I201 IT Support Cards

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You have exhausted your knowledge of a problem, and it still is not solved. Before you escalate it, what else can you do?

Ask a knowledgeable coworker for help.

Which is the best first step to protect important data on your hard drive?

Back up the data to another device.

Among the following, which is the best protection against ransomware?

Carbonite

When a user, Belinda Lim, signs in to Windows, she cannot see her Documents folder in Explorer, and some of her Windows user settings are lost. You suspect her user profile is corrupted. Which tool or method should you use first to investigate and/or solve the problem?

Check the C:\Users\Belinda Lim\Documents folder.

While verifying Windows settings, you discover defragmenting is turned off for the hard drive. What do you do next?

Check the type of hard drive installed.

Which type of server can function as a firewall?

Proxy Server

What is the first thing you should do when you discover a computer is infected with malware?

Quarantine the computer.

Mia works from home occasionally and needs to set up her Windows 10 computer at work so she can remote in from her home office. Which tools should she use?

Remote Desktop

You want to restart your Windows computer at the end of a PowerShell script you have built to update the operating system. Which of the following commands could be used to perform the restart in your script?

Restart-Computer

Which Chromebook security feature ensures that malware can't change the OS's system files?

Verified boot

As a computer starts up, you see an error message about a missing operating system. At what point in startup does this error occur?

When BIOS/UEFI is searching for an OS using devices listed in the boot priority order

As a computer starts up, you see an error message about the HAL. At what point in startup does this error occur?

When Windows attempts to launch critical device drivers

What tool is best to use when destroying data on an SSD?

ATA Secure Erase

Which Event Viewer log do you search to find errors and warnings?

Administrative Events log

Before allowing apps from untrusted sources to be installed on your Android device, what should you do?

All answers are correct: Install a firewall app Install an anti-malware app Use android setting to allow apps from untrusted source

Android apps are contained in an Android package kit, which has what file extension?

.apk

You are running a web server app in Ubuntu Server. Users complain that their browsers are loading webpages with errors. Where are you likely to find the log file where the web server reports its errors?

/var/log

Which two of the following hosts on a corporate intranet are on the same subnet?

172.54.98.3/16 172.54.72.89/16

Which definition describes a virus?

A program that can replicate by attaching itself to another program

Your manager asks you to set up an environment for user training on the payroll system. What is included in this environment?

A sandbox Dummy data

What is the best way to determine if an email message warning about a virus is a hoax?

Check websites that track virus hoaxes.

Which of the following methods can you use to install Windows 10 in a VM?

Clean install from an ISO image Clean install from a USB flash drive Upgrade from Windows 8.1 using an ISO image Clean install from a setup DVD

You have set up a user group named Accounting and have put all employees in the accounting department in this group, which has been given permission to use the Financial folder on a file server. You are now asked to create a subfolder under Financial named Payroll. Megan, the payroll officer, is the only employee in the accounting department allowed to access this folder. What is the best way to configure the new share?

Create a new user group named Payroll, put Megan in the group, and assign the group read/write permissions to the Payroll folder.

You need to install a customized console on 10 computers. What is the best way to do that?

Create the console on one computer, and copy the .msc file to the other nine.

What Apple file type is similar to an ISO file used in Windows?

DMG

What type of storage media can be used to create a Windows system image?

DVDs Internal hard drive External hard drive Network drive

When a driver is giving problems in Windows 10, which tool offers the least intrusive solution?

Device Manager

Without changing the default folder, what is the command to list all files in the C:\Linda\test2 folder that have file extensions of only two characters?

Dir C:\Linda\test2\*.??

You suspect the hard drive is corrupted. Which window do you open to repair the drive?

Elevated command prompt window to use chkdsk

What is the most effective thing you can do to prevent a mobile device battery from draining too quickly?

Enable airplane mode

As the new network administrator managing Active Directory in your organization, you decide to set up a backup system for all folders in the domain authorized for users to store their data. Which tasks should you do first before you configure the backup routine?

Evaluate backup software and storage requirements. x (17)

What file system does macOS support in order to be compatible with Windows?

FAT32

Your organization has several Mac and Windows laptops that all access data on a file server on the local network. Which file system on the Linux file server is best suited to this situation, and how do you best set it up?

FAT32; on a different partition than the one that holds the Linux installation

Remote Desktop and Remote Assistance require a technician to change port settings and firewall settings, but third-party apps such as GoToMyPC do not. Why is this?

GoToMyPC and other third-party apps use ports already left open for web browsing and don't require additional incoming connections.

The documentation for your router says that it can provide content filtering to filter out keywords except for pages that use the HTTPS protocol. Why is that?

