set 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Missing boot.ini

-In Windows, this file holds configuration data about which operating systems are installed. You cannot copy a boot.ini file from another computer and expect it to work properly. Make sure you periodically back up the boot.ini to a flash drive or some other external media. Then you can restore the boot.ini file when needed. If you do not have a backup copy of the file, you will need to create a new boot.ini. You can edit the boot.ini file using a text editor. In Windows Vista, the Boot Configuration Data (BCD) file replaced the boot.ini file

Computer Management

-This console includes Device Manager, Event Viewer, Shared Folders, Performance/Performance Logs and Alerts (depending on the operating system running), and possibly Local Users and Groups and Task Scheduler. In most cases, this is the console you would open for most computer management tasks.

sfc

/SCANNOW -Scans protected files immediately

taskkill

/t -Terminates all child processes of the specific process this is being terminated /pid process_ID-Terminates the process with the given process ID. ¡/f -Forces termination.

when an app does not response, describe steps to troubleshoot it?

1) If an app does not load on the first attempt, try rebooting the device or do a force restart. If that does not work, try downloading the app again and make sure it is updated. 2) Another option would be to stop all apps from running and try to launch the problem all again. Sometimes apps freeze because another app is interfering with it. 3) If the app continues to have problems, the next logical choice is to clear the cache and remove and reinstall the app. 4) If there are still problems, then you will want to advise him to contact the app developer

A technician has just upgraded RAM on a user's workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings. Which of the following should be entered for the "Min" portion of the page file setting if using these best practices? 4096MB 8192MB 12288MB

1.5*8=12000MB. answer=12288MB.

Bluetooth speakers range is

9 meter

Which of the following statements is true regarding the differences between a 32-bit and 64-bit OS? A 32-bit version of the OS will not run on 64-bit hardware, but a 64-bit OS will run on 32-bit hardware. A 32-bit version of the OS requires twice the number of CPU clock cycles to write the same amount of data as a 64-bit OS. A 64-bit version of the OS will address memory in eight octets. A 64-bit version of the OS will write data to disk in block sizes of eight octets

A 64-bit version of the OS will address memory in eight octets.

Data loss prevention (DLP) -

A DLP program ensures that data is protected while in use, in motion, and at rest. Most DLP devices analyze data on the network to ensure that the data is being appropriately protected using content and context analysis

A month ago, you set up a wireless access point/router for a small business that is a customer of yours. Now, the customer calls and complains that Internet access is getting slower and slower. As you look at the WAP/router, you notice that it was reset at some point and is now set for open access. You then guess that neighboring companies are using the service connection. Which of the following statements best describes how you can restrict access to your customer's wireless connection? (Select the two best answers.) A. Configure the wireless access point to use WPA2. B. Configure MS-CHAP on the WAP/router. C. Disable SSID broadcasting. D. Move the WAP/router to another corner of the office

A and C

Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares? An IP conflict is present. A corporate VPN is enabled. A firewall exception must be set. HomeGroup must be enabled.

A firewall exception must be set. IP conflict is not a problem because you have the internet. IP conflict -An IP address can be used by a single network host. If an IP address is duplicated on the network, one or possibly both the computers will not be able to communicate on the network. This problem most often occurs in situations where static IP addresses are used. You need to locate one of the computers involved in the conflict situation and change its IP address. If the computers are both using dynamic addressing, you can use the ipconfig /release command on one of the computers

When removing the top case from a laptop, which of the following, besides hand tools, should a technician have on hand to assure correct disassembly and reassembly? (Select TWO). A writing pad for documentation and a marker to label cables. A manufacturer's technical manual for the model of the laptop. A container with separated areas to store different size screws

A manufacturer's technical manual for the model of the laptop. A container with separated areas to store different size screws

Which of the following tasks can be performed to secure your WAP/router? (Select all that apply.) A. Changing the default SSID name B. Turning off SSID broadcasting C. Enabling DHCP D. Disabling DHCP

A multifunction network device that acts as both a wireless access point (WAP) and a router may come with a standard, default SSID name (that everyone knows). It is a good idea to change it (if the router doesn't ask you to do so automatically). After PCs and laptops have been associated with the wireless network, turn off SSID broadcasting so that no one else can find your WAP (with normal means). Disabling DHCP and instead using static IP addresses removes one of the types of packets that are broadcast from the WAP, making it more difficult to hack, but of course less functional and useful! Other ways to secure the wireless access point include changing the password; incorporating strong encryption such as Wi-Fi Protected Access version 2 (WPA2) with Advanced Encryption Standard (AES); and initiating MAC filtering, which only allows the computers with the MAC addresses you specify access to the wireless network

proxy server

A proxy server acts as a firewall. internet option on windows. A proxy server is basically a computer on the internet with its own IP address that your computer knows. When you send a web request, your request goes to the proxy server first. The proxy server then makes your web request on your behalf, collects the response from the web server, and forwards you the web page data so you can see the page in your browser. When the proxy server forwards your web requests, it can make changes to the data you send and still get you the information that you expect to see. A proxy server can change your IP address, so the web server doesn't know exactly where you are in the world. It can encrypt your data, so your data is unreadable in transit. And lastly, a proxy server can block access to certain web pages, based on IP address.

An administrator has verified that a PC has no Internet connectivity. Using ipconfig shows that the IP address for the machine is completely different than the assigned network address. After using ipconfig /release and ipconfig /renew, the computer is still assigned the same address. Which of the following is MOST likely the cause of the issue? DHCP server is unavailable A static IP address is configured

A static IP address is configured wrong: when dhcp server is down, you will get apipa address.

virus vs trojon horse.

A virus is malicious software (malware) that relies on other application programs to execute and infect a system. The main criterion for classifying a piece of executable code as a virus is that it spreads itself by means of host applications. The hosts could be any application on the system. such as MS officer file, boot sector etc. Trojon horse. Trojan horse provides a useful utility at the front end and performs malicious activities in the background, such as deleting system files and planting a backdoor into a system. does not replicate itself.

workgroup vs domain

A workgroup is recommended when five ( no more than 20 computers. computers need to be networked, and the users need to share files and print services and manage the administration of their shared resources. Anyone can act as client or server. domain: A domain, on the other hand, requires one or more servers to control security and permissions. Once a user creates an account on the domain, the user may log on to any computer in the domain with those credentials. A domain is suited for larger networks, and may span across multiple locations and local networks

A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access? A. Check the phone for unauthorized root access B. Disable the phone's Bluetooth chip C. Erase all personal data from the phone D. Check the phone for location tracking

A. Check the phone for unauthorized root access

Which of the following should be used to ensure that a Windows OS is functioning optimally? A. Driver updates B. Scheduled backups C. Application updates D. Restore points

A. Driver updates d is needed when it does not function good.

A technician is tasked with setting up a user's webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail? (Select THREE). A. Free/busy B. Programs C. Documents D. Calendar E. Favorites F. Social media G. Contacts

A.FREE/busy D. Calendar G. Contacts.

limiting the users who can connect to a network printer located centrally within an office environment

ACL

A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician? Convince the customer to take a better course of action to resolve the issue. Acknowledge the customer's input, but follow another course of action

Acknowledge the customer's input, but follow another course of action

With default settings in Windows 7 64-bit which of the following groups is allowed to install unsigned drivers while giving the LEAST amount of permissions? Authenticated User Administrator Power User Standard User

Administrator

h of the following security threats are typically designed to get the user to make a purchase? (Select TWO). Worm Virus Adware Spam

Adware Spam

What is the aim of security awareness training?

All employees must understand their security responsibilities. wrong: All employees in the IT department should be able to handle social engineering attacks.

Windows Virtual PC is designed to

Allow a user to run older programs in a Windows XP environment.

A customer calls you to report a video problem with his computer. The customer starts to explain the symptoms of the problem. What should you do first?

Allow him to finish his explanation, and record all the details he gives you trap answer: record only relevant detail.

For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity? Annual cyber security education Update antivirus signatures more often Block all email attachments Install an IPS on each workstation

Annual cyber security education

A user, Ann, reports that her laptop will no longer connect to wireless. Joe, a technician, checks the device manager and does not see a wireless networking card or any unknown devices. Which of the following should Joe do FIRST? Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut. Install a USB wireless card to ensure that Windows networking is working properly. Open the laptop and reseat the network card and both antennas. Download and install the latest wireless driver from the manufacturer's website.

Answer is A since it is not driver problem. d is wrong laptop has not been opened. c is wrong.

A technician contacts you and says that he needs to access the System Recovery Options on a Windows 7 computer. Which procedure or special key should he use? Press F8 during the text mode of booting. Boot from the installation CD/DVD.

