A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?
DDoS
spam
Social engineering
anonymous keylogging
Social engineering
What does SATA stand for?
Serial Advanced Technology Attachment
What is the definition of cyber law?
the process of collecting and analyzing data from computer systems, networks, wireless communications, and storage devices
a contract that defines expectations between an organization and IT service vendors for an agreed upon level of support
a single law defining criminal acts that are committed online
the collection of international, country, and local laws that affect computer security professionals
the collection of international, country, and local laws that affect computer security professionals
What type of cloud is built to meet a specific need?
Community Cloud
private cloud
hybrid cloud
public cloud
Community Cloud
A client packet is received by a server. The packet has a destination port number of 21. What service application is the client requesting?
LDAP
SLP
SNMP
FTP
FTP
Bonus: What's it stand for?
The IT department is reporting that a company web server is receiving an abnormally high number of page requests from different locations substantially. Which type of security attack is occurring?
spyware
phishing
DDoS
social engineering
adware
DDoS
What does NIC stand for?
Network Interface Card
What is the definition of a script file?
A simple text file used to automate processes and tasks.
A simple file with a single statement that loops repeatedly.
A file that is compiled and translated into machine language before executing.
A file that is the output of a conditional statement.
A simple text file used to automate processes and tasks.
How does virtualization help with disaster recovery within a data center?
guarantee of power
improvement of business practices
support of live migration
supply of consistent air flow
support of live migration
A client packet is received by a server. The packet has a destination port number of 25. What service application is the client requesting?
SMB/CIFS
HTTPS
SLP
SMTP
SMTP
A technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which BIOS option will the technician need to enable?
SSL
NTFS
TPM
EFS
TPM
What does CMOS stand for?
Complementary Metal-Oxide Semiconductor
What is a characteristic of the open source license of an application software?
It allows users to modify and share the source code.
It requires registration instead of purchasing.
It does not require purchase in order to use the software.
It requires acknowledged completion of a professional training course prior to use.
It cannot be used for campus-wide deployment.
It allows users to modify and share the source code.
A technician needs to use an application that is not supported by Windows operating systems on the PC. How can the technician make this application run on the PC?
Create a virtual machine with an operating system that supports the application.
Install the application in safe mode.
Use the Windows Compatibility mode.
Install the application with elevated permissions as administrator.
Create a virtual machine with an operating system that supports the application.
A client packet is received by a server. The packet has a destination port number of 143. What service application is the client requesting
SMB/CIFS
IMAP
HTTPS
SLP
IMAP
Which two statements characterize wireless network security? (Choose two.)
Using the default IP address on an access point makes hacking easier.
An attacker needs physical access to at least one network device to launch an attack.
Wireless networks offer the same security features as wired networks offer.
Wireless guest mode provides open access to a protected LAN.
With SSID broadcast disabled, an attacker must know the SSID to connect.
Using the default IP address on an access point makes hacking easier.
With SSID broadcast disabled, an attacker must know the SSID to connect.
What does DHCP stand for?
Dynamic Host Configuration Protocol
A support desk trainer is teaching a new support desk technician some basic rules about starting a conversation with a customer. Which statement describes the rules the trainer should be teaching?
Learn the name of the customer and create a connection with the customer. Next ask questions that assess the knowledge level of the customer.
Start by asking close-ended questions about what the customer understands of the problem and then direct the customer through the correction process.
Ask the customer what the problem is and then introduce yourself.
Assess what the customer knows of the support desk process and then use close-ended questions to guide the customer through the correction process.
Learn the name of the customer and create a connection with the customer. Next ask questions that assess the knowledge level of the customer.
A software company has groups of developers located in different cities around the world. The company is using a cloud-based development environment so that all developers can access the same software development tools. Which cloud service is used by the company?
ITaaS
IaaS
SaaS
PaaS
PaaS
A client packet is received by a server. The packet has a destination port number of 137. What service application is the client requesting?
SMB/CIFS
HTTPS
NetBIOS (NetBT)
SLP
NetBIOS (NetBT)
A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible?
phishing
adware
Trojan
spyware
Trojan
What does HTTP/HTTPS stand for?
Hypertext Transfer Protocol/ Secure
A system administrator needs to perform manual updates on a remote Linux workstation using a Windows 10 PC. Which remote access tool should the administrator use to securely access and configure the Linux device across the network?
SSH client
Telnet client
Windows Remote Desktop client
Windows Remote Assistance client
SSH client
A small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.)
The company only needs to pay for the amount of processing and storage capacity that it uses.
Cloud services are billed at a fixed fee no matter how much processing and storage are used by the company.
The company does not need to be concerned about how to handle increasing data storage and processing demands with in-house data center equipment.
The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed.
Single-tenant data centers can easily grow to accommodate increasing data storage requirements.
Cloud services enable the company to own and administer its own servers and storage devices.
The company does not need to be concerned about how to handle increasing data storage and processing demands with in-house data center equipment.
The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed.
The company only needs to pay for the amount of processing and storage capacity that it uses.
A client packet is received by a server. The packet has a destination port number of 23. What service application is the client requesting?
SMB/CIFS
HTTPS
Telnet
SLP
Telnet