1102 Q's Second 56 Flashcards
A client wants a technician to set up a proxy server in a branch office to manage
internet access. This involves configuring the workstations to use the new proxy
server. Which of the following Internet Options tabs in Control Panel would be most
appropriate for the technician to use to configure the settings?
A. Privacy
B. Advanced
C. Content
D. Connections
E. Security
Correct Answer:
D. Connections
Explanation:
To configure a proxy server in Windows, use the “Connections” tab in Internet
Options. This tab includes the LAN settings where proxy server details can be
entered.
A technician needs to perform after-hours service starting at 10:00 p.m. The
technician is currently 20 minutes late. The customer will also be late. Which of the
following should the technician do considering proper communication techniques
and professionalism?
A. Do not notify the customer if arriving before the customer.
B. Dismiss the customer and proceed with the after-hours work.
C. Contact the customer if the technician is arriving late.
D. Disclose the experience via social media
C. Contact the customer if the technician is arriving late.
Explanation:
Proper communication and professionalism require informing the customer about
any delays.
Malware is installed on a device after a user clicks on a link in a suspicious email.
Which of the following is the best way to remove the malware?
A. Run System Restore.
B. Place in recovery mode.
C. Schedule a scan.
D. Restart the PC.
Correct Answer:
C. Schedule a scan
Explanation:
Running a scan with antivirus or antimalware software is the best way to remove
malware from a device.
When visiting a particular website, a user receives a message stating, “Your
connection is not private”. Which of the following describes this issue?
A. Certificate warning
B. Malware
C. JavaScript error
D. Missing OS update
Correct Answer:
a. Certificate warning
Explanation:
When a user receives a message stating “Your connection is not private,” it typically
indicates a problem with the SSL/TLS certificate of the website. This warning alerts
users that the website’s certificate is invalid, expired, or not issued by a trusted
certificate authority, potentially compromising the security of the connection.
An organization is creating guidelines for the incorporation of generative AI
solutions. In which of the following would these guidelines be published?
A. Standard operating procedure
B. Acceptable use policy
C. Security protocols
D. Data flow diagram
Correct Answer:
B. Acceptable use policy
Explanation:
Guidelines for incorporating generative AI solutions would be published in the
organization’s Acceptable Use Policy, which outlines acceptable and unacceptable
technology use.
Which of the following is also known as something you know, something you have,
and something you are?
A. ACL
B. MFA
C. SMS
D. NFC
Correct Answer:
B. MFA
Explanation:
MFA involves “something you know” (like a password), “something you have” (like a
token or smartphone), and “something you are” (like biometric data). It enhances
security by requiring multiple forms of verification.
A technician wants to update the local security policies on a Windows machine but
is unable to launch the expected snap-in. Which of the following is the most likely
reason?
A. The computer is running Windows Home.
B. The user did not sign the end user license agreement.
C. The user disabled the User Account Control.
D. An antivirus application is blocking access.
Correct Answer:
A. The computer is running Windows Home.
Explanation:
Windows Home editions do not include the Local Security Policy Editor (secpol.msc),
which is used to update local security policies. This feature is only available in
Windows Professional, Enterprise, and Education editions.
A technician needs to back up a small business’s entire network that includes ten
workstations. Which of the following methods should the technician use to safely
and securely back up the business’s network?
A. Cloud storage
B. RAID
C. Tape drive
D. Local backups
Correct Answer:
A. Cloud Storage
Explanation:
Cloud storage offers secure, off-site backup with accessibility from anywhere,
providing redundancy and scalability.
Applications on a computer are not updating, which is preventing the user from
opening certain files. Which of the following MAC snap-ins should the technician
launch next to continue troubleshooting the issue?
A. gpedit.msc
B. perfmon.msc
C. devmgmt.msc
D. eventvwr.msc
Correct Answer:
D. eventvwr.msc
Explanation:
Event Viewer (eventvwr.msc) allows technicians to check the system logs for errors
related to application updates and other system events. This can help identify why
the applications are not updating.
A user is unable to start a computer following a failed Windows 10 update. When
trying to start the computer, the user sees a blue screen of death. Which of the
following steps should a technician take to diagnose the issue?
A. Perform a safe mode boot.
B. Run the System Restore wizard.
C. Start the computer in the last known-good configuration.
D. Reset the BIOS settings.
Correct Answer:
A. Perform a safe mode boot.
Explanation:
Booting into Safe Mode allows the computer to start with a minimal set of drivers
and services, which can help diagnose and potentially fix issues caused by a failed
update.
A technician is manually updating Windows workstations. Each workstation is
currently running Windows Pro in a workgroup environment. Which of the following
changes can the technician make to create a more manageable environment?
A. Downgrade all workstations from the Pro version to the Home version of the OS.
B. Upgrade all workstations from the Pro version to Pro for Workstations.
C. Create a domain and join the workstations to the domain for management
purposes.
D. Make sure all workstations are operating under the same workgroup name.
Correct Answer:
c.Create a domain
Explanation:
Joining workstations to a domain allows centralized management, making it easier
to handle updates, policies, and user accounts.
Which of the following authentication types is the most secure?
