ITN 106 Module 15,16,17,18,19,21

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is a potential security risk when enabling Developer mode in Android?

Malicious software might reach your device when it is connected to a computer via a USB cable.

A customer reports their recently purchased computer does not consistently run their old applications. Application errors occur intermittently, and data files get corrupted. They have tried uninstalling and reinstalling the apps, and the problems persist. As you troubleshoot the problem, you reboot the system and get a BSOD error. The customer tells you the BSOD has occasionally appeared. Which subsystem is most likely causing the problem, and what is the next best step?

Memory is faulty; run Memory Diagnostics.

Which of the following is true about NTFS permissions and share permissions?

NTFS permissions work only on an NTFS volume.

Which Windows tool is used to reset the password for a user's Windows account?

Network Places Wizard (netplwiz.exe)

You need a VPN to connect to a private, remote network in order to access some files. You click the network icon in your taskbar to establish the connection, and you realize there is no VPN option available on the menu. What tool do you need to use to fix this problem?

Network and Sharing Center

Your customer then asks you if it would be worth the investment for them to have Ethernet cabling installed to reach each of their workstations instead of connecting them by Wi-Fi to the network. Specifically, they want to know if that would speed up communications for the workstations. You examine their router and find that it's using 802.11ac Wi-Fi. Would you advise them to upgrade to Ethernet? Why or why not?

No, because 802.11ac speeds are faster than Ethernet.

You have set up your Android phone using one Google account and your Android tablet using a second Google account. Now you would like to download the apps you purchased on your phone to your tablet. What is the best way to do this?

On your tablet, set up the Google account that you used to buy apps on your phone, and then download the apps.

Where is the biometric data for an Android facial recognition lock or fingerprint lock kept?

Only on the Android device

At a restaurant, you overhear people discussing an interesting case they treated while working in a dental office that day. Which type of regulated data policies are most likely to have been violated?

PHI

To prepare to remotely work on a Linux server at work while you are at home, you install VNC Server for Linux by RealVNC (realvnc.com) on the system at work. When you get home, you install the VNC Viewer for Windows on your Windows 10 laptop. When you try to make the connection, you get an error about a refused connection. Which could be a cause of the error?

Port 5901 is not set for port forwarding on the corporate router. Configure the router next time you're in the office.

What device can be installed on a laptop to prevent shoulder surfing?

Privacy filter

Stop errors happen when which types of processes encounter an error?

Processes created by Windows components running in kernel mode

Which type of server can function as a firewall?

Proxy server

What is the first thing you should do when you discover a computer is infected with malware?

Quarantine the computer.

As a bank employee, you often work from home and remotely access a file server on the bank's network to correct errors in financial data. Which of the following services is most likely the one you are using to authenticate to the network and track what you do on the network?

RADIUS

A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes, and you see a blue screen of death. You have important document files on the drive that are not backed up. What do you do first?

Remove the hard drive from the computer case, and install it in another computer.

You want to restart your Windows computer at the end of a PowerShell script you have built to update the operating system. Which of the following commands could be used to perform the restart in your script?

Restart-Computer

You work in the accounting department and have been using a network drive to post Excel workbook files to your file server as you complete them. When you attempt to save a workbook file to the drive, you see the error message: "You do not have access to the folder 'J:\'. See your administrator for access to this folder." What should you do first?

Save the workbook file to your hard drive.

You have set up a user group named Accounting and have put all employees in the accounting department in this group, which has been given permission to use the Financial folder on a file server. You are now asked to create a subfolder under Financial named Payroll. Megan, the payroll officer, is the only employee in the accounting department allowed to access this folder. What is the best way to configure the new share?

Create a new user group named Payroll, put Megan in the group, and assign the group read/write permisterm-51sions to the Payroll folder.

When a driver is giving problems in Windows 10, which tool offers the least intrusive solution?

Device Manager

Your friend mentioned in question 4 is having problems finding the bootmgr file and asks for your help. What is your best response?

Explain to your friend that performing a startup repair is a better option.

An app that cost you $4.99 is missing from your Android. What is the best way to restore the missing app?

Go to the Play Store where you bought the app and install it again.

Remote Desktop and Remote Assistance require a technician to change port settings and firewall settings, but third-party apps such as GoToMyPC do not. Why is this?

