CompTIA - My Build Up Confirmed

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

How many partitions can be active at any given point in time?

1

A customer built a computer with the following specifications: -single hexa-core processor; 8GB DDR4 memory; 256GB SSD drive; build in graphics card; 32-bit Windows OS; Audio editing software. The computer seems to be working, but the OS reports only 3.5GB of RAM is available. Which of the following would correct this issue?

64-bit Windows OS

Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?

A firewall exception must be set.

What is a HomeGroup?

A home network that allows you to share files and prevent changes from being made to those files.

Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?

AES

Which of the following is the MOST secure wireless security protocol?

AES

A technology team is creating limits and guidelines for the use of a company provided software, equipment, and Internet access. Which of the following policies is needed?

Acceptable use policy

Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?

Acceptable use policy

A company is implementing a work from home policy. As a result, the security team needs to provide guidelines and recommendations to ensure such an infrastructure and have more control over user's mobile devices. Which of the following should the security administrator recommend? (choose 2)

BYOD policy; MDM policy

A customer brings an old computer to a repair shop and asks for advice with regard to its repair or replacement. The PC has numerous errors during the boot process and is running a very outdated OS. Which of the following should the tech do?

Advise the customer that the cost of repair is more than a new PC

Which of the following would a technician use to store memory chips from a laptop safely after an upgrade?

Antistatic containers

What section of the Task Manager shows all open tasks?

Applications

What are the tools associated with Task Manager?

Applications, Processes, Services, Performance, Networking, and Users

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as "ConnectMe" and appears as unsecure. Which of the following should the help desk perform to fix the issue?

Ask Ann to open a browser and watch for a redirect page

A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?

Ask another technician to take the call

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?

Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time

A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

Asset ID, MAC address

A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW?

Backout plan

A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end user's computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator most likely create? (choose 2)

Backout plan; Plan for change

What is the "r sync" command used for?

Backup and restore files

What is Time Machine used for?

Backup and restore files and images

During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware?

Backup plan

Which of the following provide the BEST security for a server room? (Select two.)

Badge Reader; Biometric Lock

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future?

Battery backup

A tech recently updated a printer driver on all the computers in an office. Shortly after the update, sever user's accounts and passwords were compromised. Which of the following most likely explains the compromised accounts?

Botnet

A user's smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

Check the application permissions

A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT?

Check the boot order

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?

Check the contents of the hosts file

A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST?

Check the status of the print server queue

An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do next to mitigate the issue?

Check the system logs

An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application?

Client/Server

Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be appropriate action for Joe?

Contact his supervisor so the supervisor can make scheduling changes.

A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)

Disable guest account; modify autorun settings

A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?

Disable the user accounts

A network administrator has noticed unusual activity with a user's login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access. Which of the following should the network administrator do NEXT?

Disable the user's AD account

Ann, an end user, is utilizing a stylus tablet. The recognition point is off when she uses stylus, but it registers in the correct spot when she uses her finger. Which of the following would be the best resolution to Ann's issue?

Disconnect and then reconnect the stylus

Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a "click here" button to resolve it. There is a timer in the pop-up counting down the time until the computer is no longer usable. Which of the following should the technician do NEXT?

Disconnect the Ethernet cable from the workstation and disable WiFi.

A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST?

Disconnect the PC from the network

A tech receives the CEO's Windows laptop, which has been infected with malware. The tech wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the tech perform first in this scenario? (choose 3)

Disconnect the device from the network, Identify and research the symptoms and Scan and use removal techniques

A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 is very high, while Inbound network traffic is slow. Which of the following tasks should be done FIRST?

Disconnect the network cable

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

Disconnect the power before servicing the PC.

What does the "chkdsk" command do?

Displays status report of the hard drive, correct file system problems, and attempt to repair disk errors.

A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed next to further troubleshoot the issue? (Choose 2)

Do a force stop; Clear the application cache

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped them change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

Document a backout plan to roll back changes to the router

A technician is working on a virtual server migration project. The tech has already completed the SOW. However, the servers will not work without a critical network configuration that was missed in the original SOW. The tech needs to make the adjustments quickly. Which of the following best practice processes should the tech perform next?

Document the changes and perform the work.

