Security
Terminology
The IT Professional
Virtualization
Port Numbers
100

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

DDoS

spam

Social engineering

anonymous keylogging

Social engineering

100

What does SATA stand for?

Serial Advanced Technology Attachment

100

What is the definition of cyber law?

the process of collecting and analyzing data from computer systems, networks, wireless communications, and storage devices

a contract that defines expectations between an organization and IT service vendors for an agreed upon level of support

a single law defining criminal acts that are committed online

the collection of international, country, and local laws that affect computer security professionals

the collection of international, country, and local laws that affect computer security professionals

100

What type of cloud is built to meet a specific need?

Community Cloud

private cloud

hybrid cloud

public cloud

Community Cloud

100

A client packet is received by a server. The packet has a destination port number of 21. What service application is the client requesting?

LDAP

SLP

SNMP

FTP

FTP

Bonus: What's it stand for?

200

The IT department is reporting that a company web server is receiving an abnormally high number of page requests from different locations substantially. Which type of security attack is occurring?

spyware

phishing

DDoS

social engineering

adware

DDoS

200

What does NIC stand for?

Network Interface Card

200

What is the definition of a script file?

A simple text file used to automate processes and tasks.

A simple file with a single statement that loops repeatedly.

A file that is compiled and translated into machine language before executing.

A file that is the output of a conditional statement.

A simple text file used to automate processes and tasks.

200

How does virtualization help with disaster recovery within a data center?

guarantee of power

improvement of business practices

support of live migration

supply of consistent air flow

support of live migration

200

A client packet is received by a server. The packet has a destination port number of 25. What service application is the client requesting?

SMB/CIFS

HTTPS

SLP

SMTP

SMTP

300

A technician is preparing to encrypt a corporate drive by using Microsoft BitLocker. Which BIOS option will the technician need to enable?

SSL

NTFS

TPM

EFS

TPM

300

What does CMOS stand for?

Complementary Metal-Oxide Semiconductor

300

What is a characteristic of the open source license of an application software?

It allows users to modify and share the source code.

It requires registration instead of purchasing.

It does not require purchase in order to use the software.

It requires acknowledged completion of a professional training course prior to use.

It cannot be used for campus-wide deployment.

It allows users to modify and share the source code.

300

A technician needs to use an application that is not supported by Windows operating systems on the PC. How can the technician make this application run on the PC?

Create a virtual machine with an operating system that supports the application.

Install the application in safe mode.

Use the Windows Compatibility mode.

Install the application with elevated permissions as administrator.

Create a virtual machine with an operating system that supports the application.

300

A client packet is received by a server. The packet has a destination port number of 143. What service application is the client requesting

SMB/CIFS

IMAP

HTTPS

SLP

IMAP

400

Which two statements characterize wireless network security? (Choose two.)

Using the default IP address on an access point makes hacking easier.

An attacker needs physical access to at least one network device to launch an attack.

Wireless networks offer the same security features as wired networks offer.

Wireless guest mode provides open access to a protected LAN.

With SSID broadcast disabled, an attacker must know the SSID to connect.

Using the default IP address on an access point makes hacking easier.

With SSID broadcast disabled, an attacker must know the SSID to connect.

400

What does DHCP stand for?

Dynamic Host Configuration Protocol

400

A support desk trainer is teaching a new support desk technician some basic rules about starting a conversation with a customer. Which statement describes the rules the trainer should be teaching?

Learn the name of the customer and create a connection with the customer. Next ask questions that assess the knowledge level of the customer.

Start by asking close-ended questions about what the customer understands of the problem and then direct the customer through the correction process.

Ask the customer what the problem is and then introduce yourself.

Assess what the customer knows of the support desk process and then use close-ended questions to guide the customer through the correction process.

Learn the name of the customer and create a connection with the customer. Next ask questions that assess the knowledge level of the customer.

400

A software company has groups of developers located in different cities around the world. The company is using a cloud-based development environment so that all developers can access the same software development tools. Which cloud service is used by the company?

ITaaS

IaaS

SaaS

PaaS

PaaS

400

A client packet is received by a server. The packet has a destination port number of 137. What service application is the client requesting?

SMB/CIFS

HTTPS

NetBIOS (NetBT)

SLP

NetBIOS (NetBT)

500

A user notices that files created and saved locally last week are missing and asks the technician to investigate. The technician suspects there has been a security breach. Which type of malware could be responsible?

phishing

adware

Trojan

spyware

Trojan

500

What does HTTP/HTTPS stand for?

Hypertext Transfer Protocol/ Secure

500

A system administrator needs to perform manual updates on a remote Linux workstation using a Windows 10 PC. Which remote access tool should the administrator use to securely access and configure the Linux device across the network?

SSH client

Telnet client

Windows Remote Desktop client

Windows Remote Assistance client

SSH client

500

A small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.)

The company only needs to pay for the amount of processing and storage capacity that it uses.

Cloud services are billed at a fixed fee no matter how much processing and storage are used by the company.

The company does not need to be concerned about how to handle increasing data storage and processing demands with in-house data center equipment.

The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed.

Single-tenant data centers can easily grow to accommodate increasing data storage requirements.

Cloud services enable the company to own and administer its own servers and storage devices.


The company does not need to be concerned about how to handle increasing data storage and processing demands with in-house data center equipment.

The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed.

The company only needs to pay for the amount of processing and storage capacity that it uses.



500

A client packet is received by a server. The packet has a destination port number of 23. What service application is the client requesting?

SMB/CIFS

HTTPS

Telnet

SLP

Telnet