Answer: Boot from the installation CD/DVD. F8 is wrong answer. it can start safe mode. Pressing the F8 key does not start ASR during the text mode setup phase of Windows 7. The F8 key is used to accept the End-User License agreement during the setup process. You can also access the advanced boot options menu and the Windows Startup Menu by pressing F8 before Windows starts

A user has become a victim of data harvesting. The user wants to know more about the potential for mobile device application security issues. Which of the following settings should a technician advise the user to change on the user's mobile device? (Select three.) Location tracking Camera activation Data transmission limit System lockouts Developer options Accessibility Synchronization Storage

Answer: A (location tracking) F (accessbility) H (storage) data harvesting: Sometimes you need to search and merge different data sources to create dataset for data mining. This process called "data harvesting" accessibility: that includes people who need help seeing/hearing or otherwise operating their device. To this end, there are system-wide accessibility settings . password speed, talk back service and google voice is also is enabled here. so it is should be off. Unauthorized location tracking -Location services allows apps to use query your device's location

Which of the following provides the lowest level of wireless security protection? A. Disable the SSID broadcast. B. Use RADIUS. C. Use WPA2. D. Enable WEP on the wireless access point

Answer: A. Disabling the SSID broadcast is a security precaution, but it only keeps out the average user. Any attacker with two bits of knowledge can scan for other things the wireless access point broadcasts. Interestingly, using WEP is considered more secure than not using it and disabling the SSID. RADIUS is an external method of authenticating users; it often requires a Windows Server. WPA2 is very secure; if you had one security option you could enable, make it WPA2.

One of your customers has a wireless network that is secured with WEP. The customer wants to improve data encryption so that the transmission of data has less of a chance of being compromised. Which of the following statements best describes the recommended course of action? A. Reconfigure the network to use WPA2. B. Use MAC address filtering. C. Modify the WEP key every week. D. Disable the SSID broadcast.

Answer: A. The best solution is to upgrade the wireless network from WEP to WPA2, or at least WPA. WEP is a deprecated wireless encryption protocol and should be updated to a newer and more powerful protocol if at all possible. If this is not possible, it would be wise to use a strong WEP key and modify it often. MAC address filtering does not increase the level of data encryption, but it does filter out unwanted computers when they attempt to connect to the wireless access point. Disabling the SSID broadcast deters new computers from making initial connections to the wireless access point.

Which the following can be disabled to help prevent access to a wireless network? A. MAC filtering B. SSID broadcast C. WPA2 passphrase D. WPA key

Answer: B. To aid in preventing access to a wireless network, disable the SSID. But only do this when all computers have been connected. If more computers need to be connected later, they will have to connect manually or the SSID will have to be reenabled. Although this is an okay security method, it won't keep smart attackers out of your network. MAC filtering and WPA2 encryption do a much better job at that than disabling the SSID

Which of the following settings must be established when you want to make a secure wireless connection? (Select all that apply.) A. The brand of access point B. The wireless standard used C. The encryption standard used D. The SSID of the access point E. disabling the SSID

Answer: C and D and E , To make a secure connection, you first need to know the service set identifier (SSID) of the AP and then the encryption being used (for example, WPA or WPA2). The SSID takes care of the "connection" portion, and the encryption takes care of the "secure" portion. After all computers are connected, consider disabling the SSID for increased security. Knowing the wireless standard being used can help you verify whether your computer is compatible (802.11ac, n, or g), but the brand of access point isn't really helpful.

An attacker is constantly trying to hack into one of your customer's SOHO networks. Which of the following statements best describes he easiest, most practical way to protect the network from intrusion? A. Disable the SSID broadcast. B. Install an antivirus server application. C. Disconnect the Internet connection. D. Install a firewall. E. Install an IDS.

Answer: D. The most practical way to prevent intrusion to the network is to install a firewall. In fact, if this is a SOHO network, chances are the network is controlled by a multifunction network device that already acts as a switch and a router and probably has built-in firewall technology; it just has to be enabled. Usually these are enabled by default, but perhaps someone inadvertently disabled it, and that's one of the reasons an attacker keeps trying to get into the network. An intrusion-detection system (IDS) is usually more elaborate and costs more money, but it would help to prevent network intrusion. (Some devices combine IDS and firewall technologies, but usually not SOHO multifunction network devices.) Disabling the SSID helps to discourage the average user from accessing the wireless network, but any hacker worth his or her salt can get right past that; plus, the attacker could be trying to connect directly through the Internet connection

Which of the following options is MOST likely active on a network of three workstations, running Windows 7 Home Edition x64, to enable File and Print sharing? HomeGroup Active Directory WorkGroup Domain Setup

Answer: homegroup A small business owner has five computers in the office that need to be networked. The users need to share files and print services and manage the administration of their shared resources. Which type of network would you recommend to the owner? workgroup. note the difference.

Which of the following actions can Power Users perform? Create local users accounts Backup the operating system and system files Install computer applications that require administrative privileges Modify any local user account

Answer: they can create local users. backup and installations and modification is done by administrator

Your boss asks you to install a new wireless network. Which of the following should be implemented on the wireless network to help prevent unauthorized access? (Select the two best answers.) A. Install additional wireless access points. B. Use WPA2. C. Broadcast the SSID. D. Use MAC filtering. E. Install a signal booster

Answers: B and D. By using WPA2 (the strongest type of encryption on most wireless access points), you ensure a high level of encryption, helping to reduce unauthorized access. Using MAC filtering filters out unwanted computers by checking their MAC addresses when the computers first try to connect. Additional wireless access points and signal boosters would increase the chances of unauthorized access. Broadcasting the SSID also increases the chance of unauthorized access because any wireless device will see the name of your network. When all wireless devices have made their initial connections to the wireless access point, consider disabling the SSID broadcast

Graphical interface fails to load -

Approach this issue the same as a missing graphical interface issue. If nothing seems to work, you should try using the Recovery Console to fix the issue

Joe, a technician, arrives onsite at a customer's home. Upon entering the home, Joe notices an unpleasant odor. In response to this, Joe pinches his nose and holds his breath. After Joe leaves, the customer reports the boss, what will boss's lecture do? Maintaining good communications with the Maintaining good personal hygiene Avoiding being judgmental Avoid dismissing the customer's problems

Avoiding being judgmental. pinches his nose, hold his breath shows his personal feelings, not objectivity on a problem. Judgment is a layer we add on top of that based on personal opinions and how we think things should be.And these personal feelings can get in the way of objectivity.

A technician has decided to upgrade all users' iPhones to the latest model. Which of the following is the FIRST thing the technician should advise the users to do with the old phones before turning them in? Back up the mobile data with a cloud backup service. Enable remote wipe to clear all personal and corporate data.

Back up the mobile data with a cloud backup service.

A technician is removing malware from a computer in safe mode and is having trouble with one of the infected files. The anti-malware suite is unable to remove or quarantine it and the system will not let the technician manually delete it, even though it is not in use. Which of the following can the technician use to remove the file? Open the defrag utility and run a full analysis and defragmentation of the hard drive. Boot from a pre-installation environment CD and delete the file from the hard drive. Run attrib followed by the file name with the -h switch from the command prompt. Install a second full antivirus suite onto the system and run another removal scan

Boot from a pre-installation environment CD and delete the file from the hard drive.

Browser redirection is caused by which of the following types of viruses? Hijack Trojan Worm Keylogger

Browser hijacking is a form of unwanted software that modifies a web browser's settings without a user's permission, to inject unwanted advertising into the user's browser. A browser hijacker may replace the existing home page, error page, or search engine with its own.[1] These are generally used to force hits to a particular website, increasing its advertising revenue.

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of? A. Shoulder surfing B. Phishing attack C. Social engineering D. Malware infection

C. Social engineering

A user is experiencing unexpectedly long boot times and abnormally slow performance on a Windows computer. The technician opens the Task Manager and notices there is extremely high disk utilization with low network utilization, even after a reboot. Which of the following tools should a technician use to diagnose the issue? Regsvr32 Computer Management Dr.Watson MSConfig

COMPUTER MANAGMENT HAS DISK MANAGEMENT , RESOURCE MONITOR. IT CAN BE USED TO view system performace including cpu, hardisk etc.

Which of the following components would a user MOST need when building a virtual server? (Select TWO) CPU RAM networking speed.

CPU RAM

which data can be synchronized by webmail? by a cloud?

Calendar Contacts Tasks Journal Notes all of the above , including programs, calendars, pictures, documents. email and music.

The digitizer on a user's smartphone intermittently stops working. Which of the following is MOST likely the issue? Screen orientation Software update Screen brightness Calibration

Calibration is wrong. software update.

