Cyber Sentinels
OS Overlords
System Saviors
Procedure Pros
Bug Busters
100

Which of the following provide the BEST security for a server room?

Badge Reader or Biometric Lock

100

A user called the help desk to report an issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. What COMMAND-LINE tool should the technician should use to investigate connections on the laptop?

netstat

100

"Pinwheel" is an informal term used for describing stop error in which Operating System?  

MacOS

100
A technician found that the employee is miming cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. What policy should be updated to reflect this new requirement? 

AUP

100

Malicious software collecting information about users without their knowledge/consent is called:

What is Spyware?


200

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

SSO

200

What Windows feature must be configured on Windows OS desktop in order to encrypts hard-drives on a laptop that you need a TPM chip for

BitLocker

200

A system administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. What should the administrator do to RESOLVE this issue?

Roll Back Updates 

200

What is used to identify potential issues with a proposed change prior to implementation?

Sandbox testing

200

A collection of software tools used by a hacker to mask intrusion by being invisible to traditional antivirus and antimalware software , and obtain kernel-level access to a computer or computer network is known as:

What is a rootkit?

300

Which part of AAA refers to the process of granting or denying access to resources?

Authorization

300

Which of the following answers refers to a script file type designed to be run in Unix command line?

What is .sh (or bash script)?

300

A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. What WIRELESS issue is happening to the user

NFC

300

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. What should the advisory board update before requesting approval again?

Rollback Plan

300

A type of virus that infects the storage drive area containing the necessary data and code used to start the OS is known as:

What is a Boot Sector Virus?


400

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection request which is causing the company's web server to become unavailable to the general public. What attack is occurring in the company?

Distributed denial of service (DDOS)

400

In macOS, this built-in backup solution creates incremental backups of files and directories to an external hard drive or network share.

What is Time Machine?

400

You and your friend want exchange lecture notes during class. You have an iPhone while your friend has an iPad. What would be the EASIEST way to make the exhange?

AirDrop

400

What is the MOST important environmental concern inside a data center?

Humidity Levels

400

Name the type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access:

What is a Trojan Horse?

500

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. What authentication should the technician implement?

MFA (Multifactor Authentication) 

500

A technician is partitioning on a hard disk. The five primary partitions should contain 4TB of free space. What partition style should the technician use to partition the device?

GPT

500

During system boot, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following command-line commands should be used by a technician to troubleshoot this error?

Bootrec /rebuildbcd

500

A company installed a new backup and recovery system. What type of backups should be completed FIRST?

What is a Full Backup?


500

Name 7 MALWARE removal steps?

1.Investigate & Verify

2. Quarantine infeceted Systems 

3. Disable System Restore in Windows

4. Remediate infected systems

5. Schedule Scans

6. Enable System Restore and create a restore  point

7. Educate the end user

M
e
n
u