1102 Q's 50 Flashcards
- Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the
following is the best way to remove the malware?
A. Run System Restore.
B. Place in recovery mode.
C. Schedule a scan.
D. Restart the PC
The correct answer is C. Schedule a scan.
Explanation:
C. Schedule a scan: Running a malware scan with an antivirus or anti-malware program is the best
course of action to remove malware from the device. This will help detect and remove any
malicious software that may have been installed.
- When visiting a particular website, a user receives a message stating, “Your connection is not
private”. Which of the following describes this
issue?
A. Certificate warning
B. Malware
C. JavaScript error
D. Missing OS update
The correct answer is A. Certificate warning.
Explanation:
A. Certificate warning: This message indicates that there is a problem with the website’s SSL
certificate. SSL certificates are used to establish secure connections between a web server and a
browser. When a browser encounters an issue with the certificate, such as it being expired, invalid,
or issued by an untrusted authority, it displays a warning message to the user indicating that the
connection is not private.
- An organization is creating guidelines for the incorporation of generative AI solutions. In which of
the following would these guidelines be
published?
A. Standard operating procedure
B. Acceptable use policy
C. Security protocols
D. Data flow diagram
The correct answer is B. Acceptable use policy.
Explanation:
B. Acceptable use policy: Guidelines for the incorporation of generative AI solutions, which outline
how employees are permitted to use such technology within the organization, would typically be
included in the organization’s acceptable use policy. This policy governs the proper and acceptable
use of technology resources within the organization.
Which of the following is also known as something you know, something you have, and
something you are?
A. ACL
B. MFA
C. SMS
D. NFC
The correct answer is B. MFA (Multi-Factor Authentication).
Explanation:
B. MFA (Multi-Factor Authentication): Multi-Factor Authentication (MFA) involves using multiple
factors to verify a user’s identity. These factors typically include:
- Something you know (such as a password or PIN)
- Something you have (such as a physical token or a mobile device)
- Something you are (such as biometric data like fingerprints or facial recognition)
A technician wants to update the local security policies on a Windows machine but is unable to
launch the expected snap-in. Which of the
following is the most likely reason?
A. The computer is running Windows Home.
B. The user did not sign the end user license agreement.
C. The user disabled the User Account Control.
D. An antivirus application is blocking access.
The correct answer is A. The computer is running Windows Home.
Explanation:
A. The computer is running Windows Home: Windows Home editions have certain limitations
compared to Windows Pro or Enterprise editions, one of which is the ability to access and modify
local security policies. Windows Home editions do not include the Local Security Policy Editor
snap-in, which is typically available in Windows Pro or Enterprise editions. Therefore, if the
technician is using a Windows Home edition, they would be unable to launch the expected snap-in
to update local security policies.
Which of the following is the Windows OS that only recognizes 4GB of RAM?
A. The Home version OS
B. The 32-bit OS
C. The 64-bit OS
D. The trial version OS
The correct answer is:
B. The 32-bit OS
Reasoning:
32-bit OS (Correct Answer): A 32-bit version of a Windows operating system can only address up to
4GB of RAM due to its architectural limitations. This means that regardless of the total amount of
RAM installed in the system, a 32-bit OS can only use up to 4GB.
The calendar application on an employee’s smartphone is experiencing frequent crashes, and
the smartphone has become unresponsive. Which of the following should a technician do first to
resolve the issue?
A. Reinstall the application on the smartphone.
B. Update the smartphone’s OS.
C. Reset the smartphone to factory settings.
D. Reboot the smartphone.
The correct answer is:
D. Reboot the smartphone.
Reasoning:
Reboot the smartphone (Correct Answer): Rebooting the smartphone is the first step to take when
troubleshooting a crashing application and unresponsiveness. This action can resolve temporary
glitches and free up system resources that might be causing the problem.
- A SOHO wireless router needs to be configured so incoming traffic is only allowed on specified
ports. Which of the following is the best way for the technician to accomplish this task?
A. Physically secure access to the router.
B. Implement AES encryption.
C. Install the latest firmware.
D. Disable Universal Plug and Play.
The correct answer is:
D. Disable Universal Plug and Play.
Reasoning:
Disabling Universal Plug and Play (UPnP) is the best way to ensure that only specified ports are
open for incoming traffic. UPnP can automatically open ports on the router for various applications,
which can lead to security vulnerabilities by allowing unintended traffic through. By disabling UPnP,
the technician ensures that ports can only be opened manually, thereby restricting incoming traffic
to only those ports explicitly configured.
A technician is troubleshooting a smartphone that is unable to download and install the latest
OS update. The technician notices the device operates more slowly than expected, even after
rebooting and closing all applications. Which of the following should the technician check next?
A. Application permissions
B. Available storage space
C. Battery charge level
D. Wi-Fi connection speed
The correct answer is:
B. Available storage space
Reasoning:
Available storage space (Correct Answer): If a smartphone is unable to download and install an OS
update, and is operating slowly, insufficient available storage space is a likely cause. OS updates
require a significant amount of free storage to download and install. Additionally, lack of storage
can impact overall device performance.
Which of the following describes a concept that requires using a combination of an ID, a
password, and a biometric?
A. Types of security
B. Access control
C. Principle of least privilege
D. Multifactor authentication
The correct answer is:
D. Multifactor authentication
Reasoning:
Multifactor authentication (Correct Answer): This concept requires the use of more than one
method of authentication from different categories of credentials. For example, an ID and password
(something you know) combined with a biometric factor (something you are) constitute multifactor
authentication. This enhances security by requiring multiple forms of verification.