HTTPS pages are encrypted, and the router cannot decrypt them to read the content.

How often does Time Machine create new backups?

Hourly, Daily, and Weekly.

Which of the following statements is false?

In Ubuntu Desktop, a USB flash drive must have a drive letter assigned before you can access it.

Which of the following tools can be used to improve Windows performance?

Indexing options

A user tells you that Microsoft Word gives errors when saving a file. What should you do first?

Install Windows updates that also include patches for Microsoft Word.

What is one effective way to implement a VPN connection on your Android device?

Install a firewall app that includes a VPN connection in its services.

You are setting up a Windows 10 desktop computer that requires 3 TB of storage. Which option is the best practice?

Install two 1.5 TB hard drives with the GPT partitioning systems and 64-bit Windows 10.

Which statements are false about the GPT partitioning system?

It contains the legacy MBR system for backward compatibility. It can only be installed on drives that are larger than 2 TB.

You are having difficulty uninstalling freeware a user accidentally installed while surfing the web. You look online and see the software is designed to work in an x86-based version of Windows. In which folder should you expect to find the program files for the software?

It depends on the version of Windows installed.

Which Windows program must be running before a user can sign in to Windows?

Lsass.exe

What is a potential security risk when enabling Developer mode in Android?

Malicious software might reach your device when it is connected to a computer via a USB cable.

What solution does Apple offer to assign permissions to user accounts in an organization?

Managed Apple IDs

You are troubleshooting an application problem and want to eliminate faulty memory as a source of the problem. Which command do you use?

Mdsched.exe

Which app manages multiple desktop screens in macOS?

Mission Control

Which security features are available on Windows 10 Home?

NTFS permissions Share permissions

Which of the following is true about NTFS permissions and share permissions?

NTFS permissions work only on an NTFS volume.

Which Windows tool is used to reset the password for a user's Windows account?

Network Places Wizard (netplwiz.exe)

You need a VPN to connect to a private, remote network in order to access some files. You click the network icon in your taskbar to establish the connection, and you realize there is no VPN option available on the menu. What tool do you need to use to fix this problem?

Network and Sharing Center

The PXE programming code is used to boot a computer when it is searching for an OS on the network. Where is this code stored?

On the motherboard

What is one difference between a video surveillance camera and a webcam? Select all that apply.

One camera is a part of the IoT, and the other is not. One camera has an IP address, and the other does not.

Which of the following are true about Android Safe Mode?

Only apps native to the android installation can run in Android Safe Mode A Safe Mode flag displays somewhere on the screen Safe Mode helps you eliminate third-party apps as a source of a problem To exit safe mode, restart the device normally

After installing the device drivers for a video adapter, you still are not able to use the special features of the adapter. What is your next step?

Open Device Manager and check for errors

After a Windows installation, what is the easiest way to determine that you have Internet access?

Open a browser and navigate to a website

Your macOS installation is corrupted, and you want to boot from an external Thunderbolt hard drive to repair the installation. Which key(s) do you hold down at startup to boot from the external hard drive if you have an Intel-based Mac?

Option key

You suspect a boot sector virus has infected your computer. How can you remove the virus?

Perform a Microsoft Defender Offline scan.

You see multiple errors about device drivers failing to launch at startup. Of the following, which is the best option to try first?

Perform a startup repair.

When setting up OUs in a new domain, why might it be useful to put all computers in one OU and all users in another?

Policies generally apply to either computers or users.

What device can be installed on a laptop to prevent shoulder surfing?

Privacy filter

Stop errors happen when which types of processes encounter an error?

Processes created by Windows components running in kernel mode

Your manager asks you to work through the weekend to install new software on the applications server that serves up applications to 20 users. The following Monday, all users report they cannot open their data files. After speaking with technical support for the new application, you discover it is not compatible with the old data files. Which type of documentation should you refer to first to address this problem?

Risk analysis documents

When cleaning up the startup process, which of these should you do first?

Run System Configuration to see what processes are started.

If you suspect a computer is infected with a virus and you are ready to upgrade from Windows 8.1 to Windows 10, what is your best practice?

Scan the system for malware before you perform the Windows 10 upgrade.

You work on a help desk, and you receive a call from a user who needs help on their MacBook. What feature does macOS include that allows you to assist the user without having to travel to their location?

Screen Sharing.

An employee uses a key fob to access corporate resources from their home office. What type of authentication are they using?

Soft token

After setting up a dual-boot installation with Windows 8.1 and Windows 10, how do you boot the system into Windows 8.1?

Start the system and select the OS in the boot loader menu.

Which tool is the least invasive solution to repair Windows?

