CompTIA Operational Procedure 1
A telecommunications business has filed a lawsuit against some of its workers for alleged fraud and unauthorized use of company assets. You're a member of the team tasked with gathering evidence and protecting its admissibility.
Which forensic procedures are you most likely to employ?
Correct answer: Chain of custody
Your organization is going over backups of important data. Some data has not been backed up, according to the report. An current firm policy, on the other hand, mandates that all data be backed up. You must have a backup of your data. Which of the following individuals should be in charge of the backup?
Correct answer: Data custodian
The data custodian is in charge of handling data on a day-to-day basis, including backups. The data custodian should back up the data in this scenario, while the data owner should determine the data's requirements.
What situation is referred to by the phrase "brownout"?
Correct answer: Voltage drop (temporary)
The term "Brownout" refers to temporary drop in voltage.
A junior security professional on your team is attempting to export and share a public certificate with a colleague outside of the IT department. They want to know if they should utilize CER or PFX. What is the best format to use?
Correct answer: CER
It's fine to share a.CER file containing a public certificate. A.PFX file (also known as a PKCS 12 archive) is different since it contains the private key, which should never be shared!
Which of the following solutions adds redundancy to places where single points of failure have been identified? (Choose all of the options that apply.)
Please select 3 correct answers
Correct answer: Uninterruptible Power Supply (UPS), RAID, Backup generator
The following solutions add(s) redundancy in areas identified as single points of failure.
What exactly does the phrase "blackout" mean?
Correct answer: Power outage
Power outage refers to the term "Blackout".
A device designed to provide emergency power in the event of a main power loss is known as:
Correct answer: UPS
A device designed to provide emergency power during an unexpected main power source outage is called UPS.
Which of the following is a cryptographic network protocol used for secure data communication, remote command-line login, remote command execution, and other secure network services?
Correct answer: SSH
SSH refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services.
You work as a business networking consultant, and one of your clients is a huge retail outlet. Configuring a wifi router in their coffee shop area is your mission for them. Customers who are in line will use the wireless connection to connect to the Internet. You want to make sure that wireless clients can connect to the Internet but not to the retail outlet's offices' internal systems. Where will the wireless router be plugged in?
Correct answer: DMZ
What would be excluded from personally identifiable information (PII)?
Correct answer: Name of a high school teacher
Your address, first and last name, social security number, date of birth, and work details are included inย personally identifiable information (Pll).
Company A has recently developed a custom airline ticketing system. When a freelance coding specialist examines it for security flaws, what do you call it?
Correct answer: Regression testing
If a freelance coding specialist tests it for security flaws, it is called regression testing.
In the following scenario, what special safety devices would be most appropriate for his environment?
After selling yourself as an IT consultant, one possible client calls you about multiple network design projects at his organization. There are tons of airborne particles afloat all the time in the factory where he works. He's curious about any unique considerations he should make when setting up his machines.
In the following scenario, what should he do to put out the fire?
After hearing the fire alarm in the network room, you see smoke flowing from a server. One of your coworkers is already attempting to calm it down with a pail of water as you yell and urge him to stop.
Correct answer: a fire extinguisher of class C
For electrical fires, special dry fire prevention or extinguishing chemicals, such as carbon dioxide, should always be used.
What is the best way to describe the objective of electrical grounding if you're the senior administrator and a new employee at the IT help desk has just started, and you've been tasked with showing him the ropes? While reviewing general safety procedures, the new employee inquires about the targetย of grounding electrical systems.
Correct answer: a method of removing unwanted electrical discharge from connected components
Grounding allows any excess electrical charges to be securely transported away from the equipment receiving the power. This prevents the electrical spike from destroying the linked gadget right away.
A corporation recently encountered a shoulder surfing problem. Which of the following protections would be beneficial in this situation?
Correct answer: Screen filters
During an IT meeting, your colleague Karylle proposes that the only load balancer in place for the company's website ordering system has a single point of failure. She recommends configuring two load balancers, with only one in use at any one moment. What kind of load balancing setup does Karylle recommend?
Correct answer: Active-passive
Two load balancers are used in active-passive configurations, one of which is active. The second load balancer takes over when the active load balancer becomes unresponsive. The answers a, c, and d are incorrect. Load balancing algorithms such as round robin and least connections are not connected to fault tolerance when using multiple load balancers. Both load balancers are active at the same time and work cooperatively to distribute incoming traffic to back-end nodes in an active-active configuration. As a result, the right answer is b.
Your on-premises identity provider (IdP) is being integrated with a cloud-based service. Federated authentication is available through the cloud-based service. Which two protocols from the list below could you utilize for the integration? (Select two.)
Please select 2 correct answers
Correct answer: SAML & OpenID Connect
One way to federate with a cloud-based service is to use SAML, which has been around for a long time and is widely accepted. Another alternative is OpenID Connect, which is newer than SAML and gaining traction in the market. LDAP and Kerberos are authentication and directory integration protocols for on-premises systems; they are not appropriate for internet-based authentication.
Which of the following words is used to describe an environmental control system?
Correct answer: HVAC
HVAC refers to an environmental control system.
Click for next FREE CompTIA Test
CompTIA Operational Practice Test #2