1002 test

¡Supera tus tareas y exámenes ahora con Quizwiz!

13. Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? (Select two.) A. UPS B. Server rack C. PoE phone D. Desktop printer E. Modem F. Patch panel

UPS Server rack

52. A technician is removing a virus from a user's Windows workstation. The virus was installed by the user while downloading pirated software from the Internet .Which of the following should the technician do to address this issue? A. End the current explorer.exe task. Update and run an antivirus scanning utility to remove the threat. Relaunch explorer.exe using Task Manager. B. End the current explorer.exe task using the command line. Update and run an antivirus scanning utility to remove the threat. C. Launch explorer.exe using Task Manager. Update and run an antivirus scanning utility to remove the threat. D. Update and run an antivirus scanning utility to remove the threat. Launch explorer.exe using Task Manager.

Update and run an antivirus scanning utility to remove the threat. Launch explorer.exe using Task Manager.

26. A technician responds to a report that a user's desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly .Which of the following should the technician attempt that will MOST likely resolve the performance issue? A. Roll back the OS upgrade. Continue using the older version of Windows B. Reset the PC to its factory conditions. Perform the OS upgrade again C. Update the SATA controller driver from the manufacturer's website D. Perform a full backup and replace the hard drive

Update the SATA controller driver from the manufacturer's website

54. Which of the following should a technician do to ensure static electricity does not damage the internal components of a PC while troubleshooting the motherboard? Use ESD straps Remove all jewelry. Disconnect the power. Remove the power supply.

Use ESD straps

56. A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the ransom .Which of the following would MOST likely minimize the damage to a fileshare in this type of situation? Enable System Restore on the file server and make frequent restore points. Disable full disk encryption on the file server. Install a next-generation firewall at the network edge. Use a host-based intrusion detection system and continuously monitor filesystem changes. Use granular file permissions on the share and follow the principle of least privilege.

Use a host-based intrusion detection system and continuously monitor filesystem changes.

50. A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings.Which of the following Control Panel utilities should the technician use to accomplish this task? A. Network and Sharing Center B. Sync Center C. Credential Manager D. User Accounts

User Accounts

6. A technician replaced the hard drive for the organization's Chief Financial Officer (CFO). The technician wants to reuse the old drive in another system. Which of the following actions would be MOST appropriate? A.Format the drive. B.Degauss the drive. C.Wipe the drive. D.Drill the drive. E.Shred the drive.

Wipe the drive

22. A technician needs to configure network shares on users' computers when they log on. The technician wrote the script with the net use command .Which of the following script file types is the technician writing? A. bat B. .sh C. py D. .js

bat

A technician is troubleshooting a network connectivity issue on a Linux workstation .Which of the following commands would help the technician gain information about the network settings on the machine? A. chmod B. grep C. ifconfig D. sudo

ifconfig

A technician is installing the latest OS on a user's system. The user wants all of the settings and file to remain intact during the installation.Which of the following upgrade methods should the technician use? A. network installation B. clean install C. in-place upgrade D. image deployment

in-place upgrade

4. A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange: A.keys B.passwords C.root CA D.tokens

keys

23. A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share .Which of the following commands should the technician use FIRST? A. ping B. nslooking C. net use D. ipconfig

net use

A user has changed the MAC address of a laptop to gain access to a network.This is an instance of: A. spoofing B. brute force C. man-in-the-middle D. a botnet

spoofing

18. A user's mobile device has slow data speeds. The user first noticed the slow speeds after downloading a large application to the device. The application download MOST likely caused: A. a hardware issue on the device. B. the device to run more slowly. C. the user to exceed the monthly data limit. D. the device to change to WiFi settings.

the user to exceed the monthly data limit.

10. A special type of ESD-safe vacuum cleaner may be necessary to safely clean large spills of: A. toner. B. battery acid. C. ink. D. filament.

toner.

8. A user opens a phishing email and types logon credentials into a fake banking website. The computer's antivirus software then reports it has quarantined several temporary Internet files. A technician disconnects the computer from the network . Which of the following should the technician perform NEXT? A.Have the user change the password. B.Update the antivirus software and run scans. C.Disable the user's local computer account. D.Quarantine the phishing email.

