D317 - PRACTICE TEST 4 AND 5 DION PRACTICE
EXAM QUESTIONS WITH VERIFIED ANSWERS
A small doctor's office has asked you to configure their network to use the highest levels of
wireless security and desktop authentication. The office only uses cloud-based SaaS
applications to store their patient's sensitive data. Which TWO of the following protocols
or authentication methods should you implement for the BEST security?
Multifactor and WPA2
What does the command "shutdown /s" do on a Windows workstation?
Shut down the work station
Which of the following is the LEAST secure wireless security and encryption protocol?
WEP
Wired Equivalent Privacy (WEP)
is an older mechanism for encrypting data sent over a wireless connection. WEP is considered
vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization
vector to secure its preshared key.
WPA
-is an improved encryption scheme for protecting Wi-Fi communications that was designed to
replace WEP
-WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the
vulnerabilities in the older WEP protection scheme.
WPA2
replaced the original version of WPA after the completion of the 802.11i security standard.
WPA2 features an improved method of key distribution and authentication for enterprise
networks, though the pre-shared key method is still available for home and small office
networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining
message authentication protocol (CCMP) for encryption.
WPA3
has replaced WPA2 as the most secure wireless encryption method. WPA3 uses the simultaneous
authentication of equals (SAE) to increase the security of preshared keys. WPA3 provides the
enhanced open mode that encrypts transmissions from a client to the access point when using an
open network. WPA3 Enterprise mode supports the use of AES with the Galois/counter mode
protocol (GCMP-256) for the highest levels of encryption.
,You are working as a defense contractor for the U.S. Army. The Army is looking to
purchase Microsoft Office for all of its employees to use. Which of the following licenses
would be BEST for this sized organization to purchase?
Enterprise
Enterprise license
is like a business license, but for an unlimited number of users and is designed for large
corporate and government networks.
Business license
is the standard licensing option for organizations and business entities. With Microsoft, a
company can purchase anywhere from 1 to 300 user licenses under the business license program.
Personal license
is an option for private individuals who purchase a license with their own funds and solely for
their own use. Personal licenses are not to be purchased, refunded, or in any way financed by
companies.
Open-source license
is software that also makes the program code used to design it available. Generally, open-source
software is free to use and distribute, but you may need to pay for ongoing support if you have
technical issues. The idea is that other programmers can investigate the program and make it
more stable and useful. An open-source license does not forbid commercial use of applications
derived from the original, but it is likely to impose the same conditions on further redistributions.
Your company has just installed a brand new email server, but you determined that the
server cannot send emails to another server during your initial testing. You decide to check
the firewall's ACL to see if the server's outgoing email is being blocked. Which of the
following ports should you ensure is open and not blocked by the firewall?
25
SMTP (Simple Mail Transfer Protocol)
uses port 25 and is an internet standard communication protocol for electronic mail transmission
Internet Message Access Protocol (IMAP)
uses port 143 and is an Internet standard protocol used by email clients to retrieve email
messages from a mail server over a TCP/IP connection.
Post Office Protocol version 3 (POP3)
uses port 110 and is an application-layer Internet standard protocol used by e-mail clients to
retrieve e-mail from a mail server.
, Secure Shell (SSH)
uses port 22 to securely create communication sessions over the Internet for remote access to a
server or system.
System Restore
is a Windows feature that creates configuration backups of the operating system. If there are any
changes or file corruptions that damage the information in the registry or if the technician needs
to reverse changes made when they installed an application or device driver, then System restore
can be used to reset the configuration to an earlier point in time.
What is the minimum processor required to install Windows 10 (x64) on a device?
1 GHz single-core processor
Your company has just finished replacing all of its computers with brand new
workstations. Colleen, one of your coworkers, has asked the company's owner if she can
have the old computers that are about to be thrown away. Colleen would like to refurbish
the old computers by reinstalling a new operating system and donating them to a local
community center for disadvantaged children in the neighborhood. The owner thinks this
is a great idea but is concerned that the private and sensitive corporate data on the old
computer’s hard drives might be placed at risk of exposure. You have been asked to choose
the best solution to sanitize or destroy the data while ensuring the computers will still be
usable by the community center. What type of data destruction or sanitization method do
you recommend?
Wiping
Data wiping or clearing
occurs by using a software tool to overwrite the data on a hard drive to destroy all electronic data
on a hard disk or other media. Data wiping may be performed with a 1x, 7x, or 35x overwriting,
with a higher number of times being more secure. This allows the hard drive to remain functional
and allows for hardware reuse.
Degaussing a hard drive
involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once
it has been degaussed. Therefore, it is a bad solution for this scenario.
Purging
involves removing sensitive data from a hard drive using the device's internal electronics or an
outside source such as a degausser, or by using a cryptographic erase function if the drive
supports one.
