance? A. Check Task Manager for application utilization statistics Reliability Monitor The Windows Reliability Monitor can provide information about application failures, Windows problems, warnings, informational messages, and more. What Windows utility would be the best choice to provide you with a long-term analysis of application stability and problem history? A. Event log An application is waiting to access a system resource The Apple spinning wait cursor is a colorful spinning ball that is similar to the Windows hourglass cursor. When the wait cursor appears, an application is waiting to access memory, storage, or some other resource. Which of these would be the most likely reason to see an Apple "pinwheel?" A. An application is shutting down REGSVR32 The REGSVR32 (Microsoft Register Server) utility is used to register DLLs, unregister DLLs, and update the Windows Registry. Which of these would be the best way to register a DLL? A. REGEDIT Recover from malware that corrupted the boot sector A Windows PE (Preinstallation Environment) is a minimal version of Windows that can be run completely from a DVD-ROM, USB drive, or any other storage device. It's common to use Windows PE when recovering a computer that's having a problem when starting Windows. Which of these would be the most common use of a Windows PE? A. Reset the application associations for a .DOC file The installation process doesn't have the proper access to install the driver Many driver installation files require Administrator access to install properly, especially if it's an executable application that also installs additional "helper" files in Windows directories and requires additional services to be installed. You're trying to install a new device driver using an executable file from the manufacturer, but the installation process fails in the middle of the installation. Which of these is most likely the issue? A. The driver package isn't signed by Microsoft Delete everything on the drive perform a clean install Although many removal tools can do a good job of removing many malware types, the only way to be absolutely sure the malware is removed is to delete the entire drive and reload it from scratch or an external backup. You've discovered that one of your computers at work has been infected with malware. Which of these options would provide the most effective removal of the spyware? A. Use a third-party
malware remover Additional restore points containing malware would not be created When you make a significant change, System Protection creates a restore point. Although this would normally be a good thing, you don't want to save any restore points that might save the malware. You should also delete all previous restore points as well. Why would you disable System Protection prior to attempting a malware removal? A. The anti-malware scan runs faster with System Protection disabled None of the above The only way to guarantee the removal of malware is to remove all data on the drive and reload the operating system, applications, and data. Which of these methods is guaranteed to remove malware from an infected computer? A. Scan and remove with anti-virus software Run Startup Repair Although Windows Vista and later operating systems use winload.exe and the Windows Boot Manager instead of NTLDR as the boot loader, some updates can improperly replace the boot loader files with incorrect versions. Running Startup Repair from your Windows installation media can usually resolve this issue. When you start your Windows Vista computer, your Windows desktop does not appear. Instead, you get a blank screen with this message at the top; "NTLDR is missing." Which of the following would be the best way to troubleshoot this issue? A. Update the video driver System Repair Disk The Windows System Repair Disk boots the computer and provides the standard list of system recovery options. From the System Repair Disk, you can run Startup Repair, System Restore, System Image Recovery, Windows Memory Diagnostic, or launch the Command Prompt. Which of these would be the best choice to provide system recovery options in Windows 7 without booting the operating system? A. BIOS diagnostics Application configurations The Windows Registry contains detailed system information, driver details, operating system and application configurations, and more. Which of the following would you expect to find in the Windows Registry? A. Login credentials Check for known bad apps App scanners are large databases that contain a list of mobile apps and information about their security status. You can check the app scanner before installing a new app to make sure it's legitimate. In which of the following would you be most likely to use an app scanner? A. Check for known bad apps Botnet Which of these would be the most likely cause of a hijacked email device? A. Botnet Windows Resource Protection Windows Resource Protection is the integrated Windows technology that protects registry entries, system folders, and essential system files. Which Windows feature prevents the system from overwriting an important DLL? A. System Protection During the next login The settings for the Last Known Good Configuration are updated after login. If you've made a significant change to the Windows operating system, you might want to wait at the login prompt until all of the services and drivers have completely loaded. At what point is the "Last Known Good Configuration" updated to the current configuration? A. Five minutes after boot A set of files can be restored from a previous version A Linux LVM (Logical Volume Manager) snapshot is similar to the feature of Windows System Restore, where files or folders can be reverted to a previous version or point in time. Which of the following would best describe the use of an LVM snapshot? A. The memory contents of a computer can be modified between reboots The certificate may be close to the expiration date Although it's important to keep your certificates up to date, your browser won't show any problems with the certificate until you're past