Core 2 A+

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a "?" in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?

There is unauthenticated wireless connectivity

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

Require authentication on wake-up

A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?

Restart into safe mode.

A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT?

Restart the network services

A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the "My Documents" folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?

Run DISM and re-add the local power user account

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?

SSH

A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?

SSH

In which of the following file extension types would a user expect to see the command. "net use T:\ \server\files'?

.bat

Which of the following types of scripts would be seen on the user end of a web page?

.bat

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing?

Multifactor authentication

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)

Multifactor authentication Trusted software sources

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues?

Proxy settings are configured improperly There is a rogue anti-malware program

A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on ot the device and opens terminal. Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?

Ps and kill

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?

Refresh upgrade

An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

Remove applications from startup Defragment the hard drive

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

Remove the user-installed antivirus software

Which of the following BEST describes the purpose of an ESD mat?

Protects against accidental static discharge

Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

4GB

Which of the following is the maximum RAM limit of a Windows 32-bit version?

4GB

Which of the following is the memory limitation of a 32-bit OS?

4GB

Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?

A firewall exception must be set

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are: Two 1GHz CPUs 2GB of memory 15GB hard drive 800x600 screen resolution Which of the following should the technician do to resolve the problem?

Increase the amount of hard drive space

A user's smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

Check the application permissions

A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT?

Check the boot order

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?

Check the contents of the hosts file

A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall. To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?

Proxy server

A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray: There are 1033 infected files on this computer. Click here to disinfect. The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan.

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?

Air filters

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as "ConnectMe" and appears as unsecure. Which of the following should the help desk perform to fix the issue?

Ask Ann to open a browser and watch for a redirect page

A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?

Ask another technician to take the call

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?

Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time

A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

Asset ID, MAC address

A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT?

Install all of the latest Windows Updates to patch the system

A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW?

Backout plan

Which of the following provide the BEST security for a server room? (Select two.)

Badge reader Biometric lock

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future?

Battery backup

Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger. Which of the following would be the BEST resolution to issue?

Calibrate the touchscreen sensor

Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation. Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?

Chain of custody

When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT?

Check the Windows host file

A sales representative regularly modifies confidential files on a laptop and needs them to be available all the time. The sales representative will be on a six-month business trip in two weeks. A technician has been asked to assist the sales representative with saving files.

Create a redundant cloud storage drive

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?

Install to a network drive

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

Internet Options - Connections

Joe. a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action?

Inventory management

A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?

Date and time

A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?

Delete the user accounts

A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to test a theory. Which of the following should the technician use to accomplish this?

Device Manger

A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)

Disable guest account Modify AutoRun settings

A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST?

Disconnect the PC from the network

A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low. Which of the following tasks should be done FIRST?

Disconnect the network cable.

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

Document a backout plan to roll back changes to the router

A systems administrator needs to add security to the server room. Which of the following would provide the BEST security for the room?

Door locks Privacy window

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

Driver detection

A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error. Which of the following tools should the technician use?

Event Viewer

Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is the MOST likely cause of this issue?

Files disappearing

A user's phone contains customer's PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

Fingerprint lock

A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users' mobile devices?

Full device encryption Biometric authentication

A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user?

Guest

Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?

Guest User

Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed The technician investigates and determines the PC is not infected with any viruses or malware. Which of the following should the technician check NEXT?

Hijacked email

A technician logs on to a Linux computer and runs the following command: ps -aux | grep vi Which of the following MOST accurately describes the effect of the command?

If finds a list of processes running a text editor.

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?

Image deployment

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

Inactive VPNs

Which of the following is a community supported, open source OS used for both services and workstations?

Linux

A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?

Local Users and Groups

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?

Look up the error number associated with the failed update

A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers. Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

Low-level format

A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

Low-level formatting

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

MAC filtering Signal strength

Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?

Move the appoints to the next business day.

A technician has identified malware on a user's system. Which of the following should the technician do NEXT according to malware removal best practices?

Move the infected system to a lab with no network connectivity

A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company's AUP. Which of the following would be the NEXT appropriate act?

Promptly notify the administrator's immediate supervisor

A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message. Which of the following is causing the error?

OS compatibility

A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?

PCI compliance

Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?

Password compliance policy

A technician responds to a report that a user's desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager, and the hard disk and the standard AHC11.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue?

Perform a full backup and replace the hard drive

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?

Physical network diagram

A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory, Which of the following should the technician use to accomplish this?

Power Option

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

Power levels

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)

Put the terminal server into the router's DMZ Block all unused ports on the LAN smart switch

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

RADIUS

A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?

Reboot into safe mode and roll back the updates

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

Reduce the transmit power Disable the SSID broadcast

Joe. a technician, receives notification that a share for production data files on the network Is encrypted. Joe suspects a crypto virus Is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?

Schedule antivirus scans and perform Windows updates

Which of the following threats uses personalized information in an attempt at obtaining information?

Spear phishing

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?

Submit a change order for approval

A user's corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue?

The network directory permissions have changed

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO).

There are disabled services on the vendor website There is a rogue anti-malware program.

Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?

Too many startup items

Which of the following installation types would require the use of an answer file to install the OS?

Unattended

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?

Update the OS of the smartphones

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages' load slowly or not at all, CPU performance is normal, and the local router can successfully ping.

Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings

Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.)

Use full device encryption Implement remote wipe features

A technician is contacted by a user who is working from home but is unable to connect to any office resources (e.g., files, printers). The user is able to access the Internet. Which of the following should the technician check FIRST?

VPN

Users notify the help desk of an email that was just received. The email came from the help desk's email address and asked the users to click on an embedded link. This email is BEST described as:

spoofing.

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources

WPA2 Multifactor

Which of the following NTFS security settings overrides all other settings?

Write

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

Zombies Worm

Which of the following devices provides protection against brownouts?

battery backup

A technician is installing the latest OS on a user's system. The user wants all of the settings and file to remain intact during the installation. Which of the following upgrade methods should the technician use?

in-place upgrade

A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

sudo


संबंधित स्टडी सेट्स

Innervation et vascularisation du tronc, du bassin et de la cuisse

View Set

Developmental psychology test #3

View Set

Virtualization and Cloud Computing (Guide to Networking - Unit 7)

View Set

Medical Terms Skeletal/Muscle: Ch.14&15

View Set

GEOG 110: Chapter 14 Landform Features

View Set

Unit 6 JOHNSON VERSUS REPUBLICAN RADICALS

View Set

Clients - Are they ready to change?

View Set

Alice Paul, the suffrage Movement, & the Passage of the 19th Amendment

View Set

Radioactive Decay, Nuclear Reactions

View Set

Economics - 4.1.2, 4.1.3, 4.1.4 - Trade - A Level

View Set