A systems administrator needs to add security to the server room. Which of the following would provide the BEST security for the room? (Choose two.)

Door locks; Privacy window

What system requirements should be considered when installing applications?

Drive Space and RAM

A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?

Drive wipe

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

Driver detection

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

Dumpster diving

Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

Dumpster diving

A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?

EFS security

A desktop technician needs to replace a laptop's SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement?

ESD Straps

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair?

End-User education

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

Ensure the server is patched with the latest security updates

What is the "nslookup" command used for?

It is an administrative command line used to test and troubleshoot DNS servers.

Wich is a logging tool that records errors and warnings generated by Windows?

Event Viewer

A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error. Which of the following tools should the technician use?

Event viewer

Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some websites, and web services are not responding from any of the web browsers, although Joe can access these services from his smartphone without issue. The computer's malware scanner had the latest definitions installed. Which of the following would best explain why the computer is functioning this way?

Expired root certificate

A customer is presuming manager to get things done on time. Which of the following has the project failed to do this case?

Follow up with the customer after project completion

A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users' mobile devices? (Select TWO).

Full device encryption; Biometric authentication

What is full duplexing?

Full duplexing allows everyone to send and receive at the same time.

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter "J" assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive? A. GPT B. Dynamic C. Basic D. Extended

GPT

A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue?

Hard reset the cell phone

Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware. Which of the following should the technician check NEXT?

Hijacked email

What protocol does the ping command use?

ICMP - Internet Control Message Protocol

An end-user reports a Windows computer is infected with a virus. Which of the following should be the technician's first troubleshooting step?

Identify malware symptoms

A technician logs on to a Linux computer and runs the following command: ps -aux | grep vi. Which of the following MOST accurately describes the effect of the command?

If finds a list of processes running a text editor.

Joe, a user who is traveling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe's slow data speeds?

Joe's data transmission is over the limit

Which of the following is used for building entry and computer access?

Key fobs

Which of the following would MOST likely contain troubleshooting guides?

Knowledge base

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processed and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user most likely received? (choose 2)

Knowledge base articles; Acceptable use policy

What are the two common methods of OS and software installation?

Local (DVD/USB) and network

A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?

Local Users and Groups

At what level can group permissions be applied?

Local, organizational unit, domain and device

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?

Look up the error number associated with the failed update

A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers. Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

Low-level format

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

MAC filtering; Signal strength

A technician determines a newly installed service is keeping a device from functioning in Windows. Which of the following tools should the technician use to keep the service from being loaded on the PC reboot?

MSConfig

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.)

Mapped drives; Denied write/delete permissions

What is the result of the following command: "net use M: \\server\share."

Maps a network location to M.

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed?

No boot device

A user has reported that a computer is running extremely slow when opening applications. A technician checks the computer and needs to verify memory utilization. Which of the following tools should the technician use to begin troubleshooting the issue?

Performance

What tool can be used to view performance counters?

Performance Monitor

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?

Physical network diagram

A customer's computer is powered on and working, but the customer is unable to get to any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?

Ping

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

Power levels

Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose 2)

Power supply; CRT monitor

Which of the following built-in accounts was removed in Windows 10?

Power user

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used?

Privacy screen

A user's computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT?

Preserve data integrity

A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall. To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator lock to prevent them from being changed?

Proxy Server

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Choose two.)

Proxy settings are configured improperly; There is a rogue anti-malware program

A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on to the device and opens terminal. Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?

Ps and kill

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)

Put the terminal server into the router's DMZ; Block all unused ports on the LAN smart switch

A large corporation wants to secure its wireless network so only employees can connect. Which of the following technologies should be used to control access by user account?

RADIUS

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

RADIUS

Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key. Which of the following is most likely the cause?

Ransomware

Ann, a technician, is dispatched to a corporate customer that has reported a malware infection. Upon arrival, Ann notices the system is shut off, and she is able to start the computer without incident. Ann also notices numerous pop-ups appear when the web browser is opened. Which of the following should Ann do next?

Report the incident to the appropriate contact.

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

Require authentication on wake-up

A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize. When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups. Which of the following should a technician do to resolve these issues? (Select TWO)

Reset the user's browser to default settings; Remove any unapproved applications from the user's startup items

A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue?

