Mobile Device and File System Security Quiz
40 Questions
1 Views

Mobile Device and File System Security Quiz

Created by
@FervidDjinn

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which actions should the administrator take to help secure a mobile device against future threats? (Choose two.)

  • Disable biometric authentication
  • Enable developer mode
  • Prevent a device root (correct)
  • Block a third-party application installation (correct)
  • What tool should the technician use to help a user hide a file on a shared drive?

  • File Explorer (correct)
  • Administrative Tools
  • Indexing Options
  • Device Manager
  • Which safety procedures would BEST protect the internal components of a PC during a processor replacement? (Choose two.)

  • Utilizing an ESD strap (correct)
  • Disconnecting the computer from the power source (correct)
  • Removing dust from the ventilation fans
  • Ensuring proper ventilation
  • Which document should be updated to reflect the prohibition of cryptocurrency mining on work desktops?

    <p>AUP</p> Signup and view all the answers

    Which measures provide the BEST security for physical access to a data center server room? (Choose two.)

    <p>Access control vestibule</p> Signup and view all the answers

    What is the MOST likely cause of a desktop PC not being able to log in while a laptop can on the same network?

    <p>Time drift</p> Signup and view all the answers

    Which tool should a technician use to resize a partition on a computer running macOS?

    <p>Disk Utility</p> Signup and view all the answers

    Which option would reduce the risk of a user accidentally deleting data from a shared drive?

    <p>Set file permissions to read-only</p> Signup and view all the answers

    Which of the following utilities should a technician use to add a program to the Path Environment Variable?

    <p>System</p> Signup and view all the answers

    What is the BEST account access level for a user needing advanced features on a corporate system under least privilege policy?

    <p>Power user account</p> Signup and view all the answers

    What is the MOST likely cause of a hash mismatch after downloading a file?

    <p>Modified file</p> Signup and view all the answers

    Which method is the MOST effective for securely disposing of data on optical discs?

    <p>Shredding</p> Signup and view all the answers

    What is the MOST likely reason for a user's slow corporate phone after installing a GPS application?

    <p>The GPS application contains malware.</p> Signup and view all the answers

    What feature would prevent malicious files from executing automatically when a flash drive is plugged in?

    <p>Turning off AutoPlay</p> Signup and view all the answers

    Which factors should be considered when building a master image for deployment? (Choose two.)

    <p>Device drivers</p> Signup and view all the answers

    What is the probable cause of an error message after installing an application on a desktop?

    <p>Incorrect installation procedure.</p> Signup and view all the answers

    Which command should the technician verify in the command prompt to address the issue without making any changes?

    <p>Run chkdsk on the drive as the administrator</p> Signup and view all the answers

    What should the technician use to determine the cause of the BSOD reappearing on the user's workstation?

    <p>Event Viewer</p> Signup and view all the answers

    What should the support representative do next when the current appointment is causing a delay?

    <p>Send a quick message regarding the delay to the next customer</p> Signup and view all the answers

    What is the BEST solution for managing a high volume of requests in a new service desk?

    <p>Creating a ticketing system</p> Signup and view all the answers

    What security benefit is realized after deploying a client certificate for Wi-Fi access?

    <p>All Wi-Fi traffic will be encrypted in transit</p> Signup and view all the answers

    What is the MOST likely reason for a user in a corporate office unable to connect to any network drives?

    <p>The user is not connected to the VPN</p> Signup and view all the answers

    Which action should a junior administrator take when deploying software to multiple computers?

    <p>Use a centralized software deployment tool</p> Signup and view all the answers

    Which action helps prevent rogue access points from connecting to the corporate network?

    <p>Implementing network access control mechanisms</p> Signup and view all the answers

    Which of the following would MOST likely be deployed to enhance physical security for a building?

    <p>Multifactor authentication</p> Signup and view all the answers

    What should a technician investigate NEXT if a user is redirected to unexpected websites despite clearing the web browser cache?

    <p>Update the antivirus definitions</p> Signup and view all the answers

    What BEST describes why malware is still detected after a system restore on a Windows workstation?

    <p>The malware was installed before the system restore point was created.</p> Signup and view all the answers

    Which file system format ensures read and write compatibility of USB flash drives across several generations of Microsoft operating systems?

    <p>FAT32</p> Signup and view all the answers

    What might cause an Activation Lock issue on a corporate-owned iOS device?

    <p>An employee's Apple ID used on the device</p> Signup and view all the answers

    What is the default GUI and file manager in macOS?

    <p>Finder</p> Signup and view all the answers

    What should a technician use to mitigate frequent micro power outages lasting up to five minutes?

    <p>Generator backup</p> Signup and view all the answers

    What could be a symptom of a malware infection if applications open without being launched?

    <p>Malware infection</p> Signup and view all the answers

    What is the MOST likely reason for the application on the Android tablet to immediately close?

    <p>A firewall is blocking the application</p> Signup and view all the answers

    Which troubleshooting actions would MOST likely resolve the application issue on the Android tablet? (Choose two.)

    <p>Deleting the application cache</p> Signup and view all the answers

    Which utility would a technician MOST likely use to add an individual as a local administrator on a Windows home PC?

    <p>Settings &gt; Accounts &gt; Family and Other Users</p> Signup and view all the answers

    What is the MOST efficient way for an administrator to create user profiles with home directories and network printers?

    <p>Group Policy</p> Signup and view all the answers

    What would MOST likely prevent stored data from being recovered from a stolen laptop?

    <p>Full disk encryption</p> Signup and view all the answers

    Which program can a technician use to view startup items if MSConfig is no longer usable?

    <p>Taskmgr</p> Signup and view all the answers

    Which tool can a systems administrator use to remediate issues with PKI connectivity?

