A+1102 4.0 Operational Procedures Flashcards

1
Q

Organizing support teams into tiers, such as Tier 1, Tier 2, Tier 3, is an example of?

A

THE CORRECT ANSWER

Escalation levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When creating a new ticket in the ticketing system, a technical support agent must enter all relevant ticket information related to the issue. Where should the agent go to get an accurate initial description of the problem?

A

THE CORRECT ANSWER

The affected user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is performing an inventory of computer systems on a network. What allows asset management scanners and software to track a device’s location?

A

YOU WERE SURE AND CORRECT

RFID Tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What phase of a procurement life cycle implements a procedure for installing an asset in a secure configuration?

A

THE CORRECT ANSWER

Deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Technicians can classify tickets into priority order, such as critical, major, or minor incidents. What is this an example of?

A

THE CORRECT ANSWER

Severity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technical support representative gets assigned a new ticket. While reviewing the ticket system, the representative needs to look up the user’s contact details. In what section of the ticket is this information located?

A

User information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During the course of an incident, the support technician at each tier will enter information related to the given problem. To assist in faster resolution for common incidents, a ticket can be linked to another part of the database that contains information relevant to the issue at hand. What is this information called?

A

YOU WERE SURE AND CORRECT

Knowledge base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a user is logging into a computer they first see a screen that requires them to accept the conditions of using that computer. Which two items does this screen represent? (Select all that apply.)

A

Splash screen
Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Organizing support teams into tiers, such as Tier 1, Tier 2, Tier 3, is an example of?

A

THE CORRECT ANSWER

Escalation levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What part of the ticketing system does a support agent use to group related tickets?

A

YOU WERE SURE AND CORRECT

Categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What phase of the procurement life cycle includes the documentation of an asset, such as warranty and licensing details?

A

YOU WERE SURE AND CORRECT

Procurement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A support agent determines that they need to enter a specific device into the ticket during a support call. Where in the ticketing system does the agent enter this?

A

YOU WERE SURE AND CORRECT

Device information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When onboarding or offboarding an employee, a company generates a list of steps that must be followed to ensure that all processing for that employee is complete. Which of the following are the correct lists that are generated? (Select all that apply.)

A

End-user termination checklist

New-user setup checklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Technicians can classify tickets into priority order, such as critical, major, or minor incidents. What is this an example of?

A

YOU WERE SURE AND CORRECT

Severity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Traffic light type indicators on a risk analysis worksheet where red is a high risk, orange is moderate risk, and green is minimal risk are examples of?

A

YOU WERE SURE AND CORRECT

Risk level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

During the planning of a software upgrade or other major change, the planner must ensure that they schedule the change to minimize the effect on users or other customers. What is an important change management step to ensure this?

A

THE CORRECT ANSWER

Date and time of the change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When reviewing a change request, where would a manager find the benefits a change will accrue?

A

THE CORRECT ANSWER

Purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

During the planning of a software upgrade or other major change, the planner must identify what computers or software will be part of the upgrade. This includes what services may be unavailable and how this will impact users and customers. Which part of change planning does this fall under?

A

YOU WERE SURE AND CORRECT

Affected systems/impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It can be difficult for employees to adjust to a new or upgraded software. As well as the technical implementation, what must the change plan account for to mitigate this?

A

THE CORRECT ANSWER

End-user acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What process involves testing a change in a computing environment designed to replicate the production environment but isolated from it?

A

YOU WERE SURE AND CORRECT

Sandbox testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

During the change implementation process of the procurement life cycle, what needs to accompany the implementation plan to reverse the change if the need arises?

A

YOU WERE SURE AND CORRECT

Rollback plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The IT manager generates a change request when a fault requires repair, identifies a new business need or process, or has room for improvement in an existing standard operating procedure (SOP) or system. What part of the change request includes the number of devices, users, or customers affected by the change?

A

YOU WERE SURE AND CORRECT

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

During the planning of a software upgrade or other major change, the planner must ensure that they schedule the change to minimize the effect on users or other customers. What is an important change management step to ensure this?