Resolution

What are some common options found under Display Settings?

Resolution, Color depth, refresh rate, and user accounts

A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?

Restart into safe mode

A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT?

Restart the network services

A tech submitted a change control to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is most important to create to ensure the upgrade will not adversely affect the business?

Risk analysis of the change

A tech is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The tech discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the tech do next?

Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.

A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?

Roll back updates

A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have?

Rootkit

A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the "My Documents" folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?

Run DISM and re-add the local power user account

A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose 2)

Run a virus scan with updated signature files; Uninstall any unknown browser extensions or add-ons

A user's Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?

Task Manager

Where would you go to take a look at the CPU usage?

Task Manager - Performance

Where would you go if you want to set the priority of a process?

Task Manager - Processes

A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors. Which of the following Is MOST likely the Issue?

Temperature alarm

A MAC user needs to configure a network device using a serial connection to enable a remote network connection. Which of the following utilities would most likely be used to make the necessary changes?

Terminal

Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do next?

Scan and remove the malware from the infected system.

After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)

Screen locks; screensaver passwords; BitLocker

Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed?

Set up alerts to let administrators know when backups fail.

A user's corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue?

The network directory permissions have changed

A MAC user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

Time Machine

What is the purpose of Task Scheduler?

To allow you to configure jobs to run automatically and unattended

What is the "xcopy" command used for?

To copy files and directories from one location to another.

What is the "ipconfig /flushdns" command used for?

To clear incorrect IP addresses to hostname mappings.

What is the "ipconfig /registerdns" command used for?

To confirm the device is registered with the new IP address.

Which of the following installation types would require the use of an answer file to install the OS?

Unattended

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10. Which of the following installation methods would the technician MOST likely use to accomplish this quickly?

Unattended installation

A user reports slow performance on a computer. A technician checks the computer and finds the RAM utilization Is very high. The technician restarts the computer, and the RAM use is still high. The technician discovers a program running in the background Is using most of the RAM. The user only uses this program once at the end of the year to produce a report. Which of the following steps should the technician take to improve the computer's performance?

Uninstall and reinstall the program

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?

Uninterruptible power supply

An office location regularly experiences brownouts. Which of the following would be the most appropriate solution to protect the office computers?

Uninterruptible power supply

A user is staying at a hotel that only offers Fast Ethernet connectivity to the network, The user's laptop is currently using the corporate network for access to network resources as well as the cloud. Which of the following should the help desk recommend performing prior to using the hotel network?

Unmap all network drives

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?

Update the OS of the smartphones

A technician responds to a report that a user's desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager, and the hard disk and the standard AHC11.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue?

Update the SATA controller driver from the manufacturer's website.

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages' load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem?

Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings

A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform first?

Update the firmware

A user reports malware activity on an isolated workstation used for testing It is running an end-of-life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system. Which of the following did the technician forget to do to prevent reinfection?

Update the local antivirus and set it to scan automatically every evening

What would you expect to see in the Task Manager - Networking tab?

a graphical display of the performance of the network

What information does the Services tab of Task Manger provide?

a list of all running services and the associated ID, description, status and group

What would you expect to see in the Task Manager - Users tab?

a list of users connected to the local machine

A tech is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings. Which of the following Control Panel utilities should the tech use to accomplish this task?

User accounts

A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings. Which of the following Control Panel utilities should the technician use to accomplish this task?

User accounts

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement? (Select two.)

WPA2; Multifactor

The CEO of a company receives an email from a local bank. It states the company's account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following best describes this email?

Whaling

When is the ipconfig command helpful?

When troubleshooting network communication issues.

When do you use a spanned partition?

When you want space from multiple disks to appear as a single logical volume to users.

What does the "netuser" command do?

add, remove and modify user accounts on a computer

What does the Linux "su" command do?

added to the front of a command to change from one user to another upon execution

What does the Linux "sudo" command do?

added to the front of a command to execute using root privileges

What level of permissions is needed to install software?

administrative

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?

air filters

What does the Remote Disk feature on a MAC do?

allows a user to see what computers on the same network have drives available for sharing

What does the workspace switchers feature in Linux do?

allows you to switch back and forth between open programs

What is Wake-on-LAN

an Ethernet standard that allows a sleeping machine to awaken when it receives a wakeup signal.