A technician needs to track evidence for a forensic investigation on a Windows computer.
Which of the following describes this process?
A. Valid license
B. Data retention requirements
C. Material safety data sheet
D. Chain of custody
The correct answer is:
D. Chain of custody
Reasoning:
Chain of custody (Correct Answer): This term refers to the process of documenting the handling of
evidence from the time it is collected until it is presented in court. This documentation ensures that
the evidence has not been tampered with and maintains its integrity throughout the investigation.
A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed
software product, but the user does not want to pay for a license. Which of the following license
types should the technician recommend?
A. Corporate
B. Open-source
C. Personal
D. Enterprise
The correct answer is:
B. Open-source
Reasoning:
Open-source (Correct Answer): Open-source software is distributed with a license that allows
users to access and modify the source code freely. Many open-source antivirus solutions are
available for free, making them suitable for users who do not want to pay for a license.
Which of the following operating systems uses the ext4 filesystem type?
A. macOS
B. iOS
C. Linux
D. Windows
The correct answer is:
C. Linux
Reasoning:
Linux (Correct Answer): The ext4 filesystem type is commonly used in Linux operating systems. Ext4
is the fourth extended filesystem, a widely used filesystem type in Linux distributions due to its
robustness, scalability, and support for large file sizes and volumes.
Which of the following is used to prevent automobiles from crashing into a building?
A. Cameras
B. Bollard
C. Lighting
D. Biometrics
The correct answer is:
B. Bollard
Reasoning:
Bollard (Correct Answer): A bollard is a short vertical post typically used to control or direct road
traffic, including preventing vehicles from crashing into buildings or pedestrian areas. Bollards act
as physical barriers and are often installed in front of buildings or along sidewalks to protect against
accidental collisions.
A technician is following the ticketing system’s best practices when handling user support
requests. Which of the following should the technician do first when responding to a user support
request that contains insufficient information?
A. Ask the user for clarification.
B. Keep the user updated on the progress.
C. Document the root cause.
D. Follow the system’s escalation process.
The correct answer is:
A. Ask the user for clarification.
Reasoning:
Ask the user for clarification (Correct Answer): When a user support request contains insufficient
information, the first step for the technician should be to ask the user for clarification. This helps
ensure that the technician understands the issue properly before proceeding with troubleshooting
or resolution steps.
A customer is configuring on an old desktop an inexpensive file server to share photos and
videos and wants to avoid complicated licensing.
Which of the following operating systems should the technician most likely recommend?
A. Chrome OS
B. Linux
C. macOS
D. Windows
The correct answer is:
B. Linux
Reasoning:
Linux (Correct Answer): Linux operating systems are often recommended for inexpensive file
servers due to their open-source nature, which typically means no licensing fees. Additionally,
Linux distributions offer various server-oriented features and are well-suited for file sharing
purposes.
A user is setting up a new Windows 10 laptop. Which of the following Windows settings should
be used to input the SSID and password?
A. Network & Internet
B. System
C. Personalization
D. Accounts
The correct answer is:
A. Network & Internet
Reasoning:
Network & Internet (Correct Answer): This setting in Windows 10 is where users can manage
network connections, including Wi-Fi networks. Within Network & Internet settings, there is an
option to view and connect to available Wi-Fi networks, where the SSID (network name) and
password can be inputted during the setup process.
A user recently downloaded a free game application on an Android device. The device then
began crashing frequently and quickly losing its battery charge. Which of the following should the
technician recommend be done first to remediate these issues? (Choose two.)
A. Uninstall the game application.
B. Perform a factory reset of the device.
C. Connect the device to an external charger.
D. Install the latest security patches.
E. Clear the application’s cache.
F. Enable the device’s built-in anti-malware protection.
The correct answers are A and D.
Explanation:
A. Uninstall the game application: The first step in troubleshooting the issues described would be to
remove the likely culprit, which is the recently downloaded game application. Often, applications
downloaded from untrusted sources or poorly coded applications can cause device instability and
battery drain. Uninstalling the application should resolve or at least mitigate the issues.
D. Install the latest security patches: Security patches are essential updates provided by the device
manufacturer or operating system developer to fix vulnerabilities and improve the overall security of
the device. Installing the latest security patches ensures that the device is protected against known
security threats that could potentially exploit vulnerabilities in the system, leading to crashes or
battery drain.
Which of the following authentication methods should be used for BYOD wireless devices?
A. Local certificates
B. TACACS+
C. RADIUS
D. Captive portal
The correct answer is C. RADIUS.
Explanation:
C. RADIUS (Remote Authentication Dial-In User Service): RADIUS is a widely used authentication
protocol that provides centralized authentication, authorization, and accounting (AAA)
management for users who connect and use a network service. It is commonly used in enterprise
environments to authenticate users and devices accessing network resources, including wireless
networks. RADIUS supports a variety of authentication methods, including username/password,
digital certificates, and token-based authentication, making it suitable for BYOD (Bring Your Own
Device) environments where users bring their own devices with different authentication
requirements.
Which of the following Linux commands would help to identify which directory the user is
currently operating in?
A. pwd
B. dig
C. find
D. cat
The correct answer is A. pwd.
Explanation:
A. pwd (Print Working Directory): This command displays the full pathname of the current working
directory. It helps users identify their current location within the directory structure.