CompTIA Operational Procedure 1

0%

Which of the following is a cryptographic network protocol used for secure data communication, remote command-line login, remote command execution, and other secure network services?

Correct! Wrong!

Correct answer: SSH

SSH refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services.

Which of the following words is used to describe an environmental control system?

Correct! Wrong!

Correct answer: HVAC

HVAC refers to an environmental control system.

Which of the following solutions adds redundancy to places where single points of failure have been identified? (Choose all of the options that apply.)

Please select 3 correct answers

Correct! Wrong!

Correct answer: Uninterruptible Power Supply (UPS), RAID, Backup generator

The following solutions add(s) redundancy in areas identified as single points of failure.

Your organization is going over backups of important data. Some data has not been backed up, according to the report. An current firm policy, on the other hand, mandates that all data be backed up. You must have a backup of your data. Which of the following individuals should be in charge of the backup?

Correct! Wrong!

Correct answer: Data custodian

The data custodian is in charge of handling data on a day-to-day basis, including backups. The data custodian should back up the data in this scenario, while the data owner should determine the data's requirements.

A telecommunications business has filed a lawsuit against some of its workers for alleged fraud and unauthorized use of company assets. You're a member of the team tasked with gathering evidence and protecting its admissibility.
Which forensic procedures are you most likely to employ?

Correct! Wrong!

Correct answer: Chain of custody

Your on-premises identity provider (IdP) is being integrated with a cloud-based service. Federated authentication is available through the cloud-based service. Which two protocols from the list below could you utilize for the integration? (Select two.)

Please select 2 correct answers

Correct! Wrong!

Correct answer: SAML & OpenID Connect

One way to federate with a cloud-based service is to use SAML, which has been around for a long time and is widely accepted. Another alternative is OpenID Connect, which is newer than SAML and gaining traction in the market. LDAP and Kerberos are authentication and directory integration protocols for on-premises systems; they are not appropriate for internet-based authentication.

A corporation recently encountered a shoulder surfing problem. Which of the following protections would be beneficial in this situation?

Correct! Wrong!

Correct answer: Screen filters

What situation is referred to by the phrase "brownout"?

Correct! Wrong!

Correct answer: Voltage drop (temporary)

The term "Brownout" refers to temporary drop in voltage.

A device designed to provide emergency power in the event of a main power loss is known as:

Correct! Wrong!

Correct answer: UPS

A device designed to provide emergency power during an unexpected main power source outage is called UPS.

You work as a business networking consultant, and one of your clients is a huge retail outlet. Configuring a wifi router in their coffee shop area is your mission for them. Customers who are in line will use the wireless connection to connect to the Internet. You want to make sure that wireless clients can connect to the Internet but not to the retail outlet's offices' internal systems. Where will the wireless router be plugged in?

Correct! Wrong!

Correct answer: DMZ

In the following scenario, what should he do to put out the fire?
After hearing the fire alarm in the network room, you see smoke flowing from a server. One of your coworkers is already attempting to calm it down with a pail of water as you yell and urge him to stop.

Correct! Wrong!

Correct answer: a fire extinguisher of class C

For electrical fires, special dry fire prevention or extinguishing chemicals, such as carbon dioxide, should always be used.

What is the best way to describe the objective of electrical grounding if you're the senior administrator and a new employee at the IT help desk has just started, and you've been tasked with showing him the ropes? While reviewing general safety procedures, the new employee inquires about the target of grounding electrical systems.

Correct! Wrong!

Correct answer: a method of removing unwanted electrical discharge from connected components

Grounding allows any excess electrical charges to be securely transported away from the equipment receiving the power. This prevents the electrical spike from destroying the linked gadget right away.

A junior security professional on your team is attempting to export and share a public certificate with a colleague outside of the IT department. They want to know if they should utilize CER or PFX. What is the best format to use?

Correct! Wrong!

Correct answer: CER

It's fine to share a.CER file containing a public certificate. A.PFX file (also known as a PKCS 12 archive) is different since it contains the private key, which should never be shared!

What exactly does the phrase "blackout" mean?

Correct! Wrong!

Correct answer: Power outage

Power outage refers to the term "Blackout".

In the following scenario, what special safety devices would be most appropriate for his environment?
After selling yourself as an IT consultant, one possible client calls you about multiple network design projects at his organization. There are tons of airborne particles afloat all the time in the factory where he works. He's curious about any unique considerations he should make when setting up his machines.

Correct! Wrong!

Company A has recently developed a custom airline ticketing system. When a freelance coding specialist examines it for security flaws, what do you call it?

Correct! Wrong!

Correct answer: Regression testing

If a freelance coding specialist tests it for security flaws, it is called regression testing.

What would be excluded from personally identifiable information (PII)?

Correct! Wrong!

Correct answer: Name of a high school teacher

Your address, first and last name, social security number, date of birth, and work details are included in personally identifiable information (Pll).

During an IT meeting, your colleague Karylle proposes that the only load balancer in place for the company's website ordering system has a single point of failure. She recommends configuring two load balancers, with only one in use at any one moment. What kind of load balancing setup does Karylle recommend?

Correct! Wrong!

Correct answer: Active-passive

Two load balancers are used in active-passive configurations, one of which is active. The second load balancer takes over when the active load balancer becomes unresponsive. The answers a, c, and d are incorrect. Load balancing algorithms such as round robin and least connections are not connected to fault tolerance when using multiple load balancers. Both load balancers are active at the same time and work cooperatively to distribute incoming traffic to back-end nodes in an active-active configuration. As a result, the right answer is b.

Click for next FREE CompTIA Test
CompTIA Operational Practice Test #2

Premium Tests $49/mo
FREE April-2024