Deck #012 Flashcards

1
Q

A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the
issue?

A. Roll back updates
B. Disable the Windows Update service
C. Check for updates
D. Restore hidden updates

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An end users PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

A. Remove applications from startup
B. Defragment the hard drive
C. Install additional RAM
D. Install a faster hard drive
E. End the processes in Task Manager
F. Run the Disk Cleanup utility
A

Correct Answer: AB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.
Which of the following protocols and authentication methods should the technician implement? (Select two.)

A. WPA
B. WPA2
C. WEP
D. TKIP
E. RADIUS
F. Multifactor
G. TACACS
H. SSO
A

Correct Answer: BF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?

A. Image deployment
B. Multiboot configuration
C. In-place upgrade
D. System repair

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ann, an employee at a company, calls the help disk to report issues logging on to a vendors website. Joe, the technician, is able to log in successfully with his credentials before going to Anns office. However, when he attempts to log in from Anns office, Joe
experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification.
Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

A. Ask Ann for her credentials to verify and log on to the vendors website from Anns laptop
B. Verify Anns laptop has the correct browser settings
C. Check all browser cached files on Anns laptop and log on to another vendors website
D. Attempt to log on to another vendors website from Anns laptop
E. Ask Ann about the notification and review the installed programs
F. Reinstall the browser, reboot the laptop, and check the vendors website again

A

Correct Answer: CE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the maximum RAM limit of a Windows 32-bit version?

A. no limit
B. 4GB
C. 8GB
D. 32GB

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A users smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

A. Uninstall the camera application
B. Check the application permissions
C. Reset the phone to factory settings
D. Update all of the applications on the phone
E. Run any pending OS updates
A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Joe, an end user, has been prompted to provide his username and password to access the payroll system.
Which of the following authentication methods is being requested?

A. Single-factor
B. Multifactor
C. RADIUS
D. TACACS

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following devices provides protection against brownouts?

A. battery backup
B. surge suppressor
C. rack grounding
D. line conditioner

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices there is a ? in the radio icon in the toolbar. She has verified Bluetooth is active,
airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?

A. There is unauthenticated wireless connectivity
B. She has exceeded the data allowance
C. The phone is only 3G capable
D. It is an unrooted phone
E. The SIM card was not activated
F. A data plan was not purchased
A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

A. sudo
B. chmod
C. grep
D. pwd

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business
requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

A. Default SSID
B. MAC filtering
C. Power levels
D. Content filtering
E. Firewall
A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A users computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.
Which of the following should the technician attempt NEXT?

A. Reboot into safe mode and roll back the updates
B. Repair the Windows Registry
C. Configure boot options in the BIOS
D. Disable Windows services and applications

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Windows user is attempting to install a local printer and is unsuccessful on permissions.
Which of the following user types BEST describes this user?

A. Guest
B. Power User
C. Administrator
D. Standard User

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take?

A. Update antivirus definitions
B. Install anti-malware software
C. Enable the pop-up blocker
D. Reboot the PC

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?

A. SSD
B. Optical drive
C. Flash drive
D. PXE

A

Correct Answer: D

17
Q

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which
of the following is an important part of the change request process for which the administrator still must plan?

A. Inform management regarding the anticipated amount of downtime
B. Document a backout plan to roll back changes to the router
C. Configure a redundant data path to eliminate downtime
D. Make the downtime window larger than actually anticipated

A

Correct Answer: B

18
Q

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The companys security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops
until the next inventory.
Which of the following BEST enforces this policy?

A. Delete the user accounts
B. Disable the user accounts
C. Restrict the user accounts
D. Reset the user accounts

A

Correct Answer: B

19
Q

A wireless access point is going to be configured in a small office located in a crowded building.
Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

A. Reduce the transmit power
B. Reduce the channel availably
C. Disable the DHCP server
D. Enable QoS management
E. Disable the SSID broadcast
F. Implement WPA encryption
A

Correct Answer: AE

20
Q

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are:
Two 1GHz CPUs
2GB of memory
15GB hard drive
800×600 screen resolution
Which of the following should the technician do to resolve the problem?

A. Increase the number of CPUs
B. Increase the amount of memory
C. Increase the amount of hard drive space
D. Increase the screen resolution

A

Correct Answer: C

21
Q

A technician is working on a users workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet.
Which of the following types of infection does the user MOST likely have?

A. Rootkit
B. Keylogger
C. Trojan
D. Ransomware

A

Correct Answer: A

22
Q

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

A. Driver detection
B. Metro interface
C. Account control
D. PXE installation

A

Correct Answer: A

23
Q

Which of the following is considered government-regulated data?

A. PII
B. End-user license agreement
C. Digital Millennium Copyright Act
D. DRM

A

Correct Answer: A

24
Q

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the businesss concerns. Which of the following configuration settings should the technician
change to satisfy the requirements of the business? (Select two.)

A. Default SSID
B. MAC filtering
C. NAT
D. QoS
E. Signal strength
F. Encryption
A

Correct Answer: BE

25
Q

A security team is auditing a companys network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.
Which of the following actions should be taken to close the vulnerability? (Select two.)

A. Disable guest account
B. Remove admin permissions
C. Modify AutoRun settings
D. Change default credentials
E. Run OS security updates
F. Install a software firewall
A

Correct Answer: AC