Disable the user's local computer account.

11. A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs . Which of the following should the technician implement to ensure maximum uptime of the client VM? A. Cloud storage backup B. Large file storage C. Image-level backup D. Uninterruptible power supply

Image-level backup

58. A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information .Which of the following BEST describes the technician's concern with loading this application on the user's computer? Incompatibility Impact to the network Impact to the user Impact to the device

Impact to the device

35. A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall. To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed? A. Default gateway B. Proxy server C. WINS server D. DHCP settings

Proxy server

31. A. user ran updates on a Windows computer recently. Since then, the external CD drive no longer reads discs. The user has connected the external drive to another computer that has not been updated and then successfully ran the discs .Which of the following should the user do to fix the issue? A. Upgrade the drive. B. Replace the discs. C. Roll back the drivers. D Reinstall the firmware.

Upgrade the drive

5. Which of the following is the maximum amount of RAM a computer can access if it is using a 32-bit version of the Windows OS? A.2GB B.4GB C.6GB D.8GB

4GB

39. A customer built a computer with the following specifications:Single hexa-core processor8GB DDR4 memory256GB SSD driveBuilt-in graphics card32-bit Windows OSAudio editing softwareThe computer seems to be working, but the OS reports only 3.5GB of RAM is available .Which of the following would correct the issue? A. 16GB DDR4 memory B. 64-bit Windows OS C. Dual hexa-core processors D. 512GB SSD drive

64-bit Windows OS

33. A technician is reviewing system updates. Some of the updates address vulnerabilities found in mission-critical servers, and they need to be performed immediately .Which of the following should the technician perform FIRST? A. Risk analysis B. Back-out plan C. Change board D. Implementation plan

A. Risk analysis

21. A team needs to deploy a temporary server room at a site to provide support during construction.Which of the following should they use at this site while setting up the server room? A. Air filters B. Privacy screens C. Vacuums D. ESD mats

Air filters

40. A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in .Which of the following is the BEST choice for the technician to make? A. Politely ask the user to call back B. Ask another technician to take the call C. Troubleshoot the issue for the user D. Input the issue as a ticket and escalate to Tier 2 E. Put the user on hold and troubleshoot after the scheduled break

Ask another technician to take the cal

67. During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade .Which of the following plans must be implemented to revert back to the most recent version of the firmware? Backout plan Contingency plan Alternative plan Backup plan

Backup plan

A smartphone user receives notice that a threshold for high-speed data usage, despite the user's usage behaviors being unchanged from previous periods .Which of the following troubleshooting steps should the user take FIRST? A. Check network access permissions on recently loaded applications. B. Limit data usage to WiFi networks only. C. Wipe the device and restore to the factory default. D. Change the lock screen password.

Check network access permissions on recently loaded applications

64. An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office .Which of the following would MOST likely reduce this symptom? (Select TWO). Close applications when tasks are completed. Increase the time to dim the screen automatically. Increase the frequency for syncing corporate email. Set the smartphone display to maximum brightness. Connect to the office WiFi network automatically. Disable 802.11ac and use mobile data exclusively.

Close applications when tasks are completed. Connect to the office WiFi network automatically.

32. A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails .Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user's request? (Select TWO). A. MAC filtering B. Default SSID C. Radio power levels D. Content filtering E. Physical security

Content filteringcorrect Physical security

20. An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for subscribing to an organization's mailing list .Which of the following should be performed to remove and prevent any further emails from this organization? A. Click the "Unsubscribe" button on each unwanted email B. Send the unwanted items to the spam or junk folder C. Deploy an email address whitelist D. Create domain-based filters

Create domain-based filters

Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger. Which of the following would be the BEST resolution to Ann's issue? . A. Restart the table B. Disable and then renewable Bluetooth C. Calibrate the touchscreen sensor D. Disconnect and then reconnect the stylus

D. Disconnect and then reconnect the stylus

43. Following instructions from the help desk, a company employee turns off a workstation that has a suspected ransomware infection. A technician is dispatched later to investigate the workstation.Which of the following should the technician perform FIRST? A. Disconnect the network cable. B. Disable System Restore C. Boot into safe mode D. Update the antivirus software. E. Recover from a restore point

Disconnect the network cable.