GoToMyPC and other third-party apps use ports already left open for web browsing and don't require additional incoming connections.

The documentation for your router says that it can provide content filtering to filter out keywords except for pages that use the HTTPS protocol. Why is that?

HTTPS pages are encrypted, and the router cannot decrypt them to read the content.

What is one effective way to implement a VPN connection on your Android device?

Install a firewall app that includes a VPN connection in its services.

As an IT technician, you arrive at a customer's home office to troubleshoot problems they are experiencing with their printer. While questioning the customer to get an understanding of their network, you find they have a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, tablets, and the network printer. They also have several smart home devices, including security cameras, light switches, door locks, and a thermostat supported by an IoT controller hub. To work on the printer, which type of network will you be interacting with?

LAN

Which Windows program must be running before a user can sign in to Windows?

Lsass.exe

Your SOHO router has failed, and you have installed a new router. The old router's static IP address on the network is 192.168.0.1. The new router has a static IP address of 10.0.0.1. You go to a computer to configure the new router, and you enter 10.0.0.1 in the browser address box. The router does not respond. You open a command prompt window and try to ping the router, which does not work. Next, you verify that the router has connectivity, and you see that its local connection light is blinking, indicating connectivity. What is the most likely problem and its best solution?

The computer and the router are not in the same subnet. Release and renew the IP address of the computer.

You work at an IT help desk and have been asked to set up 25 new user accounts in Active Directory. Your manager tells you to save time by using a PowerShell script that's available on a network share. You look at several script files named CreateNewUsers that are stored on the drive. Which one is likely to be the one you want?

The file with a .ps1 file extension

You have used Disk Management to verify that a laptop has a recovery partition, but when you do a Windows reset, you don't see the option to restore preinstalled apps. What is the most likely problem?

The laptop factory state uses an OS other than Windows 10.

Which of the following is the best reason to replace a mobile device with a new one in a corporate environment?

The latest version of Android the device can support has reached its EOL limitation.

You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which device assigned this IP address to the interface?

The local computer

Suppose you and your friend want to exchange lecture notes taken during class. Your friend has an iPhone, and you have an iPad. What is the easiest way to make the exchange?

Transfer the files through an AirDrop connection.

Your friend has an iPhone that refused to start, and you helped them use a Mac computer to perform a factory reset. They had previously backed up the phone to iCloud. How do you instruct your friend to restore the phone from the iCloud backup?

Turn on the phone, enter their Apple ID, and step through the questions to restore the phone from the iCloud backup.

Daunte frequently calls your help desk asking for instructions on how to use Windows 10. What is the best way to help Daunte?

Use Remote Assistance to show Daunte how to use Windows 10, and point him to the log file created.

When error messages indicate that the Windows registry is corrupted and you cannot boot from the hard drive, what tool or method is the first best option to fix the problem?

Use bootable media to launch Windows RE and perform a startup repair.

Your Windows system boots to a blue screen stop error and no Start screen or desktop. What do you do first?

Use the web to research the stop error messages and numbers.

As a computer starts up, you see an error message about a missing operating system. At what point in startup does this error occur?

When BIOS/UEFI is searching for an OS using devices listed in the boot priority order

When is it appropriate to use iTunes to restore an iPad from backup?

When the backup has been created on a Windows computer

When NTFS and share permissions are used on the local file server, can a user signed in on a Windows 10 Home computer access these shares? Why or why not?

Yes, because the user is authenticated on the file server to access its shares.

You open a folder Properties dialog box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dimmed. What is the most likely problem?

You are not using an edition of Windows that supports encryption.

Your company has recently been hired to install a smart security system for a large office building. The system will include security cameras, voice-controlled lights, smart locks, and smart thermostats. Some of the security cameras will be installed outdoors throughout the parking lot. Which wireless IoT protocol should your company use for the installation?

