Computer Skills Questions
Explore questions in the Computer Skills category that you can ask Spark.E!
In risk management concepts, a(n) _________ is something a security practitioner might need to protect. (D1, L1.2.1)A) VulnerabilityB) AssetC) ThreatD) Likelihood
Which of the following is a biometric access control mechanism? (D3, L3.2.1)A) A badge readerB) A copper keyC) A fence with razor tape on itD) A door locked by a voiceprint identifier
Network traffic originating from outside the organization might be admitted to the internal IT environment or blocked at the perimeter by a ________. (D3, L3.2.1)A) TurnstileB) FenceC) VacuumD) Firewall
The senior leadership of Triffid Corporation decides that the best way to minimize liability for the company is to demonstrate the company's commitment to adopting best practices recognized throughout the industry. Triffid management issues a document that explains that Triffid will follow the best practices published by SANS, an industry body that addresses computer and information security.The Triffid document is a ______, and the SANS documents are ________. (D1, L1.4.2)A) Law, policyB) Policy, standardC) Policy, lawD) Procedure, procedure
Zarma is an (ISC)² member and a security analyst for Triffid Corporation. One of Zarma's colleagues is interested in getting an (ISC)2 certification and asks Zarma what the test questions are like. What should Zarma do? (D1, L1.5.1)A) Inform (ISC)²B) Explain the style and format of the questions, but no detailC) Inform the colleague's supervisorD) Nothing
Which of the following is an example of a "something you are" authentication factor? (D1, L1.1.1)A) A credit card presented to a cash machineB) Your password and PINC) A user IDD) A photograph of your face
A software firewall is an application that runs on a device and prevents specific types of traffic from entering that device. This is a type of ________ control. (D1, L1.3.1)A) PhysicalB) AdministrativeC) PassiveD) Technical
In risk management concepts, a(n) ___________ is something or someone that poses risk to an organization or asset. (D1, L1.2.1)A) FearB) ThreatC) ControlD) Asset
What IPV6 tunneling cannot traverse nat gateways?
Branch users are experiencing issues with videoconferencing. Which of the following will the company MOST likely configure to improve performance for these applications?A. Link Aggregation Control ProtocolB. Dynamic routingC. Quality of serviceD. Network load balancerE. Static IP addresses
Which of the following would be BEST to use to detect a MAC spoofing attack?A. Internet Control Message ProtocolB. Reverse Address Resolution ProtocolC. Dynamic Host Configuration ProtocolD. Internet Message Access Protocol
Which of the following routing protocols is used to exchange route information between public autonomous systems?A. OSPFB. BGPC. EGRIPD. RIP
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?A. Install load balancersB. Install more switchesC. Decrease the number of VLANsD. Reduce the lease time
A company built a new building at its headquarters location. The new building is connected to the company's LAN via fiber-optic cable. Multiple users in the new building are unable to access the company's intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue?A. Correct the DNS server entries in the DHCP scopeB. Correct the external firewall gateway addressC. Correct the NTP server settings on the clientsD. Correct a TFTP Issue on the company's server
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?A. Layer 1B. Layer 2C. Layer 3D. Layer 4E. Layer 5F. Layer 6G. Layer 7
A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)A. CPU usageB. MemoryC. TemperatureD. BandwidthE. LatencyF. Jitter
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?A. Verify the session time-out configuration on the captive portal settingsB. Check for encryption protocol mismatch on the clients wireless settingsC. Confirm that a valid passphrase is being used during the web authenticationD. Investigate for a clients disassociation caused by an evil twin AP
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?A. Evil twinB. TailgatingC. PiggybackingD. Shoulder surfing
Which of the following DNS records works as an alias to another record?A. AAAAB. CNAMEC. MXD. SOA
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?A. NetFlow analyzerB. Bandwidth analyzerC. Protocol analyzerD. Spectrum analyzer