A

THE CORRECT ANSWER

Date and time of the change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

It can be difficult for employees to adjust to a new or upgraded software. As well as the technical implementation, what must the change plan account for to mitigate this?

A

THE CORRECT ANSWER

End-user acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A project with significant impact should incorporate testing to allow end-users to work with the updated system and suggest improvements before release. What is this process called?

A

THE CORRECT ANSWER

User-acceptance testing (UAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When reviewing a change request, where would a manager find the benefits a change will accrue?

A

THE CORRECT ANSWER

Purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When a change request is submitted, it must receive approval before action. Who is the approval authority for minor changes?

A

YOU WERE SURE AND CORRECT

Supervisor or department manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which type of backup assembles data from other backup jobs?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which backup storage means that the production system and backup media are in the same location?

A

YOU WERE SURE AND CORRECT

On-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The 3-2-1 backup rule is a best-practice maxim applied to backup procedures to verify that technicians are implementing a solution that can mitigate the widest possible range of disaster scenarios. How many copies of the technician’s data, including the production copy, should the technician have?

A

THE CORRECT ANSWER

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What type of backup has the highest storage and time requirement but has the least recovery complexity, as only a single file is required?

A

YOU WERE SURE AND CORRECT

Full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which backup method is an option for creating full backups that are not generated directly from the original data but instead assembled from other backup jobs?

A

YOU WERE SURE AND CORRECT

Synthetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

In recent years, increasing bandwidth and lower costs of cloud storage have made backing up crucial data to the cloud more appealing to businesses. What type of backup location is a cloud backup considered?

A

THE CORRECT ANSWER

Off-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What type of backup has a moderate backup time and only includes new files and files modified since the last backup job?

A

THE CORRECT ANSWER

Differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which type of backup assembles data from other backup jobs?

A

THE CORRECT ANSWER

Synthetic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which type of backup has a low backup time but a high recovery complexity?

A

THE CORRECT ANSWER

Incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What type of backup occurs daily using the Grandfather-Father-Son (GFS) scheme?

A

THE CORRECT ANSWER

Incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Technicians must manage two backup requirements against the capacity of the backup media and the time it takes to complete a backup job. One requirement is backup retention. What is the other requirement?

A

THE CORRECT ANSWER

Backup frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following is a best practice lifting technique when lifting an object?

A

YOU WERE SURE AND CORRECT

Keep the back straight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Whose responsibility is it to use equipment in the workplace in accordance with the guidelines given to them?

A

YOU WERE SURE AND CORRECT

Employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following would a technician use to protect static-sensitive components during storage or travel?

A

YOU WERE SURE AND CORRECT

Antistatic bags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What must be disconnected first whenever a technician adds or replaces components within a PC or laptop?

A

YOU WERE SURE AND CORRECT

Power plug and battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Static electricity discharged into the delicate structure of electronic devices will flash over between the conductive tracks, damaging or even vaporizing them. Which can a technician wear to ground themselves to prevent a discharge?

A

THE CORRECT ANSWER

Electrostatic discharge (ESD) straps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the recommended type of fire extinguisher to use on an electrical fire?

A

THE CORRECT ANSWER

Carbon dioxide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following is used as a safe place to organize sensitive components to prevent against electrical shock and damage?

A

THE CORRECT ANSWER

Electrostatic discharge (ESD) mat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

If a fault causes metal parts in the equipment to become live, what provides a path of least resistance for the electrical current to flow away harmlessly?

A

YOU WERE SURE AND CORRECT

Ground

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

While reviewing system logs during troubleshooting a laptop, it becomes apparent that one of the small-outline DIMM (SODIMM) memory cards needs replacing. What is the first step a technician must do to replace the memory?

A

YOU WERE SURE AND CORRECT

Disconnect power before repairing the PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

If necessary, technicians should wear protective clothing for handling equipment and materials that can be hazardous. Which of the following is safety gear worn to minimize any risk of burns from corrosive materials or eye irritation from particles, such as toner or dust?

A

YOU WERE SURE AND CORRECT

Safety goggles and gloves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A technician evaluates the impacts associated with handling certain materials in the workplace. What is a risk associated with handling other devices and assets from a recycling/disposal perspective?