What a user is allowed to do on a computer network would be addressed in:

an acceptable use policy

What is the "ping" command used for?

To test connectivity between two devices.

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? (Select two.)

UPS; Server rack

What does the "diskpart" command do ?

displays the partitions and allows you to manage them

What is the "tar" command used for?

backs up files (archive)

Which of the following devices provides protection against brownouts?

battery backup

What is the "cd" command used for?

change directory - move the command window from one folder or directory to another

What does the Linux "cd" command do?

change the directory

What does the Linux "chown" command do?

change the ownership of a file

A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Select two.)

chdsk; dism

A technician is troubleshooting a computer that may have some corrupt operating system files. Which of the following command line tools should the technician use to check these files?

chkdsk

Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was most likely the reason for this issue?

end-of-life

Enterprise networks join servers, workstations, and other devices into security associations called _____.

domains

What is the "gpupdate" command used for?

force a device to update as a result in a change in the policy

A company's security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user's workstation?

gpupdate

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

grupdate

A technician is troubleshooting a network connectivity issue on a Linux workstation. Which of the following commands would help the technician gain information about the network settings on the machine?

ifconfig

What command is used to obtain IP address information in a Linux or Unix system?

ifconfig

A technician is installing the latest OS on a user's system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use?

in-place upgrade

A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than the parent folder. Which of the following settings should the administrator change?

inheritance

A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

low-level formatting

What does the Linux "mv" command do?

move a file

In terms of command line prompts, what does ".." do?

moves up one directory

A user is unable to access a network share but can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST?

net use

A technician is using a CLI to perform tasks on a Windows OS. The tech needs to determine which ports are being utilized for TCP listening. Which of the following commands should the tech use?

netstat

You suspect that a host is calling home to a malicious server. What command do you use to verify.

netstat

What network feature is a security issue and should not be used on untrusted networks?

network discovery

You need to determine what DNS server a system is using. What command would you use to accomplish this?

nslookup

What are some common functions performed in Disk Management?

partitioning, formatting, mounting, create and modify arrays

What are the two network types that can be set up in Windows?

peer-to-peer (workgroup) and client/server (domain)

What is the advantage of full duplexing over half duplexing?

performance, as it is faster

What are best practices for maintaining an OS?

scheduled backups, schedule disk maintenance, system updates, patch management, driver and firmware updates, antivirus and anti-malware updates.

What command indicates whether the host can be reached and how long it takes the host to respond?

ping

Which command is helpful when troubleshooting issues with remote hosts?

ping

ping -t

pings the target until you force it to stop using CTRL+C

What is the purpose of the Dock feature on a MAC?

pins applications to the display to allow quick access to applications

What is the purpose of MAC's Boot Camp feature?

provides the ability to create a multiboot environment

What is the "gpresult" command used for?

provides the current and defective policies that are in effect for a specific device

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?

refresh upgrade

What does the Linux "rm" command do?

remove files

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack?

removing guest account

What does Mission Control do on a MAC?

shows all open programs

What is the main purpose of Task Manager?

shut down nonresponsive applications

Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?

single factor

What is another name for peer-to-peer network?

workgroup

What does the Linux "apt-get" command do?

tool that works with software packages

You have a slow remote connections and you would like to find out which part of the path is the problem. What command should you use?

tracecert

What is the equivalent of tracecert when using Linux or UNIX?

traceroute

What is the purpose of Event Viewer?

track all events on a specific Windows computer

How many disks are required to create a spanned partition?

two

What does the xkill" function do?

used in Linux to stop an unresponsive application

What is Force Quit?

used on a MAC to stop an unresponsive application

What does the User Account Management tool do?

used to create, delete, and configure properties of user accounts in Windows 10.

What is required for a user to access a device that is connected to a domain?

username and password

A technician responds to a call from a user who claims to have a virus on a workstation. The tech observes the following notification from the system tray: There are 1033 infected files on this computer. Click here to disinfect. The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan.

Which tool is used to schedule automated tasks, partition hard drives, view logged system events, and manage Windows services?

Computer Management

A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory. Which of the following should the technician use to accomplish this?

