test questions or confused questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A technician has successfully completed a gpupdate from a CMD box of a user's PC and is ready to move to the next user. Which of the following is the appropriate NEXT step? (Select TWO). View the CMD process in Task Manager Type EXIT at the command prompt and press Enter Minimize the CMD box to the taskbar Click the "x" in the top right of the CMD window Select Switch User on the PC

Type EXIT at the command prompt and press Enter Click the "x" in the top right of the CMD window

Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO). Use multi-factor authentication Require strong passwords Enable file encryption Educate end users Restrict user permissions

Use multi-factor authentication Educate end users ( option B is already included in it)

Which of the following combinations provides the STRONGEST authentication security? Hardware token Username and password Smart card with PIN Voice then fingerprint recognition

Voice then figner-print recognition. is the best option.

You need to upgrade a computer running Windows Vista Home Premium with Service Pack 2 to Windows 7. To which editions of Windows 7 can this computer be upgraded? (Choose all that apply.) Windows 7 Starter Windows 7 Home Premium Windows 7 Professional Windows 7 Ultimate

Windows 7 Home Premium Windows 7 Ultimate

--------------- will provide multilingual support for both the operating systems and applications?

Windows Vista Ultimate and Windows 7 Ultimate and window 8, 8.1, window 10

Shadow Copy

Windows Vista/7 feature that uses restore points to store older versions of files needs to perform a backup while a system is running

You need to check the startup configuration for several services. describe two control panel tools which can do this?

You can access the Services console from the Computer Management console or the Administrative Tools console. All of these tools have a console called Services

An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue? The email filter has quarantined the messages ​ The firewall is blocking the sender's email address The HIPS device is blocking the messages The access control list is blocking the messages

a is the anser, not b.

turnstile is an example of which of the following forms of physical security? Entry control roster Biometrics Mantrap Cipher lock

a mechanical gate consisting of revolving horizontal arms fixed to a vertical post, allowing only one person at a time to pass through answer: mantrap.

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy? ​ a) Disable the user accounts b) Restrict the user accounts ​ c) Delete the user accounts d) Reset the user accounts

a or c , 50-50

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.) ​ a) Denied write/delete permissions ​ b) Group Policy hours restriction c) Mapped drives d) Administrative share permissions e) Disabled proxy settings

a) Denied write/delete permissions. c) Mapped Drives.( administrative might not allow you access the folder) b) is wrong because group settings was okey as it is said in the question.

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check? a) Look at the system Event Viewer to find more information on the failure b) Download the failed update to install manually c) Visit the Microsoft Update website to see if there is an issue with a specific update d) Look up the error number associated with the failed update

a) is not option because KB update number will not be in the event viewer D) is correct , look up the error number associated with the failed update.

A user's smartphone runs very slow at the end of the day. When the user restarts the phone in the morning, it runs at its normal speed. Which of the following should be done throughout the day to BEST resolve this issue? a) ​ Uninstall any unused apps. b) Charge the smartphone. c) ​ Reset to the smartphone to factory default. d) Close all running apps

a) is wrong d) close all runnning apps.

A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and running anti-malware software, the problem persists and the technician finds that two rogue processes cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem? ​ Run msconfig to clean boot the computer ​ Run Event Viewer to identify the cause ​ Run Recovery Console to kill the processes ​ Run System Restore to revert to previous stat

a) msconfig is use to clean boot the computer. system resoter can not fix the boot sector problem

oe, an end-user, reports that the PC he uses periodically logs off his user account and displays a message that updates are being installed. Which of the following is the MOST likely cause of this issue? ​ a) Automatic Windows Update is enabled on the machine b) Scheduled antivirus scans and updates are enabled on the machine

a) windows update.

With which of the following types is a man-in-the-middle attack associated? a) DDoS b) Zero-day ​ c) Spoofing ​ d) Brute force

answer is C.

Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction. The WiFi icon is displaying that it has connectivity but she is still unable to browse. Which of the following could be the issue? a) The router needs to be rebooted b) ​ iCloud is corrupted ​c ) PRAM needs to be reset d) The upgrade needs to be uninstalled

answer is C. we can not downgroad the ram. router is not problem since it has connectivity. icloud has nothing to do with the problem.

Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open? ​ chkdsk ​ Recovery Image ​ System Restore Backup

answer is C. system restore is faster than chkdsk. the problem is related to OS. it is also chkdsk can not correct documents.

A technician is using a domain account to access files located on a server at the path \\computername\C$. The technician receives an "Access denied" error message. Which of the following is MOST likely the cause of the error? The server is no longer accepting connections since reaching its limit of open shares The account does not have local administrative permissions to access the server share. ​ The password is incorrect, requiring the user to reset it before authentication will proceed. ​ The username should be prefixed by the domain, followed by a backslash (e.g., domain\username).

answer is D.

An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the user? Power user Administrator Standard Guest

answer is power user. power user vs standard user. power user can not install new devices can not access other user files. standard users: can not edit registry they can create groups but can manage only what they have created.

A technician receives a helpdesk ticket about an employee having a problem sending text messages with a company Android smartphone. It has been determined that it is not a carrier issue. Which of the following should the technician perform FIRST? A. Verify data connectivity B. Reformat the MicroSD card C. Replace the SIM card D. Perform a soft restore

answer: A. Verify data connectivity D. Perform a soft restore it is wrong, it is not soft reset.

Which Windows 8 and 8.1 feature enhances the taskbar functionality when working with more than one monitor? Connect to a Projector Show taskbar on all displays Duplicate Display Extend display

answer: show taskbar on all display The Show taskbar on all displays feature in Windows 8 and 8.1 enhances the taskbar functionality when working with more than one monitor. It allows you to show the taskbar on all displays, as opposed to in Windows 7 (and prior) where you could only access the taskbar on the primary monitor. When enabled, this is often referred to as multi-monitor taskbars. You can access this by right-clicking the taskbar and selecting Properties, which will access the Taskbar and Navigation properties dialog box. Once there, under Multiple Displays, check the Show taskbar on all displays option as shown in the following exhibit:

A local administrator would like to determine why a laptop is taking so long to boot into the operating system. Which of the following tabs in MSCONFIG would the administrator access to BEST determine this? Startup Tools General Boot

answer: startup tags will have tools which starts after the boot. incorrect answers. tools tab: will have management tools such as remote assistance, CMD, performance monitor. Boot: which os will load. General Tab: which things will be loaded at the start. start up items and important system services and not all the drivers.

A technician wants to change the security level for a set of internal websites accessed frequently by a user. Which of the following Control Panel utilities would allow the technician to complete this task? Windows Firewall Credential Manager Network and Sharing Center Internet Options Homegroup

answer: window firewall: a) it can filter both outgoing and incoming connections to your Windows computer and block those which are unwanted b) Windows Firewall can provide your computer or device with protection against attacks from your local network or the internet Firewall has separate settings for private and public networks. When configuring a firewall, you should configure rules and exceptions. A rule is a configuration setting that filters traffic based on port, application, or service. Rules can allow or deny connections. Exceptions are configured to override the rules. For example, you may have configured a rule that does not allow a particular service. Later, if someone needs to use that service to connect to your computer, you could configure an exception to allow only that user's connection. On the General tab of Windows Firewall, you can enabled or disable Windows Firewall. Keep in mind that disabling Windows Firewall completely disables it, which could result in security issues. On the General tab, you can also select the Don't Allow Exceptions option, which is recommended when in an unsecure location

one example of community cloud

as another example, several organizations may require a specific application that resides on one set of cloud servers. Instead of giving each organization their own server in the cloud for this app, the hosting company allows multiple customers connect into their environment and logically segment their sessions. The customer, however, is still using the same pieces of hardware as other folks are. However, everyone is hitting these servers with the same purpose -- to access that one application -- which is what makes it a community cloud.

A new help desk technician receives a trouble call from a user. The issue is something the technician has never encountered before, and does not know where to begin troubleshooting. The FIRST course of action is for the technician to: tell the customer the issue needs to be escalated to a higher tier technician. ask the customer if they would mind holding for no more than two minutes to check resources. tell the customer this is the first time encountering the issue and to please be patient. ask the customer to please hold while a senior technician is consulted regarding the issue.

ask the customer if they would mind holding for no more than two minutes to check resources

An administrator is in a Remote Assistance session, sharing a user's desktop. While trying to map a shared network drive for the user, an "access denied" error is encountered while using the user's credentials. Which of the following should be the administrator's NEXT step ​ Ensure the user's account is not locked out Open the location with administrator privileges ​ Try mapping with a different drive letter Use the fully qualified domain name of the share

b) browsing to another user's directory require administrative privileges. installing applications and updates window firewall settings. changing user acount.