36. A network administrator received a report that the disk storing the accounting department's files has less than 10% free space. An extra was installed in the file server and is unused .Which of the following OS management features would allow for additional disk space for the department, avoiding downtime? A. Disk quotes B. Disk defragmentation C. Extending partitions D. Distributed file system

Disk quotes

68. While troubleshooting a software error on a user's computer, a technician finds inappropriate content.Which of the following should the technician perform FIRST? Preserve the data on an external drive. Report the discovery through proper channels. Document the findings. Erase the data and inform the user.

Document the findings.

61. An employee reported that a suspicious individual was looking through the recycle bin .Which of the following types of social engineering threats is this? Phishing Spear phishing Dumpster diving Impersonation

Dumpster diving

71. A technician is setting up a new laptop for a doctor to take to a conference. The laptop contains private health information, and the technician needs to ensure the laptop is protected from unauthorized access in case it us lost or stolen .Which of the following the technician implement the BEST meet this requirement? (Select TWO.) UEFI password Privacy screen protector Login time restrictions User account restrictions Password expiration Full disk encryption

EFI password Password expiration

. After a successful phishing attempt on a corporate workstation, the workstation is infected with malware that went undetected by the antivirus. When a technician arrives to investigate the issue, the workstation is no longer in a bootable state. Recovery is not possible, and the operating system has to be reinstalled completely .Which of the following would MOST likely prevent a future infection? A. Creating regular restore points B. Educating the user C. Scanning for viruses frequently D. Channing to a different antivirus vendor

Educating the user

2. Which of the following security tools can leverage the onboard TPM to protect data at rest? A.Encrypted file system B.Access control list C.BitLocker D.Secure file transfer protocol

Encrypted file system

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.Which of the following should the technician have covered previously as part of the original repair? A. End-user education B. Pre-installation environment cleaning C. Disabling of System Restore D. Infected system quarantine

End-user education

19. A user calls the help desk to report issues with multiple pop-ups and degraded PC performance. The user is out of the area, and assistance can only be provided remotely .Which of the following steps should a technician perform? A. Establish a remote connection, install free third-party malware software, scan the machine for malware, and restart the machine. B. Explain the steps to access safe mode with networking, establish a remote connection, run approved malware tools, and restart the machine. C. Establish a remote connection, install a free third-party backup tool, back up the user's software, and instruct the user on how to reinstall Windows. D. Explain the steps to access safe mode with networking, set a restore point, run company-approved malware tools, and restart the machine.

Explain the steps to access safe mode with networking, set a restore point, run company-approved malware tools, and restart the machine.

16. A company is creating a disaster recovery plan .Which of the following should be implemented to BEST ensure the company's data can be successfully restored in the event of a disaster? A. File-level backups B. Backups for critical applications C. Regular backup testing D. Backups to cloud storage E. Redundant backups on site

File-level backups

65. A technician is scheduled to upgrade a grocery store's network equipment at 11 00 p.m. There are only a few shoppers in the store, therefore, the store manager wants the technician to start the upgrade early. Which of the following is the NEXT step the technician should perform? Create a back-out plan for the store. Review the change request document Draft the new network diagrams. Get approval from the Change Advisory Board

Get approval from the Change Advisory Board

27. Which of the following are best practices to avoid ESD-related damage when handling internal computer components? (Choose two.) A. Ground oneself before touching components. B. Avoid exposing components to sources of RF C. Maintain cool and dry air in the work environment. D. Handle cards by their edges to avoid contacting ICs. E. Wear adequate eye protection at all times. F. Ensure hardware is plugged into a grounded outlet.

Ground oneself before touching components. Maintain cool and dry air in the work environment.

24. Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system? A. Local Administrator B. Standard User C. Power User D. Guest User

Guest User

72. A customer Is having trouble opening several files on a computer. The customer renames one of the files, but then the correct program will no longer open it.Which of the following settings is a solution to the issue? Set the view options to detail. Hide the extensions. Utilize Credential Manager. View the system files

Hide the extensions.

42. Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware .Which of the following should the technician check NEXT? A. Hijacked email B. DNS entries C. Hosts file D. POP3 errors

Hijacked email

1. A technician is deploying a PXE installation of a new OS onto a small group of company workstations . Which of the following should the technician monitor during the installation? A.Impact to the workstations B.Impact to the users C.Impact to the network D.Impact to the DHCP pool

Impact to the network

A technician has completed troubleshooting and repairing a newly found bug on a user's workstation. The technician wants to share the repair steps with the rest of the team .Which of the following methods will the technician MOST likely use? A. Knowledge-base entry B. Team chat message C. Email to the team leader D. Incident documentation

Incident documentation

75. Which of the following security settings can be changed on a folder to stop permission propagation and assign new rights? Inheritance Ownership Sharing Encryption

Inheritance

25. A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point .Which of the following should the technician do NEXT? A. Run the scan again to ensure all malware has been removed B. Quarantine the infected workstation from the network C. Install all of the latest Windows Updates to patch the system D. Educate the user on safe browsing practices

Install all of the latest Windows Updates to patch the system

17. After receiving a replacement smartphone. a corporate user is able to open some emails but is unable to open encrypted emails .Which of the following troubleshooting steps should a technician take NEXT? A. Place the previous certificate in escrow. B. Verity the installation of S/MIME on the phone C. Ensure the users public Key is in the global address list D. Instruct the user to wait for synchronization to complete.

Instruct the user to wait for synchronization to complete.

60. A user is working with the command line interface on a Linux computer To show the contents of the current directory, which of the following commands should be used? Is dir -get mv

Is

14. After installing an application on a smartphone, a user starts receiving pop-up ads for recently visited physical stores. The user also receives prompts to install other applications . Which of the following permissions should be revoked to disable the unwanted notifications? A. Account access B. Mobile data C. Location access D. Contacts access

Location access

70. Which of the following identifies changes in the environment, such as alternating current failure? UPS monitor MSDS ESD mat Surge suppressor

MSDS

74. Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch .Which of the following must Ann do to allow FTP communications? Create a static DNS entry on the server for the PC Change her NIC IP address to dynamic Create a new exception on her local firewall Make sure the PC's IP is in the management VLAN

Make sure the PC's IP is in the management VLAN

47. A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected.II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger? A. Update all antivirus definitions and run a full scan on all networked computers. B. Make sure the operating systems on all networked computers are fully patched and up to date C. Update all software drivers and firmware on all the affected computers. D. Enable geofiltering on the network firewall to stop unwanted communications.

Make sure the operating systems on all networked computers are fully patched and up to date

A Microsoft application will not open when a user clicks on it. Instead, the following error message pops up: This application has crashed. Would you like to send an error report to Microsoft.Which of the following should the user try FIRST? A. Open the application with administrative privileges. B. Open a run command and then type the application name. C. Reboot the computer into sate mode and try to open the program. D. Uninstall the program alter saving any associated data and reinstall the program.

Open the application with administrative privileges.

53. A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users .Which of the following should the technician add to meet the multifactor requirement? A. Passphrase B. Knowledge-based authentication C. PIN D. Thumbprint

PIN

66. A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely .Which of the following solutions must the hardware be able to support? (Choose two.) Image deployment Multiboot PXE Unattended installation USB Wake-on-LAN

PXE Wake-on-LAN

69. A customer's computer is having difficulty opening programs and regularly receives error messages regarding low system resources .Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made? Data execution prevention Page-file size Visual effects Processor scheduling

Page-file size

48. A Chief Information Officer (CIO) recently learned a critical update is required to secure several servers within the organization. The CIO asks a technician to:✑ Deploy the patches to the environment following best practice protocols.✑ Ensure the servers and applications are functioning properly after the deployment.Which of the following steps will the technician most likely take NEXT? A. Document the business processes. B. Scope the change. C. Perform a risk analysis. D. Develop a back-out plan. E. Document the changes.

Perform a risk analysis

3. Which of the following would MOST likely be used by an attacker to identify the hash value of a strong password quickly? A.Brute force B.Key stretching C.Rainbow table D.Dictionary attack

Rainbow table

76. A user reports that an application has been closing unexpectedly for the past two days when posting transactions. When an administrator attempts to access the application, it generates an error stating a datalibrary is missing.Which of the following should a technician attempt FIRST? Uninstall and reinstall the application using the Windows Control Panel. Reinstall the application using the Windows Control Panel Repair the application using the Windows Control Panel.correct Locate the missing data library and copy it to the Windows program folder.

