Practice Test #3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

After you install a new video card, the PC loads Windows and continuously reboots. Which of the following statements best describes the first course of action?

Go into Safe Mode.

Which Microsoft remote protocol allows for local drives to be presented to the remote system?

RDP

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

Pro

Jerry is a LAN administrator in charge of printers. Which of the following should he check first when a Windows user is trying to print a document and gets the error message "Print sub-system not available"?

Spooler service is running.

A program has been detected collecting information such as the computer name and IP address and sending that information to a specific IP address on the Internet. Which kind of threat is this an example of?

Spyware

You have a very small network in a home-based office, and you want to limit network access to only those hosts that you physically own. What should you utilize to make this possible?

Static IP Addresses

Which of the following can be used to kill a running process?

Task Manager

While you are working on a computer at a customer's home, the customer informs you that he needs to leave for about 10 minutes and that his eight-year-old son can help you with anything if you need it. Which of the following statements best describes the recommended course of action??

Tell the customer that an adult must be home while you work.

By default, when setting up an Android device, why do you need a Google account?

The account is used for cloud synchronizations.

You are trying to delete a file on the local filesystem, but the operating system will not let you. What could be the problem? (Choose the best answer.)

The file attributes are set to Read-only.

Which of the following commands is used to display hidden files?

dir/a

From which of the following locations could you disable a hardware component on a laptop in Windows?

Device Manager

A department has the following technical requirements for a new application: Quad Core processor - 250GB of hard drive space 6GB of RAM Touch screens The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?

RAM

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message, and no changes have been made within the company. Which of the following has infected the computer?

Ransomware

A user reports that a workstation is operating sluggishly. Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

Rebuild the user's profile.

Viruses have been detected and removed on a customer's computer several times during the course of several weeks. Which of the following methods will best help prevent future occurrences?

Discuss safer web browsing habits with the customer.

What must be done before a Bash script can be executed?

chmod permissions must be set.

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

dfrgui.exe

Which of the following are the best answers for securing a data center? (Select the two best answers.)

-Badge Reader -Biometric Lock

Which extension is used with the Windows batch scripting language?

.bat

Which of the statements listed below is true?

A computer with a 64-bit CPU can run most 32-bit OSs and applications without compatibility issues

As a best practice, after a set period of inactivity on a Windows workstation, what should happen?

A password-enabled screensaver should automatically start.

Which of the following descriptions classifies the protocol IMAP?

An email protocol that allows users to selectively download messages

A new program is crashing and causing the computer to lock up. What is the best location to check for further information about the cause of the crash?

Application Log

When you are performing a clean installation, which of the following is the default location for the system files of Windows?

C:\Windows\System32

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal

Configure the network as private.

A technician is configuring a SOHO device. Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times. Which of the following should the technician use?

DHCP reservation

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?

Default passwords

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

Degaussing (For HDD the best method for disposal is degaussing. This will make any data completely unrecoverable)

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

Ease of Access

Which Startup Setting option allows you to boot with basic drivers?

Enable Safe Boot

Your manager's Windows computer locks up after the graphical user interface starts to load. However, the computer will boot in Safe Mode. When you access the Event Viewer, you see an entry stating that a driver failed. Which of the following steps will help you further diagnose the problem?

Enabling Boot Logging and then in Safe Mode analyzing the ntbtlog.txt file

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following step should the technician take NEXT?

Escalate the ticket

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

File Explorer

Which type of variable will allow decimal math?

Floating-point

Which of the following answers refers to a unique string of characters used to identify hardware, software, and data?

GUID (Globally Unique Identifier)

Which of the installation types listed below provides a simpler and less costly alternative to manual OS installation in an environment consisting of multiple hosts requiring the same configuration settings?

Image Deployment

Once weekly, a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

Install and run Linux and the required application as a virtual machine installed under the Windows OS

You are troubleshooting a computer that has a web browser issue. The end user says that multiple browser pages open by themselves when surfing the Internet. Also, you observe that the computer is running slowly. Which of the following actions should you perform first?

Install anti-malware software.

A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened while browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?

Investigate what the interface is and what triggered it to pop up.

You work as a technician for an organization that has a custom web-based application that is used for the monitoring of networking devices. While using a web browser to access the application, you press F12, and within the js folder, you see the following code: $(function() { // Attach collapsible behavior to select options (function() { var selects = $('select[data-toggle="collapse"]'); Which of the following script types is being used?

JavaScript

Which tool is used for screen sharing?

MSRA

A user is in both the Sales group and the Marketing group. The Sales group has full permission at the share level, and the Marketing group has Read-only permission. The files on NTFS are secured with the Modify permission for the Sales group and the Read & Execute permission for the Marketing group. Which permissions will the user have?

Modify

Two coworkers share the same file inside a folder. User A works on the file, makes changes, and saves the file. User B then works on the file, makes changes, and saves the file as well. The next time User A attempts to open the file, she receives an access denied error. Which of the following statements best describes the most likely cause of this error message?

The file was moved before being modified and then moved back to the share.

Jack just moved a folder on the same partition. What will happen with the permissions for the folder?

The permissions will be the same as they were before the move.

