Deck #011 Flashcards

1
Q

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the
following is the FIRST option to check?

A. Visit the Microsoft Update website to see if there is an issue with a specific update
B. Look up the error number associated with the failed update
C. Look at the system Event Viewer to find more information on the failure
D. Download the failed update to install manually

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

A. System
B. Display
C. Folder Options
D. Indexing Options

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician has identified malware on a users system. Which of the following should the technician do NEXT according to malware removal best practices?

A. Enable System Restore and create a restore point so no data is lost
B. Educate the user about how to avoid malware in the future
C. Update the antivirus software and run a full system scan
D. Move the infected system to a lab with no network connectivity

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A users Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%,
and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?

A. Task Manager
B. MSTSC
C. MSConfig
D. PerfMon

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?

A. Uninterruptible power supply
B. Surge protector
C. Power strip
D. Power distribution uni

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following installation types would require the use of an answer file to install the OS?

A. Unattended
B. Clean
C. Repair
D. Upgrade

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A MAC users operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

A. Time Machine
B. Snapshot
C. System Restore
D. Boot Camp

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible
infection?

A. Create a policy to remove Internet access from the server during off hours
B. Set the local antivirus software on the server to update and scan daily
C. Ensure the server is patched with the latest security updates
D. Educate the manager on safe Internet browsing practices

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A manager with a restricted user account receives the following error message:
Windows Update cannot currently check for updates because the service is not running.
The manager contacts the help desk to report the error. A technician remotely connects to the users computer and identifies the problem. Which of the following should the technician do NEXT?

A. Reboot the computer
B. Restart the network services
C. Roll back the device drivers
D. Rebuild the Windows profiles

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error:
Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.)

A. Administrative share permissions
B. Mapped drives
C. Group Policy hours restriction
D. Denied write/delete permissions
E. Disabled proxy settings
A

Correct Answer: BD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

With which of the following types is a man-in-the-middle attack associated?

A. Brute force
B. Spoofing
C. DDoS
D. Zero-day

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

A. Phishing
B. Spear phishing
C. Dumpster diving
D. Impersonation

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages load slowly or not at all, CPU performance is normal, and the local router can successfully
ping.
The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem?

A. Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS
B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode
D. Send a test email, open a command prompt to check the file system, and empty the browser cache

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

A. Untrusted software
B. Outdated antivirus
C. MDM policies
D. Inactive VPN

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?

A. Process diagram
B. Physical network diagram
C. Fiber backbone diagram
D. Logical topology diagram

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a
policy is created to deny access to removable hard drives only.
When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

A. grupdate
B. diskpart
C. gpresult
D. net use

A

Correct Answer: A

17
Q

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned
and cleaned immediately.
With which of the following types of infections are the PCs MOST likely infected? (Select two.)

A. Spyware
B. Zombies
C. Virus
D. Ransomware
E. Worm
F. Botnet
A

Correct Answer: BE

18
Q

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email
password, but after the reset, the new credentials still do not work in the third-party email client.
Which of the following settings or features is responsible for the problems Ann is experiencing?

A. Full device encryption
B. Account lock
C. Multifactor authentication
D. Strong password requirements

A

Correct Answer: C

19
Q

oe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.
Which of the following should the technician have covered previously as part of the original repair?

A. End-user education
B. Pre-installation environment cleaning
C. Disabling of System Restore
D. Infected system quarantine

A

Correct Answer: A

20
Q

In which of the following file extension types would a user expect to see the command. net use T:\serverfiles?

A. .bat
B. .vbs
C. .js
D. .py

A

Correct Answer: A

21
Q

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.
Which of the following should the technician replace to prevent these issues in the future?

A. System memory
B. Surge protector
C. Hard drives
D. Battery backup

A

Correct Answer: D

22
Q

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

A. Put on an ESD strap.
B. Place components on an ESD mat
C. Disconnect the power before servicing the PC
D. Place the PC on a grounded work bench

A

Correct Answer: C

23
Q

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized. Which of the following
messages will be displayed?

A. NTLDR not found
B. No boot device available
C. Operating system not found
D. BIOS ROM checksum error

A

Correct Answer: B

24
Q

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as ConnectMe and appears as unsecure. Which of the
following should the help desk perform to fix the issue?

A. Remote into Anns system and restart the wireless adapter
B. Ask Ann to open a browser and watch for a redirect page
C. Advice Ann to pug an Ethernet cable into her laptop
D. Direct Ann to run an antivirus program on her laptop

A

Correct Answer: B

25
Q

A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project
as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage.
Which of the following would the project team MOST likely add to the SOW?

A. Risk analysis
B. Plan to change
C. Backout plan
D. Change board approvals

A

Correct Answer: C