1002 Flashcards

1
Q

Which of the following key and mouse combinations can be used to run an application as a different user?

A

Shift + right click

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician determines a newly installed service is keeping a device from functioning in Windows. Which of the following tools should the technician use to keep the service from being loaded on the PC reboot?

A

MSConfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following forms of regulated data is MOST important to consider when browsing e-commerce sites on the internet?

A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime?

A

Connect to a UPS that utilizes the emergency power source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?

A

Quarantine the affected systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all the users are able to work. Which of the following is the BEST solution for the technician to recommend?

A

Increase the capacity of the backup generator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A desktop technician needs to replace a laptop’s SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement?

A

ESD straps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which of the following should the technician monitor during the installation?

A

Impact to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?

A

End-of-life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A SOHO user is working on a laptop, but the wireless connection indicator is showing a limited connection. Each time the user tries to access a website, the browser redirects to an unfamiliar authentication page. Which of the following should the user check to troubleshoot the cause of the issue?

A

The existing wireless network connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A systems administrator creates a new folder in the user profile. The administrator wants it to use different NTFS permissions than its parent folder. Which of the following settings should the administrator change?

A

Inheritance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What a user is allowed to do on a computer network would be addressed in:

A

An acceptable use policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technician is troubleshooting a computer that may have some corrupt operating system files. Which of the following command line tools should the technician use to check these files?

A

chkdsk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network support technician takes a call from an office manager who wants to change the wireless security key on the access point in that particular office. The office manager explains that a label on the access point indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect securely to the access point to make the change?

A

SSH to 10.0.100.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Chief executive officer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A windows user reports that clicking on links when browsing the internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose 2)

A

Run a virus scan with updated signature files

Uninstall any unknown browser extensions or add-ons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following variable types should be used to store the data “Chicago” within a script or code?

A

String

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information. Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?

A

Impact to the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following wireless security protocols supports the use of a 40-bit encryption key?

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?

A

Remove then replace the CMOS battery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A technician receives the Chief Executive Officer’s (CEO) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario? (Choose three)

A

Disconnect the device from the network

Identify and research the symptoms

Scan and use removal techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A customer has a LINUX desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which of the following filesystem types would the customer’s drive require?

A

Ext4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take?

A

Take the print job to the office manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following Microsoft operating systems defaults to a tiled menu instead of the desktop?

A

Windows 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is protected data that can be found in a medical record?

A

PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A company wants to move the content of its users’ My Documents folders from their local hard drives to a file server so they are backed up every night. Which of the following security concepts does this describe?

A

Organizational units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A technician recently updated a printer driver on all the computers in an office. Shortly after the update, several users’ accounts and passwords were compromised. Which of the following MOST likely explains the compromised accounts?

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings. Which of the following Control Panel utilities should the technician use to accomplish this task?

A

User accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (Choose 2)

A

PXE

Wake-on-LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A user updated an iOS smartphone and is now having issues connecting to the internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues? (Choose 2)

A

Slow data speeds

No wireless connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is used for building entry and computer access?

A

Key fobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such and infrastructure and have more control over users’ mobile devices. Which of the following should the security administrator recommend? (Choose 2)

A

BYOD policy

MDM policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform FIRST?

A

Update the firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A smartphone user receives notice that a threshold for high-speed data usage, despite the user’s usage behaviors being unchanged from previous periods. Which of the following troubleshooting steps should the user take FIRST?

A

Check network access permissions on recently loaded applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some websites, and web services are not responding from any of the web browsers, although Joe can access these services from his smartphone without issue. The computer’s malware scanner has the latest definitions installed. Which of the following would BEST explain why the computer is functioning this way?

A

Expired root certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A company needs to destroy several SSDs that contain sensitive information. Which of the following methods is BEST suited for the total destruction of the SSDs?

A

Incinerating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A large corporation wants to secure its wireless network so only employees can connect. Which of the following technologies should be used to control access by user account?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following operating systems utilizes the web browser named Edge, replacing its old browser software?

A

Windows 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Joe a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?

A

Contact his supervisor so the supervisor can make scheduling changes.

