ads

8 November 2024

CompTIA A+ Core 2: Best Practice Procedures for Malware Removal

 


Question:

Why do you want to disable system restore?

  • To prevent a future technician from restoring the virus back onto the machine


Question

:

Why do you want to create a system restore point once the malware has been remediated?

  • This gives a technician the first known good configuration as a point to restore to in case of any problems with future updates or application installations


Question

:

What would be considered best practice for users to consider when replying to emails?

  • Do not provide passwords in plaintext

  • Never include financial or personal information


Question

:

Which tools can be used to identify running processes?

  • Process Explorer

  • Windows Task Manager


Question

:

Which options do you have to deal with infected files?

  • Remove them

  • Quarantine them

  • Disinfect them


Question

:

Which malware characteristics would you want to look for when conducting malware research?

  • Malware category

  • Vulnerabilities exploited

  • Services attacked


Question

:

Which other media would you want to enable automatic scanning of?

  • Email attachments

  • Removeable media


Question

:

Which are some typical symptoms that a computer may show when infected with spyware?

  • Pop-up windows begin to appear

  • The local firewall has been disabled

  • The browser homepage has changed


CompTIA A+ Core 2: Backup & Recovery Methods

 

Question
:

What is the primary benefit of off-site backup storage?

Recovery from any location

Question
:

Backing up information such as the Active Directory in a Windows environment, or the specific users on a mobile device, is considered to be part of which process of a disaster prevention and recovery plan?

Account recovery

Question
:

Which type of backup always uses the most recent full back up as a reference to determine which files should be backed up?

Differential

Question
:

Which component of determining how frequently backups should be performed defines the amount of acceptable downtime?

Recovery time objective

Question
:

Which statement correctly describes the 3-2-1 backup rule?

3 data copies, 2 media types, 1 off-site copy



11 Julai 2024

Artificial Intelligence: Basic AI Theory

 

Question: What is the output of this Python code?
import matplotlib.pyplot as plt
plt.figure()
y = np.random.hypergeometric(ngood=5, nbad=5, nsample=6, size=100)
plt.plot(y)
plt.show()
  • A graph with the amount of good samples drawn 100 times from random hypergeometric distribution, 5 good and 5 bad options, and 6 samples drawn
Question
Place these events in the correct sequence.
  • Theoretical background for AI is created
  • First commercial AI system is developed
  • First Big Data AI system is developed
  • State-of-the-Art AI technology is developed
Question
Which of the following approaches enable ethical use of AI?
  • Using encryption to secure computations
  • Utilizing control structures to prevent undesired actions
  • Federated learning approach to anonymize data


Question

Match the qualities of overfitting and underfitting.

  • Underfitting - Connections between neurons do not form well enough - Low amount of repetitions (epochs) on data training
  • Overfitting - Large amount of repetitions (epochs) on data training - Dataset memorization - Model may perform well on training and validation data, but not on new data


Question

Identify features of a regular software system and an AI system.

  • Regular Software - Is a deterministic system - Execution of the product poses no uncertainty - Clear technical requirements
  • Artificial Intelligence - Performs differently based on input data - Processing steps are not directly programmed by the developer

Question

Which of these packages have databases included as a part of them?

  • TensorFlow
  • SK-Learn

Question

Rank these fields by their presence in AI research throughout history.

  • Text Processing AI
  • Computer Vision AI
  • Communication AI
  • Big Data AI
  • AI for Robotics


Question

Match the following AI tools with their functions.

  • Helps a machine learn from its mistakes
  • Helps a machine understand its objectives and possible dangers in its environment
  • Used to make quantifying predictions or identify objects
  • Developed based of neuron structure inside our brains and can be used for object detection, text understanding, and more

Question
Which of the following is a way Big Data benefits Artificial Intelligence
  • Use of Big Data AI gives businesses an opportunity for competitive advantage
  • New models can be trained with larger datasets
  • Internet increases data availability and makes it more accessible

Question

Match reliable and unreliable conditions of using AI.

  • Unreliable conditions - Fully automated marketing through AI technology - Self-driving technology during heavy snow - AI doctor with no human oversight
  • Reliable conditions - AI tested in a fully controlled laboratory environment - AI assistant used for data processing task

Question
Which of these are key mistakes to look for in AI development?
  • AI doing its own thing
  • User corruption
  • Disconnect between AI developers and their customers
  • Racial bias

Question
Match a particular research breakthrough with its description.
  • AlphaStar - AI agent which can play e-sports better than professionals
  • GAN - Neural networks utilized for data generation based on examples - Neural networks utilized for image generation based on examples
  • RF-Pose - Technology which allows to utilize signal strength to track object position

1 Julai 2024

Microsoft Azure Architect Technologies: Managing Azure AD

 



Question:

Where in the portal is user self-service password reset enabled?

