902 Questions from Exam Labs

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A technician has verified that Joe, a user, has a malware infection on his desktop. Drag and drop the following malware remediation techniques in the correct order Joe should follow to alleviate this issue.

1. quarantine system, 2.disable system restore, 3. Re-mediate system , 4.schedule scans and update, 5.Re-enable system restore, 6.Create a restore point. 7.Educate the user

Go over questions 36, and 27. They are lab sims, and the cell phone question as well. A technician has verified that Joe, a user, has a malware infection on his desktop. Drag and drop the following malware remediation techniques in the correct order Joe should follow to alleviate this issue. Disable system restore educate the user re-enable system restore quarantine system create a restore point remediate system schedule scans and updates

1. quarantine system, 2.disable system restore, 3. Re-mediate system , 4.schedule scans and update, 5.Re-enable system restore, 6.Create a restore point. 7.Educate the user

A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser. Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings? A. Advanced B. Security C. Privacy D. Connections

A. Advanced

Joe, a user, has connected a tablet to his personal mobile hot-spot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO). A. Change the SSID to a different broadcast name B. Add the intruding device to a blocked access list C. Access the intruder's device and shut it down D. Shut down the device until the intruder is no longer in the area E. Set up a WiFi analyzer to identify the intruding device

A. Change the SSID to a different broadcast name B. Add the intruding device to a blocked access list

Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slow performance after a couple of hours and that the problem worsens as the day goes by. If Ann restarts the device, it works fine for a couple of hours and then starts to run slow again. Which of the following is the BEST action to troubleshoot this problem? A. Check running apps B. Reset to factory default C. Disable cloud syncing D. Replace the device's battery

A. Check running apps -- Phablets usually have a limited amount of RAM and over the course of time RAM is used up. Restarting a device refreshes the RAM therefore causing it to run faster or even like new. If a device boots up and then loads a BUNCH of programs (Even background apps like Facebook messenger, games, and more) it may eventually use up a ton of RAM. Check the amount of RAM used by apps, if there isn't much leeway, deactivating or uninstalling apps should alleviate the problem.

A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access? A. Check the phone for unauthorized root access B. Disable the phone's Bluetooth chip C. Erase all personal data from the phone D. Check the phone for location tracking

A. Check the phone for unauthorized root access --

When dealing with a difficult customer, which of the following is the BEST way to handle the situation? A. Do not argue with the customer and/or be defensive B. Use technical terms to assure customer confidence C. Escalate the customer's issue to a supervisor D. Sympathize with the customer about issue

A. Do not argue with the customer and/or be defensive

Which of the following should be used to ensure that a Windows OS is functioning optimally? A. Driver updates B. Scheduled backups C. Application updates D. Restore points

A. Driver updates

A technician has just fixed a users PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do? A. Educate the user regarding Internet browsing best practices B. Update the anti-malware software on the user's PC C. Schedule scans and run updates D. Enable system restore and create restore point

A. Educate the user regarding Internet browsing best practices

A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change? A. Enable MAC filtering B. Disable SSID broadcast C. Reduce radio power level D. Update router firmware

A. Enable MAC filtering

A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend? A. Enable MAC filtering B. Disable SSID broadcast C. Assign static IP addresses D. Turn on content filtering

A. Enable MAC filtering -- Disabling the SSID broadcast does not stop others from accessing it. It only prevents your typical adapter from seeing it. However, MAC Filtering is equally as useless but it will stop your average user from accessing the network.

A user calls the help desk because a folder containing critical business files is missing from the local drive. The user is adamant that the folder was there the previous day, and cannot understand why it is gone. The technician views the properties of the parent folder and sees a back up listed on the Prior Versions tab. According to the theory of troubleshooting, which of the following is the technicians NEXT step? A. Establish a theory of probable cause B. Establish a plan of action and implement the solution C. Document findings, actions and outcomes D. Verify full system functionality and implement preventive measures

A. Establish a theory of probable cause

When securing a mobile device, which of the following types of screen locks is the MOST secure? A. Fingerprint lock B. Swipe lock C. Passcode lock D. Face lock

A. Fingerprint lock

A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types? A. Hybrid B. Community C. Private D. Public

A. Hybrid

A user needs their email set up on their iOS device. The email needs to synchronize all changes made with the server and the PC. Which of the following would the technician use to accomplish this? A. IMAP B. SMTP C. SMNP D. POP3

A. IMAP -- IMAP or Internet Message Access Protocol stores all the emails on a server and accesses them as if they are stored locally. Using this allows multiple computers to access an Email account without exhibiting the conflicts that occur when emails are stored locally (All changes are made on a server and and synced amongst devices).

