Deck #008 Flashcards
What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 7? (Select 4 answers)
a) 800 MHz CPU
b) 1 GB of system RAM
c) 20 GB HDD with 15 GB of free hard disk space
d) DirectX 9 graphics device with WDDM 1.0 or higher driver
e) 2 GB of system RAM
f) 16 GB of free hard disk space
g) 1 GHz CPU
Answer: b, d, f, g
Which of the following answers describe the minimum system requirements for 64-bit (x64) version of Microsoft Windows 7? (Select 4 answers)
a) 800 MHz CPU
b) 16 GB of free hard disk space
c) 1 GHz CPU
d) 2 GB of system RAM
e) DirectX 9 graphics device with WDDM 1.0 or higher driver
f) 20 GB of free hard disk space
g) 1 GB of system RAM
Answer: c, d, e, f
Physical Address Extension (PAE) is a memory management feature that allows 32-bit CPUs to use more than 4 GB of physical memory.
a) True
b) False
Answer: True
A technician responds to a report that a user’s desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue?
A. Roll back the OS upgrade. Continue using the older version of Windows
B. Reset the PC to its factory conditions. Perform the OS upgrade again
C. Update the SATA controller driver from the manufacturers website
D. Perform a full backup and replace the hard drive
Correct Answer: C
A Linux user reports that an application will not open and gives the error. Only one instance of the application may run at one time. A root administrator logs on to the device and opens a terminal. Which of the following pairs of tools will be needed to ensure no other instances of the software are currently running?
A. pad and chmod B. sudo and vi C. ls and chown D. ps and kill E. cp and rm
Correct Answer: D
A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message.
The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:
A. keys
B. passwords
C. root CA
D. tokens
Correct Answer: A
Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.
Which of the following is MOST likely the cause?
A. Ransomware
B. Cryptomining
C. Rootkit
D. Keylogger
Correct Answer: A
Which of the following should be enacted to reduce a company’s liability and exposure to a potential lawsuit?
A. Acceptable use policy
B. Incident documentation policy
C. Password compliance policy
D. Change control policy
Correct Answer: A
Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.
Which of the following would be the BEST resolution to Anns issue?
A. Restart the tablet.
B. Disable and then reenable Bluetooth.
C. Calibrate the touchscreen sensor.
D. Disconnect and then reconnect the stylus.
Correct Answer: D
A technician is working on a virtual server migration project. The technician has already completed the SOW; however, the servers will not work without a critical network configuration that was missed in the original SOW. The technician needs to make the adjustments quickly.
Which of the following best practice processes should the technician perform NEXT?
A. Obtain end-user acceptance for the proposed changes and submit a change plan for additional work.
B. Submit the changes to the change board for approval.
C. Notify the change team of the changes needed and perform the changes.
D. Escalate to stakeholders and obtain override approval for out-of-scope changes.
E. Document the changes and perform the work.
Correct Answer: E
Joe, an end user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password.
Which of the following Control Panel utilities can Joe use to help with this situation?
A. Credential Manager
B. Network and Sharing Center
C. Security and Maintenance
D. Troubleshooting
Correct Answer: A
Ann, an external user, has received several calls from a company asking why she has been sending the company communications with internal users names in the from field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware.
Which of the following should the technician check NEXT?
A. Hijacked email
B. DNS entries
C. Hosts file
D. POP3 errors
Correct Answer: A
A technician is cleaning up a warehouse and has several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques.
Which of the following should the technician do NEXT to proceed with disposal of the batteries?
A. Place securely in trash receptacles.
B. Refer to the manufacturers specific usage.
C. Review the material safety data sheet.
D. Conduct an Internet search of disposal techniques.
Correct Answer: B
Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single users computer.
Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?
A. Educate the end user on safe browsing and email habits.
B. Scan and remove the malware from the infected system.
C. Create a system restore point and reboot the system.
D. Schedule antivirus scans and perform Windows updates.
Correct Answer: B
A users computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic.
Which of the following is MOST likely causing the high resource usage?
A. A keylogger is running
B. The computer is part of a botnet
C. The computer is receiving a DDoS attack
D. A software firewall is blocking traffic
Correct Answer: B