1002 Flashcards

1
Q

Tech use what?

A

Cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application, it fails and gives an error message. Which of the following should the technician do FIRST?

A. Reinstall the application
B. Roll back the application to the earlier version
C. Clear the application cache
D. Update the OS of the smartphones

A

D. Update the OS of the smartphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct the issue?

□ A. dir
□ B. chdsk
□ C. dism
□ D. ipconfig
□ E. format
□ F. diskpart
A

□ B. chdsk

□ C. dism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two)

□ A. Change the default access port
□ B. Enforce password complexity
□ C. Put the terminal server into the router’s DMZ
□ D. Disable logon time restrictions
□ E. Block all unused ports on the LAN smart switch
□ F. Use the local client certificate for server authentication

A

□ C. Put the terminal server into the router’s DMZ

□ E. Block all unused ports on the LAN smart switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically seperated from the company and will need to be able to securely access the devices. Wbich of the following will provide the ability to access these devices?

A. Telnet
B. SSH
C. RDP
D. VNC

A

B. SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

□ A. Guest Network
□ B. TKIP
□ C. Default login 
□ D. Outdated firmware
□ E. WPS
□ F. WEP
A

□ C. Default login

□ F. WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A client wants a technician to create a PC naming convention that will make the client’s PC’s easier to track and identify while in use. Whoch of the following convention formats should the technician follow?

A. Domain name, location, IP address
B. Domain name, location, asset ID
C. Asset ID, MAC address
D. Location, RFID

A

C. Asset ID, MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following provide the BEST security for a server room? (Select two.)

□ A. Badge reader
□ B. Bollard
□ C. Biometric lock
□ D. Cable lock
□ E. USB token
□ F. Privacy window shades
A

□ A. Badge reader

□ C. Biometric lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following threats uses personalized information in an attempt at obtaining information?

A. Whaling
B. Impersonation
C. Spoofing
D. Spear fishing

A

D. Spear fishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician receives an invalid certificate error when visiting a website with 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?

A. Date and Time
B. UEFI boot mode
C. Logon times
D. User access control

A

A. Date and Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. which of the following Control Panel utilities should the technician use to configure the setting?

A. Internet Options - Advanced
B. Internet Options - Connections
C. Internet Options - Security
D. Internet Options - Privacy

A

B. Internet Options - Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

A. 2GB
B. 4GB
C. 8GB
D. 16GB

A

B. 4GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?

A. Poliely ask the user to call back
B. Ask another technician to take the call
C. Troubleshoot the issue for the user
D. Input the issue as a ticket and escalate to Tier 2
E. Put the user on hold and troubleshoot after the scheduled break

A

B. Ask another technician to take the call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user’s phone contains a customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

A. Fingerprint lock
B. Passcode lock
C. Swipe lock
D. PIN lock

A

A. Fingerprint lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (select two.)

□ A. 
□ B.
□ C.
□ D.
□ E.
□ F.
A

□ A. UPS

□ B. Server rack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: NO OS FOUND. The technician confirms the boot.ini file is correct. Which of the following is MOST likely causing this error?

A. The computer has GRUB Legacy installed
B. Windows Startup services are not running
C. An incompatible partition is marked as active
D. An unsupported version of Windows is installed

A

C. An incompatible partition is marked as active

17
Q

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

A. Remove the guest account
B. Disable single sign-on
C. Issue a default strong password for users
D. Require authentication on wake up

A

D. Require authentication on wake up

18
Q

Joe, an employee, took a company-issued laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the internet. Which of the following would explain why Joe cannot access his personal shares?

A. An IP conflict is present
B. A corporate VPN is enabled
C. A firewall exception must be set
D. HomeGroup must be enabled

A

C. A firewall exception must be set

19
Q

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

A.
B.
C.
D.
E.
A

E.