Core 2 Professor Messer Flashcards
a tech is delivering a new laptop to a user and moving the older one to a different user. which of the following would allow the existing hard drive to be used but prevent recovery of any of the previous users data?
A. Regular format
B. Run a defragmentation
C. Connect the laptop to the Windows Domain
D. Delete the \Users folder
Regular format
a user needs to modify a spreadsheet for an upcoming meeting. the spreadsheet is currently stored on a remote computer on a shared drive. the user would like to access the shared drive letter inside of Windows File Explorer. which of the following command line options would provide this functionality?
A. tasklist
B. net use
C. diskpart
D. netstat
net use
a macOS server admin needs a backup system to allow the recovery of data from any point in the last 30 days. which of the following should be used?
A. Backup and Restore
B. Remote Disc
C. Space
D. Time Machine
Time Machine
a user is reporting some apps launched on their mobile phone will show an error message and then disappear without starting. this problem starts with a group of apps normally used during the work day. which of the following tasks would be the FIRST step for troubleshooting this issue?
A. Install the previous version of the apps
B. Connect the phone to a power source
C. Power cycle the phone
D. Disable the GPS radio
Power cycle the phone
a tech has been asked to power down and store a server thats been exploited by an external attacker. the legal department will be performing tests and gathering information from this server. which of the following would be MOST important to insure the integrity of the server data?
A. Report the server location to the proper channels
B. Compile all support tickets with the server
C. Maintain a chain of custody
D. Take photos of the server in the storage room
Maintain a chain of custody
jack, a user, has opened a help desk ticket to remove malware from his laptop. a previous removal happened 2 weeks earlier with a similar malware infection. which of the following was missed in the first malware removal?
A. Restart the computer
B. Educate the end-user
C. Enable system protection
D. Quarantine the infected system
Educate the end-user
which of the following would be found in Windows 10 Pro but not found in Windows 10 Home?
A. 32-bit and 64-bit versions
B. Domain access
C. RDP client
D. Windows Workgroup
Domain access
a user would like to encrypt a small group of files in a shared folder without modifying other files on the drive. which of the following would be the best way to accomplish this?
A. EFS
B. Save the files as an admin
C. BitLocker
D. Save the files with a dollar sign at the end of the file name
EFS
encrypting file system
a user in the shipping department has logged into the Windows domain. however, the desktop doesn’t show the user usual wallpaper and all the users spreadsheets and documents in the “My documents” folder are missing. which of these would be the BEST way to restore the users normal work environment?
A. Rename the users folder and delete their profile in the registry
B. Boot into Safe Mode and disable all startup apps
C. Add the user to the admin group
D. Update to the latest OS version
Rename the users folder and delete their profile in the registry
a companys shipping department maintains 10 different computers to print shipping labels and track outgoing shipments. all the systems are displaying an error when they access a third-party shipping management website over a secure connection. which of the following would be the MOST likely reason for this issue?
A. The computers haven’t been updated with the latest operating patches
B. The website certificate expired
C. The local computer storage drives aren’t encrypted
D. The systems are infected with malware
The website certificate has expired
a manufacturing company performs a third-party audit of their accounting records each year. the auditors use laptops provided by the company to access the internal resources. when the audit is complete, the auditors should be prevented from logging on until the following audit process begins. which of the following would be the BEST way to accomplish this?
A. Uninstall the audit software
B. Disable the user accounts between audits
C. Remove the auditor accounts between audits
D. Require two factor authentication for the auditors accounts
Disable the user accounts between audits