A

THE CORRECT ANSWER

It can contain toxins that could be fatal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

An engineer is looking at methods that will preserve organizational assets’ lifespan and operational ability. What can assist in removing debris from sensitive computing components?

A

YOU WERE SURE AND CORRECT

Compressed air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

An engineer is looking for methods that protect the organization’s computers and network. What comes in adapters, trailing sockets, or filter plugs, with the protection circuitry built into the unit?

A

THE CORRECT ANSWER

Surge suppressor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A technician reviews the organization’s policies on material handling and responsible disposal. What item needs proper disposal to reduce the risk of respiratory tract irritation?

A

THE CORRECT ANSWER

Toner

53
Q

A technician reviews the organization’s policies on material handling and responsible disposal. What item needs proper disposal to protect employees against burns from corrosive materials?

A

YOU WERE SURE AND CORRECT

Battery

54
Q

A service technician evaluates a company’s vulnerability to environmental impacts. What is important to understand about dust?

A

YOU WERE SURE AND CORRECT

It contains particles that can cause overheating or loss of function.

55
Q

A technician is developing a computing deployment strategy for a new team. What is an important consideration for equipment placement?

A

YOU WERE SURE AND CORRECT

It allows optimal environments for computing operations and increases lifespan.

56
Q

A helpdesk technician is evaluating methods to increase the lifespan of the organization’s assets from an environmental standpoint. What can prevent effective heat dissipation and cause clogging up of peripherals such as keyboards and mice?

A

YOU WERE SURE AND CORRECT

Dust

57
Q

A cyber consultant is tasked with purchasing equipment to mitigate data loss. What can be used to provide sustained power for a few minutes and provisioned at the component level for disk drives, RAID arrays, and memory modules?

A

THE CORRECT ANSWER

Battery backup

58
Q

A safety technician is reviewing procedures on material handling and disposal. What must be sent to approved waste management and recycling facilities because the materials may contain toxins and heavy metals?

A

THE CORRECT ANSWER

Other devices/assets

59
Q

A technician is purchasing equipment used to support the loss of data. What is the benefit of acquiring battery backups?

A

THE CORRECT ANSWER

It allows power to be sustained for a short duration to reduce risks of file corruption.

60
Q

An engineer is looking at various licenses to determine what the organization should use. What type of license is free to use, permitted to be modified, or shared with others?

A

YOU WERE SURE AND CORRECT

Open-source

61
Q

A cyber technician reviews the various types of data located within the organization’s customer profile. What is unique to personal government-issued information?

A
62
Q

An engineer is reviewing licenses on an employee’s organizational laptop. What is unique to valid licenses?

A

YOU WERE SURE AND CORRECT

It is active and used in accordance with agreements.

63
Q

A technician is packaging company property that was involved in a malware incident. The technician completes a document that will travel with the equipment until it reaches its destination. What is the name of this document?

A

YOU WERE SURE AND CORRECT

Chain of custody

64
Q

A technician is clearing the storage room of older documentation. What assists the technician in determining what documentation to keep and dispose of?

A

YOU WERE SURE AND CORRECT

Retention requirement

65
Q

A software technician is reviewing the organization’s current licensing and procurement plan. What describes an expired license?

A

YOU WERE SURE AND CORRECT

It is no longer active as the contract has ended.

66
Q

A technician troubleshoots an employee’s computer that is requesting reactivation. What type of license issue is the technician observing?

A

YOU WERE SURE AND CORRECT

Expired

67
Q

A technician is reviewing various organizational policies regarding the security and safety of customer information. What does the Payment Card Industry Data Security Standard govern?

A

THE CORRECT ANSWER

Transactions

68
Q

An engineer reviews company policy concerning the storage and use of customer information. What is a tenet of PII?

A

THE CORRECT ANSWER

It refers to data that can identify a person.

69
Q

An engineer is reviewing data within organizational databases that contain identifiable information. What type of data includes a person’s illness history and treatment findings?

A

YOU WERE SURE AND CORRECT

Healthcare data

70
Q

A technician reviews the organization’s policy to ensure it is abiding by regulated data classifications. What type of data can the technician use to identify, contact, or locate an individual?

