Which security implentation provides the BEST security to prevent pigybacking?
What is Access Control Vestubile?
A user called the help desk to report an issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. What COMMAND-LINE tool should the technician should use to investigate connections on the laptop?
netstat
"Pinwheel" is an informal term used for describing stop error in which Operating System?
MacOS
AUP
Person or entity responsible for an event that has been identified as a security incident or as a risk.
Threat Actor
____ ______ enables the administrator to disable and remove devices, view hardware properties and system resources, and update device drivers.
Device Manager
What Windows feature must be configured on Windows OS desktop in order to encrypts hard-drives on a laptop that you need a TPM chip for
BitLocker
A system administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. What should the administrator do to RESOLVE this issue?
Roll Back Updates
Name 7 MALWARE removal steps?
1.Investigate & Verify
2. Quarantine infeceted Systems
3. Disable System Restore in Windows
4. Remediate infected systems
5. Schedule Scans
6. Enable System Restore and create a restore point
7. Educate the end user
Type of password attack that compares encrypted passwords against a predetermined list of possible password values.
Dictionary
How do you perform a scan to identify file system errors in read-only mode?
What is run chkdsk?
Which of the following answers refers to a script file type designed to be run in Unix command line?
What is .sh (or bash script)?
A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. What WIRELESS issue is happening to the user
NFC
Process through which changes to the configuration of information systems are implemented as part of the organization's overall configuration management efforts.
Change Management
Security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.
Authentication, Authorization, And Accounting (AAA)
You have downloaded an installer for a third-party app from the vendor’s website. What should you do before proceeding with setup?
What is verify the integrity of the application using a hash value or vendor's digital certificate?
In macOS, this built-in backup solution creates incremental backups of files and directories to an external hard drive or network share.
What is Time Machine?
You and your friend want exchange lecture notes during class. You have an iPhone while your friend has an iPad. What would be the EASIEST way to make the exhange?
AirDrop
Information sheet accompanying hazardous products or substances that explains the proper procedures for handling and disposal.
Material Safety Data Sheet
Name the type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access:
What is a Trojan Horse?
Windows remote-support feature allowing a user to invite a technical support professional to provide assistance over a network using chat. The user can also grant the support professional control over his or her desktop.
Microsoft Remote Assistance (MSRA)
A technician is partitioning on a hard disk. The five primary partitions should contain 4TB of free space. What partition style should the technician use to partition the device?
GPT
During system boot, a user receives "Windows Boot Configuration Data file is missing required information" error message. Which of the following command-line commands should be used by a technician to troubleshoot this error?
Bootrec /rebuildbcd
You are updating a deployment checklist for installing new workstation PCs. What are the principal environmental hazards to consider when choosing a location?
Heat and direct sunlight, excessive dust and liquids, and very low or high humidity.
Name 7 MALWARE removal steps?
1.Investigate & Verify
2. Quarantine infeceted Systems
3. Disable System Restore in Windows
4. Remediate infected systems
5. Schedule Scans
6. Enable System Restore and create a restore point
7. Educate the end user