An employee was arrested after it was determined that an office computer was used for illegal activity that damaged the company. Which of the following MUST be documented on the employee's computer to ensure the evidence is admissible on court? Software inventory Personality identifiable information Security best practices Chain of custody

Chain of custody When dealing with prohibited content, you must first identify the content. Then you should report that you have found prohibited content through the appropriate channels. It is also vital that you preserve the device and its data to ensure that evidence is preserved, especially if the prohibited content could result in criminal charges. To preserve evidence, you should keep a detailed chain of custody on all evidence. This will ensure that the evidence is documented and tracked throughout the process. In addition, you should provide documentation to accompany any evidence that is seized. Documentation changes should be recorded as well

window charmbar

Charms were introduced with Windows 8. They include five of the most commonly used functions: Search, Save, Start, Devices, and Settings

A user tries to connect to the Internet using a dial-up modem and receives a "No dial tone detected" message. Which of the following is the FIRST thing the technician should check to troubleshoot the issue? Check if the cable is connected on the modem's line RJ-11 port. Check if the cable is connected on the modem's phone RJ-11 port

Check if the cable is connected on the modem's line RJ-11 port.

Windows Update attempts to install patches upon each startup but fails on the same single update everytime?

Clearing the Windows Update download cache entirely

A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates to Java, but is still unable to view the map. The technician should change. which of the following Internet Options? Compatibility view Manage add-ons Clear browser cache Pop-up blocker

Compatibility view

A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information? A. DHCP server B. DNS server C. File server D. Proxy server

DHCP SERVER

When using a PC on a Windows Domain, which of the following is the MOST critical service when connecting to multiple file, print, and email servers? Internet Connection Sharing Service Windows Firewall Service Computer Browser Service DNS Service

DNS Service

Which of the following optical drives is the MINIMUM required to install Windows 7 Professional from optical media?

DVD ROM Drive ( not even DVD dual etc, any such variant )

You are providing training on security breaches regarding passwords and encryption. Which attacks below best describes this? Brute-force attacks Dictionary attacks man in middle attack

Dictionary attacks Dictionary attacks can contain large files from the dictionary. Their goal is to attempt to crack encrypted passwords by using the same algorithms in the dictionary file to encrypt a users' password. Then they will compare the values to the encrypted passwords to find a match. They perform these attacks offline so they won't violate password policies brute force attack only use to crack the password. to intercept the information between two parties is man in middle attack.

Deborah has a brand new iPhone that she thinks is defective because it keeps losing battery power? choose all which saves the battery. 1) Dim the display. 2) Close out background apps. 3) Turn on WiFi. 4) Place in Airplane mode. 5) Turn on Bluetooth. 6) use low power mode.

Dim the display Close out background apps Place in Airplane mode ( when you don't need data access) use low power mode ( it is automatically on when 20% battery is left, if you on it all the time, it saves lot of battery)

An administrator is installing a WAP in a fitness center. There will only be five devices that should have access to this, and they are all company owned. Users do not want to put in a password when they connect these devices to the wireless. Given this scenario, which of the following is the MOST secure method of deployment? A. Disable SSID broadcasting B. Media access control filtering C. Disable ports 80 and 443 on the access point D. Lower radio power levels

Disable SSID broadcasting

A technician recently setup a new wired network and wants to ensure only their computers can use it. Which of the following is the MOST secure way to accomplish this? Make sure the computers are using strong passwords. Enable an intrusion detection system. Assign the computers static IP addresses Disable the extra ports on the router

Disable the extra ports on the router because it is wired, only way the hacker can connect is ports, so disable them.

A user's computer has detected a S.M.A.R.T error. Which of the following should the user run to diagnose the issue? Scheduled disk maintenance System Restore utility Disk maintenance utilities Driver/firmware updates

Driver/firmware updates disk will soon die, smart error, make a backup. update the firmware to see if error goes, otherwise replace the hard-disk

A systems administrator wants to test a tool to enhance productivity but does not want to run it in the live production environment. The systems administrator has a powerful PC running Windows 8.1. Which of the following should the systems administrator set up to test the tool on the PC without changing the base configuration? Native Windows Virtualization Emulation Safe mode

Emulation

A technician responds to a user's complaint of "stop" errors being received when the user watches company training videos. The technician determines the problem must be a faulty video driver. After installing the latest video driver for the system, rebooting, and testing the system, the error is still present. Which of the following troubleshooting steps does the technician needs to complete at this stage? Verify functionality and implement preventive measures Establish a plan of action to resolve the problem Document the findings, actions, and outcomes Formulate a new theory or escalate

Establish a plan of action to resolve the problem

A technician receives an error every time a workstation boots up. The technician needs to find out what process is responsible for the error. Which of the following utilities would be used FIRST? Event Viewer MSCONFIG

Event Viewer

The customer reports their PC freezes up everyday around the same time. Which of the following utilities would be BEST to check for any error codes? Windows Updates Task Scheduler Event Viewer Performance Monitor

Event Viewer

While installing a Web camera on a Windows Vista computer, you receive a blue screen error. You are unable to boot to Windows after installing the Web camera. Instead, each time you boot the computer, it shows the blue screen error message. What should you do to troubleshoot the problem using the least administrative effort? Boot the computer with the Windows Vista bootable disk. Boot the computer using the Last Known Good Configuration

Explanation: You should boot the computer using the Last Known Good Configuration. With this option, you can reverse configuration changes that were made to a Windows computer. This option will boot the Windows computer with configuration information saved from the last time the computer started properly. Blue screen errors, or STOP errors, are logged in the System log of the Event Viewer. A BSOD is a proprietary Windows crash screen. In addition to logging, the BSOD will display a hexadecimal code that indicates the problem. In most cases, a BSOD occurs because of a change that has been made to the system. If a simple reboot does not resolve the BSOD, then you need to rollback your system changes. Keep in mind that most BSOD errors can be researched in Microsoft's Knowledge Base bootable requires more administration effort.

A user wants to quickly install the most recent security patch released. Which of the following options can be selected from the Windows Update website? Custom settings Advanced settings Automatic settings Express settings

Express settings

Which of the following commands may need to be run after a virus removal if the computer will not boot? FIXMBR MSCONFIG

FIXMBR

A technician is attempting to remove malware from a customer's workstation. Which of the following Control Panel utilities should the technician use? Folder Options > View hidden files Internet Options > Privacy

Folder Options > View hidden files

A customer is not able to connect to any websites. Which of the following commands should a technician run FIRST to identify the issue? NETSTAT NET SHOW IPCONFIG TRACERT

IPconfig.

A company wants all new PCs to have a standard sleep and hibernate schedule. Which of the following would allow this to be accomplished? Adjust the power plan to Energy Saver Import a customized power plan

Import a customized power plan

A user requests that his Windows 7 computer display dates using the yyyy-mm-dd format

In Control Panel Category View, click Clock, Language, and Region. Select Region and Language ( in window 10, this option is only region)

Quick format vs. full format -

In choosing between these two types of formats, keep in mind that a quick format does NOT check for bad sectors. A full format will take much longer than a quick format because a full format checks for bad sectors.

A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating the Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance in the host operating system? (Select TWO). Install more physical memory. Increase the size of the virtual hard drive. Install a different hypervisor. Reduce physical memory allocated to the VM. Clear temporary files in the VM. Install additional physical hard drives.

Install more physical memory. Reduce physical memory allocated to the VM

While servicing a printer issue, a user asks you to install a new software application. The application is not listed on the company's approved software list. In addition, the installation media is a compact disc with the application name written on it.

Instruct the user that he must obtain installation approval and a licensed copy of the software

Ipconfig/ifconfig

Ipconfig/ifconfig -Displays the TCP/IP configuration of a device. You should be familiar with its switches, including the /all, /release, /registerdns, /renew, and /flushdns switches. The ifconfig is the Unix/Linux equivalent of ipconfig

You are responsible for managing the virtual computers on your network

Isolate the host computer and each virtual computer from each other

Missing GRUB/LILO -

LILO is the Linux Loader. GRUB is the Grand Unified Boot Loader. Both do the same job. LILO was more common in the past, but GRUB is more common now. They may be overwritten when you install Windows so you will have to reinstall or recover the boot loader through specific instructions within Linux. This usually involves using the installation CD to re-mount the Linux partitions

A technician's is onsite troubleshooting a user's issue and receives a call from another customer. Which of the following is the BEST course of action for the technician to take in this situation? Let the call go to voicemail and respond when time permits. Leave the current appointment to assist the calling customer. Ignore the call and continue with the scheduled itinerary. Apologize to the customer and answer the call

Let the call go to voicemail and respond when time permits.

A customer has contacted you and expressed anger about the service provided by your company. During the call, you discover that another technician responded to the customer's original issue. In spite of the customer's tone, you remain calm. Listen to the entire complaint Ask the customer what would make the situation better

Listen to the entire complaint wrong option: You should ask the customer what would make the situation better only after listening to the customer's entire complaint and analyzing the issue

A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this? Lock the workstation Set the screensaver password

Lock the workstation

remote wipe in iphone

Log in to iCloud.com, and select Find My iPhone. Select the device from the Devices list, and click Erase iPhone

A technician recently replaced a user's monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue? Lower refresh rate Lower the resolution Raise the resolution Increase refresh rate

Lower refresh rate

Which of the following types of attacks is MOST likely to occur if an attacker utilizes an HTTPS proxy? Man-in-the-middle Spear phishing Zero day Social engineering

Man-in-the-middle

A user is unable to find the preferred default network printer in the printers list in the user profile. Which of the following is the FIRST step that should be taken? Map printer Reboot computer Check to see if printer is turned on Log in as a different user and see if printer is mapped

Map printer

A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (Select TWO). Mask ESD mat ESD strap Antistatic bag Safety goggles Rubber gloves

Mask safety goggles.

