Which of the following provide the BEST security for a server room?
Badge Reader or Biometric Lock
A user called the help desk to report an issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. What COMMAND-LINE tool should the technician should use to investigate connections on the laptop?
netstat
"Pinwheel" is an informal term used for describing stop error in which Operating System?
MacOS
AUP
Malicious software collecting information about users without their knowledge/consent is called:
What is Spyware?
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?
SSO
What Windows feature must be configured on Windows OS desktop in order to encrypts hard-drives on a laptop that you need a TPM chip for
BitLocker
A system administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. What should the administrator do to RESOLVE this issue?
Roll Back Updates
What is used to identify potential issues with a proposed change prior to implementation?
Sandbox testing
A collection of software tools used by a hacker to mask intrusion by being invisible to traditional antivirus and antimalware software , and obtain kernel-level access to a computer or computer network is known as:
What is a rootkit?
Which part of AAA refers to the process of granting or denying access to resources?
Authorization
Which of the following answers refers to a script file type designed to be run in Unix command line?
What is .sh (or bash script)?
A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. What WIRELESS issue is happening to the user
NFC
A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. What should the advisory board update before requesting approval again?
Rollback Plan
A type of virus that infects the storage drive area containing the necessary data and code used to start the OS is known as:
What is a Boot Sector Virus?
A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection request which is causing the company's web server to become unavailable to the general public. What attack is occurring in the company?
Distributed denial of service (DDOS)
In macOS, this built-in backup solution creates incremental backups of files and directories to an external hard drive or network share.
What is Time Machine?
You and your friend want exchange lecture notes during class. You have an iPhone while your friend has an iPad. What would be the EASIEST way to make the exhange?
AirDrop
What is the MOST important environmental concern inside a data center?
Humidity Levels
Name the type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access:
What is a Trojan Horse?
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. What authentication should the technician implement?
MFA (Multifactor Authentication)
A technician is partitioning on a hard disk. The five primary partitions should contain 4TB of free space. What partition style should the technician use to partition the device?
GPT
During system boot, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following command-line commands should be used by a technician to troubleshoot this error?
Bootrec /rebuildbcd
A company installed a new backup and recovery system. What type of backups should be completed FIRST?
What is a Full Backup?
Name 7 MALWARE removal steps?
1.Investigate & Verify
2. Quarantine infeceted Systems
3. Disable System Restore in Windows
4. Remediate infected systems
5. Schedule Scans
6. Enable System Restore and create a restore point
7. Educate the end user