exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A user's mobile phone has become sluggish. A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Choose two.)

-Block a third-party application installation -Prevent a device root

The Chief Executive Officer at a bank recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bank's risk? (Choose two.)

-Enable multifactor authentication for each support account. -Enforce account lockouts after five bad password attempts.

A technician is investigating an employee's smartphone that has the following symptoms:✑ The device is hot, even when it is not in use.✑ Applications crash, especially when others are launched.✑ Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Choose two.)

-Perform a factory reset. -Update the device's operating system.

A user contacted the help desk to report pop-ups on a company workstation, indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Choose two.)

-Scan the computer with the company-provided antivirus software. -Perform a reset on the user's web browser.

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

. File Explorer

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

.app

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy, unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?

A full backup of the data that is stored off site in cold storage

Which of the following provide the BEST way to secure physical access to a data center server room? (Choose two.)

A. Biometric lock B. Badge reader

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

AUP

The network was breached over the weekend. System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

Account lockout

A call center technician receives a call from a user asking how to update Windows. Which of the following describes what the technician should do?

Advise the user to wait for an upcoming, automatic patch.

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

Anti-malware software

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

Antivirus

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Avoid distractions

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain.Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

B. Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign-in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete. Most Voted

Which of the following could be used to implement secure physical access to a data center?

Badge reader

A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?

Bollards

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Chain of custody

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?

Changing channels

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

Check for any installed patches and roll them back one at a time until the issue is resolved.

Which of the following OS types provides a lightweight option for workstations that need an easy-to-use, browser-based interface?

Chrome OS

A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?

Clean install

An Android user reports that when attempting to open the company's proprietary mobile application, it immediately closes. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

Clear the application cache.

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

Clone any impacted hard drives.

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

Communicate to stakeholders

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

Configure the network as private.

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine.The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

Cryptominer

A technician is configuring a SOHO device. Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the sameIP address at all times. Which of the following should the technician use?

DHCP reservation

Following the latest Windows update, PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

Default Apps

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?

Default passwords

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

Degaussing Most Vot

An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update. A technician determines there are no error messages on the device. Which of the following should the technician do NEXT?

Determine if the device has adequate storage available.

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified; however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

Differential

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?

Disk Utility

A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Disk encryption

A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?

Ease of Access Center

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

Enable BitLocker To Go with a password that meets corporate requirements.

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following step should the technician take NEXT?

Escalate the ticket.

A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the log-in issue?

Expired certificate

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

Full

Upon downloading a new ISO, an administrator is presented with the following string:59d15a16ce90c8ee97fa7c211b7673a8Which of the following BEST describes the purpose of this string?

Hash verification

Which of the following is the MOST important environmental concern inside a data center?

Humidity levels

After a company installed a new SOHO router, customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?

IP filtering

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?

Implement a single sign-on with biometrics.

Once weekly, a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

Install and run Linux and the required application as a virtual machine installed under the Windows OS. Most Voted

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

Language

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

Lock the workstations after five minutes of inactivity.

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

NTFS

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

Network utilization will be significantly increased due to the size of CAD files.

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

Operating system update

Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?

Owners can be notified a change is being made and can monitor it for performance impact.

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

Privacy

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

Pro

A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened while browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?

Proceed with initiating a full scan and removal of the viruses using the presented interface.

Which of the following is the proper way for a technician to dispose of used printer consumables?

Proceed with the custom manufacturer's procedure.

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?

Provide a sample to the antivirus vendor.

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

Provide the user with a unique ticket number that can be referenced on subsequent calls.

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user's PC is infected with ransomware. Which of the following should the technician do FIRST?

Quarantine the system.

A department has the following technical requirements for a new application:Quad Core processor -250GB of hard drive space6GB of RAMTouch screens -The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?

RAM

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message, and no changes have been made within the company. Which of the following has infected the computer?

Ransomware

A user reports that a workstation is operating sluggishly. Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

Rebuild the user's profile.

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. Which of the following will MOST likely resolve the issue?

Recalibrating the accelerometer

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state, but the malware persists.Which of the following would MOST likely resolve the issue?

Reimaging the workstation

A company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

Remote wipe

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

Resource Monitor

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?

Rollback plan

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?

Run a full antivirus scan on the computer.

Which of the following is a proprietary Cisco AAA protocol

TACACS+

The command cat comptia.txt was issued on a Linux terminal. Which of the following results should be expected?

The contents of the text comptia.txt would be displayed.

A technician is unable to join a Windows 10 laptop to a domain. Which of the following is the MOST likely reason?

The laptop has Windows 10 Home installed.

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 4GB of RAM?

The newly installed OS is x86.

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in to the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?

Time drift

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

UEFI password

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue

Uninstall the fraudulent application.

As part of a CYOD policy, a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

Use Settings to access Screensaver settings.

A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?

Using disk-wiping software

A technician is replacing the processor in a desktop computer. Prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Choose two.)

Utilizing an ESD strap B. Disconnecting the computer from the power source

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?

VNC

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

Vishing

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?

WPA2 with TKIP

Which of the following Wi-Fi protocols is the MOST secure?

WPA3

A Microsoft Windows PC needs to be set up for a user at a large corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

Windows Enterprise Edition

A user connects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged In category to Do Nothing. Most

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

dfrgui.exe

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

robocopy

During a recent flight, an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:

set AirDrop so that transfers are only accepted from known contacts.

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

ssh


Kaugnay na mga set ng pag-aaral

Chapter 6a: Earthquakes Review Questions

View Set

Ed15: Statistics in Education Research- (exam#1)

View Set

Section 6 Unknown Questions (Pt.2)

View Set