A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices? A. Identify symptoms, quarantine infected system, and create restore point. B. Quarantine infected system, identify symptoms, and create restore point. C. Identify symptoms, educate end user, and create restore point. D. Create restore point, identify symptoms, and quarantine infected system.

A. Identify symptoms, quarantine infected system, and create restore point.

A user is configuring the email settings on a smartphone. Which of the following configurations will allow the user to synchronize email from multiple devices? A. IMAP B. S/MIME C. POP3 D. SMTP

A. Imap

A technician recently replaced a users monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue? A. Lower refresh rate B. Lower the resolution C. Raise the resolution D. Increase refresh rate

A. Lower the refresh rate -- You want to do this because the reason the monitor is acting funny is because it cannot handle the the current refresh rate.

A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of the following cloud concepts does this represent? A. Measured service B. Rapid elasticity C. On-demand D. Resource pooling

A. Measured service -- Cloud Service has grown tremendously the last few years. Models range from flat fees to pay for what you use methods. It's always good to look into what works best for your clients and see if you can add functionality or save money.

A user has a new web email account and asks a technician for help with setting up email on a tablet. The user would like for the email to only be stored on this tablet. Which of the following email server setting types would the technician use to accomplish this task? A. POP3 B. IMAP C. S/MIME D. SMTP

A. POP3 -- POP3 Stores emails locally, the other common format IMAP stores them on a server. POP3 is great if you aren't syncing multiple devices and want email access when not connected to Wi-Fi.

An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the user? A. Power user B. Administrator C. Standard D. Guest

A. Power user -- The goal is to allow the user to do the work that they need to do. Whether this is installing programs, creating accounts, or changing basic settings. Depending on the set-up, a user may need to be added as an administrator to his local device but kept as a limited user on the Domain Server.

A user reports unexpected icons appearing on the desktop. The technician identifies that the symptoms point to a malware infection. Which of the following procedures would be performed NEXT? A. Quarantine infected system B. Schedule scans and run updates C. Report the issue to the information security officer D. Disable System Restore (in Windows) E. Educate end user

A. Quarantine infected system

After installing a critical update from Windows Update, a user accidentally types an incorrect URL into the browser and malware is automatically installed. The malware disables the computers antivirus software and Internet connection. Which of the following would be the BEST tool to remove the malware without risking loss of the users data? A. Run System Restore B. Reinstall Windows with the Repair Option C. Reinstall Windows on top of itself D. Run System File Checker

A. Run System Restore

An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technicians FIRST step in troubleshooting the problem? A. Run defrag on the hard drive B. Restore the CAD files from backup C. Replace the hard drive D. Remove and reinstall the CAD software

A. Run defrag on the hard drive

An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporations domain. Which of the following utilities will the administrator access to configure this setting? A. System Properties B. System Information C. System Protection D. System Management

A. System Properties

A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection? A. TRACERT B. NETSTAT C. IPCONFIG D. NSLOOKUP

A. TRACERT -- TRACERT can ping various IP addresses and send you valuable information about how long it takes and if signals are arriving. It's a great tool to be familiar with for troubleshooting network issues.

A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue? A. The PC's Windows firewall is misconfigured B. The PC has an incorrect IP address configured C. The PC is on the wrong wireless network D. The PC does not have remote assistance turned on

A. The PC's Windows firewall is misconfigured

A technician opens a customers computer and sees large amounts of accumulated dust. Which of the following is the BEST method of removing the dust from the computer? A. Use compressed air to free the dust from the components and remove it with an ESD vacuum. B. Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away. C. Use a shop vacuum with enough power to ensure all dust has been removed. D. Remove as much dust as possible by hand and use compressed air to blow the rest out.

A. Use compressed air to free the dust from the components and remove it with an ESD vacuum.

Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO). A. Use multi-factor authentication B. Require strong passwords C. Enable file encryption D. Educate end users E. Restrict user permissions

A. Use multi-factor authentication, D. Educate end users -- Multi-Factor Authentication is a practical method to keep people from using a stolen email to log into a device. It will usually send a confirmation code to a device or email. At that point only the person who possesses the secondary authentication device (Cell-Phone, email address) can access it. Secondly, education, many hacks are caused by simple phishing scams and looking like a legitmate website or email that needs private data.

