Deck #009 Flashcards

1
Q

A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?

A. Component Services
B. System Configuration
C. Security Policy
D. Local Users and Groups

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the users BEST option given the situation?

A. Install to a network drive
B. Install to a USB drive
C. Install to a DVD-RW
D. Install to a secondary internal HDD

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is called to troubleshoot a users Windows workstation that fails to boot. The user reports that, after updating the workstations graphics driver to a beta version, the machine gives a Stop error on every boot. Which of the following should the technician complete to resolve the issue?

A. Boot the workstation in safe mode and disable the graphics driver system tray menu
B. Boot the workstation in safe mode with networking and install the latest stable graphics driver
C. Boot the workstation in safe mode and disable Windows driver signing requirements
D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?

A. Check for and apply software updates
B. Perform repair installation on the application
C. Add the user to the local administrators group
D. Rebuild the users mail profile

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)

A. Firewall
B. Antivirus
C. Email filtering
D. ACLs
E. VPN
A

Correct Answer: AE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue?

A. Zero-day malware
B. Safari code injection
C. OS corruption
D. Overheating
E. Time sync failure
A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The IT department has installed new software in the folder C:Program FilesBusiness Application. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:
Cannot save file C: Program FilesBusiness Applicationfile1.wrk Access is denied.
Which of the following would be the MOST secure solution to this error?

A. Add Ann to the local Power Users group
B. Set the software to save to the %APPDATA% folder
C. Add Ann to the local administrator group
D. Give Ann write access to C:Program Files
E. Give Ann permission to elevate her permissions through a UAC prompt

A

Correct Answer: E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is the memory limitation of a 32-bit OS?

A. 16MB
B. 2048MB
C. 4GB
D. 1024GB
E. 2TB
F. 8TB
A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user has reported that a computer is running extremely slow when opening applications. A technician checks the computer and needs to verify memory utilization. Which of the following tools should the technician use to begin troubleshooting the issue?

A. Task Scheduler
B. Device Manager
C. Drive Status
D. Performance

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician wants to deploy a solution to manage a computer remotely. The technician is not allowed to modify any network configuration and is not able to forward any ports on the router to internal devices. Which of the following remote access technologies would be BEST suited for this situation?

A. Remote desktop protocol
B. Telnet client
C. Virtual network computer
D. Third-party tools
E. Secure shell
A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A customers computer is powered on and working, but the customer is unable to get to any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?

A. Ping
B. hwconfig
C. Nbtstat
D. Nslookup

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer. Which of the following connection protocols should the technician use?

A. Telnet
B. SSH
C. SMB
D. HTTP
E. SFTP
A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO users request? (Select TWO).

A. MAC filtering
B. Default SSID
C. Radio power levels
D. Content filtering
E. Physical security
A

Correct Answer: DE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following BEST describes the Guest account on a Windows system?

A. This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system.
B. This account is designed to provide basic permission for completing common daily tasks. Users of this account are restricted from performing things like installing new software.
C. This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones.
D. This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions.

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO).

A. Close applications when tasks are completed.
B. Increase the time to dim the screen automatically.
C. Increase the frequency for syncing corporate email.
D. Set the smartphone display to maximum brightness.
E. Connect to the office WiFi network automatically.
F. Disable 802.11ac and use mobile data exclusively.

A

Correct Answer: AE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.
Which of the following should the technician attempt NEXT?

A. Reboot into safe mode and roll back the updates
B. Repair the Windows Registry
C. Configure boot options in the BIOS
D. Disable Windows services and applications

A

Correct Answer: A

17
Q

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?

A. Use an antivirus product capable of performing heuristic analysis
B. Use a host-based intrusion detection system on each computer
C. Disallow the password caching of accounts in the administrators group
D. Install a UTM in between PC endpoints to monitor for suspicious traffic
E. Log all failed login attempts to the PCs and report them to a central server

A

Correct Answer: A

18
Q

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.

Which of the following BEST enforces this policy?

A. Delete the user accounts
B. Disable the user accounts
C. Restrict the user accounts
D. Reset the user accounts

A

Correct Answer: B

19
Q

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

A. Internet Options -> Advanced
B. Internet Options -> Connections
C. Internet Options -> Security
D. Internet Options -> Content
E. Internet Options -> Privacy
A

Correct Answer: B

20
Q

A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?

A. Politely ask the user to call back
B. Ask another technician to take the call
C. Troubleshoot the issue for the user
D. Input the issue as a ticket and escalate to Tier 2
E. Put the user on hold and troubleshoot after the scheduled break

A

Correct Answer: B

21
Q

A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

A. Uninstall the camera application
B. Check the application permissions
C. Reset the phone to factory settings
D. Update all of the applications on the phone
E. Run any pending OS updates
A

Correct Answer: B

22
Q

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.)

A. Administrative share permissions
B. Mapped drives
C. Group Policy hours restriction
D. Denied write/delete permissions
E. Disabled proxy settings
A

Correct Answer: BD

23
Q

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

A. Default SSID
B. MAC filtering
C. Power levels
D. Content filtering
E. Firewall
A

Correct Answer: C

24
Q

Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed?

A. Frequently restore the servers from backup files and test them
B. Configure the backups to restore to virtual machines for quick recovery
C. Set up scripts that automatically rerun failed backup jobs
D. Set up alerts to let administrators know when backups fail
E. Store copies of the backups off-side in a secure datacenter

A

Correct Answer: D

25
Q

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

A. Activate real-time protection on both antivirus software programs
B. Uninstall one antivirus software program and install a different one
C. Run OS updates
D. Enable the quarantine feature on both antivirus software programs
E. Remove the user-installed antivirus software

A

Correct Answer: E