Cyber Sentinels
OS Overlords
System Saviors
Procedure Pros
Bug Busters
100

Which security implentation provides the BEST security to prevent pigybacking?

What is Access Control Vestubile?

100

A user called the help desk to report an issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. What COMMAND-LINE tool should the technician should use to investigate connections on the laptop?

netstat

100

"Pinwheel" is an informal term used for describing stop error in which Operating System?  

MacOS

100
A technician found that the employee is miming cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. What policy should be updated to reflect this new requirement? 

AUP

100

Person or entity responsible for an event that has been identified as a security incident or as a risk.

Threat Actor


200

____ ______ enables the administrator to disable and remove devices, view hardware properties and system resources, and update device drivers.

Device Manager

200

What Windows feature must be configured on Windows OS desktop in order to encrypts hard-drives on a laptop that you need a TPM chip for

BitLocker

200

A system administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. What should the administrator do to RESOLVE this issue?

Roll Back Updates 

200

Name 7 MALWARE removal steps?

1.Investigate & Verify

2. Quarantine infeceted Systems 

3. Disable System Restore in Windows

4. Remediate infected systems

5. Schedule Scans

6. Enable System Restore and create a restore  point

7. Educate the end user

200

Type of password attack that compares encrypted passwords against a predetermined list of possible password values.

Dictionary

300

How do you perform a scan to identify file system errors in read-only mode?

What is run chkdsk?

300

Which of the following answers refers to a script file type designed to be run in Unix command line?

What is .sh (or bash script)?

300

A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. What WIRELESS issue is happening to the user

NFC

300

Process through which changes to the configuration of information systems are implemented as part of the organization's overall configuration management efforts.

Change Management

300

Security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.

Authentication, Authorization, And Accounting (AAA)

400

You have downloaded an installer for a third-party app from the vendor’s website. What should you do before proceeding with setup?

What is verify the integrity of the application using a hash value or vendor's digital certificate?

400

In macOS, this built-in backup solution creates incremental backups of files and directories to an external hard drive or network share.

What is Time Machine?

400

You and your friend want exchange lecture notes during class. You have an iPhone while your friend has an iPad. What would be the EASIEST way to make the exhange?

AirDrop

400

Information sheet accompanying hazardous products or substances that explains the proper procedures for handling and disposal.

Material Safety Data Sheet

400

Name the type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access:

What is a Trojan Horse?

500

Windows remote-support feature allowing a user to invite a technical support professional to provide assistance over a network using chat. The user can also grant the support professional control over his or her desktop.

Microsoft Remote Assistance (MSRA)

500

A technician is partitioning on a hard disk. The five primary partitions should contain 4TB of free space. What partition style should the technician use to partition the device?

GPT

500

During system boot, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following command-line commands should be used by a technician to troubleshoot this error?

Bootrec /rebuildbcd

500

You are updating a deployment checklist for installing new workstation PCs. What are the principal environmental hazards to consider when choosing a location?

Heat and direct sunlight, excessive dust and liquids, and very low or high humidity.

500

Name 7 MALWARE removal steps?

1.Investigate & Verify

2. Quarantine infeceted Systems 

3. Disable System Restore in Windows

4. Remediate infected systems

5. Schedule Scans

6. Enable System Restore and create a restore  point

7. Educate the end user

M
e
n
u