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access? a) Issue a default strong password for all users b) Disable single sign-on ​ c) Remove the guest account from the administrators group d) Require authentication on wake-up

b) is not answer, because only a single system is involved.

A user's email inbox is suddenly receiving dozens of rejection messages from various mail servers. Which of the following would the technician perform to BEST solve the issue? ​ Change the user's email password. Disable the user's email account. Change the email account from POP to IMAP. Enable spam filtering on the email account

change the user's email password.

A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a child can spend on a particular website. Which of the following tabs under Internet Options will allow the user to create those settings? A. Privacy B. Advanced C. Security D. Content

content.

After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware? Run the malware removal program while disconnected from the Internet Run the malware removal program in Windows Safe Mode Reinstall the malware removal program from a trusted source Set the malware removal program to run each time the computer is rebooted

correct: Run the malware removal program in Windows Safe Mode B: it is understood that he already disconnected from the internet using malware removal best practices. it is wrong.

A technician is upgrading a computer to Windows 7 Professional 64-bit version. The current OS is Windows Vista 32-bit. Which of the following methods should the technician use? Windows 7 Professional x64 DVD and select upgrade option Windows 7 Professional x64 DVD and select custom install Windows 7 Professional x86 DVD and select remote install Windows 7 Professional x86 in-place upgrade

custom install

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized. Which of the following messages will be displayed? a) Operating system not found b) BIOS ROM checksum error c) NTLDR not found d) No boot device available

d is the answer. b is not the answer, because system will boot in this case.

A new virus has been spreading via USB flash drives when they are plugged in. An administrator has been tasked with securing the workstations. Which of the following should be done FIRST? Disable Autorun features Update security software definitions Force encryption on all removable drives Force users to change their passwords

disable autorun features.

You are responsible for purchasing new Windows computers for your company. The computers must be able to join your company's domain. Which versions of Windows should you implement? (Choose all that apply.) Windows 7 Professional Windows 7 Ultimate Windows 8 Professional Windows 7 Starter Windows 7 Home Premium

domains are supported in professional and ultimate editions. Windows 7 Professional Windows 7 Ultimate Windows 8 Professional

Ann, an employee at a company, calls the help disk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.) ​ a) Attempt to log on to another vendor's website from Ann's laptop b) Verify Ann's laptop has the correct browser settings c) Check all browser cached files on Ann's laptop and log on to another vendor's website d )Ask Ann about the notification and review the installed programs e) Ask Ann for her credentials to verify and log on to the vendor's website from Ann's laptop

e) is wrong because confidential information can not be asked. a) does not provide resolution. b) is wrong because browser settings has nothing to do with login problem. pop up notifications can come from website and can be installed on your system this support C and D) d) Ask Ann about the notification and review the installed programs c) Check all browser cached files on Ann's laptop and log on to another vendor's website

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns? Default SSID MAC filtering Power levels Content filtering Firewall

firewall

A technician is tasked with analyzing computer settings managed by Microsoft Group Policy configuration. The technician wants to print a report to an HTML file for offline review. Which of the following Windows command line tools would allow the technician to accomplish this task?

gpresult=summary of group policies gpupdate= update the group policies settings.

After confirming BIOS support, technician has added a second video card and a new sound card to a computer's motherboard. The computer continuously restarts. This is an indication of which of the following. Incompatible sound card Insufficient power supply Insufficient memory Defective video card

insufficient power supply

Which of the following network hosts would MOST likely provide the services needed to allow client access to Internet web pages?

it is proxy server. trap answer: web server/. Proxy settings identify a proxy server on the local network that is used to access the Internet. All Internet connections are routed through this proxy server. The proxy server utilizes Network Address Translation (NAT) to translate communication between the Internet and the private network.

