B
I
N
G
O
100

Which of these specifications would be most important for a NAS device?

A. Memory

B. Video adapter

C. NIC

D. Audio adapter

What (C.) NIC.

Most of the communication to a NAS (Network Attached Storage) device is done across the network. The video or audio configuration of the NAS is not commonly an issue, since there's very little multimedia processes that run on the NAS itself.

100

What type of Windows object permission is propagated from the parent object to the child object?

A. Explicit

B. Administrative

C. Share

D. Inherited

What is (D.) Inherited.

When you set the permissions on a parent object, by default those same permissions will apply to the child objects.

100

A manager in the marketing department is printing many copies of a twenty page document. The manager would like to print all twenty pages of the document before the next copy begins printing. What setting should the manager configure in the output settings?

A. Duplex

B. Collate

C. Quality

D. Cache

What is (B.) Collate.

A collated output is printed as a complete document with the pages in their proper order.

100

A user in the marketing department has configured their system to automatically start a third-party audio player when a flash drive containing MP3 files is inserted. Which of these features should be disabled to prevent this from occurring?

A. AutoPlay

B. App Manager

C. Active Directory

D. Startup

What is (A.) AutoPlay.

AutoPlay will start an application based on the media type. For example, inserting a DVD video will AutoPlay using the pre-selected DVD player application.

100

Which of these mobile device features ensures that all data on a device is protected?

A. Biometric authentication

B. Anti-malware

C. Full device encryption

D. Authenticator app

What is (C.) Full device encryption.

Full device encryption protects all of the data stored on a mobile device.

200

A system administrator would like to install full disk encryption on all company laptops. Which of the following will be required on each laptop?

A. TPM

B. Lojack for Laptops

C. BIOS supervisor password

D. Active Directory

What is (A.) TPM.

The cryptographic functions of a TPM (Trusted Platform Module) are necessary for a secure implementation of full disk encryption.

200

The BIOS of an Intel computer has enabled the VT feature. Which of the following would describe this feature?

A. Enables hyper-threading

B. Overclocks the processor

C. Provides virtualization support

D. Enables the integrated GPU

What is (C.) Provides virtualization support.

Intel's VT (Virtualization Technology) provides virtualization functionality in the processor hardware. AMD's version of this feature is AMD-V (AMD Virtualization).

200

A network administrator needs to connect two buildings that are located across the parking lot from each other. The total distance between the buildings is approximately 400 meters. Which of the following technologies would be the BEST choice for this installation?

A. Category 6a twisted pair

B. Single-mode fiber

C. Category 5 twisted pair

D. Multimode fiber

What is (D.) Multimode fiber.

Multimode fiber is a cost effective solution for short-range network connections that are outside the range of most twisted-pair copper technologies.

200

Fran is looking for a file on her macOS system that contains certain words and phrases. Which of the following would be the BEST way to locate these files on Fran's computer?

A. Finder

B. Spotlight

C. iCloud

D. Boot Camp

What is (B.) Spotlight.

The Spotlight features of macOS will search for files, apps, images, and other operating system objects.

200

Which part of the laser printing process is responsible for writing the image onto the drum with a laser beam?

A. Exposing

B. Charging

C. Transferring

D. Developing

What is (A.) Exposing.

The exposing process writes the image into the negatively charged drum using a laser. The toner will stick to these laser-exposed sections.

300

Which of the following can be used to transmit digital and analog video signals over the same cable?

A. DVI

B. HDMI

C. VGA

D. DisplayPort

What is (A.) DVI.

DVI (Digital Visual Interface) connections can transmit analog signals (DVI-A), digital signals (DVI-D), or digital and analog in the same connector, or integrated (DVI-I).

300

A system administrator has replaced the toner cartridge in a laser printer, but now all of the output appears to be a bit faded when compared to the original cartridge. Which of the following could help resolve this issue?

A. Clean the paper path

B. Perform a calibration

C. Install a duplexer

D. Replace the pickup rollers

What is (B.) Perform a calibration.

A laser printer calibration will allow the user to adjust the density of the toner on the final output.

300

Which of the following would be the BEST way to connect a computer with a manual voltage switch to an unknown power source?

A. Try the different voltage settings until one works

B. Use a multimeter and set the power supply to the same voltage

C. Use an external power supply

D. Use the highest voltage setting on the computer

What is (B.) Use a multimeter and set the power supply to the same voltage.

