220-1102 Exam Questions

Total 739 Questions

Last Updated Exam : 16-Dec-2024

Topic 5: Exam Pool E

A Linux technician needs a filesystem type that meets the following requirements:
. All changes are tracked. . The possibility of file corruption is reduced. · Data recovery is easy.
Which of the following filesystem types best meets these requirements?
ext3


A. FAT32


B. exFAT


C. NTFS





A.
  FAT32

Explanation: The ext3 file system is a Linux native file system that meets the requirements of the question. It has the following features: All changes are tracked. The ext3 file system uses a journaling mechanism that records all changes to the file system metadata in a special log called the journal before applying them to the actual file system. This ensures that the file system can be restored to a consistent state in case of a power failure or system crash12. The possibility of file corruption is reduced. The journaling feature of ext3 also reduces the possibility of file corruption, as it avoids the need for a full file system check after an unclean shutdown. The file system can be quickly replayed from the journal and any inconsistencies can be fixed12. Data recovery is easy. The ext3 file system supports undeletion of files using tools such as ext3grep or extundelete, which can scan the file system for deleted inodes and attempt to recover the data blocks associated with them34.

A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?


A. Degaussing


B. Standard formatting


C. Low-level wiping


D. Deleting





C.
  Low-level wiping

Explanation: Low-level wiping is the best data destruction method for recycling old hard drives for reuse. Low-level wiping is a process that overwrites every bit of data on a hard drive with zeros or random patterns, making it impossible to recover any data from the drive. Low-level wiping also restores the drive to its factory state, removing any bad sectors or errors that may have accumulated over time. Low-level wiping can be done using specialized software tools or hardware devices that connect to the drive. Degaussing, standard formatting, and deleting are not suitable data destruction methods for recycling old hard drives for reuse. Degaussing is a process that exposes a hard drive to a strong magnetic field, destroying both the data and the drive itself. Degaussing renders the drive unusable for reuse. Standard formatting is a process that erases the data on a hard drive by removing the file system structure, but it does not overwrite the data itself. Standard formatting leaves some data recoverable using forensic tools or software utilities. Deleting is a process that removes the data from a hard drive by marking it as free space, but it does not erase or overwrite the data itself. Deleting leaves most data recoverable using undelete tools or software utilities.

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?


A. To maintain an information security policy


B. To properly identify the issue


C. To control evidence and maintain integrity


D. To gather as much information as possible





C.
  To control evidence and maintain integrity

Explanation: Maintaining the chain of custody is important to control evidence and maintain integrity. The chain of custody is a process that documents who handled, accessed, or modified a piece of evidence, when, where, how, and why. The chain of custody ensures that the evidence is preserved, protected, and authenticated throughout the incident response process. Maintaining the chain of custody can help prevent tampering, alteration, or loss of evidence, as well as establish its reliability and validity in legal proceedings. Maintaining an information security policy, properly identifying the issue, and gathering as much information as possible are not reasons why maintaining the chain of custody is important. Maintaining an information security policy is a general practice that defines the rules and guidelines for securing an organization’s information assets and resources. Properly identifying the issue is a step in the incident response process that involves analyzing and classifying the incident based on its severity, impact, and scope. Gathering as much information as possible is a step in the incident response process that involves collecting and documenting relevant data and evidence from various sources, such as logs, alerts, or witnesses.

A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?


A. Content filter


B. Screened subnet


C. Port forwarding


D. Access control list





A.
  Content filter

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?


A. Risk analysis


B. Sandbox testing


C. End user acceptance


D. Lessons learned





A.
  Risk analysis

Explanation: Risk analysis is the process of identifying and evaluating the potential threats and impacts of a change on the system, network, or service. It is an essential step before approving a change request, as it helps to determine the level of risk, the mitigation strategies, and the contingency plans. Risk analysis also helps to prioritize the change requests based on their urgency and importance12.

A user's antivirus software reports an infection that it is unable to remove. Which of the following is the most appropriate way to remediate the issue?


A. Disable System Restore.


B. Utilize a Linux live disc.


C. Quarantine the infected system.


D. Update the anti-malware.





C.
  Quarantine the infected system.

Explanation: Quarantining the infected system is the most appropriate way to remediate the issue of an infection that the antivirus software cannot remove. Quarantining means isolating the system from the network and other devices to prevent the infection from spreading or causing further damage. Quarantining also allows the technician to perform further analysis and removal of the infection without risking the security of other systems or data.
Some of the steps involved in quarantining an infected system are: Disconnect the system from the internet and any local network connections, such as Wi-Fi, Ethernet, Bluetooth, or USB.
Disable any file-sharing or remote access services on the system, such as Windows File Sharing, Remote Desktop, or TeamViewer.
Use a separate device to download and update the antivirus software and any other tools that may be needed to remove the infection, such as malware scanners, rootkit removers, or bootable rescue disks.
Transfer the updated antivirus software and tools to the infected system using a removable media, such as a CD, DVD, or USB flash drive. Scan the removable media for any infections before and after using it on the infected system.
Run the antivirus software and tools on the infected system and follow the instructions to delete or quarantine the infection. If the infection is persistent or complex, it may require booting the system from a rescue disk or using a Linux live disc to access and clean the system files.
After the infection is removed, restore the system to a previous clean state using System Restore, backup, or recovery partition. Scan the system again to ensure that it is clean and secure. Reconnect the system to the network and update the system and the antivirus software.

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?


A. Disable the browser from sending notifications to the Action Center.


B. Run a full antivirus scan on the computer.


C. Disable all Action Center notifications.


D. Move specific site notifications from Allowed to Block.





D.
  Move specific site notifications from Allowed to Block.

When trying to access a secure internal network, the user receives an error messaging stating, "There is a problem with this website's security certificate." The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring?


A. Reimage the system and install SSL.


B. Install Trusted Root Certificate.


C. Select View Certificates and then Install Certificate.


D. Continue to access the website.





C.
  Select View Certificates and then Install Certificate.

Explanation: The error message indicates that the website’s security certificate is not trusted by the user’s device, which may prevent the user from accessing the secure internal network. To resolve this issue, the user can view the certificate details and install it on the device, which will add it to the trusted root certificate store. Reimaging the system and installing SSL, installing Trusted Root Certificate, or continuing to access the website are not recommended solutions, as they may compromise the security of the device or the network.

A user clicks a link in an email. A warning message in the user's browser states the site's certificate cannot be verified. Which of the following is the most appropriate action for a technician to take?


A. Click proceed.


B. Report the employee to the human resources department for violating company policy.


C. Restore the computer from the last known backup.


D. Close the browser window and report the email to IT security.





D.
  Close the browser window and report the email to IT security.

Which of the following statements describes the purpose of scripting languages? To access the hardware of the computer it is running on


A. To automate tasks and reduce the amount of manual labor


B. To abstract the complexity of the computer system


C. To compile the program into an executable file





B.
  To abstract the complexity of the computer system

Explanation: Scripting languages are used to write small to medium-sized programs that perform specific tasks. Some common uses of scripting languages are: automating repetitive processes, web development, system administration, data processing, multimedia and games, report generation, document and text processing, writing plugins and extensions for existing programs and applications1.


Page 2 out of 74 Pages
Previous