A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of the following cloud concepts does this represent? Measured service Rapid elasticity On-demand Resource pooling

Measured service

SSD drive and fragmantation

NO SSD drive is fragmented.

A technician needs to use a command line tool to determine the network name and the IP address of a resource. Which of the following command line tools will provide an IP address when given a name? Tracert Ipconfig Nslookup

NSlookup

to check the status of a survice what command you can use on cmd.

Net Pause Net Stop

uac

Never notify l Notify me only when programs try to make changes to my computer (do not dim my desktop) l Default -Notify me only when programs try to make changes to my computer l Always notify me

Which of the following statements is true about XP mode in Windows 7?

Only the Professional and the Ultimate versions support Windows XP mode

A customer reports that after a technician cleaned up a rogue antivirus program, the customer cannot browse the web. Which of the following should the technician check to resolve the situation? Browsing history Firewall settings User privileges Proxy settings

PROXY SETTINGS. BROSWER DOES NOT HAVE FIREWALL SETTINGS.

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO). User training Anti-malware Paper shredding Time of day restrictions Employee badges Mantraps

Paper shredding User training Securing physical documents/passwords/shredding Dumpster diving occurs when confidential information is obtained through documents. security should exist how these documents secured (dumpster diving) and disposed (paper shredding) and educating the user.

You have two wireless networks in your building. The wireless networks do not overlap. Both of them use Wi-Fi Protected Access (WPA). You want to ensure that no unauthorized wireless access points are established. What should you do? Change the two wireless networks to WPA2. Change the two wireless networks to WEP. Periodically complete a site survey. Disable SSID broadcasts for the two wireless networks

Periodically complete a site survey You should periodically complete a site survey to ensure that no unauthorized wireless access points are established. Site surveys generally produce information on the types of systems in use, the protocols in use, and other critical information. To ensure that no unauthorized wireless access points are established, you should not change the two wireless networks to WPA2. This would increase the security for the two networks and prevent hackers from accessing the networks. However, it would not prevent an attacker from setting up a new wireless access point

A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective? Physical destruction Quick format Low level format Overwrite

Physical destruction

Physical Security

Physical security focuses mainly on ensuring the buildings and server rooms are protected against physical intrusion. It includes locked doors, guards, mantraps, securing documentation, shredding old documentation, biometrics, badgers, key fobs, RFID badges, RSA tokens, and privacy filters

A technician has contacted a vendor, informing them they need to RMA a faulty memory stick. Which of the following should the technician use to BEST protect this component from further damage during shipment? Antistatic bags Plastic box Cardboard box Bubble wrap Padded envelope

Plastic box

Which of the following is the MINIMUM account required to install most programs on Windows XP? Power user Administrator Standard user Guest

Power user

Pre-installation environments

Pre-installation environments -Windows Preinstallation Environment (Windows PE) is a minimal version of the operating system. This environment prepares a computer for installation. This is a repair platform that is included by most computer vendors for use in troubleshooting issues

A technician installed a second hard drive in a computer. Upon restart, a message appears statinG. "primary drive 0 not found. Press F1 to continue." Which of the following should the technician check FIRST? That NTLDR and boot.ini are not missing Proper drive installation (e.g. cables/jumpers) If computer can boot into safe mode If the BIOS boot settings are correct

Proper drive installation (e.g. cables/jumpers)

A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the technician configure next? Hosts files Proxy settings

Proxy settings

Nslookup -

Queries the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record Users are having trouble accessing a server. You want to view the server's DNS entry on the DNS server

A technician needs to repurpose a hard drive that has confidential information on it. Which of the following methods is MOST appropriate? Incineration Overwrite Degauss Quick format

Quick format

A technician is installing Windows 7 on a new PC. Which of the following would be the MOST likely third party driver needed during installation? Network Video RAID Sound

RAID

A technician needs to log into a user's computer to fix the user's corrupt local profile. Which of the following connectivity tools will allow the technician to connect to the user's computer? Remote Assistance Virtual Private Network Computer Management Remote Desktop

Remote Desktop

Which Mac OS feature allows you to access content on a CD or DVD drive when you do not have an optical drive?

Remote Disk is the feature of the Mac OS to access content on a CD or DVD drive when you do not have an optical drive. When configured, it allows you to access a CD or DVD drive hosted on another computer. Remote Disk (or Remote Disc) does not work with most copyrighted media. Boot camp is a Mac feature that allows you to install Windows on a Mac computer

Which configuration change should you make to harden a new operating system (OS) immediately after installation?

Rename the administrator account and disable the guest accounts because they are known to hackers guest account can also provide them system information.

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access? Remove the guest from the administrators group Disable single sign-on Issue a default strong password for all users Require authentication on wake-up

Require authentication on wake-up

A technician wants to decrease the risk of unauthorized users being able to use an unattended computer. Which of the following actions should the technician take to accomplish this goal? Configure failed attempts lockout. Require screensaver password

Require screensaver password

kernal panic in mac OS

Restart the system, launch the console application, and check all messages for log erros that may indicate the original issue.

Joe, a technician, is asked to set up a wired kiosk laptop for office visitors to use for Internet access only. Which of the following would be MOST important in securing this type of setup? Disabling the administrator account Requiring personal information be entered before use Changing the default usernames for all kiosk accounts Restricting user permissions for the kiosk account Setting a strong password for all kiosk accounts

Restricting user permissions for the kiosk account

Windows 7. A user complains that the Run dialog box is no longer available from the Start menu

Right-click the taskbar and select Properties. On the Start Menu tab, select Customize.

A technician has cleaned a virus infection off of a PC using corporate approved software. After a short period of time, the infection returned. Updated virus signatures have also detected the presence of a rootkit. Which of the following would be the BEST course of action to resolve the issue? Run a System Restore to a time before the first infection was cleaned. Install a second antivirus suite and run both antivirus products concurrently. Back up the client's data and scan it for infections on a known-working PC. Reformat the hard drive and reload the operation system and applications

Run a System Restore to a time before the first infection was cleaned.

You need to run Disk Defragmenter, but several other applications are running. Why should you shut down all running applications first?

Running other applications may result in disk write operations forcing Disk Defragmenter to restart continually

Safe Mode

Safe Mode -To load into Safe Mode, press F8 when the operating system menu is displayed during bootup. Safe Mode loads minimal drivers and can allow you to troubleshoot issues

options for boot menu

Safe Mode -uses a minimal set of device drivers and services when Windows boots. All three variants of Safe Mode use vga.sys as the video device driver. l Safe Mode with Networking -uses a minimal set of device drivers and services when Windows boot, but includes device drivers to enable networking. l Safe Mode with Command Prompt -is the same as Safe Mode, except it only boots to the command prompt. This mode does NOT provide a GUI interface. l Enable Boot Logging -enables logging with any boot mode, except Last Known Good Configuration. l Enable low-resolution video (640-480) -starts Windows in 640 x 480 resolution using the current video driver. This mode uses the video driver configured in Windows instead of vga.sys. l Last Known Good Configuration -starts Windows using the previous hardware/software configuration that worked properly. l Directory Services Restore Mode -works for domain controllers to perform a directory service repair. l Debugging Mode -turns on Windows debug mode. l Disable automatic restart on system failure -is a set of instructions to help find critical error in Windows. Windows is set to restart itself so it can prevent any further damage to your computer. l Disable Drive Signature Enforcement -allows you to disable a driver, restart the computer, install the desired driver for each one, and then shut down or restart your computer. Basically you are temporarily forcing a driver signature not to start

S/MIME

Secure/Multipurpose Internet Mail Extensions(S/MIME) allows you to send encrypted emails when enabled IMAP stores mail on a server for subsequent remote access. It does not provide encryption

A user contacts you regarding a problem searching for files on his computer. He indicates that none of his files that are protected using BitLocker are showing up in his searches. He needs BitLocker files to display for any search he implements. What should you do?

Select the Index encrypted files option for the index

A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not successfully remove the file. When the technician attempts to manually remove the file, an error message appears that says, "The file is in use by another program." Which of the following tools would be the BEST to use to correct the issue? Terminal SFC Event Viewer Services Console Recovery Console

Services Console

A network administrator notices a new WiFi connection has appeared as a wireless network choice and is always at the top of the list. As a result, users are constantly trying to connect to the wrong network. Which of the following should the administrator do to correct this issue? Adjust the wireless router antennas to 90 degrees clockwise from the current position. Ask the new wireless network owner to adjust the radio power level so it is listed below the company's network. Set all of the WiFi users' wireless profiles to automatically connect to the company network. Change the company's channel to a lower number than the new network's channel.

