Questions 478 - 502

Ace your homework & exams now with Quizwiz!

Which of the following Windows Enterprise OS versions offers Bitlocker as a feature that can be enabled? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

A. Windows 7

A company is creating a disaster recovery plan. Which of the following should be implemented to BEST ensure the company's data can be successfully restored in the event of a disaster? A. File-level backups B. Backups for critical applications C. Regular backup testing D. Backups to cloud storage E. Redundant backups on site

A. File-level backups

A technician needs to remediate an infected computeir.Which of the following is the FIRST step the technician should take? A. Quarantine the system B. Update the anti-malware software C. Scan and remove the infections D. Research the malware symptoms

A. Quarantine the system

A technician was alerted by IT security of a potentially infected desktop, which is at a remote location. The technician will arrive on site after one hour.Which of the following steps should be performed prior to traveling to prevent further infection? (Choose two.) A. Start system updates B. Back up PC data C. Run antivirus D. Install the firewall E. Turn off System Restore F. Install a keylogger

A. Start system updates C. Run antivirus

A proxy server is required for Internet access from a corporate network.Which of the following should a technician perform to manually configure a Windows 10 device for Internet access? A. Add the proxy server's URL and IP address to the computer's hosts file under C:WindowsSystem32driversetc.B. Enable the use of a proxy server and enter an address for it under Control Panel > Internet Options > Connections >LAN settings. C. Open a command prompt and run ipconfig/release, followed by ipconfig/renew. D. Set the proxy server as the default gateway under the computer's network connection IP settings by selecting Manual, then entering the proxy server's IP address under Gateway.

B. Enable the use of a proxy server and enter an address for it under Control Panel > Internet Options > Connections >LAN settings.

A user receives the following error message while browsing the Internet on a PC: The connection is not private.Upon inspection, a technician discovers the issue only occurs on the user's banking website, and the issue can be duplicated on another PC. The function to view the certificate shows it is valid and has yesterday's date as the expiration. Which of the following should the technician do NEXT? A. Ignore the error and accept the certificate. B. Report the certificate error to the bank. C. Download an updated certificate. D. Stop and restart the certificate services. E. Reimage the desktop, as it contains malware.

D. Stop and restart the certificate services.

A user is having network printing issues. The user indicates printing was working fine moments ago, but now there are no printers displayed in Microsoft Word.Which of the following should a technician check FIRST? A. The toner volume in the printer B. The USB cable from the PC to the printer C. The printer driver version D. The print spooleL service

D. The print spooleL service

Which of the following threats commonly relies on DNS poisoning and spoofing to exploit an unknowing victim? A. Rainbow tables B. Brute force C. Man-in-the-middle D. Zero-day attacks E. Phishing

E. Phishing

A technician is setting up a new corporate wireless network. One of the requirements for the network is that connections must only be allowed for current domain accounts without giving users a wireless key.Which of the following should the technician use? A. MAC filtering B. RADUIS C. MFA D. WPA2

B. RADUIS

A user calls the help desk to report an issue accessing a new application on a Windows PC. When the user tries to launch the application, an error message appears and then quickly disappears before the user can read it.Which of the following protocols would a technician MOST likely use to help diagnose this issue? A. FTP B. RDP C. SNMP D. SSH

B. RDP

Which of the following is the BEST method to secure a smartphone? A. Disallow access to any mobile operating systems or application accounts B. Require fingerprint unlock with password backup C. Disable copy/paste and autofill functions across the entire device D. Download and install all programs manually

B. Require fingerprint unlock with password backup

Joe, a user, reports the programs and icons on his Windows desktop are much larger than they were the day before. He tried changing the screen resolution and restarting the computer, but it still does not look right. Joe also states the computer showed it was finishing updates when he first powered it on. Which of the following should a technician perform NEXT? A. Reboot the computer. B. Roll back the video driver. C. Reload the OS. D. Boot into safe mode.

B. Roll back the video driver.

A user's antivirus recently expired, so the user downloaded and installed a free system protection application. The application found numerous rootkits, Trojans, viruses, and missing critical patches. It was unable to fix all the issues, however, and suggested the user call technical support. Which of the following is the FIRST step to begin repairing the computer?A. Remove the rogue antivirus. B. Install Windows Updates. C. Reimage the computer. D. Call the technical support number.