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO). A. User training B. Anti-malware C. Paper shredding D. Time of day restrictions E. Employee badges F. Mantraps

A. User training, C. Paper shredding

A technician receives a helpdesk ticket about an employee having a problem sending text messages with a company Android smartphone. It has been determined that it is not a carrier issue. Which of the following should the technician perform FIRST? A. Verify data connectivity B. Reformat the MicroSD card C. Replace the SIM card D. Perform a soft restore

A. Verify data connectivity -- Make sure the phone is getting a proper signal, as location can cause signal loss as well as trying to text from Wi-FI can cause texts to bounce.

Which of the following operating systems can be upgraded directly to Windows 7 Professional by a default installation? (Select TWO). A. Windows 7 Home Premium B. Windows Vista Business C. Windows XP Home D. Windows XP Professional 64-bit E. Windows XP Media Center

A. Windows 7 Home Premium B. Windows Vista Business

For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity? A. Annual cyber security education B. Update antivirus signatures more often C. Block all email attachments D. Install an IPS on each workstation

Annual cyber security education

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this? A. Configure the access point encryption from unsecured access to WEP. B. Adjust the radio power so that coverage is restricted to the business. C. Change the SSID to reflect the business name instead of a public access point. D. Enable MAC filtering and restrict access to other company's devices.

B. Adjust the radio power so that coverage is restricted to the business.

Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a technician recommend? (Select TWO). A. Increase the amount of RAM to improve disk checks B. Backup all data on the drive C. Upgrade to a home server D. Purchase a new hard drive E. Change the drive configuration to RAID 0 F. Upgrade to Windows 7 Professional

B. Backup all data on the drive, D. Purchase a new hard drive

A customer is reporting a burning smell coming from a CRT monitor. Which of the following should be taken into consideration before attempting to resolve the customers issue? A. Disconnect power before inspecting the CRT power supply B. CRT monitors should be serviced by qualified personnel C. Have compressed air available to clear out the debris D. Wear safely goggles to protect from the cathodes

B. CRT monitors should be serviced by qualified personnel --

A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT? A. Change the router firewall settings B. Check for and apply a firmware update C. Reconfigure the QoS settings D. Change router user-names and passwords

B. Check for and apply a firmware update.

A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following is the BEST option to modify the size of the partition? A. Credential Manager B. Computer Management C. Device Manager D. TPM Manager

B. Computer Manager -- The Computer Management Administrative Tool has a part known as Disk Management that is used for formatting, partitioning, or modifying storage devices. Make sure to use caution as data can be destroyed very quickly in Disk Management.

A user states that they cannot connect to the network or the Internet. The technician determines the issue is that the computer has a static IP address and needs to use DHCP to work correctly. The technician sets the NIC to automatically assign an IP address. Which of the following should the technician perform NEXT? A. Identify the type of network card and what Operating System the computer is running B. Confirm the computer is back on the network and has Internet connectivity C. They need to annotate what the static IP address was and inform the employees manager D. They need to determine why the NIC was assigned a static IP address

B. Confirm the computer is back on the network and has Internet connectivity

Which of the following is the BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment? A. Commercial license B. Enterprise license C. Seat license D. Open source license

B. Enterprise license

A user reports several technicians have been unable to solve a problem and requests that the technician on the phone comes out to fix the problem because the user is unable to work. After the technician has effectively communicated a willingness to help, which of the following is the NEXT step? A. Allow the user to speak with a supervisor. B. Identify the problem. C. Establish a theory. D. Immediately go to the user's office.

B. Identify the problem.

A Windows workstation is suspected of having malicious software that created an infected start-up item or service. Which of the following tools would a technician use to test this theory? A. chkdsk B. msconfig C. dxdiag D. ipconfig

B. Msconfig -- Use msconfig to deactivate the program and keep it from starting on bootup. This creates a good test to see if that is the problem. As a side-note you can also see the creator/manufacturer of a program and an unfamiliar or shady name may show that a program is Malware.

A user in a corporate environment needs to have a laptop device repaired and takes the device to the appropriate technician. Which of the following should the technician offer to the user in order to maintain professionalism? A. Ask to user to wait in the area while repairs are being made. B. Offer a temporary loaner laptop for the user to work on. C. Inform the user that it will be ready "sometime" and to come back later. D. Ask the user to bring the laptop back when the department is less busy.