Set all of the WiFi users' wireless profiles to automatically connect to the company network.

After some testing, the technician realizes the database service is coming up to quickly on startup before dependent services can start?

Set the database service to 'Automatic (Delayed Start)"

The folder "Documents" is shared. The user can create and delete documents when on the local PC, but can only read documents when accessing them remotely. Which of the following should be adjusted? Read Only Attribute Share Permissions Firewall Settings NTFS Permissions

Shared permissions. Security on folders is usually done with a combination of Share and NTFS Permission if this is the case it is essential to remember that the most restrictive always applies, for example if the share permission is set to Everyone = Read(which is the default), but the NTFS Permission allow users to make a change to the file, the Share Permission will take preference and the users will not be allowed to make changes.

Which Windows 8 and 8.1 feature enhances the taskbar functionality when working with more than one monitor?

Show taskbar on all displays

Your mobile device is fully charged. You have been travelling all day using your mobile device to make calls. However, when you travel into remote areas, calls mysteriously disconnect. What is the most likely problem with the device? Power drain Signal drop/weak signal Slow data speeds High resource utilization

Signal drop/weak signal

Which of the following describes when an application is able to reuse Windows login credentials

Single Sign on

when an application is able to reuse Windows login credentials? Principle of least privilege Single sign-on Pass-through authentication

Single sign-on

slow performance

Slow performance is often related to memory or drive space. Look for any apps that are running which can be closed, and add more RAM if possible. You might also want to delete unused apps and data to free up drive space.

how smartcard is used in security.

Smart cards, which are a type of identification badges, are used to give people access to a) buildings, doors and parking lots b) computers

A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred? War driving Social engineering Shoulder surfing Phishing

Social engineering

Which of the following security threats involve shoulder surfing and phone phishing? Social engineering Spyware

Social engineering

spyware and trojons.

Spyware: Spyware is a type of malicious software, also referred to as malware. It infects through the Internet to collect user information, including browsing habits. Windows Defender and Microsoft Anti-Spyware are two common tools from Microsoft to fight malware. Spyware is most likely to result in identify theft. it tracks user information such as account numbers and passwords and report it back to someone in the internet.

A technician needs to rebuild a computer that had a virus. Which of the following data destruction methods should be used to ensure the virus has been successfully erased before reinstalling the operating system,programs, and all user data? Standard format Low level format

Standard format

A user on a domain network cannot install software that they need. Which of the following user groups is this user MOST likely associated with? Standard user Guest user poweruser.

Standard user

A user's computer keeps producing a "low virtual memory" alert and the speed of the system degrades afterwards. Which of the following Control Panel locations can provide information to review and correct this issue? System > Remote System > Hardware System > System Restore System > Advanced

System > Advanced

Which of the following technologies ensures full device encryption on a Windows mobile device? BitLocker TPM Passcode

TPM.

A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take? Identify the problem Establish a theory of probable cause Test the theory to determine cause

Test the theory to determine cause

Which of the following can be achieved with Group Policy to help with workstation security measures? BitLocker password Complexity requirements BIOS password Wake on LAN

The Passwords must meet complexity requirements policy setting determines whether passwords must meet a series of guidelines that are considered important for a strong password

A user has stated a workstation is having problems loading certain websites. The user claims to have clicked on a link from a web page and nothing happened. However, other websites are displaying correctly. The technician advises the user to clear the browser cache and try again, but that does not fix the issue. Which of the following is the MOST likely cause in this scenario? The user's account expired The pop-up blocker is enabled The user is right-clicking on the link The browser is incompatible with certain websites

The browser is incompatible with certain websites pop up blocker can not block a website to open. just block the pops up.

A file is moved from one folder to another within the same disk volume. Which of the following will happen to the permissions on the file? The file will get the permissions of the destination folder The file will keep the original permissions

The file will keep the original permissions because it is in same volume.

Joe, a user, reports he is unable to install an OS on a home computer. An investigation reveals Joe is using an enterprise license key. Which of the following is the MOST likely issue? The wrong media is being used The hardware is unsupported

The hardware is unsupported

When running a combination of full and incremental backups, which of the following represents the required tapes in order to completely restore a system? The system cannot be restored completely using full and incremental backups. Only the latest full backup is required. Only the latest incremental backup is required. The latest full and all incremental backups since the last full backup.

The latest full and all incremental backups since the last full backup

logic bomb

The primary difference between logic bombs, viruses, and worms is that a logic bomb is triggered when specific conditions are met.

Recently, you upgraded a user's computer to a dual-core processor. The user complains that an application's performance did not increase after the upgrade. You need to ensure that the application fully utilizes the dual-core processor. What should you do?

The solution is usually as simple as upgrading to a version of the application that supports multithreading. You do not need to upgrade the operating system. This would only ensure that the operating system fully utilizes the dual-core processor, not the application

tracert

The tracert utility displays the path that data travels through a network. The path begins at the host, which is the computer on which the utility is started, and ends at the host specified in the computername or IP-Address variables. In this scenario, the tracert www.transoft.com command will display the route that data travels between Wkst1 and www.transoft.com. Each host that data traverses on its route to the destination host is referred to as a hop. The tracert utility numbers each hop and displays the following information for each hop: time required for the data to travel through the host, the FQDN of the host, and the IP address of the host

A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless signal connection when the laptop screen is tilted forward or backward during operation. When this happens, the entire wireless signal drops out until the screen is left in position for a good minute or so. Which of the following MOST likely explains what is happening? The hinges on the laptop screen are not strong enough to support the wireless signal cables. The wireless card is losing contact to its socket when the screen is opening/closing. The laptop is designed to work optimally with wireless when the screen is at a perfect 90 degree angle. The wireless signal cables are being crimped when the screen is opening/closing.

The wireless signal cables are being crimped when the screen is opening/closing

Boots to safe mode

This is most likely caused by a bad device driver. If you have a restore point from before the problem occurred, you could revert to that point in time. You could also use the Roll Back Driver feature to revert to the older driver. Device Manager can be used to view all devices and will allow you to install new drivers or roll back to older versions

Kernel Panic -

This will lock up the Apple or Linux computer. It is usually the result of a hardware or software problem that occurs during the boot process. For Linux computers, you should check the bootloader configuration or reinstall the kernel. For Apple computers, restart the computer, update the software, and update peripherals

A user wants to restore an application's security settings to an iOS device, but an Internet connection is unavailable. Which of the following tools can assist with mitigating this issue? Time machine Apple Configurator Device stage iCloud

Time machine

Remote connection

To allow a Remote Desktop Connection on the client computer, you should right-click Computer from the Start menu and select Properties. Select the Remote Settings option from the left-hand column type Remote Desktop Connection at the search prompt to open it.

A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the CRT but not the LCD. Which of the following controls should be used in troubleshooting? Geometry Contrast Brightness Degauss

To degauss something means to remove, or at least drastically reduce, a magnetic field. Magnetic interference was so common with CRT displays that degaussing coils were built into these types of screens to occasionally remove this interference.

BitLocker To Go, what device is needed to implement this technology?

To implement BitLocker To Go on all Windows 7 computers, you need a USB Flash drive. BitLocker To Go is a new technology in Windows 7 that allows you to encrypt the contents of USB Flash drives

Which versions of Windows Vista support synchronizing with network folders via the Sync Center?

To synchronize network folders via the Sync Center, you must have Windows Vista or Windows 7 Business, Enterprise, or Ultimate. Windows 8 and 8.1 do not support Sync Center, but Windows 8 and 8.1 Professional do

navigate to the hidden application data? Type %Windir% in the Windows Explorer bar Toggle the hidden system files option Make the user a local admin on the PC Type %Appdata% in the Windows Explorer bar

Toggle the hidden system files option Type %Appdata% in the Windows Explorer bar

users and groups local security policy

Tool enabling creation and changing of group memberships and accounts for users. you must have at minimum Windows 7 Professional to access the Local Users and Groups console. In Windows 8, this feature is only available in the Pro version

UTM

UTM stands for unified threat management; UTM devices combine the functionality of firewalls, intrusion detection systems (IDS), and proxy servers, among other things.

Mention three internet appliances.

