Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

MORE CORE 2 PREP QUESTIONS, Test EXTRA, TEST TWO, TEST ONE

Rating
-
Sold
-
Pages
81
Grade
A+
Uploaded on
07-08-2025
Written in
2025/2026

Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector? - correct answer WEP Which of the following technologies would you use to securely access the command line interface of a network's switches and routers remotely for configuration? - correct answer SSH A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing? - correct answer Remove, Quarantine, or Erase infected Files A user contacts the service desk and states a hardware conflict error is showing in their Device Manager. Which of the following log files should you review to determine the source of the conflict? - correct answer System Log

Show more Read less
Institution
MORE CORE
Course
MORE CORE

Content preview

MORE CORE 2 PREP QUESTIONS, Test EXTRA, TEST TWO, TEST ONE
Which of the following types of encryption uses a 128-bit encryption key but is considered weak
due to its use of a 24-bit initialization vector? - correct answer WEP
Which of the following technologies would you use to securely access the command line
interface of a network's switches and routers remotely for configuration? - correct answer SSH
A home user brought their Windows 10 laptop to the electronics store where you work because
they suspect it has a malware infection. You are in the process of remediating the infected
system. Which of the following actions should you be performing? - correct answer Remove,
Quarantine, or Erase infected Files
A user contacts the service desk and states a hardware conflict error is showing in their Device
Manager. Which of the following log files should you review to determine the source of the
conflict? - correct answer System Log
You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error
on the screen. You can see the hard disk listed in the EFI/BIOS of the system. Which of the
following commands should you use to add the Windows installation to the boot manager? -
correct answer bootrec /rebuildbcd
Dion Training is concerned with students entering the server room without permission. To
prevent this from occurring, the organization wants to purchase and install an access control
system that will allow each instructor to have access using an RFID device. Which of the
following authentication mechanisms should Dion Training use to meet this requirement? -
correct answer Proximity badge
You are working as a mobile device technician for a large corporation's enterprise service desk.
A user complains that every time they attempt to launch the company's mobile email
application, it crashes and displays an error message of Code123. Which of the following should
you do FIRST to attempt to solve this problem? - correct answer Reinstall the email app
An attacker is using a precomputed table of values to attempt to crack your Windows
password. What type of password attack is this? - correct answer Rainbow Table
A programmer is writing a script to calculate the disk space needed to perform a daily backup.
The programming needs to store the amount of disk space in a temporary placeholder within
the program that can be updated and changed during the script's execution. Which of the
following would be used to store the value of the disk space needed? - correct answer Variable
Which of the following types of screen locks uses a secret pattern drawn on the screen to
prevent access to a mobile device? - correct answer Swipe
A facility would like to verify each individual's identity before allowing access to its server room
and data center. Additionally, the building should ensure that users do not tailgate behind

,other users. What solution would BEST meet these requirements? - correct answer Implement
a biometric reader at the datacenter entrance and require passage through an access control
vestibule
You have just completed a repair for a customer's smartphone that took you three days. The
customer complained that the repair took too long and began to question you about the steps
you took to repair the device. What should you do NEXT? - correct answer Listen to the
customer, apologize for the delay, explain the process that you were required to follow, as well
as the remedy that repaired their phone.
What does the command "shutdown /r" do on a Windows workstation? - correct answer
Reboot The workstation
Which of the following BEST describes how a DHCP reservation works? - correct answer By
matching a MAC address to an IP address within the DHCP scope
Which of the following types of mobile device screen locks uses biometrics to securely unlock
the device (CHOOSE TWO) ? - correct answer FaceID
TouchID
Your company is concerned about the possibility of power fluctuations that may occur and
cause an immediate loss of power for several minutes to their server room. To prevent this
condition, they are installing a large rack-mounted UPS to protect the server. Which type of
condition are they trying to prevent using this UPS? - correct answer Power Failure
Which file system type should you format a 4 TB USB flash drive to use with both Windows and
macOS laptops? - correct answer exFAT
Which of the following Control Panel options should a technician use to change a person's role
from standard to an administrator? - correct answer User Accounts
Your company is concerned about the possibility of theft of sensitive information from their
systems. The IT Director has directed that access to all USB storage devices be blocked on all
corporate workstations to prevent this. The workstation should still use other USB devices, like
scanners, printers, keyboards, and mice. Which of the following command-line tools should you
use to install a Group Policy (GPO) to all workstations across the network to disable the use of
USB storage devices? - correct answer gpudate
Which of the following Windows tools should a technician use to control the types of programs
and network resources that a user or computer can access? - correct answer gpedit.msc
Tamera and her husband are driving to the beach for the weekend. While her husband drives,
she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the
current location. She can make and receive calls, but Facebook is refusing to load her news