Zigbee, because it is always encrypted

Cait is trying to execute a script file to update a Linux workstation. The script has been written and is saved. When Cait checks the permissions using ls -l, the following information is displayed in terminal. -r—r—r— 1 evan evan 1437 Sep 18 07:01 UpdateLinux.sh Cait needs to ensure that everyone can read and execute the file. Using the absolute mode format, which of the following commands would change the permissions on the UpdateLinux.sh file?

chmod 555 UpdateLinux.sh

Backups of files can help restore files when something goes missing. Which of the following commands can be used to copy a file named ImportantInfo.txt from the desktop to a directory named Backups in the root directory?

cp Desktop/Importantfile.txt ./Backups/ImportantInfo.txt

Before allowing apps from untrusted sources to be installed on your Android device, what should you do? (Choose all that apply.) a. Install a firewall app. b. Install an anti-malware app. c. Use Android settings to allow apps from untrusted source. d. All of the answers are correct.

d. All of the answers are correct.

You are managing an FTP server installed in Ubuntu Server. The server has created a very large log file, vsftpd.log. Which command is appropriate to search the log file for activity of the user nolan?

grep "nolan" /var/log/vsftpd.log

A coworker is complaining that their connection to the Internet does not work. When you ask to examine the system, they show you a MacBook with Ubuntu Linux installed. Your initial assessment is that the Ethernet port does not have any lights flashing. You now want to check the configuration of the network card. Which of the following commands would allow you to view the necessary information?

ip address

A new user is exploring the Linux terminal and wants to read an explanation of the dig command and see several examples. Which command would help them understand this command?

man dig

You sign in to your personal computer with your Microsoft account, and you want to set up your computer as a trusted device to make changes to the account settings. Microsoft sends a code to your cell phone in a text message. You enter the code on a Windows screen. This type of authentication is called _________________.

multifactor authentication

In Linux, when logged in as a normal user with root privileges, which command must precede the apt-get command in the command line in order to install a program?

sudo

You have set up an FTP server in Ubuntu Server. Dominque, a user, calls to say she gets an error when trying to put a file in her /home/dominque/files directory. You look at the directory structure and see that you forgot to give the user ownership of the directory. Which command can fix the problem?

sudo chown dominque:dominque /home/dominque/files

As the new network administrator managing Active Directory in your organization, you decide to set up a backup system for all folders in the domain authorized for users to store their data. Which tasks should you do first before you configure the backup routine? (Choose all that apply.)

- Evaluate backup software and storage requirements. - Apply folder redirection to the Home folder for each user.

Which security features are available on Windows 10 Home? (Choose all that apply.)

- NTFS permissions - Share permissions

Where in Group Policy can you locate the policy that requires a smart card to be used to authenticate a user to Windows?

Computer Configuration, Windows Settings, Security Settings, Local Policies, Security Options

Which two of the following hosts on a corporate intranet are on the same subnet?

- 172.54.98.3/16 - 172.54.72.89/16

What is one difference between a video surveillance camera and a webcam? Select all that apply.

- One camera is a part of the IoT, and the other is not. - One camera has an IP address, and the other does not.

Android apps are contained in an Android package kit, which has what file extension?

.apk

You are running a web server app in Ubuntu Server. Users complain that their browsers are loading webpages with errors. Where are you likely to find the log file where the web server reports its errors?

/var/log

Which definition describes a virus?

A program that can replicate by attaching itself to another program

What tool is best to use when destroying data on an SSD?

ATA Secure Erase

An error message is displayed during Windows startup about a service that has failed to start, and then the system locks up. You try to boot into Safe Mode, but you get the same error message. What do you try next?

Boot to Windows RE, and perform a startup repair.

Among the following, which is the best protection against ransomware?

Carbonite

What is the best way to determine if an email message warning about a virus is a hoax?

Check websites that track virus hoaxes.

How can you configure an iPhone so it can download and install any app from any website on the Internet?

Use an app to jailbreak the iPhone.

As a computer starts up, you see an error message about the HAL. At what point in startup does this error occur?

When Windows attempts to launch critical device drivers

What is the most effective thing you can do to prevent a mobile device battery from draining too quickly?

Enable airplane mode.

You work in the IT department of a large hospital, and your manager has asked you to dispose of several old laptops previously used by the medical staff. How do you proceed?

Physically destroy all the hard drives, and then donate the laptops to the computer repair labs at the local community college.

Mia works from home occasionally and needs to set up her Windows 10 computer at work so she can remote in from her home office. Which tools should she use?