UTM: Unified Threat Management (UTM) devices are Internet appliances. They provide a single point on the network from which multiple security functions are managed. This single point of presence is in contrast to several independent software and devices, such as antivirus, antispam, firewall, IDS, and IPS IDS: An intrusion detection system (IDS) is an Internet appliance. It typically sits outside the network and watches packets coming through the network and sets off an alarm if a packet (or series of packets) contains something that violates a defined set of rules IPS: An intrusion prevention system (IPS) is an Internet appliance that sits inline in the network. While it performs many of the same duties as an IDS, an IPS also prevents the offending traffic instead of just detecting it

A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several apps recently. Which of the following might be the cause of this issue? Slow data speeds Defective SD card Unauthorized root access Signal drop or weak signal

Unauthorized root access

A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the following should the computer technician do before connecting a cable TV line to a TV tuner card? Perform self-grounding Unplug the computer power cable Use an ESD strap Require the electrical system be brought up to code

Unplug the computer power cable

Services fail to start -

Use the Event Log to determine which service has failed to start and to research any issues that may have led up to the service not loading. Try to restart the service using the Services console. Also note that some services are dependent upon other services running. Check the service dependencies to ensure that all the services are running that are required

A user has installed a legacy application in Windows 7 and reports that only some of the functionality in it is operational. Another user is using the same application on a different Windows 7 machine and doesn't report those problems. Which of the following features in Windows 7 may be responsible for this problem? System Protection settings User Account Control Action Center Data Execution Prevention

User Account Control

what is UAC

User Account Control (UAC) is a feature of Windows Vista and Windows 7 that prevents applications from running in privileged mode even when an administrator is logged on

Restricting user permissions

Users should only be granted permissions that they need to complete their jobs. For users that need administrative-level permission, the users should be given two accounts: one normal account with more restrictive permissions that they use for day-to-day activities and one administrative account that they use when performing administrative duties. Also, as a rule, permissions should be assigned to groups, and user accounts should be added to group accounts. This makes permission administrative much more manageable

You need to establish a network connection on a Windows computer using the Setup a Connection or Network applet

VPN dial up wireless network.

A technician gets a call from a customer stating that their computer will not boot. They are getting the following error "invalid system disk". Which of the following should the technician check FIRST? Verify the operating system is installed correctly. Verify that all removable drives are empty. Verify Boot.ini is on the hard drive. Verify the computer will boot into safe mode

Verify that all removable drives are empty Your machine is configured to look for USB devices from which to boot before it checks the hard disk. You have a USB hard disk or flash drive inserted. That inserted disk or drive is not bootable. Your computer is trying to boot from it anyway

virus vs trojon horse

Viruses are also considered as malicious software. Viruses act as a self-replicating computer program that tries to alter the computer's operation by destroying data without the user consent. However, viruses spread themselves by attaching themselves to an existing program trojon horses do not replicate themselves. but also attached to good looking software and do harm in many ways such as deletion of data, file corruption, spam e-mails, phishing

You are an on-site technician at a customer's residence to fix a new motherboard. You find that the carpet of the computer room has become damp due to moisture. Wear rubber-soled shoes. Wear an anti-static wrist strap. Place the computer and all the hardware components on an anti-static bag. Use rubber-handled needle nose pliers for all maintenance tasks

Wear rubber-soled shoes. earing rubber-soled shoes does not allow electric current to pass from the ground through your body In this scenario, because the carpet has become damp with moisture, you should wear rubber-soled shoes while fixing the motherboard. The combination of water and electricity can be lethal and care should be taken to ensure that you have no contact with either component. Rubber is a non-conductor, or insulator, of electricity anti-static wrist strap can not protect against DC.

Daniel, a member of the board of directors for your company, has called the help line to complain that an unknown person is posting to his account on his favorite social media site pretending to be him. After discussing the problem, he reveals that he performed the steps as dictated by last week's email from your department. Your department did not send out an email last week with steps to complete. What term(s) below best describe which attack most likely occurred? whaling zombie spear phishing

Whaling or spear phishing most likely occurred. Whaling and spear phishing are two types of phishing attacks. Spear phishing occurs when a group of users in an organization become a high risk or target for attacks through email and social media posts. The hacker will send specific emails attempting to target someone who will answer their questions with the objective of getting access to confidential information, usually login credentials. Once they get a response, they will monitor the user's action. Later they may use the information gained to mimic your behavior and even writing style. Whaling is just like spear phishing except that whaling targets only senior executives

OS not found error NTDLR missing

When MBR is corrupted. it is boot order problem. attempt to boot from another device.

public home work networks

When you are connecting to a wireless network at a coffee shop, you should classify that connection as Public when prompted. When in doubt, choose Public unless you need to share files or printers. home network: trusted people and devices, you can join homegroup and send everything to others. worknetwork. like home network but in a work area, you can not join homegroup. but can perform network discovery.

display a blue screen, reason

When you install an incompatible or old device driver version

Which of the following operating systems supports full BitLocker functionality? Windows 7 Professional Windows 7 Enterprise

Windows 7 Enterprise

An audio visual company has decided that they want to migrate from Windows XP Professional SP2. The company has a domain network. A technician is tasked with selecting an operating system. Which of the following should the technician select? Windows 7 Home Premium Windows Vista Home Premium Windows 7 Professional Windows XP Media Center

Windows 7 Professional

Worm vs. Virus

Worms self propagate while viruses need human intervention to replicate.

Which of the following is an example of client-side virtualization? Compatibility mode on a program icon properties menu Running a DOS application on a Windows 7 32-bit operating system Cloud hosted office applications XP mode running in Windows 7 64-bit operating system

XP mode running in Windows 7 64-bit operating system

Performance Monitor

You can monitor a computer's processor, memory, network, and disk performance using Performance Monitor in Windows Vista, Windows 7, Windows 8, and Windows 8.1. Performance Monitor is used to display real-time performance operation

nbstat utility

You can use the nbtstat command to view information about the status of NetBIOS over TCP/IP on a Microsoft network, and to troubleshoot problems with Windows Internet Name Service (WINS). WINS resolves NetBIOS names to IP address on Microsoft networks. If you issue the nbtstat www.transoft.com command at a command prompt, then a screen of instructions for the use of the nbtstat command will be displayed

maximum age policy.

You should configure the Maximum password age policy to define the number of days a password can be used before the user is required to change it. You can set the number of days between 0 and 999. If you set the policy to 0 days, then the password will never expire. Configuring the Maximum password age policy can help prevent a computer from being hacked.

A user reports that his computer locks up when he inserts a Secure Digital High Capacity (SDHC) memory card into his memory card reader. You use the Safely Remove Hardware icon to eject the memory card. You then insert a Secure Digital (SD) memory card that also does not work even it was working yesterday. Reboot the computer. Update the memory card reader's device driver. Optimize the memory card reader for performance. Optimize the memory card reader for quick removal

You should reboot the computer. The memory card reader that is installed in the user's computer does not support SDHC memory cards. SDHC is a newer card type, and is not supported in some systems. Once the lockup occurs, the memory card reader will not function until the computer is rebooted. After you reboot the computer, you should instruct the user to connect the device that uses the SDHC card to the computer's USB port to access the data on the SDHC card

how can we share the mobile internet? can we share it with bluetooth connection

You should recommend that he enable tethering on the Android phone. Tethering will allow the laptop to use the data connection on the Android phone as a WiFi hot spot to transmit the order to the home office. Pairing the phone and laptop via Bluetooth is not correct. That process will allow the two devices to communicate, but will not allow the laptop to transmit the order to the home office.

You have recently installed Internet Explorer 8 on a Windows Vista computer. You want to prevent fraudulent Web sites from gaining access to your personal information through Internet Explorer.

You should turn on the SmartScreen filter to prevent fraudulent Web sites from gaining access to your personal information through Internet Explorer 8. In Internet Explorer 7, this feature was the Phishing filter. Enabling the filter provides protection against threats of accessing your personal information such as your passwords without your consent. The filter will scan and inform you about the Web site status, such as whether the Web site is suspicious. It also prevents you from sharing your personal information on Web sites that are recognized as fraudulent Web sites. The best way to prevent a phishing attack is to educate the end user

Net -

a powerful Windows command. The net use subcommand allows you to view what is currently shared. Research the various ways you can use the net command

A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and running anti-malware software, the problem persists and the technician finds that two rogue processes cannotbe killed. Which of the following should be done NEXT to continue troubleshooting the problem? Run msconfig to clean boot the computer Run Recovery Console to kill the processes

a virus on the boot has to be removed manually. Run msconfig to clean boot the computer

The registry is corrupt

a) incorrect computer shutdown b) improper device driver installation, or c) unsupported or corrupted application installation. Microsoft provides a solution to recover from this problem by performing a Windows repair with the CHKDSK /r command, replacing corrupted system files from the Windows media, or restoring Windows to the previous system state by running the Windows system restore program

Which attributes or details of an employee can be used by biometric devices? a. face b. iris c. hair d. signature e. fingerprints f. hand geometry

all of them, not hair. signature is notable though. face was confusing too. You can also use voice recognition to identify a person using biometric devices

You have discovered that hackers are gaining access to your WEP wireless network. After researching, you discover that the hackers are using war driving. You need to protect against this type of attack Change the default Service Set Identifier (SSID). Disable SSID broadcast. Configure the network to use authenticated access only. Configure the WEP protocol to WPA

all of them. War driving is a method of discovering 802.11 wireless networks by driving around with a laptop and looking for open wireless networks

Once Jane progresses and learns about ESD, which factors would she say generate and promote the transmission of electrostatic discharge (ESD) to devices? (Choose all that apply.) moving people moving machines improper grounding humidity less than 40 percent

all of them. why moving people?Unshielded cables and poor connections can also cause ESD

Wendy has decided to implement an uninterruptible power supply for several servers. Which functions can it provide her? surge protection short-term battery backup a warning when the power source fails

all of them. specially a warning, which i missed in the question.