    <p>certmgr.msc</p> Signup and view all the answers

    What is the first action a technician should take when reimaging a desktop PC?

    <p>Connecting the PC to the network</p> Signup and view all the answers

    Study Notes

    Mobile Device Security

    • A systems administrator should prevent device rooting and block third-party application installation to secure the device against threats in the future.
    • A technician should use a PIN on the unlock screen to help secure the device against this threat in the future.
    • The administrator installed MDM software to help secure the device against malicious applications.
    • A user's phone became sluggish after several malicious applications were discovered on the device.

    File System Security

    • Device Manager, Indexing Options, and Administrative Tools are not used to hide files on a shared drive.
    • File explorer can be used to help hide files from others if they are not given access.

    Computer Hardware Safety

    • A technician should utilize an ESD strap and disconnect the computer from the power source to ensure internal components are protected.

    Company Policy Violations

    • A company should update its Acceptable Use Policy to reflect its new requirements.

    Data Center Security

    • Biometric locks, badge readers, locking racks, and access control vestibules provide the BEST way to secure physical access to a data center server room.
    • Video surveillance can work in conjunction with other access control measures to improve security.

    Troubleshooting Login Issues

    • If a user is unable to log in to the domain with a desktop PC but a laptop PC is working properly on the same network, the MOST likely cause of the issue is a time drift.

    macOS Partition Resize

    • Disk Utility should be used to resize a partition on the internal storage drive of a computer running macOS.

    Troubleshooting BSOD

    • A technician should utilize the Stop Code to determine the cause of a Blue Screen of Death.

    Customer Service Best Practices

    • A support technician should send a quick message regarding the delay to the next customer if the appointment takes longer than expected.

    Service Desk Management

    • The BEST solution for a new service desk having difficulty managing the volume of requests is implementing a support portal.

    Network Security

    • Deploying a client certificate to be used for Wi-Fi access for all devices in an organization in conjunction with the user's existing username and password provides multi-factor authentication for Wi-Fi.
    • All Wi-Fi traffic will be encrypted in transit when using a client certificate for Wi-Fi access.

    Network Connectivity Troubleshooting

    • The MOST likely reason a user cannot connect to network drives is because the user is not connected to the VPN.

    Software Deployment

    • The BEST way for a junior administrator to resolve an issue deploying software to a large group of computers in an organization is to use gpmc.msc, Group Policy Management Console, to manage Group Policies.

    Environment Variables

    • The technician should use the System Control Panel utility to list the application in the Path Environment Variable.

    User Account Access Level

    • A Power User account provides the BEST description of the account access level needed for accessing advanced features and configuration settings for several applications.

    File Hash Validation

    • The MOST likely cause for a mismatch in file hash values is a modified file.

    Data Disposal

    • Shredding is the MOST effective method to securely dispose of data stored on optical discs.

    Mobile Device Performance Issues

    • The MOST likely cause for an abnormally slow phone after a user's data plan has reached its limit is that the GPS application contains malware.

    USB Flash Drive Security

    • Turning off AutoPlay would prevent a malicious file from being executed automatically when a flash drive is plugged in.

    Master Image Deployment

    • Device drivers and installed application license keys should be considered when building a master image for deployment to desktops.

    Application Installation Errors

    • Licensing agreements and incident management documentation should be considered when an application installation error occurs.

    Physical Security

    • Badge readers and motion sensors would MOST likely be deployed to enhance physical security for a building.

    Web Browser Redirection

    • A technician should examine the localhost file entries to troubleshoot a user's issue accessing commonly used web pages but being redirected to unexpected websites.

    Malware Removal

    • A system patch disabling the antivirus protection and host firewall would BEST describe why a workstation has malware in the root OS folder even after a System Restore.

    File System Compatibility

    • FAT32 would be the BEST choice for a file system format to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems.

    Activation Lock

    • An employee's Apple ID used on the device would cause a corporate-owned iOS device to have an Activation Lock issue.

    macOS GUI and File Manager

    • Finder is the default GUI and file manager in macOS.

    Power Outage Mitigation

    • A battery backup should be used to mitigate micro power outages.

    Computer Issues

    • The incorrect DNS address was assigned is the MOST likely reason why applications open without being launched and the browser redirects to unintended websites.

    Android Tablet Application Issues

    • Uninstalling the application and clearing the application storage are likely to resolve an issue with an Android tablet application.

    Local Administrator Account Management

    • Settings>Accounts>Family and Other Users is the utility used to add an individual as a local administrator on a Windows home PC.

    User Profile Configuration

    • Group Policy is the MOST efficient way to complete tasks for creating user profiles that include home directories and network printers for several new users.

    Data Security

    • Full disk encryption would MOST likely prevent stored data from being recovered if a corporate-owned laptop was stolen.

    Startup Items Viewing

    • Taskmgr (Task Manager) is the program used by a technician to look at startup items after MSConfig can no longer be used.

    PKI Troubleshooting

    • certmgr.msc is the tool a systems administrator can use to help remediate issues connecting to the corporate network using PKI.

    Desktop Reimaging

    • When reimaging a desktop PC, a technician should connect the PC to the network and power it on.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    CompTIA Core 2 Practice PDF

    Description

    Test your knowledge on securing mobile devices and file systems against various threats. This quiz covers best practices for preventing unauthorized access and ensuring data integrity. Additionally, learn about hardware safety and policy violations related to company procedures.

    More Like This

    Mobile Device Security
    6 questions

    Mobile Device Security

    VictoriousTurtle avatar
    VictoriousTurtle
    Mobile Device Security Quiz
    14 questions

    Mobile Device Security Quiz

    RightSmokyQuartz1782 avatar
    RightSmokyQuartz1782
    Use Quizgecko on...
    Browser
    Browser