  • Azure AD


Question

:

What is the default Azure AD tenant DNS name suffix?

  • onmicrosoft.com


Question

:

Which PowerShell cmdlet is used to create a new Azure AD user?

  • New-AzAdUser


Question

:

Which file format is used when importing users for bulk create?

  • CSV


Question

:

After enabling user MFA, what MFA status appears for the user?

  • Enabled


Question: You want to automate Azure AD user creation using the CLI. What is missing from the following CLI statement?

az ad user create --display-name "Jen Hill" --user-principal-name jhill@stefansammsoutlook.onmicrosoft.com 
  • Password
Question: You are creating an Azure AD user through the portal. Which create options are you presented with?
  • Invite user
  • Create user

Question: Which statements regarding Azure AD guest users are correct?
  • Guest users can be assigned access to apps
  • An invitation email is sent to the user

Question: You want to use PowerShell to import users from a CSV file. Which PowerShell cmdlet accomplishes this task?
  • Import-Csv

Question: MFA users receive a verification phone call from Microsoft. What must the user enter to compete the sign-in?
  • #

Question: Which statement regarding assigning Azure AD licenses are correct?
  • The user must have a usage location specified
  • The licenses must first be added to Azure AD

Question: You would like to require current and future Azure AD users to use MFA. What should you do?
  • Enable an MFA registration policy

Question: Which are components of a conditional access policy?
  • Conditions
  • Access controls

Question: What is the purpose of MFA bypass?
  • Simple authentication from trusted networks

Question: Which type of managed identity is its own Azure resource?
  • User assigned

Question: You suspect Azure AD groups that no longer need app access still have active permissions. Which tool can you use to verify this?
  • Access review

  • Question: You have configured a banned password list, yet users are still able to set new passwords using banned items. What is the most likely cause of the problem?
  • The mode is not set to enforced

Question: Which are valid Azure AD MFA verification options?
  • Mobile app
  • SMS text message

Question: You need to configure an Azure AD registered app with claim information required by the app. Which option should you configure in the registered app?
  • Token configuration

25 Jun 2024

Google Associate Cloud Engineer: Google Cloud Operations Suite

 

Question:

What is the name of the script that needs to be downloaded and ran, in order to install the cloud monitoring agent on a Linux device?

  • add-monitoring-agent-repo.sh


Question

:

Which API is ran by an equipped application manage error reporting to the cloud error reporting console?

  • gcloud beta error-reporting


Question

:

Which of the options are valid sink destinations?

  • Cloud Logging Bucket

  • BigQuery data set

  • Cloud Storage Bucket


Question

:

The cloud logging agent is an application that runs on your virtual machines and is based on which open-source data collector?

  • Fluentd


Question

:

What is the name of the request that is sent to a resource to see if it responds in a timely manner? These requests are useful to determine the availability of your VM instances, URLs and app engine services.

  • Uptime checks


Question

:

Which pane in the logs explorer console must be added to the page and offers a high-level summary of the logs data and gives users a more practical way to refine queries?

  • Logs fields pane


Question

:

What must be created as part of an alerting policy in order to advise administrators of problems within our GCP project?

  • Notification channel


Question

:

When creating user defined logs-based metrics, what are the two metrics types available?

  • Counter

  • Distribution


Question

:

Which type of insights into your application can you gather from using the cloud trace tool in the Google cloud console?

  • Application requests

  • Application latency


Question

:

Which is the URL to view status information on all the services that make up Google cloud?

  • https://status.cloud.google.com


Question

:

Which option is available to users to inject logging into our running app without the need to restart it?

  • Log point


Question

:

The legacy log viewer allows users to view and organize their log data for which options?

  • For a single cloud project


Question

:

What must you configure in your GCP project to ensure that all new VMs created automatically install the monitoring and logging agents?

  • Agent rules


Question

:

Google cloud monitoring allows you to view and organize metrics in which ways?

  • For multiple projects across multiple organizations

  • For multiple projects in a single organization

  • For a single project


Question

:

When creating resource groups, which criterion can you select to produce your resource groups with the most precision?

  • Security group

  • Resource type

  • Tag


Question

:

Which of the options are resource types that custom metrics can be created for?

  • k8s_cluster

  • gce_instance

  • aws_ec2_instance