902 Flashcards
A technician has a clients laptop that is randomly shutting down. What is the first step of the troubleshooting theory that the technician should perform to resolve the laptops issue?
Reference: Ch02- operational procedures
Document findings, actions, and outcomes
Your company has been experiencing issues with third parties tailgating authorized users when they enter a secure server room. What would best resolve this problem?
Reference: Ch28- securing computers
Mantraps
Might installed a new external DVD drive. The installation program required a rebate. As the system rebooted, Mike got a blue screen of death. He shut off the system and disconnected the external DVD drive. What should he try next?
Reference: Ch17- troubleshooting operating systems
Last known good configuration
Jamie has just finished cleaning up a virus infection on a customer’s computer. What should Jamie do last?
Reference: Ch28- securing computers
Educate the end-user
A user has not received any new emails on his part phone in the last two days. User is able to access the Internet without any problems. What should the user do first?
Reference: Ch26- care and feeding of Mobile devices
Restart the phone
John worked on his PowerPoint presentation yesterday, but today the program won’t run. What windows tool or option should he try to get PowerPoint working again?
Reference: Ch17- troubleshooting operating systems
System restore
A client has a computer that is infected with several viruses and spyware. What should the technician performed first before spyware removal?
References: Ch28- securing computers
Disable system restore
When trying to access a secure web page, Karen gets an error telling her the domain names for the site and the certificate or mismatched. The site is a small “mom and pop” website, but she’s about to order $1500 Worth of merchandise. What should she do?
Ch23- The Internet
Stop and call the store
When troubleshooting a software problem on Phoebe’s computer and listening to her describe the problem, your beeper goes off. It’s your boss. What should you do?
Ch02- operational procedures
Wait until Phoebe finishes her description, run through any simple fixes, and then explain that you need to call your boss on your cell phone.
A technician wants to make a file hidden using the commandline. Instruct him on how to accomplish this task.
Ch16- working with the command line interface
Type ATTRIB +H followed by the file name
When securing a new wireless router, what should be changed first?
Ch22- Wireless Networking
Default password
What security controls would be an example of the least privilege principle on a home PC?
Ch14- users, groups, and permissions
Create a standard user account for kids
What file system enables you to encrypt an image, thus making it un-viewable by any account except your own?
Ch14- users, groups, and permissions
EFS
EFS, or encrypted file system enables you to encrypt an image
A technician has 50 identical computers that need to be upgraded to windows seven. The computers are all capable of booting from the network. They are running a gigabit network with a windows deployment server. Which of the following will be the best to use in this scenario?
Ch12- building a PC
PXE
The windows pre-boot execution environment or PXE, enables a computer to boot from a network device, enabling a networked install of windows
What command line utility is designed to edit the BOOT.INI file?
Ch17- troubleshooting operating systems
Bootcfg
Bootcfg is designed to let you edit the BOOT.INI file from the command prompt.
Which of the following is not an APM/ACPI level?
Standby
Enabled
Full on
Shut Down
Ch24- portable computing
Shut Down
There is no APM shut down level
What is the proper way to refer to the system root folder?
Ch03- The visible computer
%systemroot%
The system root folder is where the operating system is stored. %systemroot% is a programmer is a shortcut to take you to that directory
What utility will display a listing of active TCP/IP ports on the computer?
Ch21- local Area networking
NETSTAT
NETSTAT is short for network statistics. The command shows you a list of all active TCP and UDP connections being made to your PC at any given moment.
What type of hardware is the least likely to be used as a security device?
Ch28- securing computers
SD Flash card
What tool can you use in the recovery console to partition a hard drive?
Ch17- troubleshooting operating systems
DISKPART
You have been contacted by a local school to evaluate their computer labs for security threats. They are most worried about the hard drives and ram being stolen from inside the computers. What could they do to prevent this from happening?
Ch28- securing computers
Replace the PCs screws with proprietary security screws.
What tool would you use at the windows vista commandline interface to edit operating system start up parameters located in the data store?
Ch13- Windows under the hood
Bootmgr
Starting with windows vista, Windows no longer stores boot information in the BOOT.INI file, but in a boot configuration data store which requires a new command line utility to edit.
Jamie needs to troubleshoot a windows seven machine for a client, but the ticket on the PC merely says that the computer is “having problems”. Where can he check for important messages that might help direct him to specific solutions?
Ch03- The visible computer
Action center
The Windows 7 action center, found in the control panel and in the notification area, enables you to review recent messages, problems, and potential solutions.
What tool allows a person with administrator privileges to add local users to a Windows system?
Ch14- users, groups, and permissions
The local users and groups snap-in under computer management.