Device Manager

Joe, a technician, recently installed drivers for a webcam, but he is now experiencing issues when trying to operate it. Which of the following should Joe check next to troubleshoot the issue?

Device Manager

What are some common features that you would find in the Computer Management Console?

Device Manager, Event Viewer, Shared Folders, Performance Logs

Which of the following BEST describes the Guest account on a Windows system?

. This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions

In which of the following file extension types would a user expect to see the command. "net use T:\\server\files'?

.bat

Which of the following types of scripts would be seen on the user end of a web page?

.vbs

What is the maximum number of workstations that should be joined in a peer-to-peer network?

10

How many partitions can be created on a single disk?

4

Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

4 GB

Which of the following is the maximum RAM limit of a Windows 32-bit version?

4 GB

What is a peer-to-peer network?

A small group of computers with a common purpose all connected to each other for the purposes of sharing resources.

What are the requirements for a HomeGroup?

All devices must be running Windows 7, 8, 8.1 or 10 and the network cannot grow beyond a limited size.

What is the Gestures feature on a MAC do?

Allows the user to select multiple points on the screen and respond to the gesture that the user makes. Ex: resizing a photo.

What does Local Security Policy do?

Allows you to set the default security settings of the system

What is the purpose of the DXDIAG utility?

Allows you to test DirectX functionality, focusing on display, sound and input.

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct. Which of the following is MOST likely causing this error?

An incompatible partition is marked as active

A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a "Stop" error on every boot. Which of the following should the technician complete to resolve the issue?

Boot the workstation in safe mode and disable the graphics driver system tray menu

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?

BrancheCache

A user's mobile device is losing its battery change very quickly. The user report charge at 9:00 a.m. but has 22% battery by 1:00 p.m. The user has installed several applications, and the phone is relatively new, high-end phon. The user claims most of the usage involves checking emails for a few minutes three or four times per hours. Windows of the following should a technician perform FIRST to diagnose the issue properly?

Check the application and their resources usage.

A user is surprised that a newly installed 3rd-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help desk team recommend the user do in this situation?

Cancel installation of the application and report it to the applications source

Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation. Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?

Chain of Custody

Ann, an employee at a company, calls the help desk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

Check all browser cached files on Ann's laptop and log on to another vendor's website; Ask Ann about the notification and review the installed programs

A smartphone user receives notice that a threshold for high speed data usage, despite the user's usage behaviors being unchanged from previous periods. Which of the following troubleshooting steps should the user take first? A. Check network access permissions on recently loaded applications. B. Limit data usage to WiFi networks only C. Wipe the device and restore to the factory default. D. Change the lock screen password

Check network access permissions on recently loaded applications.

When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT?

Check the Windows host file

An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO)

Close applications when tasks are completed.; connect to the office wifi network automatically.

A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.)

Cloud Storage; hot site

What does the Advanced Security tool do?

Configure inbound and outbound rules; import and export policies

A technician is repairing a computer. Which of the following should the technician do to protect the computer from accidental voltage spikes?

Connect a proper ESD strap

A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime?

Connect to a UPS that utilizes the emergency power source

What functionalities are found under Internet Options?

Connections, Security, General, Privacy, Content, Programs and Advanced

Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FDTP from the switch. Which of the following must Ann do to allow FTP communications?

Create a new exception on her local firewall

A sales representative regularly modifies confidential files on a laptop and needs them to be available all the time. The sales representative will be on a six-month business trip in two weeks. A technician has been asked to assist the sales representative with saving files. Which of the following is the BEST method to implement to prevent any data loss for the sales representative?

Create a redundant cloud storage drive.

Joe, an end-user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?

Credential Manager

Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?

Credential Manager

A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?

Date and Time

A technician receives and invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?

Date and time.

A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

Default login; WEP

The medical records department of a local hospital recently upgraded its computers. A technician needs to ensure the data stored on the hard drives is unrecoverable. Which of the following methods should the technician use to the meet the requirement?

Degauss

A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task?

Degaussing

A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which of the following file systems would the customer's drive require?

Ext4

T/F. It is recommended to implement more than one firewall.

False

What is the "fsck" command used for?