the expiration date. Which of the following would not indicate a problem with a website's certificate? A. The certificate may be close to the expiration date Run a refresh procedure Windows 8.1 includes a new refresh feature that will return Windows to the configuration it had when it was first installed. This process will effectively remove all of your applications, but your user documents will remain intact. Which of the following would be the best way to create a clean configuration of Windows 8.1 without losing any of your personal files? A. Backup your documents and perform a clean install All device content is deleted Most mobile devices are configured to automatically erase everything if too many unlock attempts fail. It usually takes at least 10 attempts before erasing the data, so it would be difficult to accidentally cause this to occur. It's always important to have a backup of your data! Which of the following would be a common response on a mobile device to an excessive number of consecutive failed unlock attempts? A. The device reboots Chain of custody The chain of custody provides a paper trail of a piece of physical or digital evidence from the point of seizure through the final disposition of the evidence. Which of these best describes the control and integrity of evidence as it moves from person to person? A. Digital signatures Ask an associate in the department for some assistance The materials on the user's desk may seem sensitive, so someone else in the department should be able to move the documents or confirm that the information is not sensitive. This would make sure that someone else in the area was aware of the documents, and they'll also know that the documents were not seen during the repair. Since the repair was urgent, this would allow you to complete the job while maintaining the security of the information. You've been asked to work on an urgent computer repair while the user is at lunch. When you arrive, you notice paperwork on the desk that may contain private information about your customers. Which of these would be the best next step? A. Complete the repair as quickly as possible Larger joule ratings The absorption ratings of a surge suppressor are measured in joules. The larger joule rating can absorb a larger spike of power. What type of surge absorption ratings should you look for on a suppressor? A. Smaller joule ratings Maintain a humidity level over 60% High humidity helps to control electrostatic discharge, although keeping a room this humid and simultaneously at a comfortable temperature may be a challenge. Which of these would be the best method of minimizing electrostatic discharge? A. Keep all work surfaces clean
Foam You should avoid using water or foam when battling an electrical fire. Which of these should not be used with an electrical fire? A. FM-200 Enterprise license It's common for a company to purchase software with an enterprise license that must be renewed annually. At home, we commonly license software perpetually, where a one-time cost is the only purchase requirement. Which of these software licenses is most often associated with annual renewals? A. Personal license A damp cloth As the name implies, an LCD contains liquid crystals and is very sensitive to harsh chemicals. For the best (and safest) cleaning, use a cloth that's dampened with water. Chemicals on an LCD screen are quite harsh. For best results, keep your alcohol and other cleaning agents away from the LCD screen. Although an air blower would remove large pieces of dust from an LCD screen, it won't work well enough to completely clean the display. A vacuum cleaner is worse than an air blower since a vacuum cleaner can't avoid some direct contact with the display. An LCD screen is very fragile, so you want to avoid using any cleaning devices that might damage the display. Which of these would be the best cleaner to use on LCD displays? A. Isopropyl alcohol Use a small screwdriver to dislodge dust from smaller components A motherboard contains many small components, and many of the components are only mounted onto the surface of the board. A slight bit of pressure can easily dislodge the components, and physically touching the components could potentially discharge static electricity and permanently damage the silicon. Which of these options should not be used to clean a motherboard? A. Remove large dust collections with a vacuum Divert electrical faults away from people An electrical ground is a path for electricity to take in the case of a stray voltages. The electrical ground is the best path to the Earth, so any inadvertent power would take the path through the electrical ground instead of our bodies. Which of these would best describe the primary purpose of an electrical ground? A. Increase the total power available to a computer 330 volts The let-through voltage specifies the point that a surge suppressor will begin diverting a spike of power away from your equipment. The lower let-through voltage is always better. Which of these surge suppressor let-through ratings is the best? A. 400 volts Which of the following is a product that supports creating and running virtual machines in Windows Server 2008?Which of the following is a product that supports creating and running virtual machines in Windows Server 2008? A business continuity plan (BCP) is a plan that ensures the infrastructure is operational and ready to support primary business functions.
Which of the following terms is used to describe providing credentials that claim a specific identity such as a user name?For purposes of user identity, users are typically identified with a user ID, and authentication occurs when the user provides credentials such as a password that matches their user ID. The practice of requiring a user ID and password is known as single-factor authentication (SFA).
Which of the following is a subset of SQL used to query Windows machines for management and operations data?WMI Query Language (WQL) is subset of SQL used to query Windows machines for management and operations data.
|