Repair the application using the Windows Control Panel.

62. A technician has installed a second monitor for a customer, but the desktop font sizes do not match .Which of the following display settings should be technician adjust to correct this issue? Resolution Refresh rate Extended monitor Color depth

Resolution

41. A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.Which of the following would MOST likely fix the issue? A. Roll back update B. Disable the Windows Update service C. Check for updates D. Restore hidden updates

Roll back updates

55. A user recently browsed several online shopping sites on a computer. Since then, the user has been experiencing pop-ups that appear in the browser. The pop-ups also display in the rightcorner of the screen without the browser open .Which of the following should the technician do to remove the pop-ups? Enable a firewall. Apply OS security updates. Boot the computer in safe mode and run chkdsk. Run an anti-malware application

Run an anti-malware application

49. A company has hired a new IT firm to manage its network switches and routers.The firm is geographically separated from the company and will need to able to securely access the devices.Which of the following will provide the ability to access these devices? A. Telnet B. SSH C. RDP D. VNC

SSH

7. A user suspects a computer Is infected with malware. A technician identifies the symptoms as being related to a recent spread of malware . Which of the following steps should the technician take NEXT to address the infection? A.Educate the end user B.Schedule scans and run updates. C.Disable System Restore. D.Remediate the infected system.

Schedule scans and run updates.

34. A technician is setting up a SOHO router for a customer. Per the customer's requirements, data security is the highest priority .Which of the following provides the MOST security for the network? A. Set up encryption for wireless B. Set up port forwarding. C. Set static IP addresses. D. Change the default SSI

Set up encryption for wireless

73. When an employee logs in to a computer, access is automatically granted to all applications .Which of the following must be enabled to facilitate this capability? Single sign-on Authentication permissions Microsoft Management Console Administrator rights

Single sign-on

57. A security learn recommends a disaster recovery plan with the following requirements:* Recent backups should be readily available.* Only long-term backups should be stored off premises* There should be minimum expenditure on hardware .Which of the following satisfies all of these requirements? Store 30 days of backups on premises and then age the backups to the public cloud Store backups on premises and burst to the public cloud if needed. Store backups both on premises and in a public cloud infrastructure Store all the backups in a public cloud with no on-premises backup storage

Store 30 days of backups on premises and then age the backups to the public cloud

59. A company is implementing multifactor authentication and requires a solution that utilizes TCP .Which of the following will the company MOST likely select? SNMP TACACS+ DHCP RADIUS Kerberos

TACACS+

51. A technician is attempting to resolve an issue with a customer's smartphone. The customer can no longer unlock the smartphone due to an "incorrect pattern" message appearing onscreen, The customer explains that the option to "make pattern visible" is unchecked in the security settings. The customer has also unsuccessfully tried to unlock the smartphone using a PIN. The customer is certain the pattern and PIN being entered are both correct. The technician is unable to click the proper options onscreen to perform a reset, but can select it without issue using the side buttons designed for volume and power .Which of the following describes the root cause of the issue? A. The smartphone's data cable is disconnected. B. The smartphone's side buttons are becoming sticky. C. The smartphone has very little free space available. D. The smartphone screen needs to be calibrated.

The smartphone screen needs to be calibrated.

15. Joe, a user, did not receive emails over the weekend like he usually does. Productivity software is functioning properly. Joe never powers off his computer and typically leaves all applications open. No other users are reporting email issues .Which of the following is MOST likely the cause of the issue? A. There is an OS update failure. B. Out-of-office is turned on. C. There is an Internet connectivity issue. D. SMTP services are not running.

There is an Internet connectivity issue.

63. A user's laptop screen goes black after five minutes of not being used .Which of the following Windows Control Panel utilities should be used to modify the user experience? Troubleshooting Internet Options Power Options Device Manager

Troubleshooting


Conjuntos de estudio relacionados

Genetics: Cell Cycle, Mitosis, and Meiosis

View Set

Prevention/Eval/Treatment Exams/Quizzes/ Assignments

View Set