You need to access a shared folder named research$ . Which fact is true about this shared folder?

l It is hidden. l It requires administrative privileges to access Administrative shares have the following characteristics: Hidden: The "$" appended to the end of the share name means that it is a hidden share. Windows will not list such shares among those it defines in typical queries by remote clients to obtain the list of shares. One needs to know the name of an administrative share in order to access it.[1] Not every hidden share is an administrative share; in other words, ordinary hidden shares may be created at user's discretion.[1] Automatically created: Administrative shares are created by Windows, not a network administrator. If deleted, they will be automatically recreated.[2]

l Windows 7 Starter, Home Basic, Home Premium l Windows 7 Starter, Home Basic, Home Premium, Professional, Ultimate l Windows 7 Professional and Enterprise and Windows 8 l Windows 8, Pro, and Pro with Media Center and Windows 8.1 l Windows 8 Pro, Pro with Media Center, Enterprise and 8.1 Pro -upgrade to Windows 8 Enterprise

l Windows 7 Starter, Home Basic, Home Premium -upgrade to Windows 8 ( for personal use) l Windows 7 Starter, Home Basic, Home Premium, Professional, Ultimate -upgrade to Windows 8 Pro l Windows 7 Professional and Enterprise and Windows 8 -upgrade to Windows 8 Enterprise l Windows 8 -upgrade to Windows 8.1 l Windows 8, Pro, and Pro with Media Center and Windows 8.1 -upgrade to Windows 8 Pro l Windows 8 Pro, Pro with Media Center, Enterprise and 8.1 Pro -upgrade to Windows 8 Enterprise

Which of the following best practices is used to fix a zero-day vulnerability on Linux? Scheduled disk maintenance Scheduled backup Antivirus update Patch management

patch management is the correct software. anti-virus can not help because it is not a virus, it is infection in the system itself.

what is the purpose of proxy server on a corporate network in terms of security?

to redirect network traffic for filtering or monitoring?

Joe, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently appears on the screen informing the user additional information is required to log in. Which of the following is causing this? ​ Cellular data roaming notifications Weak cellular signal ​ Unintended WiFi connections ​ Unintended Bluetooth connections

unintended wifi connections

content filtering

using certificates and parents controls , Content filtering is the use of a program to screen and/or exclude access to web pages or email deemed objectionable. Content filtering is used by corporations as part of their firewalls, and also by home computer owners. Content filtering works by specifying content patterns - such as text strings or objects within images - that, if matched, indicate undesirable content that is to be screened out. A content filter will then block access to this content

A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed?

wrong: 3389 Correct! 443

A user's email inbox is suddenly receiving dozens of rejection messages from various mail servers. Which of the following would the technician perform to BEST solve the issue? ​ Change the user's email password. Disable the user's email account. Change the email account from POP to IMAP. Enable spam filtering on the email account. ​

​ Change the user's email password.

An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem? ​ USB host adapter The cable connected to the network ​ The domain of the virtual machine ​ Virtual host network adapter

​ Virtual host network adapter not the domain of the virtual machine.

The type of security threat that uses computers or other networks to accept and pass on viruses is called:

​ botnets

CDFS (Compact Disc File System)

A file system used on optical discs and widely supported by different operating systems.

A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types? A. Hybrid B. Community C. Private D. Public

Answer is hybrid cloud. Google Cloud Platform (This Google-developed open source application container management platform can run on-premises or in Google's public cloud in in the Google Container Engine) Amazen web service (Customers can run a full suite of VMware software on dedicated infrastructure in AWS's public cloud) Microsoft azure. all are now hybrid cloud.

A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network? Disable the router's remote management feature. Enable WPA2 wireless encryption. Change the router's default admin name and password. Place the router in a locked room

B is not possible, since wireless is disabled already. C is already done. in the question. D: correct answer.

A technician is troubleshooting a startup failure on a Windows domain controller DNS service. The technician discovers a third-party application is running a database server application that happens to capture the same high-numbered ports as the DNS service. The application service ports cannot be changed due to application design. Which of the following is the BEST solution to resolve this problem? Allow the database application to start up first, and set the DNS service to delayed start Allow the DNS server service to start up first, and set the application service to delayed start Move the third-party database application to a different domain controller Contact the application vendor to find out if the ports it uses can be changed

Move the third-party database application to a different domain controller

how can you role updates.