File system checker

A user's phone contains customer's PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

Fingerprint Lock

Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician most likely discuss with Ann to educate her on security concepts addressing her concerns? Choose 2.

Firewall; VPN

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

Folder options

What are the common options found under MSConfig?

General, Boot, Services, Startup and Tools

A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user?

Guest

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine?

Guest

Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?

Guest user

What is half duplexing?

Half duplexing allows traffic to go both ways, but only in one direction at a time.

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?

Image deployment

Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?

Image deployment installation

A technician receives a call from an end user in the human resources dept. who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can run in compatibility mode, but it will need to be removed as soon as the user obtains the required information. Which of the following best describes the technician's concerns with loading this application on the user's computer?

Impact to the device

A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which of the following should the technician monitor during the installation?

Impact to the network

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

Inactive VPNs

A company needs to destroy several SSDs that contain sensitive information. Which of the following methods is best suited for the total destruction of the SSDs?

Incinerating

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are: - Two 1GHz CPUs - 2GB of memory - 15GB hard drive - 800x600 screen resolution Which of the following should the technician do to resolve the problem?

Increase the amount of hard drive space

An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A tech works to divert power from other floors until all users are able to work. Which of the following is the best solution for the technician to recommend?

Increase the capacity of the backup generator

Which of the following is a reason to use WEP over WPA?

Increased security

What is Internet Options - Connections tab used for?

to configure connections for an Internet connection, VPN or LAN settings

A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT?

Install all of the latest Windows Updates to patch the system

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take?

Install anti-malware software

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the user's best option given the situation?

Install to a network drive

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

Internet Option - Connections

Where would you go to disable pop-ups?

Internet Options - Privacy

Kim has a file on her computer that is not recognized by the OS. How could you assign a program to use to open the file?

Internet Options - Programs

Where would you go to enable or disable add-ons?

Internet Options - Programs

Joe. a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action?

Inventory management

Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server. Which of the following is the FIRST step the technician should take to correct this issue?

Isolate Joe's computer from the network

What does the Linux "shutdown" command do?

It brings the system down in a secure way

What does the Linux "passwd" command do?

It changes passwords for user accounts

What does the Linux "chmod" command do?

It changes the permissions of files or directories

What does the Linux "ps" command do?

It displays information about a selection of the active processes

What does the Linux "ls" command do?

It lists information about the files in the current directory

What does the Linux "pwd" command do?

It prints the full path name of the current working directory

What does the Linux "q" command do?

It quits the Unix vi full-screen editor

What does the Linux "grep" command do?

It searches text or searches the given file for lines containing a match to the given strings or words.

You use the copy command to copy a file to another location. The original source location has different permissions than the new location. Which permissions will the file have once it has been copied?

It will inherit the permissions of the folder that it was moved to.

What do the Linux commands iwconfig and ifconfig do?

to configure network interfaces. iw is for wireless and if is for wired.

A new company policy states that all end-user access to network resources will be controlled based on the users' roles and responsibilities within the organization. Which of the following security concepts has the company just enabled?

Least privilege

Which of the following is a community supported, open source OS used for both services and workstations?

Linux

A technician has identified malware on a user's system. Which of the following should the technician do NEXT according to malware removal best practices?

Move the infected system to a lab with no connectivity.

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing?

Multifactor authentication

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)

Multifactor authentication; trusted software sources

Which offers more security between FAT32 and NTFS?

NTFS

A technician must manually modify HOSTS system file in order to resolve a website address to a specified local destination. Which of the following utilities should the technician use to best accomplish this task?

Notepad

What is the "copy" command used for?

to copy files from one location to another

What is the "lvcreate" command used fro?

to create a snapshot volume

What is "r sync" and Time Machine used for?

to create backups in Linux and MAC

What does the "net use" command do?

to establish a connection between shared devices

Shell and Terminal are used for what?

to run commands

What is the "taskkill" command used for?

to terminate a process

A company wants to move the contents of its user's My Documents folder from their local hard drives to a file server so they are backed up every night. Which of the following security concepts does this describe?

Organizational units

What is the "format" command used for?

to wipe data off disks and prepare them for new use

A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message. Which of the following is causing the error?

OS compatibility

A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses. Which of the following is MOST likely the problem?