B. Offer a temporary loaner laptop for the user to work on.

Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue. Which of the following methods can the technician use? A. Initiate a factory reset B. Perform a hard reset C. Remove the MicroSD card D. Rollback the OS update

B. Perform a hard reset

A technician installed a second hard drive in a computer. Upon restart, a message appears statinG. primary drive 0 not found. Press F1 to continue." Which of the following should the technician check FIRST? A. That NTLDR and boot.ini are not missing B. Proper drive installation (e.g. cables/jumpers) C. If computer can boot into safe mode D. If the BIOS boot settings are correct

B. Proper drive installation (e.g. cables/jumpers)

On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring? A. Content Advisor B. Proxy Settings C. Network Drive Mapping D. Local Security Policy

B. Proxy Settings -- Proxy Servers are network hubs that act as the main filter for internet traffic. Internet coming in first hits the proxy and going out also hits the proxy server. This allows custom monitoring and filtering of a network and is great for a corporate setting. It can also be configured to block access to common sites and even keep programs from connecting with a server (Steam and Adobe for instance).

A user is experiencing a software application error. The user contacts a technician for support. Which of the following will allow the user to issue an invitation to the technician in this scenario? A. Remote desktop B. Remote assistance C. telnet D. FTP

B. Remote assistance

Joe, a technician, receives an error message on his tower PC just after POST which reads: WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics. Which of the following is generating this error message? A. CHKDSK B. S.M.A.R.T. C. eSATA D. QoS

B. S.M.A.R.T. -- Self-Monitoring, Analysis and Reporting Technology

A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part? A. Ground the computer and remove jewelry. B. Self ground and handle the new card by the edges. C. Place the computer on an ESD mat. D. Attach an ESD strap to the new card during handling.

B. Self ground and handle the new card by the edges.

Virtual machines provide users with the ability to do which of the following? A. Extend 32-bit machines to 64-bits B. Share hardware resources C. Increase the network download speed D. Use less memory in the machine

B. Share hardware resources

A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand? A. The parent folder has explicit Allow rights set for this user. B. The parent folder has explicit Deny rights set for this user. C. The user forgot to share the parent folder and only shared the specific file. D. The parent folder likely has the "archive" attribute enabled.

B. The parent folder has explicit Deny rights set for this user.

A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the following should the computer technician do before connecting a cable TV line to a TV tuner card? A. Perform self-grounding B. Unplug the computer power cable C. Use an ESD strap D. Require the electrical system be brought up to code

B. Unplug the computer power cable

When the computer is turned on it emits a series of beeps and does not POST. This can be caused by a bad: A. CMOS battery. B. video card. C. IDE cable. D. floppy cable.

B. Video Card -- Depending on the beeps, you can actually know quite a bit. The most common cause is a Video Card but on a Mac it not turn on and beep three times, to indicate a RAM issue.

Ann, a customer, reports that when she occasionally works in the office basement, her smartphone battery drains faster than normal and she has poor cellular reception. Which of the following is the reason for the fast battery drain? A. Unpaired Bluetooth B. Weak signal C. Defective SD card D. Malware

B. Weak signal -- The Phone is probably using more power to try and boost the signal through the basement ceiling. Unfortunately this isn't easy to remedy without buying cell signal extender. She should probably buy a charger :D

A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be: A. a detriment to employer/employee relations. B. personally identifiable information. C. a violation of information access policies. D. proof of employee corporate affiliation.

B. personally identifiable information.

A technician has just upgraded RAM on a users workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings. Which of the following should be entered for the Min portion of the page file setting if using these best practices? A. 4096MB B. 8192MB C. 12288MB D. 16328MB

C. 12288MB -- A best practice is to take what you need and half as much to what you need. Since you need 8GB which is 8192MB take half of that and add it on so half of 8192 is 4096. 8192 + 4096 is 12288MB

A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers? A. 10 feet (3 meters) B. 15 feet (5 meters) C. 30 feet (9 meters) D. 45 feet (14 meters)

C. 30 feet (9 meters)

A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed? A. 143 B. 23 C. 443 D. 3269 E. 3389

C. 443

A customer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. Which of the following courses of action would BEST resolve the problem? A. Running a full DEFRAG on the system B. Clearing the AppData temp folder entirely C. Clearing the Windows Update download cache entirely D. Uninstalling the Windows Update feature in Windows 7 and reinstalling it directly from the Microsoft website

C. Clearing the Windows Update download cache entirely -- This is a very common problem, often caused by a corrupt file download (So then when the update attempts to execute, the program locks up). Also note, Windows Update can keep a very large amount of useless files on hand. This is good to clear overtime as it can yield more than 8-10 GB at times.

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the companys network jacks unless such jacks are designated for guest use? A. Disable DHCP and assign a static IP address to each network device physically connected to the network. B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices. C. Disable all switch ports when they are not utilized and enable them on an as needed basis. D. Place guest network jacks in public areas and all other jacks in secure areas as needed.

C. Disable all switch ports when they are not utilized and enable them on an as needed basis.

A user is reporting that their screen is flickering at a rapid rate. Which of the following Control Panel paths should a technician use in order to remedy this issue? A. Display -> Settings -> Advanced -> General -> DPI B. Display -> Settings -> Resolution C. Display -> Settings -> Advanced -> Adapter -> Refresh D. Display -> Appearance -> Effects -> Transition

C. Display -> Settings -> Advanced -> Adapter -> Refresh

A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information? A. Simple 1-pass zero overwrite B. Low level 3-pass random wipe C. Low level 7-pass random wipe D. High level format 10 times

C. Low level 7-pass random wipe -- Wipe is much better than format or overwrite.

An administrator is in a Remote Assistance session, sharing a users desktop. While trying to map a shared network drive for the user, an access denied error is encountered while using the users credentials. Which of the following should be the administrators NEXT step? A. Ensure the user's account is not locked out B. Use the fully qualified domain name of the share C. Open the location with administrator privileges D. Try mapping with a different drive letter

C. Open the location with administrator privileges

Which of the following best practices is used to fix a zero-day vulnerability on Linux? A. Scheduled backup B. Scheduled disk maintenance C. Patch management D. Antivirus update

C. Patch management -- A zero day vulnerability is one that is already out there. It is being exploited by hackers in a destructive manner and the software developer has to act as quickly as possible to plug the gaps.

A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem? A. Disable System Restore B. Schedule scans and run updates in safe mode C. Quarantine the system D. Create a System Restore point

C. Quarantine the system

A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy? A. Require biometric identification to log into the laptop. B. Require multifactor authentication to log into laptop. C. Require laptop hard drives to be encrypted. D. Require users to change their password at frequent intervals. E. Require users to have strong passwords.

C. Require laptop hard drives to be encrypted. -- This is first step best practice because the hard drive can be removed, therefore it supper cedes strong password.

A technician has been tasked with loading the operating system on every PC with a blank hard drive on a network. The technician wishes to install the operating system with minimal physical interaction with the PCs. Which of the following is the BEST way to accomplish this? A. Clone the operating system from an image onto optical media. B. Use the original software media to load the operation system on every PC. C. Set up a central image that the PCs can load from a PXE boot. D. Create an image and copy it from a USB drive using an unattended answer file.

C. Set up a central image that the PCs can load from a PXE boot.

Which of the following describes when an application is able to reuse Windows login credentials? A. Access control list B. Principle of least privilege C. Single sign-on D. Pass-through authentication

C. Single sign-on

A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications? A. The workstation is victim of a denial of service attack. B. The username is not authenticating on the network. C. The username is not part of the local administrator group. D. The administrator has not applied appropriate security patches.

C. The username is not part of the local administrator group.

A technician needs to install a clean Windows OS on several laptops in the office. The office is running a 100Base-T network. The owner would like the installations completed as soon as possible. Which of the following installation methods should the technician use? A. FireWire External Hard Drive B. PXE-based Network Installation C. USB 3.0 Flash Drive D. DVD-ROM

C. USB 3.0 Flash Drive

A technician is in need of a device that would give the BEST network protection within a single device. Which of the following devices would the technician use? A. NLX B. IDS C. UTM D. ATX

C. UTM -- Unified threat management (UTM) - centralize security management, allowing administrators to manage all of their security-related hardware and software through a single device or interface

A customer has recently installed several applications on a Windows 7 workstation and is now experiencing slow system performance and spontaneous restarts. After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss? A. Factory restore B. SecureBoot C. msconfig D. diskpart

C. msconfig -- Msconfig is a great tool for removing bloatware (Software that bloats a system that comes with the manufacturer, such as Dell or HP) and ordering programs to not boot automatically. Some troubleshooting time in Msconfig can find any programs that are still "Triggering" and causing the boot issues.

A user, Ann, reports that her laptop will no longer connect to wireless. Joe, a technician, checks the device manager and does not see a wireless networking card or any unknown devices. Which of the following should Joe do FIRST? A. Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut. B. Install a USB wireless card to ensure that Windows networking is working properly. C. Open the laptop and reseat the network card and both antennas. D. Download and install the latest wireless driver from the manufacturer's website.

Check and make sure the wireless card was not turned off via the hardware switch or keyboard shortcut.

A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician? A. Follow the customer's prescribed course of action. B. Convince the customer to take a better course of action to resolve the issue. C. Explain why the customer's prescribed course of action is incorrect. D. Acknowledge the customer's input, but follow another course of action.

D. Acknowledge the customer's input, but follow another course of action.

A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO). A. Configure the workstation for a static IP B. Disable all wireless network connections C. Remove shortcuts to the application D. Block the application in Windows Firewall E. Change network location to Work F. Reroute the web address in HOSTS file

D. Block the application in Windows Firewall, F. Reroute the web address in HOSTS file -- There are many ways to accomplish this but simpler is often better. Making the Firewall catch specific programs can cause them from sending a signal out, and rerouting the web address in the HOSTS file is a simple way to block access to internet content. You simply add the desired IP into the HOSTS file and then it can be redirected to a different website or even blocked. As an added bonus, setting up a service such as OpenDNS can help you control access to many websites on a Domain with ease

Which of the following file system types is used primarily for optical media? A. FAT32 B. NTFS C. HPFS D. CDFS

D. CDFS

A technician is performing a clean install of Windows on a new hard drive from a factory DVD, but the computer does not recognize the optical disc. A non-system disk or disk error is observed. Which of the following should the technician do FIRST? A. Update the motherboard firmware B. Check the cables C. Replace the optical drive D. Check the BIOS setting

D. Check the BIOS setting

A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a child can spend on a particular website. Which of the following tabs under Internet Options will allow the user to create those settings? A. Privacy B. Advanced C. Security D. Content

D. Content --

A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST? A. Fusing B. Paper handling C. Transfer D. Development

D. Development

A computer was recently infected by malware after a flash drive was plugged in. The user, Ann, indicates she never opened any files or folders from the flash drive. A technician needs to prevent this from occurring in the future. Which of the following would accomplish this? A. BitLocker To Go B. Set strong passwords C. Disable usermin D. Disable AutoRun

D. Disable AutoRun

A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring? A. Configure the server to use a static IP B. Logically move the server to the DMZ C. Reallocate the server to a different networking closet D. Disable the remote desktop port

D. Disable the remote desktop port --

Which of the following prevention methods is considered to be digital security? A. RFID badge B. Mantrap C. Biometrics D. Firewalls E. ID badge

D. Firewalls -- All the others are examples of physical security.

A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network? A. Disable the router's remote management feature. B. Enable WPA2 wireless encryption. C. Change the router's default admin name and password. D. Place the router in a locked room

D. Place the router in a locked room

A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however, when the laptop lid is closed, it goes into sleep mode. Which of the following Control Panel items can be used to disable this feature? A. Action Center B. System C. Display Settings D. Power Options

D. Power Options

A user recently installed a new video driver on a PC but now it will not boot. Which of the following is the BEST option to correct the issue? A. Automated system recovery B. Emergency repair disks C. FIXBOOT D. Safe mode

D. Safe mode

Which of the following explains why it is important to secure Personally Identifiable Information (PII)? A. So phishing attacks are not launched against employees of the organization. B. So sensitive information, such as corporate passwords, is not stolen. C. So man-in-the-middle attacks are not launched against the organization. D. So sensitive information, such as social security numbers, is not stolen.

D. So sensitive information, such as social security numbers, is not stolen.

A technician responds to a hardware issue with a server. The technician discovers that one of the hard drives in the server has failed. The server is set up in a RAID 1 configuration. Which of the following steps would the technician perform NEXT? A. Remove the hard drive and back up the data B. Run CONVERT on the hard drive C. Reboot the server D. Swap hard drive and rebuild array

D. Swap hard drive and rebuild array

A technician is using a domain account to access files located on a server at the path \\computername\C$. The technician receives an Access denied error message. Which of the following is MOST likely the cause of the error? A. The server is no longer accepting connections since reaching its limit of open shares. B. The password is incorrect, requiring the user to reset it before authentication will proceed. C. The username should be prefixed by the domain, followed by a backslash (e.g., domain\username). D. The account does not have local administrative permissions to access the server share.

D. The account does not have local administrative permissions to access the server share. -- Since the location is a specific device itself and not a registered domain name, it is possible you are not accessing a server or Domain registered component of the network. In that case, you would need local Administrative rights as the Computer is not using Domain credentials to authenticate locally. --- The C$ of any pc is the local administrator hidden shared drive and would require local administrator permission to access.

A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless signal connection when the laptop screen is tilted forward or backward during operation. When this happens, the entire wireless signal drops out until the screen is left in position for a good minute or so. Which of the following MOST likely explains what is happening? A. The hinges on the laptop screen are not strong enough to support the wireless signal cables. B. The wireless card is losing contact to its socket when the screen is opening/closing. C. The laptop is designed to work optimally with wireless when the screen is at a perfect 90 degree angle. D. The wireless signal cables are being crimped when the screen is opening/closing.

D. The wireless signal cables are being crimped when the screen is opening/closing. -- Unfortunately some laptop designs can cause issues overtime from monitor cords unplugging the backlight to crimped Wi-Fi cables. Although much of troubleshooting is with software issues, it isn't uncommon to have bizarre hardware failure.

A technician has been informed by the IT security manager that a vulnerability has been discovered in the wireless router. The vulnerability could allow an attacker to take remote control of the device. Which of the following should the technician perform to address the issue? A. Power off the device B. Install an add-on card C. Update the WiFi antenna D. Update firmware

D. Update firmware -- Manufacturers routinely issue updates to firmware, check back regularly to see if that is happening with a device on the network and make sure to register important devices and sign up for updates on patches whenever possible.

A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the following commands should be run on the workstation? A. extract B. tasklist C. gpupdate D. gpresult E. chkdsk

D. gpresult

A technician has purchased a new surge protector to protect equipment in the production environment. The surge protectors features safeguard the connected equipment by directing surges to the: A. path of shortest conductance. B. path of lowest inductance. C. path of highest voltage. D. path of least resistance.

D. path of least resistance. -- Surge protectors block or short voltages to the ground that go beyond a set threshold. It is absolutely critical to have protection against power surges. It is a cheap solution to something that can cripple an IT set-up.

The simulation that goes -- You have been tasked with setting up a new executive's laptop on his home network. After an investigation, you find that his home network is wired and has the following settings: IP range is 10.10.10.0 Netmask is 255.255.255.0 Default gateway is 10.10.10.1 Additionally, the router's address is used as the primary DNS server and WINS is not in use. Please configure the laptop with an IP address of 10.10.10.15, ensuring that the laptop will still work when plugged into the switch at the office, which is configured for DHCP. Do not make any other unnecessary configurations to the laptop.

Go into the network setting like you would always do, then select the alternate configuration tab, and input the static information.

A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does not run correctly and is reporting that the .dll is missing. Which of the following tools would the technician use to complete the import of the .dll? A. gpresult B. msconfig C. regedit D. gpupdate E. regsrv32

Regsrv32 -- This allows you to register and deregister .dll and ActiveX files. Commands like regsrv32 (followed by the file name) can register, and regsvr32 /u (filename) can deregister.

Which of the following security threats requires the attacker to be physically located near the target machine? A. Shoulder surfing B. Social engineering C. Phishing D. Rootkit

Shoulder surfing

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of? A. Shoulder surfing B. Phishing attack C. Social engineering D. Malware infection

Social Engineering

A Windows 7 machine appears to have a failure. Every time it is rebooted, the message "BOOTMGR is missing" appears. You have previously inserted a Windows 7 installation DVD into the DVD-ROM. Please repair this failure without overwriting the customers' local user profiles. Instructions: ✑ Launch the simulation to repair the failure ✑ Type Help in command line to show list of available commands ✑ When you have completed the simulation, please select the done button.

bootrec /fixboot


Set pelajaran terkait

Quizzes - Safety and infection control

View Set

ch3 Decision Support Systems Concepts, Methodologies, and Technologies

View Set

Immigration & The Statue of Liberty

View Set

Chapter 21: Translating Research into Practice

View Set

ECN Chapter 1 and 2: Homework and Quiz

View Set