A

YOU WERE SURE AND CORRECT

Personally identifiable information

71
Q

A software engineer travels to a customer’s site, and the customer advises them that business casual attire is permitted. What are the components of business casual attire? (Select all that apply.)

A

Matching coat and slacks
Minimal accessories or jewelry

72
Q

A technician is preparing for a meeting with a customer who is upset with their received service. As part of maintaining a positive attitude and projecting confidence, what situations should the technician and customer avoid during the meeting? (Select all that apply.)

A

Arguing with the customer
Being judgmental

Dismissing the customer’s concerns

73
Q

An organization representative has completed a ticket at the customer’s site. What should the representative do to see if the issue resurfaced?

A

THE CORRECT ANSWER

Have a customer satisfaction follow-up.

74
Q

An organizational representative is preparing to meet with a customer at their site. This customer is known for being easily provoked and angered. Thinking of a possible mitigation step, what is the representative doing by giving their full attention to what the customer is saying and not interjecting until the customer finishes speaking?

A

YOU WERE SURE AND CORRECT

Actively listening

75
Q

An organization technician is conducting a service call at a customer’s site and reviewing systems/information containing confidential and private data. Where might the technician see this type of information? (Select all that apply.)

A

Desktop

Laptop

Printer

76
Q

A software engineer travels to a customer’s site for an introductory meeting. What articles of clothing would be appropriate for business formal? (Select all that apply.)

A

Non-matching coat and slacks

Collared shirt

77
Q

A company representative travels to a new customer’s site for an initial meeting. What actions should the representative consider? (Select all that apply.)

A

Show up before the prearranged meeting time.

Avoid taking personal calls while in the meeting.

Do not check social media while in the meeting.

78
Q

A representative is working on contractual agreements with the customer management team. What provides the management team with expectations of terms and incident resolution times?

A

THE CORRECT ANSWER

Documentation of services

79
Q

A technician meets with a customer at the customer’s site and wants to ensure they are providing their full attention, refraining from comment, and not misinterpreting what the customer has said. What skill is the technician using in this meeting?

A

YOU WERE SURE AND CORRECT

Active listening

80
Q

An engineer is working on resolving a ticket at a customer’s site. What personal distractions should the engineer avoid while on the site? (Select all that apply.)

A

Making non-business phone calls

Visiting social media sites

81
Q

An organizational representative walks into a customer’s site and immediately encounters an angered manager. How should the representative behave in this situation? (Select all that apply.)

A

Continue to address by title.

Maintain a positive mindset.

Actively listen.

82
Q

An organization technician is conducting a service call at a customer’s site and reviewing systems/information containing confidential and private data. Where might the technician see this type of information? (Select all that apply.)

A

CORRECT ANSWER:
Desktop

Laptop

Printer

83
Q

A technician meets with a customer’s management team and wants to ensure they are fully aware of the organization’s capabilities. What is the benefit of using proper service documentation?

A

It allows the customer to fully understand the expected terms of service and how long it should take for an incident to be resolved.

84
Q

A technician is meeting with a customer and wants to discuss the future state of the business relationship. What provides the customers with full knowledge of incident resolution times and expectations of service?

A

YOU WERE SURE AND CORRECT

Documentation of services

85
Q

A new customer requests that a technician attend an initial meeting with them at their business location. What should the technician consider wearing as this is their introductory meeting? (Select all that apply.)

A

A matching suit
A conservative use of accessories

86
Q

A software engineer travels to a customer’s site for an introductory meeting. What articles of clothing would be appropriate for business formal? (Select all that apply.)

A

Minimal accessories or jewelry
Matching coat and slacks

87
Q

A software engineer travels to a customer’s site, and the customer advises them that business casual attire is permitted. What are the components of business casual attire? (Select all that apply.)

A

Non-matching coat and slacks
Collared shirt

88
Q

A technician is using a Windows script in a current project. What is a tenet of .bat?

A

THE CORRECT ANSWER

It is a shell script written for the basic Windows CMD interpreter.