Reboot into safe mode and roll back the updates

A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. Which of the following is the BEST step the user can take to fix this problem? Perform a force stop Reset to factory default Upgrade to a larger battery Close running apps

Reset to factory default

Harddrive shredding

Shredder -This is an accepted method for destroying CDs and DVDs. However, to shred hard drives, you would need access to an expensive hard drive shredded

A user reports that any URL entered redirects to the same web page. A technician concludes that the user's computer has been compromised. Which of the following tools would the technician use to resolve the issue? Rogue antivirus ​ Last known good configuration ​ Anti-malware ​ System restore

anti-malware.

Which of the following tasks is automatically added to the task scheduler in Windows to keep hard disk performance up?

defrag

Which of the following built-in accounts removed in Windows 10? Power User Administrator Guest Standard User

guest

hange the number of CPU cores available to the OS to enhance productivity a) task manager b) ms config

ms config. ( boot menu, advanced options, change number of cpu)

A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT? a )Run the Windows Update utility to manually reinstall the DLL file b )Run the defrag utility to correct any fragmentation that may have damaged the file c) Research the DLL file to identify the application it corresponds to before continuing d) Copy the DLL file from a working PC and use the regsvr32 command to load the file

we can not copy DLL file from other computer and fix it. windows update can not provide that file. correct answer. you need to install the application again, but this answer was not given. so correct answer is C.

In Windows 7 deployments, you must have which minimum Windows 7 version can access the Local Users and Groups console

window 7 professional

A technician is in need of a device that would give the BEST network protection within a single device. Which of the following devices would the technician use? NLX IDS UTM ATX

A UTM appliance will usually include functions such as: antivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention, content filtering and leak prevention. Some units also provide services such as remote routing, network address translation (NAT), and virtual private network (VPN) support. The allure of the solution is based on simplicity, so organizations that may have had individual vendors or appliances for each separate security task can now have them all under one vendor umbrella, supported by one IT team or segment, and run through one console

A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? (Select TWO). A. Rename default accounts B. Disable Windows Update C. Configure single sign-on D. Run gpupdate tool E. Disable guest account F. Disable Action Center pop-ups

A. Rename default accounts E. Disable guest account

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this? Configure the access point encryption from unsecured access to WEP. Adjust the radio power so that coverage is restricted to the business. Change the SSID to reflect the business name instead of a public access point. Enable MAC filtering and restrict access to other company's devices. Answer: B

Adjust the radio power so that coverage is restricted to the business.

A SOHO customer has taken precautions against malware and viruses on a Windows 8 workstation. After implementing the precautions, standard applications are crashing or failing to start. Which of the following could be used to remedy the customer's issue after a virus scan reports no infections? Use Event Viewer to clear the logs Perform a hard drive defragmentation Turn off DEP for all programs and services Use System Restore to create a restore point

Answer: C

The system administrator is tasked with installing Windows to 100 computers over the network. The systems administrator needs to remove system-specific identifiers. Which of the following would the system administrator use to accomplish this? Windows Deployment Services Remote Installation Services System Preparation Tool Unattended installation

Answer: C The System Preparation Tool (Sysprep), is meant for System Administrators and OEMs, to automate the deployment of Windows operating system. Once you have performed the initial setup steps on a single computer, you can run the Sysprep tool to prepare the sample computer for cloning and automate the deployment on other computers. It can be found in the \Windows\System32\sysprep folder

Daniel is new to your department and is asking about wireless networks. What would you tell him are three conditions that affect the external vulnerabilities of wireless networks? (Choose three.) Number of users Antenna selection Antenna placement Access point power Speed of connection

Antenna selection Antenna placement Access point power

A technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast? Enable static IPs Block the outbound port Change the default SSID enable mac filtering

Block the outbound port Of course, outbound is covered by the Default rule which allows all outbound traffic until you add to the outbound firewall rules, these are used to block or allow access by your computer(s) to the Internet. Set up correctly and it will be working - perhaps an application will complain that it cannot connect. I believe with that router you must choose the correct Service/Application to be covered or add a custom service in Services if the rule is not covered.

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST? a) Roll back the application to the earlier version b) Update the OS of the smartphones Clear the application cache c) Reinstall the application

C is not the option, because if two mobiles install the app, it will not improve. B is the because, if two OS having the same problem. on two mobiles, it is likely the OS.

