Topic 6, Exam Pool F
A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?
A. Multifactor authentication
B. Encryption
C. Increased password complexity
D. Secure password vault
Explanation: Multifactor authentication (MFA) significantly enhances security by requiring two or more forms of verification before granting access to an account or system. This method is highly effective against brute-force attacks, where attackers attempt to guess a user's password through repeated trials. By implementing MFA, even if a password is compromised, unauthorized access is still prevented without the additional authentication factor(s), such as a code from a smartphone app, a fingerprint, or a physical security token. Multifactor authentication: Provides an additional layer of security beyond just the password, making it much harder for attackers to gain unauthorized access through brute-force methods, as they would need to compromise more than one authentication factor. Encryption (B) is crucial for protecting data at rest and in transit, but it does not directly prevent brute-force login attempts. Increased password complexity (C) can deter brute- force attacks by making passwords harder to guess, but it is not as effective as MFA in preventing access when passwords are compromised. A secure password vault (D) helps users manage and store their passwords securely, which can indirectly contribute to security by allowing users to keep more complex passwords, but it does not directly prevent brute-force attacks on accounts.
A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?
A. The smartphone's line was not provisioned with a data plan
B. The smartphone's SIM card has failed
C. The smartphone's Bluetooth radio is disabled.
D. The smartphone has too many applications open
Explanation:
The smartphone’s line was not provisioned with a data plan. The user is unable to use any
internet-related functions on the smartphone when it is not connected to Wi-Fi because the
smartphone’s line was not provisioned with a data plan. The user can send and receive text
messages and phone calls when the smartphone is not connected to Wi-Fi because these
functions do not require an internet connection.
A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?
A. Configure MAC filtering.
B. Disable DHCP.
C. Configure port forwarding.
D. Disable guest access.
Explanation: For a SOHO (Small Office/Home Office) router setup where the goal is to only allow specific computers on the network, MAC filtering is the appropriate solution: Configure MAC filtering: This security measure involves creating a list of allowed device MAC (Media Access Control) addresses in the router's settings. Only devices with MAC addresses on this list will be able to connect to the network, effectively restricting access to authorized computers only.
Which of the following environmental controls is most important to maintain the safety of a data center?
A. Temperature control
B. Humidity control
C. Fire suppression control
D. Power managementcontrol
Explanation: The most important environmental control to maintain the safety of a data center is Temperature control (A). Proper temperature control is crucial to prevent overheating, which can lead to hardware failure, reduced performance, and shortened equipment lifespan. Data centers house high-density computing equipment that generates significant amounts of heat, making effective temperature management essential for maintaining operational stability and reliability.
A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?
A. Ransomware
B. Failed OS updates
C. Adware
D. Missing system files
Explanation:
The most likely reason for the antivirus protection on a company laptop being out of date is
failed OS updates1. Antivirus software relies on the operating system to function
properly. If the operating system is not up-to-date, the antivirus software may not function
properly and may not be able to receive the latest virus definitions and
updates2. Therefore, it is important to keep the operating system up-to-date to ensure the antivirus software is functioning properly.
Which of the following features can a technician use to ensure users are following password length requirements?
A. Group Policy
B. Log-on script
C. Access controllist
D. Security groups
Explanation: Group Policy is a feature in Windows that allows network administrators to manage and configure operating system, application settings, and user settings in an Active Directory environment. It can enforce password policies across the network, including password length requirements, making it the best tool for ensuring compliance with security policies.
A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?
A. Acceptable use policy
B. Incident report
C. End user license agreement
D. Standard operating procedures
Explanation: After successfully mitigating a malicious event caused by an infected email, the final step before considering the event closed is to complete an incident report. This document should detail the nature of the incident, the steps taken to resolve it, and any lessons learned to improve future responses to similar threats.
A customer who uses a Linux OS called the help desk to request assistance in locating a missing file. The customer does not know the exact name of the file but can provide a partial file name. Which of the following tools should the technician use? (Select two).
A. cat
B. df
C. grep
D. ps
E. dig
F. find
G. top
A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue. Which of the following should a technician do to remediate the issue?
A. Roll back the updates.
B. Increase the page file
C. Update the drivers.
D. Rebuild the profile.
Explanation:
The issue is specific to the user’s profile, so the technician should rebuild the
profile. Rebuilding the profile will create a new profile and transfer the user’s data to the
new profile1.
When a user attempts to open an email using a company-issued smartphone, the user receives a message stating the email is encrypted and cannot be opened. The user forwards the email to a personal account and receives the same message. The user then contacts the IT department for assistance. The technician instructs the user to contact the sender to exchange information in order to decode the message. Which of the following will the user receive from the sender?
A. Keys
B. Token
C. Password
D. RootCA
Explanation: When an email is encrypted and the recipient cannot open it, the issue typically revolves around the need for encryption keys. Encryption keys are used to encode and decode the email content, ensuring that only authorized recipients with the correct key can access the information. In this scenario, the user would need to receive the appropriate decryption key from the sender to unlock and read the encrypted email. This exchange ensures that sensitive information remains secure during transmission and is only accessible to intended recipients.
Which of the following data is MOST likely to be regulated?
A. Name in a Phone book
B. Name on a medical diagnosis
C. Name on a job application
D. Name on a employer's website
A name on a medical diagnosis (B) is most likely to be regulated. This is because it falls under the category of protected health information (PHI), which is subject to regulations such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States. These regulations aim to protect the privacy and security of individuals’ health information.
Which of the following is the STRONGEST wireless configuration?
A. WPS
B. WPA3
C. WEP
D. WMN
Explanation:
The strongest wireless configuration is B. WPA3. WPA3 is the most up-to-date wireless
encryption protocol and is the most secure choice. It replaces PSK with SAE, a more
secure way to do the initial key exchange. At the same time, the session key size of WPA3
increases to 128-bit in WPA3-Personal mode and 192-bit in WPA3-Enterprise, which
makes the password harder to crack than the previous Wi-Fi security standards.
https://www.makeuseof.com/tag/wep-wpa-wpa2-wpa3-explained/
Page 20 out of 62 Pages |
Previous |