A multimeter can easily determine the voltage from the power source, and the manual voltage switch on the computer's power supply can then be properly set before connecting the computer.

300

A system administrator needs to modify some files at the macOS command prompt. Which of the following would provide this type of access?

A. Finder

B. Terminal

C. Console

D. Boot Camp

What is (B.) Terminal.

The Terminal utility provides access to the macOS command prompt.

300

A security administrator has identified a server on the corporate network that has been infected with a bot. The server has been sending an excessive number of requests to a single external IP address. Which of the following would BEST describe this activity?

A. Zero-day attack

B. Buffer overflow

C. DoS

D. Brute force attack

What is (C.) DoS.

A bot that is sending excessive data requests to another device is most likely participating in a distributed DoS (Denial of Service).

400
Give us an example of:


Something you have.
Something you are.
Something you know.

EXPLAIN LATER

400

A company has found that all of their servers have been infected by a virus that was able to replicate between systems without any user intervention. Which of the following would best describe this type of virus?

A. Ransomware

B. Worm

C. Botnet

D. Rootkit

What is (B.) Worm.

A worm is able to propgate between systems without a user manually downloading or executing a program.

400

A system administrator uses a key fob to unlock the door to the data center. What type of access controls are associated with this lock?

A. Deadbolt

B. Token-based

C. Conventional

D. Multi-factor

What is (B.) Token-based.

A token-based key lock would be associated with an RFID badge, magnetic swipe card, or key fob.

400

A United States federal government employee uses their identification card as an authentication factor during login. Which of the following would best describe this card?

A. MAC

B. MDM

C. PIV

D. DLP

What is (C.) PIV.

A PIV (Personal Identify Verification) card is a US federal government identification smart card that displays a picture, identification information, and contains a certificate. A form of "Something You Have."

400

A system administrator is adding a CPU to a new motherboard installation. The CPU has many pins on the bottom of the CPU package, and the pins connect to a motherboard socket with holes for each CPU pin. Which of the following would BEST describe this CPU socket?

A. LGA

B. DIMM

C. GPU

D. ZIF

What is (D.) ZIF.

PGA (Pin Grid Array) CPU packages contain pins on the CPU itself and connect to a ZIF (Zero Insertion Force) socket on the motherboard.

500

An employee in the sales department received a call asking for the employee's login name and password. The caller said they were with the help desk and they were troubleshooting an account issue. Which of these social engineering principles were in use?

A. Consensus

B. Scarcity

C. Authority

D. Familiarity

What is (C.) Authority.

By stating that they were from the help desk, the attacker was attempting to use authority as a method of social engineering.

500

A system administrator has discovered malware on a computer. The computer has all of the latest security patches and is up to date with the latest anti-malware signatures. Which of the following is the MOST likely reason for this malware infection?

A. Brute force attack

B. Man-in-the-middle attack 

C. Zero-day attack

D. Spoofing

What is (C.) Zero-day attack.

A computer that already has all of the latest patches and updates could have been infected by unknown zero-day malware that has not previously been seen in the wild.

500

A security administrator is implementing secure DNS services for all devices in the organization. Which of these features will be provided by this service?

A. Block malware from executing on a company computer

B. Maintain backups of all user modified documents

C. Remove malware infections from boot sectors

D. Block known malware sites in real-time

What is (D.) Block known malware sites in real-time.

A secure DNS provider can be used to provide real-time blocking of known malware sites. If a user's workstation attempts to resolve the IP address for a known malware domain, the DNS server will resolve the address to a notification page or trusted site address.

500

Sam is a manager in the accounting department at a company's remote site. She is connecting to the main office over a VPN connection and uses her Windows username and password during the VPN authentication process. Which of the following have been configured on the VPN concentrator to allow Windows-based credentials?

A. WPA2

B. RADIUS

C. IPsec

D. AES

What is (B.) RADIUS.

RADIUS (Remote Authentication Dial-in User Service) is commonly used to centralize authentication between devices.

500

A Linux administrator has been asked to change the group ownership of a documents folder on the accounting server. Which of these commands would be the best choice for this task?

A. chown

B. chmod

C. mv

D. grep

What is (A.) chown.

The Linux chown command can change the owner and group information of an operating system object.