902 Flashcards

1
Q

A technician has a clients laptop that is randomly shutting down. What is the first step of the troubleshooting theory that the technician should perform to resolve the laptops issue?

Reference: Ch02- operational procedures

A

Document findings, actions, and outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your company has been experiencing issues with third parties tailgating authorized users when they enter a secure server room. What would best resolve this problem?

Reference: Ch28- securing computers

A

Mantraps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Might installed a new external DVD drive. The installation program required a rebate. As the system rebooted, Mike got a blue screen of death. He shut off the system and disconnected the external DVD drive. What should he try next?

Reference: Ch17- troubleshooting operating systems

A

Last known good configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jamie has just finished cleaning up a virus infection on a customer’s computer. What should Jamie do last?

Reference: Ch28- securing computers

A

Educate the end-user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user has not received any new emails on his part phone in the last two days. User is able to access the Internet without any problems. What should the user do first?

Reference: Ch26- care and feeding of Mobile devices

A

Restart the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

John worked on his PowerPoint presentation yesterday, but today the program won’t run. What windows tool or option should he try to get PowerPoint working again?

Reference: Ch17- troubleshooting operating systems

A

System restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A client has a computer that is infected with several viruses and spyware. What should the technician performed first before spyware removal?

References: Ch28- securing computers

A

Disable system restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When trying to access a secure web page, Karen gets an error telling her the domain names for the site and the certificate or mismatched. The site is a small “mom and pop” website, but she’s about to order $1500 Worth of merchandise. What should she do?

Ch23- The Internet

A

Stop and call the store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When troubleshooting a software problem on Phoebe’s computer and listening to her describe the problem, your beeper goes off. It’s your boss. What should you do?

Ch02- operational procedures

A

Wait until Phoebe finishes her description, run through any simple fixes, and then explain that you need to call your boss on your cell phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician wants to make a file hidden using the commandline. Instruct him on how to accomplish this task.

Ch16- working with the command line interface

A

Type ATTRIB +H followed by the file name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When securing a new wireless router, what should be changed first?

Ch22- Wireless Networking

A

Default password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What security controls would be an example of the least privilege principle on a home PC?

Ch14- users, groups, and permissions

A

Create a standard user account for kids

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What file system enables you to encrypt an image, thus making it un-viewable by any account except your own?

Ch14- users, groups, and permissions

A

EFS

EFS, or encrypted file system enables you to encrypt an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technician has 50 identical computers that need to be upgraded to windows seven. The computers are all capable of booting from the network. They are running a gigabit network with a windows deployment server. Which of the following will be the best to use in this scenario?

Ch12- building a PC

A

PXE

The windows pre-boot execution environment or PXE, enables a computer to boot from a network device, enabling a networked install of windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What command line utility is designed to edit the BOOT.INI file?

Ch17- troubleshooting operating systems

A

Bootcfg

Bootcfg is designed to let you edit the BOOT.INI file from the command prompt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is not an APM/ACPI level?

Standby
Enabled
Full on
Shut Down

Ch24- portable computing

A

Shut Down

There is no APM shut down level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the proper way to refer to the system root folder?

Ch03- The visible computer

A

%systemroot%

The system root folder is where the operating system is stored. %systemroot% is a programmer is a shortcut to take you to that directory

18
Q

What utility will display a listing of active TCP/IP ports on the computer?

Ch21- local Area networking

A

NETSTAT

NETSTAT is short for network statistics. The command shows you a list of all active TCP and UDP connections being made to your PC at any given moment.

19
Q

What type of hardware is the least likely to be used as a security device?

Ch28- securing computers

A

SD Flash card

20
Q

What tool can you use in the recovery console to partition a hard drive?

Ch17- troubleshooting operating systems

21
Q

You have been contacted by a local school to evaluate their computer labs for security threats. They are most worried about the hard drives and ram being stolen from inside the computers. What could they do to prevent this from happening?

Ch28- securing computers

A

Replace the PCs screws with proprietary security screws.

22
Q

What tool would you use at the windows vista commandline interface to edit operating system start up parameters located in the data store?

Ch13- Windows under the hood

A

Bootmgr

Starting with windows vista, Windows no longer stores boot information in the BOOT.INI file, but in a boot configuration data store which requires a new command line utility to edit.

23
Q

Jamie needs to troubleshoot a windows seven machine for a client, but the ticket on the PC merely says that the computer is “having problems”. Where can he check for important messages that might help direct him to specific solutions?

Ch03- The visible computer

A

Action center

The Windows 7 action center, found in the control panel and in the notification area, enables you to review recent messages, problems, and potential solutions.

24
Q

What tool allows a person with administrator privileges to add local users to a Windows system?

Ch14- users, groups, and permissions

A

The local users and groups snap-in under computer management.

25
Which tool in windows vista enables you to encrypt the contents of a drive, including folders of users other than you? Ch17- troubleshooting operating systems
Bitlocker
26
The accelerometer in a mobile device makes what possible? Ch25- understanding mobile devices
Automatic rotation of the screen when it is flipped, and game controller input
27
A customer reports that after a technician cleaned up a rogue antivirus program, the customer cannot browse the web. What should the technician check to resolve the issue? Ch23- The Internet
Proxy settings Some viruses change a computer is proxy setting to use a proxy server controlled by the viruses creator
28
Hey frustrated user calls in for tech-support. She installed three new programs, but now Windows 7 won't load. What can she do to determine which program is at fault? She doesn't want to uninstall all three programs. Ch17- troubleshooting operating systems
Boot the computer in safe mode. Go to the control panel, administrative tools, event viewer. Event viewer will quickly tell her which program made windows fail to load.
29
Which of the following is not controlled by windows Parental controls? Time of day Games Torrents Website filters Ch28- securing computers
Torrents
30
What allows a user to reset their password with a series of security questions that only the user should know?
Authentication
31
Kobe is working in the command line. He knows there are hidden files and folders on the drive. How would he show all the hidden files and folders? Ch16- working with the commandline interface
DIR /AH DIR Will list contents of a directory. The /AH switch will show hidden files and folders
32
What is SYSPREP? Ch12- building a PC
SYSPREP can be used to prepare duplicate images of a Windows installation when dealing with a mass deployment
33
Teryan discovers a computer on his network that has been infected with a 0-day virus. What is the first thing that should be done to the workstation? Ch28- securing computers
Unplug it from the network A zero day virus is a virus that is so new and unheard of that no virus scanner has the definitions to be able to protect against it. The best thing to do is unplug it from the wall and wait for your favorite antivirus company to come up with a fix.
34
Which two things can a technician clean a dirty PC case out with? Ch02- operational procedures
Compressed air and a vacuum
35
The user gets notifications that the manufacturer is updated the driver for his network card on a windows seven 64-bit system. The tech download the drivers, but cannot install them. What is wrong? Ch14- users, groups, and permissions
The user account does not have sufficient permissions
36
Read operational procedures and learn the steps of troubleshooting theory Ch02
Just do it
37
What is the most secure method, short of physical destruction, that would be used to ensure the data on the hard drive cannot be recovered? Ch12- building a PC
Use a degaussing tool A degaussing tool is a big magnet that will completely erase any magnetic hard drive you use it on
38
What is the minimum amount of hard drive space required to install Windows 7 32-bit?
16 GB
39
What switch should a technician use with the ping command to resolve and IP address to a hostname? Ch21- local area networking
-a The minus a switch resolves IP address is to host names
40
A microwave oven interfering with a wireless network is an example of what phenomenon? Ch02- operational procedures
Radio frequency interference (RFI)
41
The part of your hard drive that contains the MBR is called? Ch10
Boot sector
42
What is the correct path to determine the IP address on an iOS device? Ch26
Settings> General> network> wi-Fi> SS ID name> IP address