BYOD
is a security framework used to facilitate the use of personally-owned devices to access corporate networks and data.
MDM
is a class of
... [Show More] management software designed to apply security policies to the use of mobile devices in the enterprise.
Clear the application cache
A user is having an issue with a specific application on their Android devices. The user works for DionTraining, and every employee has the exact same model of smartphone issued by the company. Whenever the user attempts to launch the application, the app fails and generates an error message. Which of the following should the technician attempt FIRST to solve this issue?
Device manager
allows you to view and edit installed hardware properties. You can change device settings, update drivers, and resolve any known conflicts. If there is no audio being played, it could be an issue with the audio card or its drivers.
PWD
is used to display the current working directory to the screen. The pwd command is the short name for "print working directory" on a Unix, Linux, or Mac operating system
netstat
You are troubleshooting an issue with a Windows desktop and need to display the machine's active TCP connections. Which of the following commands should you use?
is used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols) on a Windows machine. This is a useful command when determining if any malware has been installed on the system and maybe maintaining a remote connection with a command and control server.
DMZ
You have been asked to configure your neighbor's SOHO network. Your neighbor wants to build a Minecraft server so that all their friends can play together over the internet. When configuring their firewall, where should you place the server?
How would you represent rwxr-xr-- in octal notation?
you can convert letter permissions to octal by giving 4 for each R, 2 for each W, and 1 for each X. So, RWX is 7, R-X is 5, and R-- is 4.
754
install the latest security updates and patches to the server
Your supervisor has requested remote access to a particular server to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do before granting remote access to the server to your supervisor?
spotlight
Which of the following MacOS features allows the user to search all of the hard drives, network shares, and files for a keyword or phrase?
These requirements can be met by enabling BitLocker to encrypt the hard drive, enable a UEFI password to require a password to be entered before booting an operating system, and enabling a screen lock that turns on after 2 minutes of inactivity.
Your company failed a recent security audit. The IT Directory has issued a new policy dictating that all workstations must be locked when not in use for more than 2 minutes. A password must be entered before booting up the operating system, and that the hard drive is fully encrypted. You have been asked to configure the corporate workstations to enforce these new security measures. Which THREE of the following should you configure FIRST?
2GB
What is the minimum amount of RAM needed to install Windows 8.1 on a 64-bit system?
sfc system file checker
provides a manual interface for verifying system files and restoring them from the cache if they are corrupt or damaged.
UTM unified threat management
appliance is one that enforces a variety of security-related measures, combining the work of a firewall, malware scanner, and intrusion detection/prevention.
looping
What type of structure is "For Next" in scripting?
rm -rf /
Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system's filesystem?
-r option means
that the command will recursively delete the folder and its subfolders.
The -f option
means that even read-only files will be removed without asking the user. The use of / indicates that the remove command should begin at the root directory (/) and recursively force all files and folders to be deleted under the root. This would delete everything on the system.
The . would
only begin deleting from the current working directory and then delete all files and folders further down the directory structure, not the entire file system.
schedule scans and run updates
A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have finished remediating the infected system. Which of the following steps should you NEXT?
Chain of custody (CoC)
in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. The chain of custody must be maintained from when you arrived at the laptop until you turn it over to law enforcement officials.
steps of the malware removal process
Identify and research malware symptoms. ...
Quarantine the infected systems. ...
Disable System Restore (in Windows). ...
Remediate the infected systems. ...
Schedule scans and run updates. ...
Enable System Restore and create a restore point (in Windows). ...
Educate the end user.
net use
You are trying to open your company's internal shared drive from your Windows 10 laptop but cannot reach it. You open your web browser and can connect to DionTraining.com without any issues. Which of the following commands should you use to determine if the internal shared drive is mapped to your computer properly?
DISM & CHKDSK (physical)
You are working on a Windows 10 workstation that is operating much too slowly. Which TWO of the following commands should you use to speed up the system?
VNC
Which of the following open-source remote access tools allows users to connect to their desktop remotely, see what is on their screen, and control it with their mouse and keyboard?
A branch is
used to control the flow within a computer program or script, usually based on some logic condition. Often, these are implemented with IF THEN ELSE statements.
nfs
Which file system type is used to mount remote storage devices on a Linux system?
53
The server administrators have asked you to open the default port on the firewall for their new DNS server. Which of the following ports should you set as ALLOW in the ACL?
What port is RDP
3389
what port is DHCP
67
format /fs:NTSF
Which command-line tool is used on a Windows system to erase all the data on a hard disk and ensure it is ready to accept new Windows files?
BSOD
Your Windows 10 machine has just crashed. Where should you look to identify the cause of the system crash and how to fix it?
A stop error, commonly called the blue screen of death
firmware updates
Which of the following types of software cannot be updated via the Windows Update program?
The Windows Update program cannot download and install firmware updates because the firmware must be updated before the Windows operating system begins running during the boot process.
RW-R--R
What is the symbolic representation of the octal numeric permission 644?
WPS was created to ease the setup and configuration of new wireless devices by allowing the router to automatically configure them after a short eight-digit PIN was entered. Unfortunately, WPS is vulnerable to a brute-force attack and is easily compromised. Therefore, WPS should be disabled on all wireless networks. If Bob could enter your apartment and press the WPS button, he could have configured his laptop to use your wireless network without your WPA2 password.
Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the WPA2 password?
DOS
An increased amount of web traffic to an e-commerce server is observed by a network administrator but without increasing the number of financial transactions. Which kind of attack might the company be experiencing?
