Filters
Question type

Study Flashcards

If your Internet home page has changed and a strange-looking search engine appears when you try to search the Internet, what type of attack are you experiencing?


A) A network worm
B) A new web browser was installed.
C) A new browser add-on was installed.
D) A redirect virus.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

D

A customer called Derek to complain that her computer was running slow, so he went to the client work area and started troubleshooting the problem. Derek ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger.   A customer called Derek to complain that her computer was running slow, so he went to the client work area and started troubleshooting the problem. Derek ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger.     Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek restarted the computer and noticed a long load time for Windows. Derek checked Task Manager and saw several processes that he did not recognize.   What should Derek perform next on the client's computer? A)  Run memory diagnostics. B)  Download a CPU diagnostic program. C)  Run a virus scan. D)  Refresh Windows. Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek restarted the computer and noticed a long load time for Windows. Derek checked Task Manager and saw several processes that he did not recognize.   What should Derek perform next on the client's computer?


A) Run memory diagnostics.
B) Download a CPU diagnostic program.
C) Run a virus scan.
D) Refresh Windows.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Recently, Frank's computer has slowed down dramatically. He has also noticed that the time on the computer is not accurate. Frank has run several antivirus scans, but has not found an issue. Today while surfing the web, he was redirected several times to a website that he did not request. Then a BSOD error occurred on his computer, and when he turned on his computer, the antivirus software was disabled.   What kind of malware could be causing the issues on Frank's computer?


A) Zombie
B) Rootkit
C) Spyware
D) Ransomware

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Jerry has received an email on his company's email system. The email is in regard to a new update the company plans to implement. The administrators are requesting that everyone send their username and password so that the administrators can compile a list and avoid having everyone change their passwords. ​ What type of attack is this?


A) Spear phishing
B) Impersonation
C) Shoulder surfing
D) Tailgating

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Your company has decided that security is very important and wants to add a second security check that will identify its employees while they are logging in to their computers.   What type of security do you recommend?


A) Key fobs
B) Smart cards
C) Biometric locks
D) Hardware tokens

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Oscar has a client who has been receiving unsolicited emails from several companies. Oscar recommended that the client unsubscribe from the email lists, but that just increased the number of unsolicited emails she received. ​ What can Oscar do to stop the unsolicited emails on the email server?


A) Enable a firewall.
B) Enable a spam filter.
C) Enable port forwarding.
D) Enable MAC filtering.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Jeff owns a health care company that sells medical supplies. The company bills health insurance companies for their customers. They are required by the insurance companies to complete paperwork that includes personal and health information. What type of regulated data does Jeff's company need to secure?


A) PII
B) PHI
C) PCI
D) GDPR

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Your company's email server has been filling up employee's email boxes with advertisements for things they did not request. You have been asked to research how to stop these types of messages from getting to your coworker's email client software.   What will you recommend to your supervisor?


A) Enable the firewall.
B) Enable the spam filter.
C) Enable port forwarding.
D) Enable MAC filtering.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Jordan is talking with a client on the phone. Jordan's company recently completed updates on the client's system and something is not working properly. The client asks Jordan why the company is always doing updates. Jordan explain that updates help to secure computer systems.   What specific vulnerability do updates help prevent?


A) Zero-day
B) DDoS
C) Brute force
D) Man-in-the-middle

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Lana has just taken a job as an IT professional in Europe and would like to get a head start on what to expect.    What regulated data would you recommend that she research?


A) PII
B) PHI
C) PCI
D) GDPR

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the software they purchase and giving it to others who have not purchased the software.   What can Sharon's company do to make sure a customer who purchases the program does not give it to someone else?


A) Acquire a copyright.
B) Obtain an EULA.
C) Use DRM.
D) Issue a license.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Christian has malware that is preventing him from installing anti-malware on his laptop.   What can Christian try if he does not have another computer available to run the anti-malware program?


A) Try to install in Safe Mode.
B) Try to install in Windows RE.
C) Try to install in Windows PowerShell.
D) Create a virtual machine and install the anti-malware program.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

An operating system is responsible for validating certificates used to secure communication. For Windows, Microsoft maintains a database of trusted root certificates issued by Certificate Authorities (CAs) . A root certificate is the original certificate issued by the CA. When a Windows system opens a secure email or visits a secure website and encounters a new digital certificate, it requests Microsoft's trusted root certificate, which is downloaded to the computer. The download happens seamlessly without the user's knowledge unless there's a problem. If Windows cannot obtain the root certificate to validate the email or website, an error is displayed.   Where do you go in the Windows operating system to view and delete root certificates?


A) Action Center
B) Certificate Manager
C) Windows Security
D) Windows Defender

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Lin received 200 new laptops to be issued to company employees. Lin was asked to set them up and distribute them to everyone on a list provided by his supervisor. Lin has completed installing all the software on each computer and is ready to distribute them, but he needs to keep track of who received each laptop. ​ How can Lin keep track of all the laptops?


A) Network topology diagram
B) Knowledge database
C) Inventory management documentation
D) Acceptable use documentation

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

C

The computer that you are working on is not able to complete a Windows update. The update process begins to download the file, but then you receive an error message saying that the Windows update was unable to download. You have checked your Internet connection, and it is working. You have tried the update on your other computer, and it worked.   What should you do first to fix the problem with the Windows update?


A) Reinstall Windows.
B) Reinstall the network drivers.
C) Reinstall the security certificate.
D) Remove malware.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

If you receive this error when trying to go to a website, where can you go in Windows to verify the certificate settings for the website? If you receive this error when trying to go to a website, where can you go in Windows to verify the certificate settings for the website?   A)  Action Center B)  Event Viewer C)  Certificate Manager D)  Windows Defender


A) Action Center
B) Event Viewer
C) Certificate Manager
D) Windows Defender

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Your company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. ​ What will you recommend as an upgrade to RADIUS?


A) RADIUS+
B) TACACS+
C) AES
D) WPA2

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Holly has been tasked to design the plan the IT department will use when making a change to systems. The plan will be used anytime the company needs to change a system and should include which people are to be contacted when changes are made and what the changes will do to other equipment.   While Holly writes the change document, what types of things will she need to include in the scope of change? (Select all that apply.)


A) Key components of the change and how they will be addressed
B) Risk or problems that might arise during the change
C) Skill sets, tasks, and activities required to carry out the change
D) A plan in case something happens and the change cannot be executed
E) Who will participate in the change
F) How the success of the change will be measured

G) A) and B)
H) A) and E)

Correct Answer

verifed

verified

Joe works for a company that has a traveling sales force. The company has asked Joe to research a way for the sales force to have real-time information on the availability of its salable products. The company has an intranet application that allows it to see up-to-the minute information. The company does not want to make this information public. ​ What should Joe recommend?


A) VPN
B) Firewall
C) Access control list
D) MDM policies

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

One of Kyle's clients called to complain that his computer was running really slow. Kyle went to the client's work area and started troubleshooting the problem. Kyle ran the Disk Defragmenter and Disk Clean-up utilities. He checked the processes running in Task Manger and noticed that the SVC host was running several processes. While Kyle was looking at Task Manager, the computer crashed. Kyle restarted the computer and noticed a long load time for Windows. He checked Task Manager and saw several processes that he did not recognize. ​ What might be the issue with Kyle's client's computer?


A) The computer might need more RAM.
B) The computer might need a processor update.
C) The computer might have a virus.
D) The computer might need to have Windows refreshed.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

C

Showing 1 - 20 of 71

Related Exams

Show Answer