Which of the following provide the BEST security for a server room?
Badge Reader or Biometric Lock
A user called the help desk to report an issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. What COMMAND-LINE tool should the technician should use to investigate connections on the laptop?
netstat
What happens with the protocol NTP?
Time Drift
AUP
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?
SSO
What Windows feature must be configured on Windows OS desktop in order to encrypts hard-drives on a laptop that you need a TPM chip for
BitLocker
A system administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. What should the administrator do to RESOLVE this issue?
Roll Back Updates
What is used to identify potential issues with a proposed change prior to implementation?
Sandbox testing
A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have?
Worm
A user reports a PC is running slowly. The technician suspects its has a bad fragmented drive. What MMC Snap-In should you use?
msinfo32.exe
A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. What WIRELESS issue is happening to the user
NFC
A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. What should the advisory board update before requesting approval again?
Rollback Plan
A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection request which is causing the company's web server to become unavailable to the general public. What attack is occurring in the company?
Distributed denial of service (DDOS)
What Operating System can allow users have access to the source code, can host various server applications, and can be command line only?
Linux
You and your friend want exchange lecture notes during class. You have an iPhone while your friend has an iPad. What would be the EASIEST way to make the exhange?
AirDrop
What is the MOST important environmental concern inside a data center?
Humidity Levels
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. What authentication should the technician implement?
MFA (Multifactor Authentication)
A technician is partitioning on a hard disk. The five primary partitions should contain 4TB of free space. What partition style should the technician use to partition the device?
GPT
Name 5 MALWARE removal steps?
1.Investigate & Verify
2. Quarantine infeceted Systems
3. Disable System Restore in Windows
4. Remediate infected systems
5. Schedule Scans
6. Enable System Restore and create a restore point
7. Educate the end user
A company installed a new backup and recovery system. What type of backups should be completed FIRST?
Full