902_exam_1 Flashcards

1
Q

A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a
child can spend on a particular website. Which of the following tabs under Internet Options will allow the user to create those settings?

A

Content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician is performing a clean install of Windows on a new hard drive from a factory DVD, but the computer does not recognize the optical disc. A “non-system
disk or disk error” is observed. Which of the following should the technician do FIRST?

A

Check the BIOS settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added
to the corporation’s domain. Which of the following utilities will the administrator access to configure this setting?

A

System properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician is attempting to remove malware from a customer’s workstation. Which of the following Control Panel utilities should the technician use?

A

Folder options > view hidden files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following should be used to ensure that a Windows OS is functioning optimally?

A

Drivers updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician needs to log into a user’s computer to fix the user’s corrupt local profile. Which of the following connectivity tools will allow the technician to connect to
the user’s computer?

A

Remote Assistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An end user needs to completely re-install Windows 7 on a home computer but it did not come with any OS discs. How would a technician accomplish this?

A

Recovery partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user is unable to find the preferred default network printer in the printers list in the user profile. Which of the following is the FIRST step that should be taken?

A

Map printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician needs to perform a backup while a system is running. Which of the following services allows this task to be accomplished?

A

Shadow copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician has been tasked with loading the operating system on every PC with a blank hard drive on a network. The technician wishes to install the operating system with minimal physical interaction with the PCs. Which of the following is the BEST way to accomplish this?

A

Set up a central image that the PCs can load from a PXE boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technician is navigating through a Windows OS via command prompt. The technician needs to display the content of a folder. Which of the following is the BEST
option for accomplishing this task?

A

dir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administratoruse to gain access to the secure network?

A

VPN=private virtual network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates to Java, but is
still unable to view the map. The technician should change which of the following Internet Options?

A

Compatibility view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
#
A technician has successfully completed a gpupdate from a CMD box of a user’s PC and is ready to move to the next user. Which of the following is the appropriate NEXT step?
A
  1. Type EXIT at the command prompt and press Enter

2. Click the “x” in the top right of the CMD window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An administrator is in a Remote Assistance session, sharing a user’s desktop. While trying to map a shared network drive for the user, an “access denied” error is
encountered while using the user’s credentials. Which of the following should be the administrator’s NEXT step?

A

Open the location with administrator privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open?

A

System restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser. Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings?

A

TLS= transport layer secuirty

Advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following network hosts would MOST likely provide the services needed to allow client access to Internet web pages?

A

Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following best practices is used to fix a zero-day vulnerability on Linux?

A

Patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following tools is used to type or paste recovery commands directly into a Linux box?

A

Shell/terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers?

A

90 meters (30 feet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A user has a Windows 8.1 RT operating system and wants to add additional programs to the computer. Which of the following is available for installing more applications?

A

RT

Microsoft Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types?

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem?

A

Virtual host network adapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A Google account on an Android device by default will synchronize to which of the following locations?

A

Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How would a technician install Windows OS on a MAC OS computer without using third-party software?

A

Bootcamp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this?

A

OneDrive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Virtual machines provide users with the ability to do which of the following?

A

Share hardware resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following features of a mobile device operates the touch screen?

A

Digitizer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician
MOST likely review to find that information?

A

DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A technician is tasked with setting up a user’s webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail?

A

Contacts, calendar and free/busy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications?

A

The username is not part of the local administrator group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?

A

ACL= access control list

34
Q

An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue?

A
#
The email filter has quarantined the messages
35
Q

A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?

A
#
Verify a smart card has been issued
36
Q

A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?

A

Require laptop hard drives to be encrypted.

37
Q

The type of security threat that uses computers or other networks to accept and pass on viruses is called:

A

botnets

38
Q

Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following?

A

trojan horse

39
Q

A technician is attempting to manually migrate a user’s profile from one Windows PC to another. Files in the user’s My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur?

A

EFS= encryption file system

40
Q

When securing a mobile device, which of the following types of screen locks is the MOST secure?

A

fingerprintlock

41
Q

A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?

A

drive wipe

42
Q

A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees’ laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change?

A

Enable MAC filtering

43
Q

A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend?

A

Enable MAC filtering

44
Q

A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT?

A

Check for and apply a firmware update

45
Q

A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?

A

Physical destruction

46
Q

Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach?

A
  1. Use multi-factor authentication

2. Educate end users

47
Q

A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives?

A
#
Shredding
48
Q

Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe?

A

Social engineering

49
Q

A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation?

A
  1. Rename default accounts

2. Disable guest account

50
Q

Which of the following prevention methods is considered to be digital security?

A

Firewalls

51
Q

Which of the following Windows features would be used to encrypt a single file or folder?

A

EFS

52
Q

A turnstile is an example of which of the following forms of physical security?

A

Mantrap

53
Q

A user wants to save a file into another user’s directory, but the file save is denied. Which of the following is the MOST likely reason the file save cannot be completed?

A

The user requires write permissions to the folder

54
Q

A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation?

A

Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours.

55
Q

A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed?

A

HTTPS 443

56
Q

An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?

A

Content-filtering

57
Q

Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a message that updates are being installed. Which of the following is the MOST likely cause of this issue?

A

Automatic Windows Update is enabled on the machine

58
Q

A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and running anti-malware software, the problem persists and the technician finds that two rogue processes cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem?

A

Run msconfig to clean boot the PC

59
Q

A user reports that any URL entered redirects to the same web page. A technician concludes that the user’s computer has been compromised. Which of the following tools would the technician use to resolve the issue?

A

Anti-malware

60
Q

A technician receives a helpdesk ticket about an employee having a problem sending text messages with a company Android smartphone. It has been determined that it is not a carrier issue. Which of the following should the technician perform FIRST?

A

Verify data connectivity

61
Q

A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ
FIRST when responding to the problem?

A

Quarantine the system

62
Q

A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?

A

Quarantine the system

63
Q

Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue. Which of the following methods can the technician use?

A

perform a hard reset

64
Q

A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several apps recently. Which of the following might be the cause of the issue?

A

Unauthorized root access

65
Q

A customer has recently installed several applications on a Windows 7 workstation and is now experiencing slow system performance and spontaneous restarts.
After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss?

A

msconfig

66
Q

A user’s smartphone runs very slow at the end of the day. When the user restarts the phone in the morning, it runs at its normal speed. Which of the following should be done throughout the day to BEST resolve this issue?

A

Close all running apps

67
Q

After installing a critical update from Windows Update, a user accidentally types an incorrect URL into the browser and malware is automatically installed. The
malware disables the computer’s antivirus software and Internet connection. Which of the following would be the BEST tool to remove the malware without risking
loss of the user’s data?

A

run system restore

68
Q

Joe, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently appears on the screen informing the user additional information is required to log in. Which of the following is causing this?

A

Unintended WiFi connections

69
Q

An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technician’s FIRST step in troubleshooting the problem?

A

Run defrag on the hard drive

70
Q

Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Joe is then required to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screen-lock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue?

A

Domain-level group policies

71
Q

A Windows workstation is suspected of having malicious software that created an infected start-up item or service. Which of the following tools would a technician use to test this theory?

A

msconfig

72
Q

A user reports unexpected icons appearing on the desktop. The technician identifies that the symptoms point to a malware infection. Which of the following procedures would be performed NEXT?

A

Quarantine infected system

73
Q

A user updates the video driver on the computer and it requests a restart after installation. The computer never gets past the loading Windows page without rebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs?

A

system recovery

74
Q

A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT?

A

DDL

Research the DLL file to identify the application it corresponds to before continuing

75
Q

A user, Ann, receives a phone call from the company’s mail administrator who indicates her email account has been disabled due to high volumes of emails being sent in a very short period of time. Which of the following types of attack has the user experienced?

A

Virus infection

76
Q

A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. Which of the following is the BEST step the user can take to fix this problem?

A

Reset to factory default

77
Q

A user reports browsing the Internet is slow and an icon with a picture of a person with a headset keeps asking them to “click here for help.” The user has clicked on the icon to try to resolve the slowness but all that happens is the computer redirects them to a website to purchase software. Which of the following should be http://www.gratisexam.com/ performed FIRST to resolve the issue?

A

Identify the type of malware

78
Q

A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT?

A

Run chkdsk with the /r switch and reboot the PC.

79
Q

A technician has just fixed a user’s PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?

A

Educate the user regarding Internet browning best practices

80
Q

Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction. The WiFi icon is displaying that it has connectivity but she is still unable to browse. Which of the following could be the issue?

A

PRAM needs to be reset

81
Q

Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device. He now notices the battery is rapidly draining. Which of the following can Joe MOST likely do to resolve the issue without a loss of data?

A

Readjust the location settings

82
Q

Joe, a user, has connected a tablet to his personal mobile hotspot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately?

A
  1. Change the SSID to a different broadcast name

2. Adding the