What's Next
Security
Windows
Wifi/ Mobile Devices
Commands
100

A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.

Which of the following should the technician attempt NEXT?
A. Reboot into safe mode and roll back the updates
B. Repair the Windows Registry
C. Configure boot options in the BIOS
D. Disable Windows services and applications

What is Reboot into Safe Mode and roll back the updates

100

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)

A. Disable guest account
B. Remove admin permissions
C. Modify AutoRun settings
D. Change default credentials
E. Run OS security updates
F. Install a software firewall

Show

What is disable guest account and modify autorun settings?

100

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

A. Internet Options -> Advanced
B. Internet Options -> Connections
C. Internet Options -> Security
D. Internet Options -> Content
E. Internet Options -> Privacy


Where is Internet Options -- Connections?

100

A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

A. Uninstall the camera application
B. Check the application permissions
C. Reset the phone to factory settings
D. Update all of the applications on the phone
E. Run any pending OS updates

What is check the application permissions?

100

A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.)

A. dir
B. chdsk
C. dism
D. ipconfig
E. format
F. diskpart

What is chdsk and dism?

200

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?

A. Use an antivirus product capable of performing heuristic analysis
B. Use a host-based intrusion detection system on each computer
C. Disallow the password caching of accounts in the administrators group
D. Install a UTM in between PC endpoints to monitor for suspicious traffic
E. Log all failed login attempts to the PCs and report them to a central server


What is Use an antivirus product capable of performing heurisitic analysis?

200

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)

A. Change the default access port
B. Enforce password complexity
C. Put the terminal server into the router’s DMZ
D. Disable logon time restrictions
E. Block all unused ports on the LAN smart switch
F. Use the local client certificate for server authentication

What is put the terminal server into the router's DMZ and Block all unused ports on the LAN smart switch?

200

A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance on this computer?

A. Windows 7
B. Windows 8
C. Windows 8.1
D. Windows 10

What is Windows 7?

200

Emily, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Emily is experiencing?

A. There is unauthenticated wireless connectivity
B. She has exceeded the data allowance
C. The phone is only 3G capable
D. It is an unrooted phone
E. The SIM card was not activated
F. A data plan was not purchased


What is there is unauthenticated wireless connectivity?

200

A junior Linux system administrator needs to update system software. What shell command would allow the administrator to gain the necessary permissions to update the software?

What is sudo?

300

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.

Which of the following BEST enforces this policy?
A. Delete the user accounts
B. Disable the user accounts
C. Restrict the user accounts
D. Reset the user accounts

What is disable the user accounts?

300

When someone is assigned only the rights and privileges necessary to do her job, this is referred to as ____.

What is principle of least privilege?

300

What installation types would require the use of an answer file to install the OS?

What is Unattended?

300

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

A. Default SSID
B. MAC filtering
C. NAT
D. QoS
E. Signal strength
F. Encryption

What is Mac Filther and Signal Strength?

300

A user is in both the Sales group and the Marketing group. The Sales group has full permission at the share level, and the Marketing group has read-only permissions. The files on NTFS are secured with the Modify permission for the Sales group and the Read & Execute permission for the Marketing group. Which permissions should the user have?

What is Modify? 

400

An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

A. Remove applications from startup
B. Defragment the hard drive
C. Install additional RAM
D. Install a faster hard drive
E. End the processes in Task Manager
F. Run the Disk Cleanup utility

What is remove applications from startup and defragment the hard drive? 

400

You’ve discovered that credentials to a specific application have been stolen. The application is only accessed from one computer on the network. Which type of attack is this most likely to be?

What is Man in the middle attack? 

400

A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. What would would MOST likely fix the issue?

What is roll back updates?

400

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

A. Reduce the transmit power
B. Reduce the channel availably
C. Disable the DHCP server
D. Enable QoS management
E. Disable the SSID broadcast
F. Implement WPA encryption

What is reduce the transmit power and disable the SSID broadcast?

400

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. What  following command-line tools should the technician use to apply the new policy?


What is grupdate?

500

The company you work for wants to establish a VPN. Which technologies can be used to establish a VPN across the Internet?

What is point to point tunneling protocol?

PPTP

500

You are a system administrator for a high school and responsible for five student computer labs. You need to prevent students from accessing the system BIOS on the machines. What steps should you take to protect these settings?

What is assign a password to the system BIOS?

500

What feature has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?


What is driver detection?
500

A new app developed for the Android platform has which extension?

What is .apk? 

500

What Linux commands would you used to change the mode of a file system object and view the current processes? 

What is chmod and ps?

M
e
n
u