41
Q

A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users’ computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose 2)

A

Backout Plan

Plan for change

42
Q

A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?

A

Local Users and Groups

43
Q

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the user’s BEST option given the situation?

A

Install to a network drive

44
Q

A technician is called to troubleshoot a user’s Windows workstation that fails to boot. The user reports that, after updating the workstation’s graphics driver to a beta version, the machine gives a “Stop” error on every boot. Which of the following should the technician complete to resolve the issue?

A

Boot the workstation in safe mode and disable the graphics driver system tray menu

45
Q

A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?

A

Rebuild the user’s mail profile

46
Q

A user’s computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic.

Which of the following is MOST likely causing the high resource usage?

A

The computer is part of a botnet

47
Q

Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose 2)

A

Firewall

VPN

48
Q

The IT department has installed new software in the folder C:\Program Files\Business Application. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:

Cannot save file C:\ Program Files\ Business Application\file1.wrk- Access is denied.

Which of the following would be the MOST secure solution to this error?

A

Give Ann permission to elevate her permissions through a UAC prompt

49
Q

Which of the following is the memory limitation of a 32-bit OS?

50
Q

A user has reported that a computer is running extremely slow when opening applications. A technician checks the computer and needs to verify memory utilization. Which of the following tools should the technician use to begin troubleshooting the issue?

A

Performance

51
Q

A technician wants to deploy a solution to manage a computer remotely. The technician is not allowed to modify any network configuration and is not able to forward any ports on the router to internal devices. Which of the following remote access technologies would be BEST suited for this situation?

A

Virtual Network Computer

52
Q

A customer’s computer is powered on and working, but the customer is unable to get any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?

53
Q

A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer. Which of the following connection protocols should the technician use?

54
Q

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user’s request? (Select 2)

A

Content filtering

Physical Security

55
Q

A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue?

A

Overheating

56
Q

A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose 2)

A

Do a force stop

Clear the application Cache

57
Q

Joe a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user’s computer.

Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?

A

Scan and remove the malware from the infected system.

58
Q

Ann, an external user, has received several calls from a company asking why she has been sending the company communications with internal users’ names in the “from field”. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware.

Which of the following should the technician check NEXT?

A

Hijacked email

59
Q

The medical records department of a local hospital recently upgraded its computers. A technician needs to ensure the data stored on the hard drives is unrecoverable. Which of the following methods should the technician use to meet the requirement?

60
Q

A user wants to see the workstations present on the LAN in a workgroup environment. Which of the following settings must be enabled to make this possible?

A

Turn on network discovery

61
Q

A user is staying at a hotel that only offers Fast Ethernet connectivity to the network. The user’s laptop is currently using the corporate network for access to network resources as well as the cloud. Which of the following should the help desk recommend performing prior to using the hotel network?

A

Unmap all network drives

62
Q

A technician is investigating the cause of a Windows 7 PC running very slowly. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 is very high, while inbound network traffic is low. Which of the following tasks should be done FIRST?

A

Disconnect the network cable.

63
Q

Which of the following NTFS security settings overrides all other settings?

64
Q

A technician is cleaning up a warehouse and has several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques.

Which of the following should the technician do NEXT to proceed with disposal of the batteries?

A

Refer to the manufacturer’s specific usage.

65
Q

Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot. A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a “click here” button to resolve it. There is a timer in the pop-up, counting down the time until the computer is no longer usable.

Which of the following should the technician do NEXT?

A

Disconnect the Ethernet cable from the workstation and disable Wifi.

66
Q

A Linux user reports that an application will not open and gives the error “Only one instance of the application may run at one time.” A root administrator logs on to the device and opens a terminal. Which of the following pairs of tools will be needed to ensure no other instances of the software are currently running?

A

PS and kill

67
Q

A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:

68
Q

Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.

Which of the following is MOST likely the cause?

A

Ransomware

69
Q

Which of the following should be enacted to reduce a company’s liability and exposure to a potential lawsuit?

A

Acceptable use policy

70
Q

Ann, a user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.

Which of the following would be the BEST resolution to Ann’s issue?