B. Install Windows Updates.

Malware has been identified on a critical system that is currently quarantined. Which of the following should a technician do after the malware symptoms are correctly identified? A. Educate the power user for that system. B. Schedule weekly scans and run routine updates. C. Disable System Restore. D. Remediate the infected system.

B. Schedule weekly scans and run routine updates.

A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software.Which of the following should the technician do to MOST likely resolve the issue? A. Bridge the LAN connection between the laptop and the desktop. B. Set the laptop configuration to DHCP to prevent conflicts. C. Remove the static IP configuration from the desktop. D. Replace the network card in the laptop, as it may be defective.

B. Set the laptop configuration to DHCP to prevent conflicts. C. Remove the static IP configuration from the desktop.

A security director is designing a company's disaster recovery procedure. The information security officer wants the servers to continue to function during short power outages, and important documents should be stored off site in case of a catastrophe at the datacenter.Which of the following would BEST fulfill these requirements? (Choose two.) A. Power distribution unit B. UPS C. Cloud storage D. Surge protector E. Local file replication F. RAID

B. UPS C. Cloud storage

A Linux user types the following command: apt- get updateThe action is denied due to insufficient privileges. Which of the following should precede the above command to successful execution? A. vi B. sudo C. chmod D. g rep

B. sudo

A user ran updates on a Windows computer recently. Since then, the external CD drive no longer reads discs. The user has connected the external drive to another computer that has not been updated and then successfully ran the discs. Which of the following should the user do to fix the issue? A. Upgrade the drive. B. Replace the discs. C. Roll back the drivers. D. Reinstall the firmware.

C. Roll back the drivers.

Which of the following is a device that stores a copy of a certificate that is used for authentication? A. Biometric scanner B. Soft token C. Smart card D. OTP token

C. Smart card

Which of the following features in Windows 10 combines the functionality from Windows 7 and Windows 8 while also introducing Metro-style applications? A. Microsoft Edge B. SmartScreen Filter C. Start menu D. User Account Control

C. Start menu

A technician is repairing a computer's motherboard in a clean environment. The technician needs to ensure all necessary safety procedures are taken prior to performing the replacement.Which of the following should the technician employ during this process to ensure safety? (Choose two.) A. CPU paste B. Safety goggles C. Self-grounding D. ESD straps E. Antistatic bag F. Air filter mask

D. ESD straps E. Antistatic bag

A customer has been using a computer to download and copy files to a USB flash drive. The customer accidentally stepped on the power strip, and the computer suddenly powered off. When the computer turned back on, it displayed an error message: No OS found. Which of the following should a technician perform NEXT? A. Connect a UPS. B. Repair the OS. C. Check the boot order. D. Run hardware diagnostics.

C. Check the boot order.

A company recently experienced a security incident in which an unauthorized user was able to insert a USB flash drive into a kiosk, launch a non-native OS, and deliver malicious payloads across the network.Which of the following security measures would have been BEST to prevent the attack from being executed in the first place? (Choose two.) A. Using a host-based antivirus with real-time scanning B. Implementing automatic screen locks after 60 seconds of inactivity C. Creating a strong BIOS/UEEI Qassword D. Disabling AutoRun for USS devices E. Enabling the Secure Boot option F. Changing the default administrator credentials

C. Creating a strong BIOS/UEEI Qassword D. Disabling AutoRun for USS devices

In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it.The developer states that the management team approved the business use of this software.Which of the following is the BEST action for the technician to take? A. Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased. B. Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process. C. Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software. D. Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software.

C. Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.

Joe, a technician, is using a terminal session on a Linux desktop. He is trying to install a software update but receives an error message stating he does not have the required privileges.Which of the following commands should Joe use to accomplish this task? A. pwd 8.apt- ge t C. Ghmu<.i D. sudo

D. sudo


Related study sets

Government Chapter 13.5 - The Election and Presidential Selection

View Set

ACCT 4400 - SALT #2 Apportionment, Multijurisdictional Tax Issues, Uses of Local/State Taxes, ACCT 570 - Ch 12: State & Local Taxes, 4400, Multi-Jurisdictional Tax, State and Local Taxation, Tax Law, Test 1: State Tax, Tax Chapter 23 - State and Loca...

View Set

Computer Apps. 1 Ch. 15 Database Basics

View Set

Written Test Sec. 3 (NTSB Part 830)

View Set

HRM: Performance Management and Appraisal

View Set

Carpenters, Glaciers, and Other Tradespeople

View Set

TEXTBOOK: Ch. 2: Scientific Methods in Media Effects Research

View Set