A. WPA3
B. WEP
C. RADIUS
D. TACACS+
E. WPS
Correct Answer:
A. WPA3
Explanation:
WPA3 (Wi-Fi Protected Access 3) is the latest and most secure wireless
authentication protocol, offering enhanced security features compared to older
protocols.
A user reports being unable to access a sports team’s website on an office
computer. The administrator tells the user this blocked access is intentional and
based on company guidelines. Which of the following is the administrator referring
to?
A. NDA
B. AUP
C. VPN
D. SOP
Correct Answer:
B. AUP
Explanation:
An Acceptable Use Policy (AUP) outlines the rules and guidelines for using the
organization’s network and resources. It often includes restrictions on accessing
certain types of websites, such as sports sites, to ensure appropriate use of
company resources.
A user’s laptop has been performing slowly and redirecting to unfamiliar websites.
The user has also noticed random pop-up windows. Which of the following is the
first step a technician should take to resolve the issue?
A. Scan for malware and ransomware.
B. Perform a system restore.
C. Check the network utilization.
D. Update the antivirus software.
Correct Answer:
A. Scan for malware and ransomware.
Explanation:
The symptoms described—slow performance, website redirections, and random
pop-ups—are indicative of a malware infection. The first step to resolve the issue is
to scan the laptop for malware and ransomware to identify and remove any
malicious software causing these problems.
A Linux technician needs a filesystem type that meets the following requirements:
* All changes are tracked.
* The possibility of file corruption is reduced.
* Data recovery is easy.
Which of the following filesystem types best meets these requirements?
A. ext3
B. FAT32
C. exFAT
D. NTFS
Correct Answer:
A. Ext3
Breakdown of Each Choice:
* A. ext3:
o Correct: Offers journaling for tracking changes, reducing corruption,
and easy recovery.
A branch office suspects a machine contains ransomware. Which of the following
mitigation steps should a technician take first?
A. Disable System Restore.
B. Remediate the system.
C. Educate the system user.
D. Quarantine the system
Correct Answer:
D. Quarantine the system
Explanation:
When ransomware is suspected on a machine, the first step is to isolate or
quarantine the system to prevent further spread of the infection to other machines
or network resources. This helps contain the ransomware and prevents additional
damage.
A user’s Windows 10 workstation with an HDD is running really slowly. The user has
opened, closed, and saved many large files over the past week. Which of the
following tools should a technician use to remediate the issue?
A. Disk Defragment
B. Registry Editor
C. System Information
D. Disk Cleanup
Correct Answer:
a. Disk Defragment
Explanation:
When a Windows 10 workstation with an HDD is running slowly, especially after
opening, closing, and saving many large files, fragmentation of files on the disk may
be a contributing factor. Disk Defragmentation rearranges fragmented data on the
hard drive, optimizing its performance by reducing seek times and improving data
access speeds.
A technician wants to enable BitLocker on a Windows 10 laptop and is unable to
find the BitLocker Drive Encryption menu item in Control Panel. Which of the
following explains why the technician is unable to find this menu item?
A. The hardware does not meet BitLocker’s minimum system requirements.
B. BitLocker was renamed for Windows 10.
C. BitLocker is not included on Windows 10 Home.
D. BitLocker was disabled in the registry of the laptop.
Correct Answer:
c.BitLocker is not included on Windows 10 Home.
Explanation:
BitLocker is only available in Windows 10 Pro, Enterprise, and Education editions,
not in the Home edition. This is why the technician cannot find it in the Control
Panel.
Which of the following is an example of MFA?
A. Fingerprint scan and retina scan
B. Password and PIN
C. Username and password
D. Smart card and password
Correct Answer:
D. Smart card and password:
o Correct: Combines “something you have” (smart card) and “something
you know” (password), representing true MFA.
Which of the following features can be used to ensure a user can access multiple
versions of files?
A. Multiple desktops
B. Remote Disc
C. Time Machine
D. FileVault
Correct Answer:
c. Time Machine
Time machine will allow a Mac computer to go back “in time” to view the state of
machine at any given time.
File Vault is Mac’s version of full disk encryption
Remote Disc allows you to access optical drives on other computers over a
network.
Multiple desktops allows you to create separate virtual desktops to organize your
open windows and apps.
A technician downloaded a software program to a network share. When the
technician attempts to copy the program to the Windows tablet for installation, the
technician receives an error. Which of the following is the best procedure for the
technician to use to complete the assignment?
A. Copy the program file to a USB drive and install.
B. Burn the program file to a CD and install.
C. Format the HDD and then do the installation.
D. Replace the HDD and then do the installation
Correct Answer:
a. Copy the program file to a usb drive and install
Explanations:
A. Copy the program file to a USB drive and install: This option is a reasonable
approach. If the network share is causing issues, copying the program to a USB
drive and installing it directly from there can bypass any network-related problems.
A user reports that the hard drive activity light on a Windows 10 desktop computer
has been steadily lit for more than an hour and performance is severely degraded.
Which of the following tabs in Task Manager contains the information a technician
should use to identify the cause of this issue?
A. Services
B. Processes
C. Performance
D. Startup
B. Processes
The Processes tab provides detailed information about running processes,
including their resource usage (CPU, memory, and disk).