Old virus definitions

A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license type should the technician recommend?

Open license

A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time event after the update is removed. Which of the following is the MOST likely cause of the issue?

Overheating

A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?

PCI Compliance

Which of the following is protected data that can be found in a medical record?

PHI

Which of the following forms of regulated data is most important to consider when browsing e-commerce sites on the Internet?

PII

Which of the following is considered government-regulated data?

PII . PII

A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?

PXE

A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (choose 2)

PXE; Wake-on-LAN

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?

Provide documentation of the repair to the customer

A customer's computer is having difficulty opening programs and regularly receives error messages regarding low system resources. Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made?

Page-file size

What section of the Task Manager lets you see the names of all the processes that are running?

Processes

Which of the following BEST describes the purpose of an ESD mat?

Protects against accidental static discharge

A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?

Reboot into safe mode and roll back the updates

A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The tech has the user log back in, but the application still freezes when opened. Which of the following is the next step the technician should take to resolve the issue?

Rebuild the user's email profile

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

Reduce the transmit power; Disable the SSID broadcast

A technician is cleaning up a warehouse and several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques. Which of the following should the technician do NEXT to proceed with disposal of the batteries?

Refer to the manufacture's specific usage.

While preparing a computer that will be issued to a new user, the technician discovers the computer's former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?

Remove and then replace the CMOS battery

A small office calls a technician to investigate some "invalid certificate" errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.)

Remove any proxy servers configured on the user's browsers.; Run anti-malware scans and download the latest Windows updates.

An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

Remove application from startup; defragment the hard drive

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

Remove the user installed antivirus software

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?

SSH

A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?

SSH

A tech needs to connect securely to a Linux based network appliance in a remote datacenter. Which of the following will the tech most likely use?

SSH

A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer. Which of the following connection protocols should the technician use?

SSH

A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user's computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard. Which of the following would be BEST suited for this task?

SSH

A network support technician takes a call from an office manager who wants to change the wireless security key on the access point in that particular office. The office manager explains that a label on the access point indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect securely to the access point to make the change?

SSH to 10.0.100.2

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

SSO

Which of the following key and mouse combinations can be used to run an application as a different user?

Shift + Right click

Which of the following technologies is used by malicious employees to obtain user passwords?

Shoulder surfing

If you have one dynamic disk and you want to change allocated space as needed, what type of partition should you create?

Simple partition

What are the 3 types of partitions?

Simple, Spanned and striped

A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for the signal strength while making calls. Which of the following are the most likely causes of these issues? (Choose 2)

Slow data speeds; no wireless connectivity

A contract technician is working on a network printer when a print job starts and completes. The tech notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the tech take?

Take the print job to the office manager.

Which partition types are no fault tolerance?

Spanned and striped

Which of the following threats uses personalized information in an attempt at obtaining information?

Spear Phishing

With which of the following types is a man-in-the-middle attack associated?

Spoofing

Which of the following variable types should be used to store the data "Chicago" within a script code?

String

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?

Submit a change order for approval.

What tool allows an administrator to troubleshoot startup issues

System Configuration

A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook?

System requirements

A user's computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic. Which of the following is MOST likely causing the high resource usage?

The computer is part of a botnet.

Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a "?" in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?

There is unauthenticated wireless connectivity

What is the Computer Management tool used for?

To manage system tools, storage, system services and applications

What is the "ipconfig /release" command used for?

To release an IP configuration from the DHCP server.

What is the "ipconfig /renew" command used for?

To renew and IP configuration on the DHCP server.

What is "shutdown.exe" used for?

To schedule a shut down locally or remotely.

What is the "netstat" command used for?

To see what ports are listening on the TCP/IP based system.

What is the purpose of creating an alternate IP address?

To serve as a backup in the event that that primary IP address is not available.

What is the "dism" command used for?

To service a Windows image or prepare an image.

What is the "ipconfig" command used for?

To view IP configurations for a device.

What is the "dir" command used for?

To view a listing of the files and folders that exist within a directory, subdirectory or folder.

Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is the MOST likely cause of this issue?

Too many startup items

What is the "tracecert" command used for?

Trace the path of a packet through the network

A user wants to see the workstations present on the LAN in a workgroup environment. Which of the following settings must be enabled to make this possible?