A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone's knowledge. Which of the following would prevent this from occurring? Change to user MAC filtering Change default usernames and passwords Disable the SSID from broadcasting Enable static IP addresses

Change default usernames and passwords

When setting up a new wireless router, which of the following actions should the technician take FIRST in order to secure the network? (Select TWO). Disable unused ports Change the SSID Position the antennas to prevent outside access Enable MAC filtering Change the default user name

Change the default user name Change the SSID The basic tasks to secure a network are to change SSID and the default user name. This is the basic security a user can employ to secure the network immediately.

A home user receives a call from a technician who claims to be with a virus control company. The technician explains that the user's PC is infected with harmful viruses. The technician instructs the user how to get to the Event Viewer where all errors can be seen. The technician claims this problem can be fixed for money. Which of the following threats has the user been a victim of? Phishing Social engineering Man-in-the-middle Spoofing

Correct answer: A hacker typically uses social engineering to gain user names and passwords or sensitive documents by non-technical means, such as posing as an employee or dumpster diving. A company can help protect itself from a social engineering attack by requiring employees to attend security awareness training. Often hackers will use flattery as a means to gain trust to obtain information. incorrect answers phishing: An example of phishing is an e-mail request pretending to be from a financial institution asking you to log in and change your password using the provided link. Phishing attacks always appear to be from a legitimate source spoofing: Most web applications use a login mechanism that generates a temporary session token to use for future requests to avoid requiring the user to type a password at every page. An attacker can sniff sensitive traffic to identify the session token for a user and use it to make requests as the user. The attacker does not need to spoof once he has a session token Spoofing is another example of man-in-middle attack. trick might be to pollute the mapped IP addresses and MAC addresses so that users think they are sending data to one another when they are really sending it to the hacker

A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use? chkdsk Degauss Quick format Drive wipe

Correct answer: drive Wipe: data wiping software to completely erase the information. Disk wiping overwrites each individual sector on a hard drive multiple times to erase the data from the entire hard drive. recommendations will range from 1 pass, 3 pass, 7 pass, up to 30 or more passes. Degauss: An extra step is to degauss the hard drive. Degaussing is a process whereby the magnetic media is erased using a reverse magnetic field to scramble the electronic data and make it unreadabl Degausser are expensive.

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company's network jacks unless such jacks are designated for guest use? Disable DHCP and assign a static IP address to each network device physically connected to the network. Enable MAC address filtering across all network jacks and record the MAC address of guest devices. Disable all switch ports when they are not utilized and enable them on an as needed basis. Place guest network jacks in public areas and all other jacks in secure areas as needed.

Disable all switch ports when they are not utilized and enable them on an as needed basis

A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur? Dead pixels Flickering image No image on screen Distorted image

Distorted image The chassis of a CRT (Cathode Ray Tube) television is its very cathode ray tube.The cathode rays i.e. the electrons from the cathode are focused and accelerated using a combination of electric and magnetic field setup inside the cathode ray tube.These rays when focused to bombard the fluorescent screen of the television, we see the pictures on the television.If a sufficiently strong magnet is placed near the television then the magnetic field of the magnet may distort the accurate focusing of electron beams by magnetic field inside the tube thereby distorting the picture on the screen

Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Joe is then required to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screenlock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue? ​ Corrupted registry settings ​ Antivirus domain-level policies ​ Domain-level group policies ​ Incorrect local-level user policies

Domain-level group policies system administrator, you may often need to create a Windows domain of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database (called a directory service). Also one or more domain controllers need to be deployed to enable managing the domain

A technician is attempting to manually migrate a user's profile from one Windows PC to another. Files in the user's My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur? COMPRESSED exFAT EFS ​NTFS

EFS

A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees' laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change?

Enable Mac filtering

Multiple users have reported latency issues. After troubleshooting the issue, the technician finds that bandwidth is saturated by non-corporate applications. Which of the following should resolve this issue? Assign static IP addresses Enable MAC filtering Enable content filtering Configure an IPS

Enable content filtering

q1=A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access? Turning down the radio power level Enabling MAC filtering Setting a high encryption level Disabling the SSID broadcast q2.A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password

Enabling MAC filtering for 1 and 2 radio power level is related to range. since company shares the floor, this does not going to help. encryption: This is used when there is danger of the hacker. SSID does not provide security. but considered a good practise.

gpupdate.