Startup repair

Your friend is setting up a computer and plans to use Windows RAID striping. They ask you how many hard drives they should install in the system. What do you tell them?

Suggest to your friend that they use hardware RAID, which is more stable.

Which app provides tools for customizing the macOS interface?

System Preferences

You have used Disk Management to verify that a laptop has a recovery partition, but when you do a Windows reset, you don't see the option to restore preinstalled apps. What is the most likely problem?

The laptop factory state uses an OS other than Windows 10.

Which of the following is the best reason to replace a mobile device with a new one in a corporate environment?

The latest version of Android the device can support has reached its EOL limitation.

You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which device assigned this IP address to the interface?

The local computer

Why is the scrollbar typically hidden from view in macOS?

To keep the simple layout that macOS is designed to have.

What are reasons to uninstall software you no longer use?

To prevent Windows errors To free up hard drive space

You suspect malware might have infected restore points saved on the computer, and you want to delete them all. What is your next step?

Turn off System Protection.

Which OS is most appropriate to support a web server on the Internet?

Ubuntu Server

If you are having a problem with a driver, which of the following should you try first?

Update Windows.

While working in a call center, you receive a call from Latisha, who says she can no longer access the online reporting application for her weekly reports through her web browser. You ask your manager, and she tells you that the server team changed the application's URL during an upgrade over the weekend. She asks you to make sure all the other technicians are aware of this change. What is the best way to share this information?

Update the knowledge base article that contains the application's URL in the ticketing system application.

Daunte frequently calls your help desk asking for instructions on how to use Windows 10. What is the best way to help Daunte?

Use Remote Assistance to show Daunte how to use Windows 10, and point him to the log file created.

An application is frozen, and you cannot close its application window. What is the first thing you should do to end the process?

Use Task Manager.

How can you configure an iPhone so it can download and install any app from any website on the Internet?

Use an app to jailbreak the iPhone.

You suspect that Windows has become corrupted. What is the least invasive solution to fix the problem?

Use the System File Checker.

You're troubleshooting a network connection for a client at their home office. After pinging the network's default gateway, you discover that the cable connecting the desktop to the router had been damaged by foot traffic and is no longer providing a reliable signal. You replace the cable, this time running the cable along the wall, so it won't be stepped on. What do you do next?

Use the ping command

Your Windows system boots to a blue screen stop error and no Start screen or desktop. What do you do first?

Use the web to research the stop error messages and numbers.

When is it appropriate to use iTunes to restore an iPad from backup?

When the backup has been created in iCloud

Which Windows utilities are used to create previous versions of files that can be recovered from the file properties dialog box?

Windows File History Windows Backup and Restore

When NTFS and share permissions are used on the local file server, can a user signed in on a Windows 10 Home computer access these shares? Why or why not?

Yes, because the user is authenticated on the file server to access its shares.

You open a folder Properties dialog box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dimmed. What is the most likely problem?

You are not using an edition of Windows that supports encryption.

Which installation of Windows 10 requires you to enter a product key during the install process?

You are replacing a failed motherboard on a system with Windows 10 installed and a Microsoft account was not used to sign in to Windows.

You have 32-bit Windows 8.1 installed on your computer, and you purchase a license for Windows 10 Pro. You want to install Windows 10 using the 64-bit architecture. In which way can you install Windows 10?

You can perform a clean install but not an upgrade.

Your company has recently been hired to install a smart security system for a large office building. The system will include security cameras, voice-controlled lights, smart locks, and smart thermostats. Some of the security cameras will be installed outdoors throughout the parking lot. Which wireless IoT protocol should your company use for the installation?

Zigbee, because it is always encrypted

Which command would you use to find out how much RAM is installed in a computer?

msinfo32.exe

You sign in to your personal computer with your Microsoft account, and you want to set up your computer as a trusted device to make changes to the account settings. Microsoft sends a code to your cell phone in a text message. You enter the code on a Windows screen. This type of authentication is called

multifactor authentication

In Linux, when logged in as a normal user with root privileges, which command must precede the apt-get command in the command line in order to install a program?

sudo

Where is the biometric data for an Android facial recognition lock or fingerprint lock kept?

x (18)

A scanner connected to your Mac is giving you problems, and you suspect corrupted device drivers. What should you do first?

x (20)

You are managing an FTP server installed in Ubuntu Server. The server has created a very large log file, vsftpd.log. Which command is appropriate to search the log file for activity of the user nolan?

x (21)


Ensembles d'études connexes

Immune and Hematologic Disorders

View Set

Anatomy and Physiology Final Exam

View Set

Exam OSHA 30 FALL HAZARDS Redvector Clicksafety - Flash Cards

View Set