89
Q

An engineer reviews various automation methods to determine what would work well for the team. What describes a tenet of installing applications?

A

THE CORRECT ANSWER

It can be executed in silent mode by using the command switches for its installer.

90
Q

A technician is working on a ticket where the organization’s systems were exposed to malware. What is one way that the technician could unintentionally expose the environment to malware risks?

A

THE CORRECT ANSWER

It can occur when an interpreter is not a default feature.

91
Q

A cyber consultant is reviewing the organization’s playbook on Windows scripts. What provides the Windows PowerShell ISE for rapid development?

A

THE CORRECT ANSWER

.ps1

92
Q

A technician is creating a playbook for Windows-based script file extensions. What file extension/scripting language based on Microsoft’s Visual Basic programming language predates PowerShell?

A

THE CORRECT ANSWER

.vbs

93
Q

A technician is working on a project that uses interactive web-based content. What type of script could the technician use to support the development of this interactive content?

A

THE CORRECT ANSWER

.js

94
Q

A technician is working on a project involving software application development. What general-purpose scripting and programming language can the technician use to develop both automation scripts and software apps?

A

THE CORRECT ANSWER

.py

95
Q

A cyber architect reviews the organization’s current and future state design for automation and scripting. When is it appropriate to use the Bash command shutdown -r?

A

THE CORRECT ANSWER

When restarting a machine

96
Q

A technician is working on a project involving software application development. What general-purpose scripting and programming language can the technician use to develop both automation scripts and software apps?

A

THE CORRECT ANSWER

.py

97
Q

A technician is reviewing the team’s guidelines on scripting. What is a tenet of basic automation?

A

THE CORRECT ANSWER

It is one of the primary use cases for scripting.

98
Q

A cyber consultant is reviewing the organization’s playbook on Windows scripts. What is a shell script written for the basic Windows CMD interpreter?

A

THE CORRECT ANSWER

.bat

99
Q

A technician is creating a playbook for Windows-based script file extensions. What file extension/scripting language based on Microsoft’s Visual Basic programming language predates PowerShell?

A

THE CORRECT ANSWER

.vbs

100
Q

A cyber consultant is reviewing the organization’s playbook on Windows scripts. What provides the Windows PowerShell ISE for rapid development?

A

THE CORRECT ANSWER

.ps1

101
Q

An engineer reviews various automation methods to determine what would work well for the team. What describes a tenet of installing applications?

A

THE CORRECT ANSWER

It can be executed in silent mode by using the command switches for its installer.

102
Q

A cyber engineer is drafting policy on automation and scripting. What task can be completed with PowerShell using the New-PSDrive cmdlet?

A

THE CORRECT ANSWER

Remapping a network drive

103
Q

A cyber architect reviews the organization’s current and future state design for automation and scripting. When is it appropriate to use the Bash command shutdown -r?

A

THE CORRECT ANSWER

When restarting a machine

104
Q

A technician adds various script types to the team’s playbook for future hires. What is unique to .ps1?

A

THE CORRECT ANSWER

It provides the Windows PowerShell Integrated Scripting Environment rapid development.

105
Q

A technician is using a Windows script in a current project. What is a tenet of .bat?

A

THE CORRECT ANSWER

It is a shell script written for the basic Windows CMD interpreter.

106
Q

A cyber engineer is drafting policy on automation and scripting. What task can be completed with PowerShell using the New-PSDrive cmdlet?

A

THE CORRECT ANSWER

Remapping a network drive

107
Q

A technician is working on a project involving software application development. What general-purpose scripting and programming language can the technician use to develop both automation scripts and software apps?

A

THE CORRECT ANSWER

.py

108
Q

A cyber consultant is reviewing the organization’s playbook on Windows scripts. What provides the Windows PowerShell ISE for rapid development?

A

THE CORRECT ANSWER

.ps1

109
Q

An engineer reviews various automation methods to determine what would work well for the team. What describes a tenet of installing applications?

A

THE CORRECT ANSWER

It can be executed in silent mode by using the command switches for its installer.

110
Q

A technician is working on a project that uses interactive web-based content. What type of script could the technician use to support the development of this interactive content?