,feed. Which of the following is MOST likely the problem? - correct answer The data speeds are
insufficient with only one bar of signal
Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations.
Which of the following IP addresses is a Class A address? - correct answer 10.5.34.15
You are working as a forensic investigator for the police. The police have a search warrant to
capture a suspect's workstation as evidence for an ongoing criminal investigation. As you enter
the room with the policeman, he arrests the suspect and handcuffs him. What should you do
FIRST? - correct answer Secure the Area
Which of the following Windows tools should a technician use to import and install data in the
x.509 format? - correct answer Certificate manager
Christina is attempting to install Windows 10 (32-bit) on an older netbook-style laptop. The
installation is continually failing and producing an error. The device has a 1.1 GHz processor, 1
GB of memory, an 8 GB hard drive, and a 720p display. Which component would need to be
fixed to allow Windows 10 (64-bit) to be installed on this device? - correct answer Amount of
hard drive space
Which mitigation provides the best return on investment by mitigating the most vulnerable
attack vector in an enterprise network? - correct answer Provide end-user awareness training
for office staff
Sally was checking her email when she noticed that she has several automated replies from
emails she doesn't remember sending. What type of attack was Sally MOST likely the victim of?
- correct answer Hijacked Email
Which of the following commands is used on a Linux system to safely turn off a server? - correct
answer shutdown
You are working as a military defense contractor and have been asked to dispose of 5 laptop
hard drives used in systems that processed classified information. Which of the following
physical data destruction and disposal methods is MOST appropriate to ensure the data cannot
be recovered? - correct answer Degaussing of the HDDs
Jason wants to configure his Windows 10 workstation to automatically block pop-ups when
searching for websites online. Which of the following Control Panel sections should he use to
achieve this? - correct answer Internet Options
An offsite tape backup storage facility is involved with a forensic investigation. The facility has
been told they cannot recycle their outdated tapes until the conclusion of the investigation.
Which of the following is the MOST likely reason for this? - correct answer A notice of a legal
hold

, Which command-line tool on a Windows system is used to display the resulting set of policy
settings that were enforced on a computer for a specified user when they logged on? - correct
answer gpresult
Dion Training will be hiring 10 college students as interns to work over the summer. Each year,
the same interns will work for the company for 8 weeks, but then they will return to school.
Next summer, they will return to the company and will need to reaccess their accounts. What is
the BEST policy to use so that the interns can use the accounts during the summer but cannot
log in during the school year? - correct answer Disable the user accounts at the end of each
summer
Last week, a technician remediated a malware infection on Karen's laptop. Today, she shows up
at the service desk, frustrated because her laptop appears to have been infected again. What
step of the malware remediation process did the technician MOST likely forget to complete? -
correct answer Educating the end user
Jason has an old 2017 Dell Laptop that he uses to connect to his office network while traveling.
The computer is slow and is running Windows 7. The laptop's screen was recently cracked and
needs replacement. Jason brings the laptop to the computer store you work at and asks for
your assistance. Which of the following do you recommend? - correct answer Purchase a new
laptop as the cost to repair might be more than a new laptop
Which of the following types of information can be displayed by the top command in Linux? -
correct answer Running processes ordered by CPU or RAM consumption
Which command-line entry would be used on a Windows system to test if your system can
reach diontraining.com? - correct answer ping diontraining.com
You are applying for a job at a cybersecurity firm. The application requests you enter your social
security number, date of birth, and email address to conduct a background check as part of the
hiring process. Which of the following types of information have you been asked to provide? -
correct answer PII
You are troubleshooting a computer that is not producing any sounds through its speakers.
Which of the following tools should you use to troubleshoot this workstation? - correct answer
Device Manager
A user is complaining that their profile is taking too long to load on their Windows 10 system.
Which of the following is the BEST solution to this problem? - correct answer Rebuild your
Windows profile
What information should be recorded on a chain of custody form during a forensic
investigation? - correct answer Any individual who worked with evidence during the
investigation

Written for

Institution
MORE CORE
Course
MORE CORE

Document information

Uploaded on
August 7, 2025
Number of pages
81
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$22.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BSNGUIDER California Southern University
Follow You need to be logged in order to follow users or courses
Sold
203
Member since
5 year
Number of followers
174
Documents
4207
Last sold
1 month ago
Simples

4.3

39 reviews

5
25
4
6
3
5
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions