CompTIA A+ 220-902 Scenario Questions

Ace your homework & exams now with Quizwiz!

Drag and drop the following Windows 7 versions in order according to their feature-sets, from MOST to LEAST.

***MOST Ultimate Enterprise Professional Home Premium Starter ***LEAST

Which of the following file formats does Android use for application installation?

.apk

A technician has verified that Joe, a user, has a malware infection on his desktop. Drag and drop the following malware remediation techniques in the correct order Joe should follow to alleviate this issue. (Drag and Drop)

1. Quarantine the system 2. Disable System Restore 3. Re-mediate system 4. Schedule scans and updates 5. Re-enable system restore 6. Create restore point 7. Educate the user

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt. The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G. The new partitions must be formatted to ensure that users' files can be secured from other users and that the disk must be configured to account for future redundancy. Instructions: Conduct the necessary steps within the Disk Manager to accomplish these tasks

1. Right click on disk 1, click on initialize 2. Choose disk and option as MBR. Hit ok. 3. Again, right click on disk 1 and choose convert to dynamic disk. 4. Now right click on disk 1 and choose new simple volume. 5. Specify storage as 256000 and assign a drive letter F and choose file system as NTFS and click finish. 6. Do the same thing for rest of space of disk 1, assigning 512000MB and using Disc G

A technician has just upgraded RAM on a users workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings. Which of the following should be entered for the Min portion of the page file setting if using these best practices?

12288MB

A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers?

30 feet (9 meters)

A technician is called into the office during a thunderstorm. Users are reporting that machines are intermittently powering off. Which of the following will BEST prevent user data loss?

A UPS

A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?

ACL

A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician?

Acknowledge the customer's input, but follow another course of action.

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?

Adjust the radio power so that coverage is restricted to the business.

A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser. Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings?

Advanced

For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?

Annual cyber security education

A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation?

Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours

Joe, a technician, arrives onsite at a customers home. Upon entering the home, Joe notices an unpleasant odor. In response to this, Joe pinches his nose and holds his breath. After Joe leaves, the customer reports the behavior to Joe's supervisor. The supervisor decides the issue must be addressed. Which of the following topics would the supervisor be MOST likely to cover?

Avoiding being judgmental

A technician is working a trouble ticket for a user. After addressing the issue, the technician asks the user to verify functionality. The user confirms the system is functioning, but the computers speakers now emit an irritating noise. The technician states this is a byproduct of the solution, and the user will eventually get used to the noise. Which of the following professionalism principles is the technician failing to address?

Avoiding dismissal of the customer's problems

A technician has decided to upgrade all users iPhones to the latest model. Which of the following is the FIRST thing the technician should advise the users to do with the old phones before turning them in?

Back up the mobile data with a cloud backup service.

Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a technician recommend? (Select TWO).

Backup all data on the drive Purchase a new hard drive

Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayeD. Access Denied. Please Enter Encryption Password. Which of the following is the reason that this error is displayed?

BitLocker is being used

A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).

Block the application in Windows Firewall Reroute the web address in HOSTS file

How would a technician install Windows OS on a MAC OS computer without using third- party software?

Boot Camp

An IT manager needs to reimage 30 computers in a lab. The image has already been created and is ready to be deployed via the network. Which of the following tasks should be completed FIRST?

Boot from PXE.

Which of the following file system types is used primarily for optical media?

CDFS

A PC is powering on but the only activity a technician can see is spinning fans. Which of the following components would MOST likely be at fault for such a condition? (Select TWO)

CPU Memory

A customer is reporting a burning smell coming from a CRT monitor. Which of the following should be taken into consideration before attempting to resolve the customers issue?

CRT monitors should be serviced by qualified personnel

A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyones knowledge. Which of the following would prevent this from occurring?

Change default usernames and passwords

Joe, a user, has connected a tablet to his personal mobile hot-spot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO).

Change the SSID to a different broadcast name Add the intruding device to a blocked access list

A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT?

Check for and apply a firmware update

Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slow performance after a couple of hours and that the problem worsens as the day goes by. If Ann restarts the device, it works fine for a couple of hours and then starts to run slow again. Which of the following is the BEST action to troubleshoot this problem?

Check running apps

A small office experiences frequent power outages. Upon rebooting the Windows workstations after each power outage, users report the inability to open shared files. Which of the following MUST a technician configure to resolve this issue in the future?

Check the "Reconnect at logon" checkbox for the mapped network drive

A technician is performing a clean install of Windows on a new hard drive from a factory DVD, but the computer does not recognize the optical disc. A non-system disk or disk error is observed. Which of the following should the technician do FIRST?

Check the BIOS setting

A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access?

Check the phone for unauthorized root access

A user, Ann, reports that her laptop will no longer connect to wireless. Joe, a technician, checks the device manager and does not see a wireless networking card or any unknown devices. Which of the following should Joe do FIRST?

Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut.

A customer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. Which of the following courses of action would BEST resolve the problem?

Clearing the Windows Update download cache entirely

A technician has just removed malware from a Windows 7 system, but the user reports that every time they type a URL into Internet Explorer to navigate to a search engine the same standard page is being displayed on the browser. The page is asking the user to purchase antivirus software.

Click on internet options > Click Advance settings > click reset

A users smartphone runs very slow at the end of the day. When the user restarts the phone in the morning, it runs at its normal speed. Which of the following should be done throughout the day to BEST resolve this issue?

Close all running apps.

A Google account on an Android device by default will synchronize to which of the following locations?

Cloud

Which of the following Windows OS capabilities allows modern Windows versions to run applications written for older versions natively?

Compatibility mode

A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates to Java, but is still unable to view the map. The technician should change which of the following Internet Options?

Compatibility view

A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following is the BEST option to modify the size of the partition?

Computer Management

Which of the following is the BEST option to prevent data breaches on lost mobile devices?

Configure the device to remote wipe as soon as it is reported lost.

A user states that they cannot connect to the network or the Internet. The technician determines the issue is that the computer has a static IP address and needs to use DHCP to work correctly. The technician sets the NIC to automatically assign an IP address. Which of the following should the technician perform NEXT?

Confirm the computer is back on the network and has Internet connectivity

Which of the following is the FASTEST way for a user to synchronize data between an iPhone and a work PC?

Connect the iPhone's USB cable and use iTunes.

A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a child can spend on a particular website. Which of the following tabs under Internet Options will allow the user to create those settings?

Content

An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?

Content-filtering

You have been tasked with setting up a new executive's laptop on his home network. After an investigation, you find that his home network is wired and has the following settings: IP range is 10.10.10.0 Netmask is 255.255.255.0 Default gateway is 10.10.10.1 Additionally, the router's address is used as the primary DNS server and WINS is not in use. Please configure the laptop with an IP address of 10.10.10.15, ensuring that the laptop will still work when plugged into the switch at the office, which is configured for DHCP. Do not make any other unnecessary configurations to the laptop.

Control Panel>Network and Internet>Network and Sharing Center>Change Adapter Settings> right click on Ethernet connection to be change>Properties> Select IPv4>Properties> change settings as needed.

A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information?

DHCP server

A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the CRT but not the LCD. Which of the following controls should be used in troubleshooting?

Degauss

A laser printer is producing completely blank sheets. Which of the following processes should the technician check FIRST?

Development

A technician has just installed a video card in a PC. The video card is not working, although it was working fine on the test bench. Which of the following Windows tools should the technician use to start troubleshooting the problem?

Device Manager

A user has plugged in a mobile phone to a PC and received a message that the driver was not successfully installed. Which of the following system tools should be used to troubleshoot this error?

Device Manager

Which of the following features of a mobile device operates the touch screen?

Digitizer

A computer was recently infected by malware after a flash drive was plugged in. The user, Ann, indicates she never opened any files or folders from the flash drive. A technician needs to prevent this from occurring in the future. Which of the following would accomplish this?

Disable AutoRun

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the companys network jacks unless such jacks are designated for guest use?

Disable all switch ports when they are not utilized and enable them on an as needed basis.

A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?

Disable the remote desktop port

In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed FIRST?

Disconnect power

A user is reporting that their screen is flickering at a rapid rate. Which of the following Control Panel paths should a technician use in order to remedy this issue?

Display -> Settings -> Advanced -> Adapter -> Refresh

A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur?

Distorted image

When dealing with a difficult customer, which of the following is the BEST way to handle the situation?

Do not argue with the customer and/or be defensive

You need to configure your mobile device to send and receive electronic messages from your company. Your mobile device must be able to truly synchronize the message state with your desktop so that when a message is read on your desktop it is marked as read on your mobile device These are the proper parameters: ✑ Email address tech@techies com ✑ Password P@SSwOrd ✑ Pop techies com Port 110 Security. None ✑ IMAP techies com Port 993 Security SSL ✑ Smtp.techies.com Port 465 Security: TLS ✑ Company SSID Techies ✑ Security WPA2 ✑ Passphrase P@SSwOrd ✑ SSID is not broadcasted Instructions You are not authorized to use the Company's WLAN The outgoing server does not require login credentials When you have completed the simulation, please select the done button to submit your answer.

Do not put the credentials in the WIFI and NETWORKS. because Instructions You are not authorized to use the Company's WLAN The outgoing server does not require login credentials, and use IMAP because POP3 does not sync, it just download the ema

A technician has finished replacing the network card in a laptop and has verified full system functionality. Which of the following troubleshooting steps should the technician take NEXT?

Document findings, actions, and outcomes

Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Joe is then required to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screen-lock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue?

Domain-level group policies

A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?

Drive wipe

Which of the following should be used to ensure that a Windows OS is functioning optimally?

Driver updates

A technician is attempting to manually migrate a users profile from one Windows PC to another. Files in the users My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur?

EFS

A technician has just fixed a users PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?

Educate the user regarding Internet browsing best practices

A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change?

Enable MAC filtering

A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend?

Enable MAC filtering

Which of the following is the BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment?

Enterprise license

A user calls the help desk because a folder containing critical business files is missing from the local drive. The user is adamant that the folder was there the previous day, and cannot understand why it is gone. The technician views the properties of the parent folder and sees a back up listed on the Prior Versions tab. According to the theory of troubleshooting, which of the following is the technicians NEXT step?

Establish a theory of probable cause

A customers Windows 7 Home Premium computer displays a stop error and automatically reboots. Which of the following system utilities can a support technician use to find more information about the cause of the error?

Event Viewer

The customer reports their PC freezes up everyday around the same time. Which of the following utilities would be BEST to check for any error codes?

Event Viewer

Which of the following Windows utilities would MOST likely be used to identify system errors?

Event Viewer

When securing a mobile device, which of the following types of screen locks is the MOST secure?

Fingerprint lock

Which of the following prevention methods is considered to be digital security?

Firewalls

A user is looking for the Application Data directory in their profile but cannot see it. Which of the following Control Panel options would correct this?

Folder Options

A technician is attempting to remove malware from a customers workstation. Which of the following Control Panel utilities should the technician use?

Folder Options > View hidden files

A technician is tasked with setting up a users webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail? (Select THREE).

Free/busy Calendar Contacts

A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements?

GPT

A user, Ann, reports that her computer is able to connect to devices on her local network but not on the remote office network. Anns computer shows the following ipconfig information: IP address: 192.168.10.45 Subnetmask: 255.255.255.0 Gateway: 192.168.11.1 DNS server 1: 192.168.10.2 DNS server 2: 8.8.8.8 Which of the following is the cause of the problem?

Gateway is set incorrectly.

A user notices the social media apps are constantly updated with the users precise location. The user is worried about privacy and would like to keep this information from being broadcast online. Which of the following features should the user adjust in order to accomplish this?

Geotracking

A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed?

HTTPS: Port 443

Drag and drop the following Windows Versions to the correct feature on which they are found. Windows Versions may be used more than once.

HomeGroup -Win 7 Add/Remove Programs - Win XP Printers - Win Vista Gadget Sidebar - Win Vista Action Center - Win 7 Start Menu - Win 7, XP, Vista Printers and Faxes - Win XP Hibernate - Win 7, XP, Vista Printers and devices - Win 7

A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types?

Hybrid

A user is configuring the email settings on a smartphone. Which of the following configurations will allow the user to synchronize email from multiple devices?

IMAP

A user needs their email set up on their iOS device. The email needs to synchronize all changes made with the server and the PC. Which of the following would the technician use to accomplish this?

IMAP

A user wants to be able to access email from all devices. Which of the following formats should be used to allow this synchronization?

IMAP

A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices?

Identify symptoms, quarantine infected system, and create restore point.

A user reports several technicians have been unable to solve a problem and requests that the technician on the phone comes out to fix the problem because the user is unable to work. After the technician has effectively communicated a willingness to help, which of the following is the NEXT step?

Identify the problem.

A user reports browsing the Internet is slow and an icon with a picture of a person with a headset keeps asking them to click here for help. The user has clicked on the icon to try to resolve the slowness but all that happens is the computer redirects them to a website to purchase software. Which of the following should be performed FIRST to resolve the issue?

Identify the type of malware

A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating the Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance in the host operating system? (Select TWO).

Install more physical memory. Reduce physical memory allocated to the VM.

A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error is received that the application cannot be installed because the OS is not supported. Which of the following should the technician do FIRST to try to get the application installed in Windows 7?

Install the application with compatibility mode

A technician is trying to install Windows on a computer. The install process reports there are no storage devices available, but the BIOS shows a hard drive is installed. Which of the following does the technician need to do?

Install third-party drivers

A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue?

Insufficient airflow and cooling

A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss of video during operation. Which of the following are MOST likely causes of this problem? (Select TWO)

Integrated system video chip is failing and/or near death. Incompatible or untested video drivers have been installed.

Which of the following is a risk of implementing a BYOD policy?

Introducing malware onto the network

Which of the following command line tools will terminate a non-system process without restarting the computer?

Kill

A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?

Low level 7-pass random wipe

A technician recently replaced a users monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue?

Lower refresh rate

Which of the following identifies traffic based upon its physical network address?

MAC filtering

A user states that the computer takes a long time to load the desktop after login. Which of the following tools should be used to help remediate the problem?

MSCONFIG

A user has recently installed Windows 7 on a computer. They ran Windows updates, updated the firmware and installed a printer. The user accessed a P2P application and now they are getting a large amount of browser pop-ups. Which of the following is MOST likely the cause of the pop-ups?

Malware

A company is concerned about users tailgating into restricted areas. In order to prevent unauthorized users from following others, which of the following should be implemented?

Mantraps

A user is unable to find the preferred default network printer in the printers list in the user profile. Which of the following is the FIRST step that should be taken?

Map printer

A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (Select TWO).

Mask Safety goggles

A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of the following cloud concepts does this represent?

Measured service

A user, Joe, has just finished upgrading his computer with a wireless keyboard/mouse combination, additional memory, installed new speakers, and replaced his 15 inch flat screen with a 24 inch flat screen. When he boots the computer it immediately starts making a loud beeping noise and will go no further in the boot process. Which of Joes system upgrades is the cause of the problem?

Memory is mismatched

A user has a Windows 8.1 RT operating system and wants to add additional programs to the computer. Which of the following is available for installing more applications?

Microsoft Store

Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

NET

Which of the following features is being used when a smartphone is used to purchase a product at a retail kiosk?

NFC

A user in a corporate environment needs to have a laptop device repaired and takes the device to the appropriate technician. Which of the following should the technician offer to the user in order to maintain professionalism?

Offer a temporary loaner laptop for the user to work on

A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this?

One Drive

An administrator is in a Remote Assistance session, sharing a users desktop. While trying to map a shared network drive for the user, an access denied error is encountered while using the users credentials. Which of the following should be the administrators NEXT step?

Open the location with administrator privileges

After being relocated to an enclosed position under a desk, a computer experiences intermittent shutdowns. Which of the following conditions is MOST likely the cause?

Overheating

An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contact the IT department and report a violation of which of the following policies?

PII

A user has a new web email account and asks a technician for help with setting up email on a tablet. The user would like for the email to only be stored on this tablet. Which of the following email server setting types would the technician use to accomplish this task?

POP3

A technician is instructed to configure a new workstation to boot the OS from the network. The technician must enable which of the following FIRST?

PXE

A users PC breaks and a technician needs to configure a new machine with a copy of their computer image stored on a remote server. Which of the following technologies would help RIS install this image?

PXE

Which of the following best practices is used to fix a zero-day vulnerability on Linux?

Patch management

Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue. Which of the following methods can the technician use?

Perform a hard reset

A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?

Physical destruction

An IR printer stops working for half of an office while the other half is able to print. Which of the following should be checked FIRST?

Physical obstructions

A technician is installing a wireless network and wants to limit the signal available outside the building. Which of the following would help accomplish this?

Place directional antennas

A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network?

Place the router in a locked room.

A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however, when the laptop lid is closed, it goes into sleep mode. Which of the following Control Panel items can be used to disable this feature?

Power Options

When using Microsoft Windows 8.1 Operating System, which of the following features allows scripts and snippets to run?

Power Shell

An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the user?

Power user

A technician is tasked with installing Windows on numerous network PCs. Which of the following is the QUICKEST method for getting a standard configuration to the PCs?

Prebuilt image using PXE

A technician installed a second hard drive in a computer. Upon restart, a message appears statinG. primary drive 0 not found. Press F1 to continue." Which of the following should the technician check FIRST?

Proper drive installation (e.g. cables/jumpers)

On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?

Proxy Settings

Which of the following network hosts would MOST likely provide the services needed to allow client access to Internet web pages?

Proxy server

A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the technician configure next?

Proxy settings

A user reports unexpected icons appearing on the desktop. The technician identifies that the symptoms point to a malware infection. Which of the following procedures would be performed NEXT?

Quarantine infected system

A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?

Quarantine the system

A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following types of RAID is MOST likely in use?

RAID 0

An end user needs to completely re-install Windows 7 on a home computer but it did not come with any OS discs. How would a technician accomplish this?

Recovery partition

A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?

Regular user education

After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem?

Reinsert the drive and boot.

A technician needs to log into a user's computer to fix the user's corrupt local profile. Which of the following connectivity tools will allow the technician to connect to the users computer?

Remote Desktop

A user is experiencing a software application error. The user contacts a technician for support. Which of the following will allow the user to issue an invitation to the technician in this scenario?

Remote assistance

A PC uses RAID 1. Ann, a technician, has read in the event log that the drive "SATA 1" is no longer in sync with drive "SATA 0". Which of the following steps should she try FIRST to repair this PC to optimal running conditions?

Remove SATA 1 from the RAID group then try to re-add it

Ann, a user, has brought her laptop in for service. She reports that her battery is at 100%, but whenever it is unplugged it immediately shuts down. Which of the following should the technician do?

Replace the battery

A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?

Require laptop hard drives to be encrypted

A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT?

Research the DLL file to identify the application it corresponds to before continuing

A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. Which of the following is the BEST step the user can take to fix this problem?

Reset to factory default

A technician is working on a users PC. After testing the theory of the cause, which of the following could the technician perform NEXT? (Select TWO).

Resolve issue New theory or escalate

After installing a critical update from Windows Update, a user accidentally types an incorrect URL into the browser and malware is automatically installed. The malware disables the computers antivirus software and Internet connection. Which of the following would be the BEST tool to remove the malware without risking loss of the users data?

Run System Restore

A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address. Which of the following should the technician do to resolve the issue?

Run an anti-spyware scan

A technician is fixing a very slow computer. Antivirus and Malware programs have been run, and some detections have been removed. After running Disk Cleanup, the system still seems to be slow, especially with multiple programs running. Which of the following should the technician do NEXT

Run defrag

An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technicians FIRST step in troubleshooting the problem?

Run defrag on the hard drive

After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?

Run the malware removal program in Windows Safe Mode

Joe, a technician, receives an error message on his tower PC just after POST which reads: WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics. Which of the following is generating this error message?

S.M.A.R.T.

A technician recently removed spyware from a computer and now the user is getting error messages about system files. Which of the following tools would a technician use to verify all system files are intact and in their original versions?

SFC

A user recently installed a new video driver on a PC but now it will not boot. Which of the following is the BEST option to correct the issue?

Safe mode

A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform?

Secure the workstation in a limited access facility.

A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?

Select load driver

A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part?

Self ground and handle the new card by the edges.

A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not successfully remove the file. When the technician attempts to manually remove the file, an error message appears that says, The file is in use by another program. Which of the following tools would be the BEST to use to correct the issue?

Services Console

In order to prevent other users from editing files in C:\ Files, which of the following steps should be taken?

Set NTFS permissions to read only

A users personal laptop was hacked. A technician troubleshooting the issue discovers the user used the numbers 123456789 as their account password. The user has not changed the password in two years. Which of the following best practices should the technician recommend the user implement to prevent future hacking? (Select TWO).

Set a strong password Change the password frequently

A network administrator notices a new WiFi connection has appeared as a wireless network choice and is always at the top of the list. As a result, users are constantly trying to connect to the wrong network. Which of the following should the administrator do to correct this issue?

Set all of the WiFi users wireless profiles to automatically connect to the company network.

A technician has been tasked with loading the operating system on every PC with a blank hard drive on a network. The technician wishes to install the operating system with minimal physical interaction with the PCs. Which of the following is the BEST way to accomplish this?

Set up a central image that the PCs can load from a PXE boot.

An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this?

Set up shares with permissions based upon group membership.

Virtual machines provide users with the ability to do which of the following?

Share hardware resources

Which of the following tools is used to type or paste recovery commands directly into a Linux box?

Shell/terminal

Which of the following security threats requires the attacker to be physically located near the target machine?

Shoulder surfing

A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives?

Shredding

Which of the following describes when an application is able to reuse Windows login credentials?

Single sign-on

Which of the following explains why it is important to secure Personally Identifiable Information (PII)?

So sensitive information, such as social security numbers, is not stolen.

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?

Social engineering

A user, Ann, receives a call from Joe who states that he is brand new in the help desk. Joe states that he needs to update Anns email client to prevent corruption. At Joe's request, Ann discloses her user name and password. She later discovers that Joe is not a member of the help desk. Which of the following has occurred?

Social engineering

A local administrator would like to determine why a laptop is taking so long to boot into the operating system. Which of the following tabs in MSCONFIG would the administrator access to BEST determine this?

Startup

After an installation of a video adapter, the screen on a Windows 7 system cannot be seen. Which of the following Windows 7 functions will resolve this?

Startup Repair

A technician responds to a hardware issue with a server. The technician discovers that one of the hard drives in the server has failed. The server is set up in a RAID 1 configuration. Which of the following steps would the technician perform NEXT?

Swap hard drive and rebuild array

An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporations domain. Which of the following utilities will the administrator access to configure this setting?

System Properties

An office manager mistakenly uninstalled a valuable application. Which of the following utilities may allow the manager to correct this issue?

System Restore

Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open?

System Restore

A user, Joe, calls and states every few hours he is unable to connect to the Internet for several minutes but is able to access internal sites during this time. Which of the following tools would be used to find the issue with the network connection?

TRACERT

Which of the following security threats happens when another person enters a secured area with an authorized person?

Tailgating

A technician is noticing extremely slow performance on a computer and would like to see what application is consuming resources. Which of the following tools should the technician use to view the system performance?

Task Manager

A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take?

Test the theory to determine cause

A critical server was replaced by the IT staff the previous night. The following morning, some users are reporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shut down their workstations the previous day are able to connect to the Internet. A technician looks at the following report from a workstation with no Internet connectivity: IP Address: 192.168.1.101 Netmask: 255.255.255.0 DHCP Server:192.168.1.1 DNS Server:192.168.1.2 Default Gateway:192.168.1.1 Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?

The DHCP server is misconfigured.

A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue?

The PC's Windows firewall is misconfigured

A technician is using a domain account to access files located on a server at the path \\computername\C$. The technician receives an Access denied error message. Which of the following is MOST likely the cause of the error?

The account does not have local administrative permissions to access the server share.

A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?

The parent folder has explicit Deny rights set for this user.

A technician recently installed a new video card in a PC. The PC already has integrated video on the motherboard. When the technician turns on the PC, there is no video. Which of the following is MOST likely the cause?

The power connector for the video card is unplugged.

A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair?

The technician should remove jewelry

A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications?

The username is not part of the local administrator group.

A users CRT display is not displaying colors correctly. Turning the display to the right or left sometimes temporarily corrects the problem. Which of the following should the technician check?

The video cable

A user reports that their wireless connectivity is being spotty. The issue seems to interrupt their wireless signal connection when the laptop screen is tilted forward or backward during operation. When this happens, the entire wireless signal drops out until the screen is left in position for a good minute or so. Which of the following MOST likely explains what is happening?

The wireless signal cables are being crimped when the screen is opening/closing.

An IPS appliance is installed on the network. Which of the following is the purpose of the IPS?

To check and stop unwanted activity

Which of the following is a security threat that disguises itself as legitimate software?

Trojan

Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following?

Trojan horse

Data on full disk encrypted drives using BitLocker is MOST secure from loss when combined with which of the following technologies?

Trusted platform module

A technician has successfully completed a gpupdate from a CMD box of a users PC and is ready to move to the next user. Which of the following is the appropriate NEXT step? (Select TWO)

Type EXIT at the command prompt and press Enter Click the "x" in the top right of the CMD window

A technician needs to install a clean Windows OS on several laptops in the office. The office is running a 100Base-T network. The owner would like the installations completed as soon as possible. Which of the following installation methods should the technician use?

USB 3.0 Flash Drive

A technician is in need of a device that would give the BEST network protection within a single device. Which of the following devices would the technician use?

UTM

A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several apps recently. Which of the following might be the cause of the issue?

Unauthorized root access

A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the following should the computer technician do before connecting a cable TV line to a TV tuner card?

Unplug the computer power cable

A technician has been informed by the IT security manager that a vulnerability has been discovered in the wireless router. The vulnerability could allow an attacker to take remote control of the device. Which of the following should the technician perform to address the issue?

Update firmware

Users are reporting that their laser printer is picking up multiple pages. The printer has very high utilization. Which of the following should be performed to resolve this issue?

Use a maintenance kit

A technician opens a customers computer and sees large amounts of accumulated dust. Which of the following is the BEST method of removing the dust from the computer?

Use compressed air to free the dust from the components and remove it with an ESD vacuum.

Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO).

Use multi-factor authentication Educate end users

A technician is setting up automatic login to desktop for a non-domain Windows XP system. Which of the following administrative tools would accomplish this?

User Accounts

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).

User training Paper shredding

A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network?

VPN

A user needs to connect securely to the company network while working from a hotel room. Which of the following would the user need available to accomplish this?

VPN

A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?

Verify a smart card has been issued

A technician receives a helpdesk ticket about an employee having a problem sending text messages with a company Android smartphone. It has been determined that it is not a carrier issue. Which of the following should the technician perform FIRST?

Verify data connectivity

A technician gets a call from a customer stating that their computer will not boot. They are getting the following error invalid system disk. Which of the following should the technician check FIRST?

Verify that all removable drives are empty.

An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem?

Virtual host network adapter

Ann, a customer, reports that when she occasionally works in the office basement, her smartphone battery drains faster than normal and she has poor cellular reception. Which of the following is the reason for the fast battery drain?

Weak signal

A customer reports very slow wireless connection speeds in the new office. Which of the following tools should a technician use to troubleshoot the issue?

WiFi analyzer

Two components of Genericwafe2.0 are causing performance issues on a Windows 7 PC One Genencware2.0 component is currently not responding and needs to be disabled upon reboot. To prevent further performance issues ensure both components are no longer running upon reboot without making any other changes to the current system or without deleting registry keys or shortcuts. (SIMULATION)

Win+R type "msconfig" and go to the startup tab and disable the items

Which of the following operating systems can be upgraded directly to Windows 7 Professional by a default installation? (Select TWO).

Windows 7 Home Premium Windows Vista Business

Which of the following updates should be performed on a regular basis to ensure the OS has the latest security patches?

Windows updates

Which of the following is TRUE about the difference between a worm and a virus?

Worms self propagate while viruses need human intervention to replicate

Which of the following is an example of client-side virtualization?

XP mode running in Windows 7 64-bit operating system

A new help desk technician receives a trouble call from a user. The issue is something the technician has never encountered before, and does not know where to begin troubleshooting. The FIRST course of action is for the technician to:

ask the customer if they would mind holding for no more than two minutes to check resources.

A Windows 7 machine appears to have a failure. Every time it is rebooted, the message "BOOTMGR is missing" appears. You have previously inserted a Windows 7 installation DVD into the DVD-ROM. Please repair this failure without overwriting the customers' local user profiles. (SIMULATION)

bootrec /fixmbr bootrec /fixboot bootrec /rebuildbcd exit

The type of security threat that uses computers or other networks to accept and pass on viruses is called:

botnets

Which of the following tasks is automatically added to the task scheduler in Windows to keep hard disk performance up?

defrag

A technician is navigating through a Windows OS via command prompt. The technician needs to display the content of a folder. Which of the following is the BEST option for accomplishing this task?

dir

While navigating a Windows machine through command prompt, which of the following commands will a technician use to display the contents of the current folder?

dir

A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technician should use the LIST function of which of the following commands?

diskpart

A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the following commands should be run on the workstation?

gpresult

A technician is tasked with analyzing computer settings managed by Microsoft Group Policy configuration. The technician wants to print a report to an HTML file for offline review. Which of the following Windows command line tools would allow the technician to accomplish this task?

gpresult

A PC technician notices that the printers deployed via a new Group Policy are not showing up on the workstation. Which of the following commands should be run on the PC?

gpupdate

The network administrator has changed the IP address of Computer A from 192. 168. 120 to 10. 10. 1020 and now Jane a user, is unable to connect to file shares on Computer A from Computers using the computer name.

ipconfig /release ipconfig /renew and then ipconfig /flush dns

A Windows workstation is suspected of having malicious software that created an infected start-up item or service. Which of the following tools would a technician use to test this theory?

msconfig

A customer has recently installed several applications on a Windows 7 workstation and is now experiencing slow system performance and spontaneous restarts. After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss?

msconfig

A technician installs a new application and restarts the computer. After signing in to Windows, an error message appears stating that the application did not start automatically as intended. After confirming the software has installed correctly, which of the following tools would be used to troubleshoot this problem?

msconfig

A technician is tasked to change the number of CPU cores available to the OS to enhance productivity. Which of the following tools would allow the technician to perform this task?

msconfig

A technician has purchased a new surge protector to protect equipment in the production environment. The surge protectors features safeguard the connected equipment by directing surges to the:

path of least resistance

A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be:

personally identifiable information.

A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does not run correctly and is reporting that the .dll is missing. Which of the following tools would the technician use to complete the import of the .dll?

regsrv32

An unauthorized user observing system security procedures is known as:

shoulder surfing.

When the computer is turned on it emits a series of beeps and does not POST. This can be caused by a bad:

video card


Related study sets

PHARM EXAM 2 MCQS and Powerpoint Questions

View Set

PRS Inservice- Breast Reconstruction

View Set

10年文法80-稱呼A為B-SVOC句型

View Set

Developmental Psychology Questions

View Set

Christ and Church- Chapter 3 Test

View Set

Assessment and Management of Problems Related to Male Reproductive Processes

View Set

Biology Chapter 4, Biology Plant cells and photosynthesis

View Set

Chapter 5 Python: Numerical Types

View Set