A computer is responding slowly, and the Windows Task Manager shows that spoolsv.exe is using 95 percent of system resources. Which of the following is most likely the cause of this problem?

The printing subsystem

What is normally performed when an employee is offboarded?

Their user account is deleted.

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?

VNC

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:

VPN

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

Vishing

Which of the following Wi-Fi protocols is the MOST secure?

WPA3

Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices?

WWAN

Which wireless encryption protocol provides Advanced Encryption Standard (AES) encryption?

Wi-Fi Protected Access 2 (WPA2)

A user connects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged In category to Do Nothing

In Windows, which of the following folders might be stored in a hidden partition by default?

\Boot

Which of the following commands is used to fix errors on the system disk?

chkdsk/F

In Windows, which of the following commands should be used to verify that a previous system shutdown was completed successfully?

chkntfs

Which of the following provide the BEST way to secure physical access to a data center server room? (Choose two.)

-Biometric Lock -Badge Reader

A user's mobile phone has become sluggish. A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Choose two.)

-Block a third-party application installation. -Prevent a device root.

A technician is replacing the processor in a desktop computer. Prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Choose two.)

-Disconnecting the computer from the power source. -Utilizing an ESD strap.

Which of the following statements best describes how to prepare a mobile device in case it is stolen or lost? (Select the three best answers.)

-Enable GPS. -Configure remote backup. -Configure a pattern screenlock.

Which of the following answers refer(s) to (a) file system type(s) specific to Microsoft Windows OSs? (Select all that apply)

-FAT32 -exFAT -NTFS

You are required to stop the Windows Defender Firewall service. Which of the following best describes how to accomplish this? (Select the three best answers.)

-In Services.msc -Within the Task Manager -With the net stop mpssvc command

Which of the following enable installation of an OS via network interface? (Select 2 answers)

-PXE -Netboot

Which of the statements listed below describe the characteristic features of open-source applications and OSs? (Select 2 answers)

-Permission to modify and redistribute the application -Free access to the application code

You are working for a company as a roaming PC tech and have been assigned work by a network administrator. The admin notifies you that the company is experiencing a DDoS attack. Half a dozen internal Windows PCs are the source of the traffic. The admin gives you the Windows computer names and tells you that they must be scanned and cleaned immediately. Which of the following effects to the PCs should you as a PC technician focus on fixing? (Select the two best answers.)

-Worm -Zombies

Which of the following answers refers to a macOS application installer file?

.pkg

Which bootrec option can be used in Windows to rebuild the boot configuration file?

/rebuildbcd

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

AUP

The network was breached over the weekend. System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

Account lockout

A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as:

Active Directory

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Chain of Custody

You have been contracted to repair a computer at an organization that has strict rules about information leaving the premises. While troubleshooting the computer, you determine that the computer should be taken offsite to complete the repair. Which of the following should you do next?

Check corporate policies for guidance.

Which command allows a user to change a file's permissions in Linux?

Chmod

What is the name of a lightweight operating system designed by Google for small-factor PCs, laptops, tablets, and mobile devices?

Chrome OS

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.

Login script

You are tasked with disabling services from starting on a Windows PC. Which command should be run to bring up a window to make these changes?

Msconfig

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain. Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign-in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

Network utilization will be significantly increased due to the size of CAD files

Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?

Owners can be notified a change is being made and can monitor it for performance impact.

Which of the following is the best Windows utility to use if an administrator wants to perform administrative tasks that integrate scripts over a network?

PowerShell

Which scripting language has its own preinstalled Integrated Scripting Environment (ISE)?

PowerShell

Which scripting language is used with Microsoft Azure and Microsoft 365?

PowerShell

One of your customers has a wireless network that is secured with WEP. The customer wants to improve data encryption so that the transmission of data has less of a chance of being compromised. Which of the following statements best describes the recommended course of action?

Reconfigure the network to use WPA2.

Which of the following replaced removable media used for reformatting storage drives and restoring an operating system to the original factory condition?

Recovery partition

You are troubleshooting a networking problem with Windows, and you can't seem to fix it using the typical Windows GUI-based troubleshooting tools or with the Command Prompt. You have identified the problem and established a theory of probable cause. (In fact, you are on your fourth theory.) Which tool should be used to troubleshoot the problem, and in what stage of the troubleshooting process should you do so?

Regedit; Test the theory to determine cause.

Which statement about scripting languages is true?

Scripting languages are interpreted

Which command-line tool in Windows finds all of the unsigned drivers in the computer?

Sigverif

Which of the following has the goal of allowing a username/password combination to be entered once and then allowing claims to be used for consecutive logins? (Choose the best answer.)

Single Sign-On

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in to the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?

Time drift


Ensembles d'études connexes

leadfin, Chapter 13: Staffing and Scheduling, Chapter 12: Care Delivery Strategies (Leading and Managing in Nursing), Chapter 10: Healthcare Organizations (Leading and Managing in Nursing), Chapter 18: Leading Change, Chapter 9: Power, Politics, and....

View Set

Important People - Monster Test World Wars

View Set

COMM251.50 - Public Relations I: Intro PR (Spring 2021)

View Set

Art Appreciation Unit 5 Study Questions (Valerie Owen)

View Set

Kinesiology midterm (week 1-8 quizzes)

View Set