A

DIsconnect and then reconnect the stylus

71
Q

A technician is working on a virtual migration project. The technician has already completed the SOW; however, the servers will not work without a critical network configuration that was missed in the original SOW. The technician needs to make the adjustments quickly.

Which of the following best practices processes should the technician perform NEXT?

A

Document the changes and perform the work.

72
Q

Joe, an end user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password.

Which of the following control panel utilities can Joe use to help with this situation?

A

Credential Manager

73
Q

A technician responds to a report that a user’s desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all the systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue?

A

Update the SATA controller driver from the manufacturer’s website.

74
Q

Which of the following BEST describes the Guest account on a Windows system?

A

This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions.

75
Q

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose 2)

A

Knowledge base articles

Acceptable use policy

76
Q

A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?

77
Q

A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices.
Which of the following should the security administrator recommend? (Choose 2)

A

BYOD policy

MDM policy

78
Q

A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information. Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?

A

Impact to the device

79
Q

Which of the following variable types should be used to store the data “Chicago” within a script or code?

80
Q

A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose 2)

A

Run a virus scan with updated signature files

Uninstall any unknown browser extension or add-ons

81
Q

The Chief Executive Officer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?

82
Q

After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users. Which of the following is the BEST way for the technician to perform this security feature?

A

Assign a local security policy

83
Q

When hackers execute code against a vulnerability in the hope that it has not yet been addressed, this is known as a:

A

zero-day attack

84
Q

Which of the following is MOST likely to be specified as a system requirement for the installation of a photo editing application in Microsoft Windows?

A

RAM quantity

85
Q

Which of the following is an example of PHI?

A

Phone number

86
Q

An employee is taking a credit card payment over the phone, but the payment system has a temporary outage. To avoid inconveniencing the customer, the employee writes down the credit card number and expiration date on a notepad to be entered later.

This is in violation of:

87
Q

While troubleshooting a software error on a user’s computer, a technician finds inappropriate content. Which of the following should the technician perform FIRST?

A

Document the findings

88
Q

After purchasing an Ultrabook, Ann, a home user, has a technician come to her home and install an operating system.

Which of the following OS installation methods will the technician MOST likely use?

A

Flash drive

89
Q

Joe, a user, is receiving automated replies but does not remember sending any emails to those recipients. He checks the sent items folder and sees email messages he did not send.

Which of the following would be the BEST way to resolve this issue?

A

Reset Joe’s email password.

90
Q

A technician is remediating a virus on an infected workstation. All user files are set to system and hidden. Which of the following should a technician perform NEXT to remediate the system?

A

Run system restore to a date before the infection

91
Q

A user received a call from a bank to confirm a wire transfer; however, the user created no such request. While troubleshooting, a technician discovers there are rules on the user’s account that are forwarding the emails to an external email address and deleting the emails from the bank. This is an example of:

A

hijacked email

92
Q

A customer wants to format a 4TB external drive with a filesystem that is compatible with both Windows and Linux OSs. Which of the following should the technician suggest the customer use?

93
Q

A user’s computer was infected with malware, and a technician successfully removed the infection. However, the user reports certain web-based services are still inaccessible. Which of the following should the technician perform FIRST to resolve the issue?

A

Reset the internet explorer settings.

94
Q

A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software.

Which of the following would be MOST important during this phase of the request process?

A

End-user acceptance.

95
Q

A user is unable to get to any internal websites but can access some external websites. Which of the following will MOST likely resolve this issue?

A

Confirm the proper proxy settings.

96
Q

Many of the files in a user’s network folder have a new file extension and are inaccessible. After some troubleshooting, a technician discovers a text document that states the files were intentionally encrypted, and a large sum of money is required to decrypt them.

Which of the following should the technician do to recover the files?

A

Disconnect the computer from the network.

97
Q

An administrator is creating a new user account and wants to grant access to only the resources required to perform the use’s assigned job duties.

Which of the following will the administrator MOST likely use?

A

Principle of least privilege

98
Q

A technician is installing the Mac OS X operating system. The technician is prompted to select the filesystem. Which of the following filesystems should the technician utilize to install the listed operating system?

99
Q

A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?