CRT Monitor
Which of the following components presents the largest risk of electrical shock to a technician?
asked open ended questions to properly identify the issue by narrowing down the possible symptoms
Janice called the help desk to report that her computer will not boot up. The technician begins troubleshooting the issue, but after 20 minutes, the computer is still not booting up. Janice is getting frustrated with the technician, and she tells the technician that she feels that they are wasting her time since the issue isn't resolved yet. How should the technician respond to Janice's frustration?
The technician should "accidentally" hang up the call so that Janice gets a different technician when she calls the help desk again
Connections
Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure?
Configure the ability to perform remote wipe
Enable full device encryption
Dion Training is worried about the security of the data on their corporate smartphones if lost or stolen. The Chief Security Officer has instructed that the devices be configured so that unauthorized users cannot access the data. Which TWO of the following settings would provide the BEST security and protection for the corporate smartphones' data?
Disable the installation of application from untrusted sources
Task Manager
is an advanced Windows tool that provides several tabs that allow users to monitor the applications, processes, services, and CPU utilization on a computer.
Signal Strength or power level
Dion Training has an open wireless network so that their students can connect to the network during class without logging in. The Dion Training security team is worried that the customers from the coffee shop next door may be connecting to the wireless network without permission. If Dion Training wants to keep the wireless network open for students but prevents the coffee shop's customers from using it, which of the following should be changed or modified?
Default SSID
TracerT
is a command-line utility used to trace an IP packet's path as it moves from its source to its destination.
diagnostic utility determines the route to a destination by sending Internet Control Message Protocol (ICMP)
Faulty Ambient light sensor
An Android user recently cracked their screen and had it replaced. If they are in a dark room, the phone works fine. If the user enters a room with normal lights on, then the phone's display is dim and hard to read. What is MOST likely the problem?
Notepad
Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?
zero-day vulnerability
refers to a hole in software that is unknown to the vendor. Hackers then exploit this security hole before the vendor becomes aware and hurries to fix it.
firewall is properly configured and the anti-malware solution is up-to-date,
The smartphone is infected with malware that is using a lot of processing power
A smartphone user notices that their phone gets very hot, and their battery is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem?
NTFS
modern day file system for windows
CDFS
a type of file system used to burn data onto CDs
UDF (Universal Disk Format) file system
File system used with DVD
FAT32
older file system pre-NTFS
NSlookup
network administration command-line tool for querying the Domain Name System to obtain domain name or IP address mapping, or other DNS
ping
send a message from one computer to another to check whether it is reachable and active
netstat
A TCP/IP utility that shows the status of each active connection.
traceroute
used for linux and unix- can find hops (paths) between desitnations
Data loss prevention (DLP)
software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in-use, in-motion, and at-rest. This can be configured to detect and alert on future occurrences of this issue.
Which type of antivirus scan provides the best protection for a typical home user?
on access scans
#!/bin/bash
it is a bash script for a Linux, macOS (OS X), or Unix system.
.sh
A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?
Boolean variable
has only two possible values: true or false. It is common to use Booleans with control statements to determine the flow of a program.
Windows 10
Which version of Windows supports Virtual Desktops?
hosts.ini
is a local file that allows a user to specify specific domain names to map to particular addresses.
Shutdown +11
Which of the following Linux command-line options would shutdown a Linux server in 11 minutes from now?
Visual (Vi)
Which of the following commands is used on a Linux system to edit a text file on a server?
COPE
(company-owned/personally enabled) means that the company provides the users with a smartphone primarily for work use, but basic functions such as voice calls, messaging, and personal applications are allowed, with some controls on usage and flexibility.
With CYOD
, the user can choose which device they wish to use from a small selection of devices approved by the company.
"View hidden files"
is located under the folder options utility
Remove any proxy servers configured in their web browser
A user is complaining that when they attempt to access Google's homepage, it appears in a foreign language even though they are located in the United States. The user claims they are not using a VPN to access the internet. You have run a full anti-malware scan on the workstation and detected nothing unusual. Which of the following actions should you attempt NEXT?
The system log
contains information about service load failures, hardware conflicts, driver load failures, and other common issues.
Image instillation
Which of the following types of installations would require the use of an XML text file containing the instructions that the Windows Setup program would need to complete the installation?mag
.py
Which of the following file types are commonly used to create applications that can be run on Linux, macOS, and Windows?
For the Windows 10 (32-bit) operating system,
the minimum requirements are a 1 GHz processor, 1 GB of RAM, and at least 16 GB of hard drive space.
For the Windows 10 (64-bit) operating system,
—either Windows 7 SP1 or Windows 8.1 Update. ...
Processor: 1 gigahertz (GHz) or faster processor or SoC.
RAM: 2 GB for 64-bit.
Hard disk space: 20 GB for 64-bit OS.
Line conditioners
are used to protect an entire power circuit from brownouts and sags
apt-get
used on linux systems to perform instillations of new software packages
chown command
used on Unix-like systems to change the owner of file system files, directories
pwd
print working directory
A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, and the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?
Quarantine the machine and report it as infected to your companies cybersecurity department for investigation
ipconfig/release| ipconfig / renew
A network technician determines that two dynamically-assigned workstations have duplicate IP addresses. What command should the technician use to correct this issue?
require authentication on wake-up
You have been asked to install a computer in a public workspace. Only an authorized user should use the computer. Which of the following security requirements should you implement to prevent unauthorized users from accessing the network with this computer?
dd
Which of the following commands is used on a Linux system to convert and copy files from one hard disk to another? [Show Less]