Remote Desktop

You sign in to your banking website on a new computer and get a request that the bank needs to send you a text code to your cell phone to authenticate the sign in. Why is this method of authentication not secure?

SMS text is not encrypted.

You suspect a boot sector virus has infected your computer. How can you remove the virus?

Perform a Microsoft Defender Offline scan.

You see multiple errors about device drivers failing to launch at startup. Of the following, which is the best option to try first?

Perform a startup repair.

When setting up OUs in a new domain, why might it be useful to put all computers in one OU and all users in another?

Policies generally apply to either computers or users.

An employee uses a key fob to access corporate resources from their home office. What type of authentication are they using?

Soft token

Which tool is the least invasive solution to repair Windows?

Startup repair

Your friend sees an error message about a corrupted bootmgr file during Windows startup. They have another computer with a matching configuration and decide to copy the bootmgr file from the working computer to the computer with the problem. Where is the bootmgr file stored?

System Reserved\bootmgr

When you started your new job, your training included reading through the company intranet website AUP pages. This morning you see a coworker violating a policy. You ask whether they are aware that they are violating the policy, and they respond that they are aware. What is your next step?

Tell your manager about the situation.

Your manager asks you to transmit a small file that includes sensitive personnel data to a Linux server on the network. The server is running a Telnet server and an SSH server. Why is it not a good idea to use Telnet to reach the remote computer?

Telnet transmissions are not encrypted.

While browsing the Internet, your web browser is not displaying the webpage correctly. The images and multimedia content are not showing or playing, and you want to watch your favorite music video on YouTube. What is one possible explanation for this issue?

The JavaScript add-on is not activated.

You are helping your friend troubleshoot a problem with their Linux server. You enter a common Linux command and discover it doesn't work exactly as you expected. What might be the problem, and what do you do next?

The Linux shell is not the one you expected; use the echo $0 command.

Your computer displays the error message, "A disk read error occurred." You try to boot from the Windows setup DVD, and you get the same error. What is most likely the problem?

The boot device order is set to boot from the hard drive before the optical drive.

A friend is having problems with their iPhone randomly rebooting. When you examine the phone, you notice the Cydia app installed. What do you recommend your friend try first to fix the problem?

Update the OS to eliminate the jailbreak.

A stop error halts the Windows 10 system while it is booting, and the booting starts over in an endless loop of restarts. How can you solve this problem?

Use the Windows Startup Settings screen to disable automatic restarts.

You're troubleshooting a network connection for a client at their home office. After pinging the network's default gateway, you discover that the cable connecting the desktop to the router had been damaged by foot traffic and is no longer providing a reliable signal. You replace the cable, this time running the cable along the wall, so it won't be stepped on. What do you do next?

Use the ping command.

You've just received a call from human resources asking for assistance with a problem. One of your company's employees, Ahmed, has recently undergone extensive surgery and will be homebound for three to five months. He plans on working from home and needs a solution to enable frequent and extended access to the company network's resources. Which WAN technology will you need to configure for Ahmed, and which tool will you use to configure it?

VPN using the Network and Sharing Center

Which of the following are true about Android Safe Mode? (Choose all that apply.)

a. Only apps native to the Android installation can run in Android Safe Mode. b. A Safe Mode flag displays somewhere on the screen. c. Safe Mode helps you eliminate third-party apps as the source of a problem. d. To exit Safe Mode, restart the device normally. All of them is correct!!!!

If you are having a problem with a driver, which of the following should you try first?

Update Windows.

You have important data on your hard drive that is not backed up, and your Windows installation is so corrupted you know that you must reinstall Windows. What do you do first?

Make every attempt to recover the data.


Kaugnay na mga set ng pag-aaral

pediatric success neurological disorders chapter 5

View Set

Lesson 3: Basic Network Commands

View Set

Canvas Briefing: Harvesting - Quizlet

View Set

Phases of Wound healing Acute Wound/ Wound Healing

View Set

Actus Reus Attempt Test at Common Law

View Set

Pediatric PrepU Exam 2 Questions

View Set

Orga_MCQ_Ch9_Competences, and Technology, OT Chapter 11, Chapter 8: Organizational Design and Strategy in a Changing Global Environment, Chapter 9 Organizational Design, competence, and Technology

View Set