Turn on network discovery

What functions can be performed from BitLocker Drive Encryption?

Turn on, suspend, or off BitLocker whole drive encryption

A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files. However, the files were not decrypted after the company paid the ransom. Which of the following would most likely minimize the damage to a fileshare in this type of situation?

Use a host based intrusion detection system and continuously monitor filesystem changes.

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?

Use an antivirus product capable of performing heuristic analysis

Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.)

Use full device encryption; Implement remote wipe features

A technician accessed a network share from a computer joined to workgroup. The technician logged in as "user1" and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the "user1" account. Which of the following would allow the technician to log in using the "administrator" username?

Use the command: net use Z: \\fileserver\share

A tech is contacted by a user who is working from home but is unable to connect to any office resources (files, printers). The user is able to access the Internet. Which of the following should the tech check first?

VPN

A technician is contacted by a user who is working from home but is unable to connect to any office resources (e.g., files, printers). The user is able to access the Internet. Which of the following should the technician check FIRST?

VPN

What is Disk Utilities used for?

Verified disk health and restores images

A user's smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?

Verify the SSID with which the device is associated

Which of the following wireless security protocols supports the use of a 40-bit encryption key?

WEP

Which of the following Microsoft OS defaults to a tiled menu instead of the desktop?

Windows 10

Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?

Windows 10

A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance on this computer?

Windows 7

Which of the following Windows Enterprise OS version Offers BitLocker as a feature that can be enabled?

Windows 7

Which of the following NTFS security settings overrides all other settings?

Write

Does running an SFC command requirement administrative privileges?

Yes

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

Zombies; Worm

What requirements should be considered when installing an OS?

compatibility

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connection and ensure that employees cannot applications or personal emails. Which of the following would the technician MOST likely configure on the network device to accommodate the SOHO user's request? (Select TWO)

content filtering; Physical security

What is the purpose of QoS?

control the flow of traffic and help with network transmission speed

What does the Linux "dd" command do?

copy and convert a file

What does the Linux "cp" command do?

copy files and directories

What does the Linux "cmkdir" command do?

create an encrypted directory, called a CFS

How is dat written for a striped partition?

fixed size stripes across the disks

What does the Linux "vi" command do?

initiates the vi editor which remains active until the user manually quits

What is the "sfc" command used for?

it checks and verifies the versions of system files on the computer

A tech is having issues with the WiFI connection while working on a MAC. The tech wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the tech use?

iwconfig

A computer running any edition of Windows 7 can ____ a HomeGroup, not all can ____ one

join; create

A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user call the IT department to ask for help. To decrypt the message, the tech tells the user to contact the sender of the message to be able to exchange:

keys

What is the advantages of a peer-to-peer network over a client/server network?

less expensive

What does Device Manager do?

lists all installed hardware and let you add, remove or update devices.

What is the Linux "fsck" command and the MAC's Disk Utility's Verify Disk used for?

to check the health of the system

A user has changed the MAC address of a laptop to gain access to a network. This is an instance of:

spoofing

Users notify the help desk of an email that was just received. The email came from the help desk's email address and asked the users to click on an embedded link. This email is BEST described as:

spoofing

A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

sudo

What is Internet Options - Security tab used for?

to choose a zone and also apply the security level to that zone

A SOHO user is working on a laptop, but the wireless connection indicator is showing a limited connection. Each time the user tries to access a website, the browser redirects to an unfamiliar authentication page. Which of the following should the user check to troubleshoot the cause of the issue?

the existing wireless network connection

What does placing "/?" after a command do?

this is a help command that provides a listing of available switches

What is Internet Options - General tab used for?

to apply generic personal settings, such as appearance, and browser settings

What is Windows Firewall tool used for?

to block access from the network


Kaugnay na mga set ng pag-aaral

ACCT 315 Exam 3 (CH 15,16,16,18,23,28)

View Set

Chapter 32- Obstetrics and Neonatal Care

View Set

ATI Pharmacology Made Easy 4.0: The Reproductive & Genitourinary Systems

View Set

PP RNSG 1538 Intrapartum Mastery Quiz

View Set

Exam review insurance life and health missed questions:

View Set