To protect e-mail messages from unauthorized users. two tasks?

always encrypt your outgoing emails. delete the suspicious email , without opening it.

Spencer has been hired as the systems administrator for a small business and he wants to set up authentication on a network that contains two servers. What is the best way to provide this? usernames with strong passwords directory permissions VPN access control lists (ACLs)

ans: usernames with strong passwords ACLs is not authentication , they are the actual lists that contain the permissions granted to groups and users for a particular directory or file. They are also used on firewalls to govern the flow of traffic based on IP address, port numbers, and other factors.

NTFS versus share permissions on Windows 8 computers. which is false statement? a) NTFS permissions can be assigned to users and groups. b) Share permissions include Read, Write, Modify, and Full Control. c) NTFS permissions include Read, Write, Modify, and Full Control. d) Share permissions can be assigned to users and groups

answer: b) Share permissions include Read, Write, Modify, and Full Control. share permissions are only Read, Change, and Full Control NTFS also holds permissions for local users and groups and allows them to have read, write, read and execute, modify, full control, or special permissions to both folders and files. Permissions can be configured for allow versus deny. Additionally, it allows file encryption, which prevents hackers from accessing data easily

When scheduling a backup for preventative maintenance, which of the following would ensure all data was captured? Differential Full Incremental Daily

answer: full. A differential backup backs up those files that have changed since the last normal or incremental backup set was created, but does not mark them as being backed up Normal -Backs up the selected files and marks them as backed up l Copy -Backs up the selected files but does not mark them as backed up l Daily -Backs up the files that changed today, but does not mark them as backed up l Incremental -Backs up the files that have changed or are new, and marks them as being backed up

Which of the following can enable a technician to remove a virus that prevents users from updating their antivirus software? Recovery console Safe mode

answer: safe mode. Safe Mode -To load into Safe Mode, press F8 when the operating system menu is displayed during bootup. Safe Mode loads minimal drivers and can allow you to troubleshoot issues To run the Bootrec.exe tool, you must start the Windows Recovery Environment (RE). To do this, follow these steps: 1. Put the Windows Vista,7, 8, or 8.1 installation disc in the disc drive, and then start the computer. Recovery Console -This Windows software can be used to copy, rename or replace operating system files and folders and repair the file system boot sector or the Master Boot Record (MBR). In Windows Vista and later, the System Recovery Options menu is available on the installation DVD and allows you to perform similar functions as the Recovery Console

social engineering

attempting to gain access to a company network or facility by manipulating people inside the organization is known as social engineering. e.g. finding out the names of their pets, knowing their passwords by phone call, finding any personal information. Social engineering occurs when an attacker attempts to acquire information about a network via phone conversations or other social settings. User gullibility is the main reason that social engineering occurs. User education is the best protection against social engineering

Which of the following allows a user to reset their password with a series of security questions that only the user should know? Administration Verification Authentication

authentication.. verification is wrong answer.

You are the network administrator for your company. A user reports that he cannot access network resources from his computer. He was able to access the resources yesterday.While troubleshooting his computer, you find that his computer is issued an Automatic Private IP Addressing (APIPA) address. All the network equipment in the user's computer is functioning properly because you are able to access the user's computer from a remote computer. What is most likely the problem? The computer is configured with an alternate IP address. The computer is configured with a static IP address. The DNS server is down. The DHCP server is down.

because you can connect to user computer, it is not DHCP problem, it can not assign IP address.

You run the systeminfo command on a Windows 7 computer, which is not included. hotfixes installed boot options domain name virtual memory statistics

boot option is not included. all others

Missing NTLDR missing Bootmgr

bootmgr=win7 or later missing ntldr=below win 7. copy it from CD

spoofing vs phishing

both messages come from a valid source. spoofing downloads malware to your computer or network, and phishing tricks you into giving up sensitive financial information to a cyber crook. Phishing is a method of retrieval (Unlike spoofing, a phishing scam usually provides a link to a bogus website where the end-user is required to enter sensitive account information) spoofing is a means of delivery.

bcdedit.exe

can change the boot order of the multiple OS

After performing a wireless survey, a technician reports the following data: WAP Name Channel WAP1 6 WAP2 8 WAP3 9 Which of the following channels should the technician use for the SOHO WAP to be installed next? 1 3 7 11

chanel 1, not channel 11.

parent control in the internet option is listed in which tab?

content tab.

A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST? Fusing Paper handling Transfer developing

correct answer: Developing: during this stage, toner is attracted to the drum , due to less negatively or relatively positive charge. processing ( process the Raster image) charging ( negative charge the drum) exposing ( bum with laser to produce relative less negative charge) developing ( attract toners on the drum) transferring ( transfer the image to the paper) fusing ( fuse the toner) cleaning ( clean the drum and other devices)

A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause? The motherboard BIOS version is out of date The incorrect video card drivers are installed. The power connector for the video card is unplugged. The video card is unsupported by the motherboard.

correct answer: The power connector for the video card is unplugged BIOS version even it is outdated. will run the integrated video.

What Linux command creates a hard drive image?

dd

Digital Security

digital security focuses mainly on protecting your networks and devices from harmful data and malware. It includes anti-virus software, firewalls, anti-spyware software, and user authentication with strong passwords

bit locker to go

encrypt flash drives and external devices

BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment? a) commercial b) enterprise

enterprise license supports unlimited number of users (technical support is included, provided by longer duration (3 year) and more expensive. commercial license supports finite number of users.

Users on the corporate network are reporting that accessing folders is very slow on internal network servers.Which of the following should the technician troubleshoot to resolve this problem? DHCP server Web server File server Proxy server

file server

If a touchscreen becomes nonresponsive,

first remove the case or screen protector. Then clean the screen. If that does not fix the problem, unplug the device and restart it. If that still does not fix the problem, you may want to try to calibrate the touchscreen

BEST choice to repair a corrupted Windows XP boot file? bootrec fixboot

fixboot

Ten computers in your department need the BIOS updated, and it needs to be completed within a two-hour timeframe. What is the fastest way to accomplish this task? Flash the BIOS. Use a bootable flash drive. Use a boot loader file. Update the EEPROM chip

flash the bios. It is highly recommended that you back up your computer before flashing the BIOS. Updating the BIOS is good for fixing bugs, improving performance, and providing support for newly installed hardware. download exe file from manufactorer website and back up and then install it.

system tool within Mac operating systems?

force quit

You are troubleshooting an Internet connectivity issue. Several laptop users cannot connect to any websites. Users with PCs do not have any trouble. Which of the following devices is most likely causing the problem? A. Router B. Cable modem C. WAP D. Encryption mismatch E. Firewall

if more than one laptop can not connect, it is most likely WAP problem. D is wrong, it may not true that all laptops have misconfigraution. E. firewall can block some ports,

IOS8 and UP encryption?

if you lose your phone, your data is already encrypted.

A technician is trying to request a new IP address to a customer's computer through the command prompt. Which of the following commands should the technician use? ipconfig /flushdns ipconfig /renew ipconfig /release

ipconfig /renew

drive degauss

is the best method for banking old hard drive destructions.

what is the best implementation of principle of least privilege? administrative tasks at a computer that functions only as a server issuing the Run as command to execute administrative tasks during a regular user session

issuing the Run as command to execute administrative tasks during a regular user session. You should never use an administrative account to perform routine operations, such as creating a document, checking your e-mail, and so on. Administrative accounts should only be used when you need to perform an administrative task, such as configuring services or backing up the computer

whaling vs phishing

it is similar to phishing , it is malware targetting high level corporate users.

A PC technician issues the following command in a terminal window cat passwd The output of the command is garbled and unreadable. Which of the following BEST explains this output? The passwd file is a binary file The passwd file is a system file The passwd file cannot be edited The technician does not have proper permissions

it is system file. cat passwd=concatenate passwords in a file.

When an iPhone is placed in Airplane Mode, the following services are disabled:

l Cellular (both voice and data) l WiFi l Bluetooth l GPS l Location Services When a Windows phone is placed in Airplane mode, the following services are disabled: l Cellular l WiFi l FM radio l Bluetooth When an Android phone is placed in Airplane Mode, the following services are disabled: l Cellular l WiFi l Bluetooth

Which Windows 8 and Windows 8.1 feature allows you to sign into Windows using the same credentials as your Hotmail account? outlook live sign in

live sign in

A technician wants to delete all information from a laptop so it is not recoverable, but needs to repurpose the laptop drive for future use. Which of the following is the BEST option to accomplish this task? Degauss Overwrite Standard format Low-level format

low level format

Search results are being redirected to a strange site. l Computer performance degrades. l New favorites unexpectedly appear in your browser. l The firewall alerts you about an unwanted application trying to access the Internet. l Pop-ups occur even when you are not actively browsing the Internet. l Anti-virus application will not update properly. l The hard drive activity light is always on, even when applications are not running. l The user has an increase in spam e-mail.

malware

PPTP (Point-to-Point Tunneling Protocol)

more common VPN (virtual private network) but is a less secure option.