What is the BEST way to update an app purchased from the Mac App Store on a
Macbook?
EXAM QUESTIONS WITH VERIFIED ANSWERS
A small doctor's office has asked you to configure their network to use the highest levels of
wireless security and desktop authentication. The office only uses cloud-based SaaS
applications to store their patient's sensitive data. Which TWO of the following protocols
or authentication methods should you implement for the BEST security?
Multifactor and WPA2
What does the command "shutdown /s" do on a Windows workstation?
Shut down the work station
Which of the following is the LEAST secure wireless security and encryption protocol?
WEP
Wired Equivalent Privacy (WEP)
is an older mechanism for encrypting data sent over a wireless connection. WEP is considered
vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization
vector to secure its preshared key.
WPA
-is an improved encryption scheme for protecting Wi-Fi communications that was designed to
replace WEP
-WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the
vulnerabilities in the older WEP protection scheme.
WPA2
replaced the original version of WPA after the completion of the 802.11i security standard.
WPA2 features an improved method of key distribution and authentication for enterprise
networks, though the pre-shared key method is still available for home and small office
networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining
message authentication protocol (CCMP) for encryption.
WPA3
has replaced WPA2 as the most secure wireless encryption method. WPA3 uses the simultaneous
authentication of equals (SAE) to increase the security of preshared keys. WPA3 provides the
enhanced open mode that encrypts transmissions from a client to the access point when using an
open network. WPA3 Enterprise mode supports the use of AES with the Galois/counter mode
protocol (GCMP-256) for the highest levels of encryption.
,You are working as a defense contractor for the U.S. Army. The Army is looking to
purchase Microsoft Office for all of its employees to use. Which of the following licenses
would be BEST for this sized organization to purchase?
Enterprise
Enterprise license
is like a business license, but for an unlimited number of users and is designed for large
corporate and government networks.
Business license
is the standard licensing option for organizations and business entities. With Microsoft, a
company can purchase anywhere from 1 to 300 user licenses under the business license program.
Personal license
is an option for private individuals who purchase a license with their own funds and solely for
their own use. Personal licenses are not to be purchased, refunded, or in any way financed by
companies.
Open-source license
is software that also makes the program code used to design it available. Generally, open-source
software is free to use and distribute, but you may need to pay for ongoing support if you have
technical issues. The idea is that other programmers can investigate the program and make it
more stable and useful. An open-source license does not forbid commercial use of applications
derived from the original, but it is likely to impose the same conditions on further redistributions.
Your company has just installed a brand new email server, but you determined that the
server cannot send emails to another server during your initial testing. You decide to check
the firewall's ACL to see if the server's outgoing email is being blocked. Which of the
following ports should you ensure is open and not blocked by the firewall?
25
SMTP (Simple Mail Transfer Protocol)
uses port 25 and is an internet standard communication protocol for electronic mail transmission
Internet Message Access Protocol (IMAP)
uses port 143 and is an Internet standard protocol used by email clients to retrieve email
messages from a mail server over a TCP/IP connection.
Post Office Protocol version 3 (POP3)
uses port 110 and is an application-layer Internet standard protocol used by e-mail clients to
retrieve e-mail from a mail server.
, Secure Shell (SSH)
uses port 22 to securely create communication sessions over the Internet for remote access to a
server or system.
System Restore
is a Windows feature that creates configuration backups of the operating system. If there are any
changes or file corruptions that damage the information in the registry or if the technician needs
to reverse changes made when they installed an application or device driver, then System restore
can be used to reset the configuration to an earlier point in time.
What is the minimum processor required to install Windows 10 (x64) on a device?
1 GHz single-core processor
Your company has just finished replacing all of its computers with brand new
workstations. Colleen, one of your coworkers, has asked the company's owner if she can
have the old computers that are about to be thrown away. Colleen would like to refurbish
the old computers by reinstalling a new operating system and donating them to a local
community center for disadvantaged children in the neighborhood. The owner thinks this
is a great idea but is concerned that the private and sensitive corporate data on the old
computer’s hard drives might be placed at risk of exposure. You have been asked to choose
the best solution to sanitize or destroy the data while ensuring the computers will still be
usable by the community center. What type of data destruction or sanitization method do
you recommend?
Wiping
Data wiping or clearing
occurs by using a software tool to overwrite the data on a hard drive to destroy all electronic data
on a hard disk or other media. Data wiping may be performed with a 1x, 7x, or 35x overwriting,
with a higher number of times being more secure. This allows the hard drive to remain functional
and allows for hardware reuse.
Degaussing a hard drive
involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once
it has been degaussed. Therefore, it is a bad solution for this scenario.
Purging
involves removing sensitive data from a hard drive using the device's internal electronics or an
outside source such as a degausser, or by using a cryptographic erase function if the drive
supports one.
What is the BEST way to update an app purchased from the Mac App Store on a
Macbook?