Gpupdate: The gpupdate command refreshes a computer's local Group Policy, as well as any Active Directory-based group policies. for instance. Windows domain has been identified as not having the most current policy

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.) ​ a) Reduce the transmit power b) Reduce the channel available c) Enable QoS management d) Disable the SSID broadcast e) Implement WPA encryption f) Disable the DHCP server

Implement WPA encryption. is wrong , this is not the first task. a) simplest task is disable SSID broadcast. d) Reduce the transmit power.

A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating the Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance in the host operating system? (Select TWO). Increase the size of the virtual hard drive. Reduce physical memory allocated to the VM ​ Install additional physical hard drives. ​ Install more physical memory ​ Clear temporary files in the VM

Install more physical memory Install additional physical hard drives.

A technician is trying to install Windows on a computer. The install process reports there are no storage devices available, but the BIOS shows a hard drive is installed. Which of the following does the technician need to do? Create a primary partition Use NTFS Enable PXE Install third-party drivers

Install third-party drivers trap answer: primary partition, it is only needed after the hard drive has the proper driver.

A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue? Unsupported operating system Unacceptable CPU type and speed Insufficient airflow and cooling Inadequate video RAM amount

Insufficient airflow and cooling

NTLDR is missing or corrupt"

NTLDR is missing or corrupt" The System Recovery Options should be used to fix a corrupt master boot record. You should use the repair option to fix the master boot record. The NTLDR is missing or corrupt message can indicate several issues, including the following: l The computer is attempting to boot from a non-bootable source. l The hard drive is not correctly configured in the BIOS. l One of the boot files is corrupt or missing

to change the dual-monitor configuration of the monitors in window 7.

Navigate to Control Panel\Appearance and Personalization\Display\Adjust Resolution

A user in a corporate environment needs to have a laptop device repaired and takes the device to the appropriate technician. Which of the following should the technician offer to the user in order to maintain professionalism? ​ Ask the user to bring the laptop back when the department is less busy. ​ Offer a temporary loaner laptop for the user to work on. Ask to user to wait in the area while repairs are being made ​ Inform the user that it will be ready "sometime" and to come back later

Offer a temporary loaner laptop for the user to work on.

An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue? ​ Internet connectivity issues Ransomware infection ​ Antivirus software ​ Content-filtering

Ransomware infection answer is not content filtering.( it filters traffic) can not block the data file. PDF file says, answer is content filtering.

A user's smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT? Reset the device's network settings Check the data usage statistics on the device Verify the SSID with which the device is associated

Reset the device's network settings

Windows Update cannot currently check for updates because the service is not running

Restart the update service

A technician is fixing a very slow computer. Antivirus and Malware programs have been run, and some detections have been removed. After running Disk Cleanup, the system still seems to be slow, especially with multiple programs running. Which of the following should the technician do NEXT? Run CHKDSK Manually erase all cookies Go back to the latest restore point Run defrag

Run Defrag.

The system administrator is tasked with installing Windows to 100 computers over the network. The systems administrator needs to remove system-specific identifiers. Which of the following would the system administrator use to accomplish this? Unattended installation System Preparation Tool

System Preparation Tool (Correct Answer)

A technician is using a domain account to access files located on a server at the path \\computername\C$. The technician receives an "Access denied" error message. Which of the following is MOST likely the cause of the error? The server is no longer accepting connections since reaching its limit of open shares ​ The account does not have local administrative permissions to access the server share. ​ The password is incorrect, requiring the user to reset it before authentication will proceed. ​ The username should be prefixed by the domain, followed by a backslash (e.g., domain\username).

The username should be prefixed by the domain, followed by a backslash (e.g., domain\username).


संबंधित स्टडी सेट्स

Chapter 20: Short-Term Financial Planning

View Set

OWare- Earth And Space Science 8. Earth's Water

View Set

BRUNNERS - Ch 67 - Management of Patients with Cerebrovascular Disorders

View Set

Chapter 8: Overview of the micronutrients & phytochemicals

View Set

Lesson 19 Geography of Ancient China

View Set