A

THE CORRECT ANSWER

.js

111
Q

A department coder adds various script commands to the organization’s coding playbook. What starts with a shebang line designating which interpreter to use, such as Bash or Ksh?

A

THE CORRECT ANSWER

.sh

112
Q

A technician reviews the team’s playbook on processes that expedite work completion in scripting. What is one of the primary use cases for scripting where the OS manages some tasks rather than being run manually?

A

THE CORRECT ANSWER

Basic automation

113
Q

A desktop support technician works for an IT outsourcing company handling clients for multiple companies. What can distinguish clients from different companies and support recording and billing activities?

A

THE CORRECT ANSWER

Remote monitoring and management (RMM) tools

114
Q

As part of a network and system upgrade, a company hires a managed service provider (MSP) to monitor the network, patch computers, and provide customer support. Which type of IT support tool would the MSP used to distinguish individual client accounts to provide support for while recording and reporting billable support activity?

A

THE CORRECT ANSWER

Remote monitoring and management (RMM) tools

115
Q

A technician is connecting to a network server using a secure shell connection. What port does this connection use to connect as a default?

A

THE CORRECT ANSWER

TCP Port 22

116
Q

When a technician remote connects to a Windows server compromised by malware using remote desktop, what two functions can the technician use to mitigate the risk of having their credentials compromised? (Select all that apply.)

A

Remote Credential Guard

RDP Restricted Admin (RDPRA)

117
Q

A technician attempts to connect to a user’s computer to troubleshoot the system. If the technician remotes into the computer using Remote Desktop Protocol (RDP), it will lock the local desktop. What alternative will allow the user to screen share with the technician?

A

THE CORRECT ANSWER

Virtual Network Computing (VNC)

118
Q

What port do third-party screen-sharing applications like TeamViewer and LogMeln use to connect over the internet?

A

THE CORRECT ANSWER

TCP Port 443

119
Q

A technician is trying to remotely connect to a computer but cannot. Where does the technician need to navigate the customer to in Windows settings to enable access?

A

THE CORRECT ANSWER

Remote desktop

120
Q

A business director is looking to outsource their IT needs from one company. What type of company is an outsourcing company that is specialized in handling all IT support for their clients?

A

THE CORRECT ANSWER

Managed service provider (MSP)

121
Q

A user attempts to connect to a server using a secure shell connection. What default port does the user need to enable on the computer’s firewall to allow the connection?

A

THE CORRECT ANSWER

TCP Port 22

122
Q

A business director is looking to outsource their IT needs from one company. What type of company is an outsourcing company that is specialized in handling all IT support for their clients?

A

THE CORRECT ANSWER

Managed service provider (MSP)

123
Q

When a technician remote connects to a Windows server compromised by malware using remote desktop, what two functions can the technician use to mitigate the risk of having their credentials compromised? (Select all that apply.)

A

Remote Credential Guard
RDP Restricted Admin (RDPRA)

124
Q

A user is working with a technician to solve a software problem on their computer. What application allows a user to ask for help from a technician or co-worker via an invitation file protected by a passcode?

A

THE CORRECT ANSWER

Microsoft Remote Assistance (MSRA)

125
Q

A business manager needs to create a meeting with multiple remote users within the company. What type of software allows users to create and configure virtual meeting rooms with voice, video, instant messaging, and screen sharing options?

A

THE CORRECT ANSWER

Video-conferencing

126
Q

A technician is trying to remotely connect to a computer but cannot. Where does the technician need to navigate the customer to in Windows settings to enable access?

A

THE CORRECT ANSWER

Remote desktop

127
Q

A user needs to share pictures from an iPad with another nearby iOS user. What OS application does the user need to use to complete this?

A

THE CORRECT ANSWER

AirDrop

128
Q

What port do third-party screen-sharing applications like TeamViewer and LogMeln use to connect over the internet?

A

THE CORRECT ANSWER

TCP Port 443

129
Q

A user is browsing the internet and wants to conceal their source IP address. What type of network connection allows users to do this?

A

YOU WERE SURE AND CORRECT

Virtual private network (VPN)