Deck #008 Flashcards

1
Q

What are the minimum system requirements for 32-bit (x86) version of Microsoft Windows 7? (Select 4 answers)

a) 800 MHz CPU
b) 1 GB of system RAM
c) 20 GB HDD with 15 GB of free hard disk space
d) DirectX 9 graphics device with WDDM 1.0 or higher driver
e) 2 GB of system RAM
f) 16 GB of free hard disk space
g) 1 GHz CPU

A

Answer: b, d, f, g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following answers describe the minimum system requirements for 64-bit (x64) version of Microsoft Windows 7? (Select 4 answers)

a) 800 MHz CPU
b) 16 GB of free hard disk space
c) 1 GHz CPU
d) 2 GB of system RAM
e) DirectX 9 graphics device with WDDM 1.0 or higher driver
f) 20 GB of free hard disk space
g) 1 GB of system RAM

A

Answer: c, d, e, f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical Address Extension (PAE) is a memory management feature that allows 32-bit CPUs to use more than 4 GB of physical memory.

a) True
b) False

A

Answer: True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician responds to a report that a user’s desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue?

A. Roll back the OS upgrade. Continue using the older version of Windows
B. Reset the PC to its factory conditions. Perform the OS upgrade again
C. Update the SATA controller driver from the manufacturers website
D. Perform a full backup and replace the hard drive

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Linux user reports that an application will not open and gives the error. Only one instance of the application may run at one time. A root administrator logs on to the device and opens a terminal. Which of the following pairs of tools will be needed to ensure no other instances of the software are currently running?

A. pad and chmod
B. sudo and vi
C. ls and chown
D. ps and kill
E. cp and rm
A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message.
The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:

A. keys
B. passwords
C. root CA
D. tokens

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.
Which of the following is MOST likely the cause?

A. Ransomware
B. Cryptomining
C. Rootkit
D. Keylogger

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following should be enacted to reduce a company’s liability and exposure to a potential lawsuit?

A. Acceptable use policy
B. Incident documentation policy
C. Password compliance policy
D. Change control policy

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.
Which of the following would be the BEST resolution to Anns issue?

A. Restart the tablet.
B. Disable and then reenable Bluetooth.
C. Calibrate the touchscreen sensor.
D. Disconnect and then reconnect the stylus.

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician is working on a virtual server migration project. The technician has already completed the SOW; however, the servers will not work without a critical network configuration that was missed in the original SOW. The technician needs to make the adjustments quickly.
Which of the following best practice processes should the technician perform NEXT?

A. Obtain end-user acceptance for the proposed changes and submit a change plan for additional work.
B. Submit the changes to the change board for approval.
C. Notify the change team of the changes needed and perform the changes.
D. Escalate to stakeholders and obtain override approval for out-of-scope changes.
E. Document the changes and perform the work.

A

Correct Answer: E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Joe, an end user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password.
Which of the following Control Panel utilities can Joe use to help with this situation?

A. Credential Manager
B. Network and Sharing Center
C. Security and Maintenance
D. Troubleshooting

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ann, an external user, has received several calls from a company asking why she has been sending the company communications with internal users names in the from field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware.
Which of the following should the technician check NEXT?

A. Hijacked email
B. DNS entries
C. Hosts file
D. POP3 errors

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A technician is cleaning up a warehouse and has several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques.
Which of the following should the technician do NEXT to proceed with disposal of the batteries?

A. Place securely in trash receptacles.
B. Refer to the manufacturers specific usage.
C. Review the material safety data sheet.
D. Conduct an Internet search of disposal techniques.

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single users computer.
Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?

A. Educate the end user on safe browsing and email habits.
B. Scan and remove the malware from the infected system.
C. Create a system restore point and reboot the system.
D. Schedule antivirus scans and perform Windows updates.

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A users computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic.
Which of the following is MOST likely causing the high resource usage?

A. A keylogger is running
B. The computer is part of a botnet
C. The computer is receiving a DDoS attack
D. A software firewall is blocking traffic

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?

A. Windows 7
B. Windows 8
C. Windows 8.1
D. Windows 10

A

Correct Answer: D

17
Q

Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?

A. Contact his supervisor so the supervisor can make scheduling changes.
B. Move the appointments to the next business day.
C. Reach out to a colleague to assist in completing the jobs.
D. Continue to work on the current call, and get to the other as soon as possible.

A

Correct Answer: A

18
Q

A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose two.)

A. Risk analysis
B. End-user acceptance
C. Backout plan
D. Plan for change
E. Business processes
F. Request for proposal
A

Correct Answer: CD

19
Q

A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?

A. Component Services
B. System Configuration
C. Security Policy
D. Local Users and Groups

A

Correct Answer: D

20
Q

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the users BEST option given the situation?

A. Install to a network drive
B. Install to a USB drive
C. Install to a DVD-RW
D. Install to a secondary internal HDD

A

Correct Answer: A

21
Q

A technician is called to troubleshoot a users Windows workstation that fails to boot. The user reports that, after updating the workstations graphics driver to a beta version, the machine gives a Stop error on every boot. Which of the following should the technician complete to resolve the issue?

A. Boot the workstation in safe mode and disable the graphics driver system tray menu
B. Boot the workstation in safe mode with networking and install the latest stable graphics driver
C. Boot the workstation in safe mode and disable Windows driver signing requirements
D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings

A

Correct Answer: A

22
Q

A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?

A. Check for and apply software updates
B. Perform repair installation on the application
C. Add the user to the local administrators group
D. Rebuild the users mail profile

A

Correct Answer: D

23
Q

Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)

A. Firewall
B. Antivirus
C. Email filtering
D. ACLs
E. VPN
A

Correct Answer: AE

24
Q

A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue?

A. Zero-day malware
B. Safari code injection
C. OS corruption
D. Overheating
E. Time sync failure
A

Correct Answer: D

25
Q

The IT department has installed new software in the folder C:Program FilesBusiness Application. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:
Cannot save file C: Program FilesBusiness Applicationfile1.wrk Access is denied.
Which of the following would be the MOST secure solution to this error?

A. Add Ann to the local Power Users group
B. Set the software to save to the %APPDATA% folder
C. Add Ann to the local administrator group
D. Give Ann write access to C:Program Files
E. Give Ann permission to elevate her permissions through a UAC prompt

A

Correct Answer: E