A technician is running a Cat 5 cable from the IDF to a user's PC in the office. Which of the following should the technician use for safety reasons? Dusk mask ESD strap Multimeter Cable tester

multi-meter wrong: ESD strap

A technician wants to see if the computer has a route to a remote network. Which of the following commands will display the routing table of the PC? netstat nbtstat ipconfig pathping

netStat Displays protocol statistics and current TCP/IP network connections. Netstat can be a helpful forensic tool when trying to determine what processes and programs are active on a computer and involved in networked communications. It can provide telltale signs of malware compromise under some circumstances and is a good tool to use to observe what kinds of communications are underway at any given time.

You are responsible for managing a Windows Vista computer that hosts several virtual computers. You need to install the latest patches for the operating system. Where should you install the patches? on the host computer only on each Windows Vista virtual computer only on the physical computer only on both the host computer and all Window Vista virtual computers

on both the host computer and all Window Vista virtual computers

elasticity vs on demand service

on demand relates to the ability to provision a service as and when required, typically in the context of acquiring new resources. elasticity on the ability to scale the service up or down based on demand. This should be considered in the context of scaling an existing resource previously provisioned using the on-demand service

Which cloud computing term refers to the availability of a resource as it is needed by the client?

on demand. it is not rapid elasticity: Rapid elasticity allows the provider to dynamically allocate resources based on demand. Examples include increased bandwidth, storage, or memory requirements

A recent data breach has revealed that compromised files contained employee photos, names, and addresses.This information is sensitive because it is considered to be: a detriment to employer/employee relations. personally identifiable information. a violation of information access policies. proof of employee corporate affiliation.

personally identifiable information.

phishing

phising scams are commonly used by criminals to obtain sensitive information. A phishing scam usually begins with somone trustworthy entity in some form of electronic communication.

Gaining unauthorized access to the data center by using another user's credentials is an example of which option?

piggybacking. not a man trap

A user contacts you stating that he believes that his computer is infected with malware. Which symptoms may indicate that he is correct? a) pop-ups b) browser redirection c) low disk space warning alert d) security alerts e) junk email f) slower performance

pop-ups browser redirection security alerts slower performance A low disk space warning alert is not generally a symptom of malware infection. The minimum amount of hard drive space for optimal performance is 200 MB. Junk email is not usually a sign of malware infection.

A user, Ann, reports that her computer is able to connect to devices on her local network but not on the remote office network. Ann's computer shows the following ipconfig information: IP address: 192.168.10.45 Subnetmask: 255.255.255.0 Gateway: 192.168.11.1 DNS server 1: 192.168.10.2 DNS server 2: 8.8.8.8 Which of the following is the cause of the problem? DNS server 2 is set incorrectly. DNS server 1 is set incorrectly. IP address is set incorrectly. Gateway is set incorrectly.

problem is with the internet. So Gateway is the most problematic. DNS server 2. may be incorrect, but service is still possible with IP address.

rd deltree del

rd (or rmdir) -Removes the specified directory, provided the directory is empty. l deltree -Removes the specified directory and all files and subdirectories within that directory. del -Deletes one or more files. When using this command, you need to be aware of the following parameters: ¡/P -Prompts for confirmation before each deletion. ¡/F -Forces deletion of read-only files

A rootkit

root means administrator access. is a collection of programs that grants a hacker administrative access to a computer or network. The hacker first gains access to a single system, and then uploads the rootkit to the hacked system. An example of a rootkit is a system-level kernel module that modifies file system operations After gaining administrative access, a malicious intruder might leave which of the following behind on a compromised system to allow for continued monitoring and access

Which activity is covered under the confidentiality objective of the CIA triad and involves examining someone's computer to steal confidential information?

shoulder surfing

A user, Ann, receives a call from Joe who states that he is brand new in the help desk. Joe states that he needs to update Ann's email client to prevent corruption. At Joe's request, Ann discloses her user name and password. She later discovers that Joe is not a member of the help desk. Which of the following has occurred? Social engineering Phishing Spear phishing Hijacking

social engineering. incorrect answers. Hijacking is a type of network security attack in which the attacker takes control of a communication - just as an airplane hijacker takes control of a flight - between two entities and masquerades as one of them phishing, is more general attack which sends to a group. spear phishing is personal attack phishing: Phishing is a broader term for any attempt to trick victims into sharing sensitive information such as passwords, usernames, and credit card details for malicious reasons. The attackers often disguise themselves as a trustworthy entity and make contact with their target via email, social media, phone calls (often called "vishing" for voice-phishing), and even text messages (often called "smishing" for SMS-phishing).

A user does not want their kids to be able to install software on their home desktop. Which of the following types of accounts should the user set up in Windows 7? standard user power user.

standard user window 7: Standard User: Standard account users can use most software and change system settings that do not affect other users or the security of the computer. So if you are creating an account for someone who is not very versed in Windows and may cause more harm than good while browsing the web, you may want to designate these users as Standard users. This will ensure that harmful software trying to install itself on a Standard user account will require administrative rights before installing

A customer brings in a PC for repair. The technician attentively listens as the customer describes the problem with the PC. Once the customer has finished describing the problem, which if the following should the technician do to ensure the information is accurately documented? (Choose two.) Ask questions to clarify the scope of the problem. Complete the process as quickly as possible to begin the repair process. Ensure the customer is educated regarding the correct terminology for the problem. Restate the issue to verify understanding. Note all information exactly as the customer describes

step 1: actively listens the customer. (a) Restate the issue to verify understanding. (b) Note all information exactly as the customer describes step 2: identify the problem

You need to upgrade a Windows Vista Home Premium computer to Windows 7 Home Premium. What should you do prior to the upgrade? (1,2,3)

step 1: install latest service step 2: update antivirus then disable it step 3: update bios or check hardware support

Which feature is tied closely to the Volume Shadow Copy Service (VSS) in Windows 7 and is also disabled if VSS is disabled?

system restore.

Which of the following tabs under MSCONFIG would allow a technician to configure all of the applications that launch at boot? Startup Services Tools Boot

trap: boot ( it specify which os will boot) startup:

A user, Ann, receives a phone call from the company's mail administrator who indicates her email account has been disabled due to high volumes of emails being sent in a very short period of time. Which of the following types of attack has the user experienced? Virus infection Man-in-the-middle attack Phishing attack Malware infection

virus infection.

a Visual Basic script attached to an e-mail that infects your system an attack that uses drones to obtain e-mail accounts to send spam a program that sends out your personal information to an advertiser an e-mail request from a financial institution asking you to log in and change your password using the provided link

virus/trojen. botnet spyware. phishing

window 7 professional can be upgraded by , name two

vista business. win 7 home premium.

use the snap function to display two side-by-side applications

win 7 win 8 win 8.1 win 10

Aero feature is found in which of the following operating systems? (Select TWO). Windows 7 Home Premium Windows 7 Starter Windows Vista Enterprise

windows 7 starter does not have it.

Which Windows Vista feature allows you to control the settings for Windows Update, Windows Firewall, and Windows Defender?

windows security center. it is not action center.

Which of the operating systems can be upgraded to Windows 7 Professional? Windows 7 Enterprise Windows Vista Home Premium Windows XP Professional Windows Vista Business

windows vista business window 7 home premium ( trap, not window vista home premium)

A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were than successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.) Disable guest account Remove admin permissions Modify AutoRun settings Change default credentials Run OS security updates Install a software firewall

wrong answer: modify autorun settings is a wrong answer because it is applicable only when a new virus has been spreading via USB flash drives when they are plugged in. correct answer. change default credentials and disable guest account.

A technician needs to install a clean Windows OS on several laptops in the office. The office is running a 100Base-T network. The owner would like the installations completed as soon as possible. Which of the following installation methods should the technician use? PXE-based Network Installation USB 3.0 Flash Drive

wrong: PXE-based Network Installation correct: USB 3.0 Flash Drive

bootrec -Interacts with the Master Boot Record (MBR), boot sector, or boot configuration data (BCD) store.

¡/FIXBOOT -Writes a new boot sector. ¡/FIXMBR -Writes a new MBR. ¡/REBUILDBCD -Rebuilds BCD store. ¡/SCANOS -Scans all disks for installations the Boot Manager menu is not listing


संबंधित स्टडी सेट्स

Central Venous Access Devices and Nursing Management

View Set

Legal and Ethical Issues for health professions Final

View Set

Business Intelligence MIS 5342 Baylor

View Set

Legal Environment of Business Chapter 13

View Set

Physiology Chapter 12 The Spinal Cord, Spinal Nerves and Spinal Reflexes

View Set