This Windows tool is able to monitor the Processes on a computer.
A)MsConfig B)Task Manager C)Remote Desktop
What is Task Manager?
The task manager is an advanced Windows tool that has 7 tabs that are used to monitor the Processes, Performance, App History, Startup, Users, Details, and Services on a computer.
This concept in computer security that limits users' access rights to only what is strictly required to do their jobs.
A)AUP B)Least Privilege C)Zero Trust
What is least privilege
Least privilege is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.
A)Reboot B)Shutdown C)Jailbreak
What is reboot
To reboot is to reload the operating system of a computer: to start it up again. Rebooting is usually necessary after a computer crashes, meaning it stops working because of a malfunction.
This procedure consist of a controlled environment and allow developers to run simulated scenarios while conducting experiments.
A)Linux B)Change Request C)Sandbox D)Backup
What is Sandbox?
Sandbox testing involves creating a controlled and isolated environment, known as a "sandbox," that mimics a production environment. It's used for testing software, applications, or code changes without affecting the actual production system or end-users. In a sandbox, testers can simulate real-world scenarios, conduct experiments, and identify potential issues or vulnerabilities.
A customer is complaining that her laptop is too slow. You have thoroughly checked the device but cannot find anything wrong with it. What is an appropriate question to follow up with
What is Ask more details about the problem?
When dealing with a difficult customer or situation, you should follow five key principles: (1) Do not argue with customers and/or become defensive; (2) Avoid dismissing customer problems; (3) Avoid being judgmental; (4) Clarify customer statements (ask open-ended questions to narrow the problem's scope, restate the issue, or question to verify understanding); and (5) Do not disclose experiences via social media outlets.
This file system type is used by default when installing macOS on a modern workstation
A) NTFS B)APFS C)FAT32
What is APFS?
The Apple file system (APFS) is the default file system for Mac computers using macOS 10.13 or later and features strong encryption, space sharing, snapshots, fast directory sizing, and an improved file system fundamentals
This type of attacks occurs when an attacker specifically targets the CEO, CFO, CIO, and other board members.
A)Whaling B)Brute force C)Ransomware
What is Whaling?
Whaling is an email-based or web-based form of phishing that targets senior executives or wealthy individuals.
This type of wireless connection requires a pin to be entered as part of the pairing process before it is utilized
A)Infrared B)Airdrop C)Bluetooth D)NFC
What is Bluetooth?
Wireless devices with Bluetooth radios must be paired with each other before they can communicate. This involves making them discoverable and entering a PIN as part of the pairing process
This system manages request, incidents, and problems. In addition, can be used to support both internal end-users and external customers.
What is Ticketing Systems?
A ticketing system manages requests, incidents, and problems. Ticketing systems can be used to support both internal end-users and external customers. It will contain a Ticket ID, user info, Device info and asset ID
You are manage a SOHO network for a small coffee shop. Certain customers will buy a single coffee cup and then sit at the coffee shop all day to use the WiFi. You're tasked to block this customer's laptop from connecting by placing it on a blocklist. This configuration allows you to blocklist those customer's devices based on its unique hardware identifier.
What is MAC Filtering?
MAC filtering is the application of an access control list to a switch or access point so that only clients with approved MAC addresses connect to the network.
This version of Windows supports Virtual Desktops.
Windows 8, Windows 8.1, Windows 10, Windows XP ?
What is Windows 10?
Windows 10 added support for Virtual Desktops. These allow users without multi-monitor setups to create multiple virtual desktops.
This device deployment model describes when a user's personal device is installed with corporate apps and data.
A)COPE B)CYOD C)MDM D)BYOD
What is BYOD?
A bring your own device (BYOD) policy allows, and sometimes encourages, employees to access enterprise networks and systems using personal mobile devices such as smartphones, tablets, and laptops.
It's the process of installing a new operating system on a machine.
A)Reimage B)Reboot C)Restore
What is Reimage?
This process includes wiping, or clearing, the hard drive entirely, and installing a fresh operating system with factory defaults.
This backup has the highest storage and time requirements but provides a baseline for restoring systems and has the least recovery complexity as only a single file is required.
A)Incremental B)Full C)Synthetic D)RAM
What is a full Backup?
A full backup is a complete and comprehensive backup of all selected data and files in a system or specific storage device. It includes all files, directories, databases, configurations, and other critical data necessary for the operation and recovery of a system. Full backups capture the entire dataset at a specific point in time, providing a baseline for restoring the system to its exact state at the time of the backup. This type of backup is typically the most time-consuming and resource-intensive, but it offers the fastest recovery time in the event of data loss or system failure.
Define the 3-2-1 backup rule
The 3-2-1 backup rule states that an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site.
this command-line tool is used on a Windows system to move upward in a directory within the system's directory structure.
what is cd..?
The cd command can be used to move directly to another directory or path if entered as "cd (some other directory or path)" into the command line
This type of malware encrypts the victim's data and the decryption key is withheld from the victim unless payment is received.
What is Ransomware?
Ransomware is a type of malware designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website.
This Microsoft status screen that indicates an error from which the system cannot recover, resulting in a system stop error (a crash screen).
What is Blue screen of death (BSOD)
A failing fixed disk and file corruption may cause a particularly severe read/write failure, resulting in a system stop error (a crash screen).
The two main protocols used for desktop-based remote access in Windows, Linux and masOS systems.
What is RDP and VNC?
RDP (Remote Desktop Protocol) and VNC (Virtual Network Computing) are remote desktop access technologies. RDP is developed by Microsoft, allowing users to access and control a remote Windows computer. VNC is a more platform-agnostic system that enables remote access and control of desktop environments across various operating systems like Windows, Linux, and macOS.
This feature in Windows Control Panel allow users to configure the Magnifier feature and zoom in on smaller fonts.
What is Ease of Use?
the Ease of Access section can be used to turn on the Magnifier that can zoom in anywhere on the screen to make everything in the area larger and easier for a visually impaired user to see.
This Windows 10 edition supports BitLocker, Remote Desktop Protocol, and domain access.
What is Windows 10 Pro?
Windows 10 Pro includes advanced features like BitLocker for encryption, Remote Desktop Protocol (RDP) for remote access, and domain access for networked environments
This following type of attack are usually used as part of an on-path attack?
What is Spoofing?
Spoofing is often used to inject the attacker into the conversation path between the two parties. Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source.
A popular unethical method of subverting the security controls built into the OS to gain unrestricted system-level access.
Rooting/Jailbreaking
It allows user to obtain root privileges, sideload apps, change or add carriers, and customize the interface.
Those two regulatory frameworks consist of regulating data protection in regards to Healthcare data and Credit Card transactions.
What is HIPAA and PCI DSS?
PCI DSS (Payment Card Industry Data Security Standard) and HIPAA (Health Insurance Portability and Accountability Act) are regulatory frameworks in the United States. PCI DSS focuses on securing payment card data and transactions to prevent fraud and breaches within the financial industry. HIPAA, on the other hand, safeguards patient health information and establishes privacy and security standards within the healthcare industry, aiming to protect patient privacy and improve healthcare operations.
This method is used for distributing network traffic equally across a pool of resources that support an application.
What is Load Balancing?
It's the process of distributing network traffic across multiple servers. This ensures no single server bears too much demand. By spreading the work evenly, load balancing improves application responsiveness.