Deck #013 Flashcards
A technician is installing the latest OS on a users system. The user wants all of the settings and file to remain intact during the installation.
Which of the following upgrade methods should the technician use?
A. network installation
B. clean install
C. in-place upgrade
D. image deployment
Correct Answer: C
A team needs to deploy a temporary server room at a site to provide support during construction.
Which of the following should they use at this site while setting up the server room?
A. Air filters
B. Privacy screens
C. Vacuums
D. ESD mats
Correct Answer: A
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring.
Which of the following would BEST accomplish this goal?
A. Use an antivirus product capable of performing heuristic analysis
B. Use a host-based intrusion detection system on each computer
C. Disallow the password caching of accounts in the administrators group
D. Install a UTM in between PC endpoints to monitor for suspicious traffic
E. Log all failed login attempts to the PCs and report them to a central server
Correct Answer: A
Which of the following technologies is used by malicious employees to obtain user passwords?
A. Main-in-the-middle
B. Phishing
C. Tailgating
D. Shoulder surfing
Correct Answer: D
A technician is recycling PCs to be reused by a middle school.
Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?
A. Standard formatting
B. HD drilling
C. Low-level formatting
D. HD partitioning
Correct Answer: C
A user reports that when opening a web browser, the initial page loads to a search engine the user does not recognize. When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups. Which of the following should a
technician do to resolve these issues? (Choose two.)
A. Reset the users browser to default settings
B. Delete the users cached images, temporary files, and cookies
C. Reboot the users computer and install a secondary antivirus
D. Convince the user to use a different web browser that is currently unaffected
E. Download the update to the users web browser of choice
F. Remove any unapproved applications from the users startup items
Correct Answer: AF
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on
the computer?
A. Unattended installation
B. Refresh upgrade
C. Clean installation
D. In-place upgrade
Correct Answer: B
Which of the following is the MOST secure wireless security protocol?
A. AES
B. WPA
C. WPA2
D. WEP
Correct Answer: A
Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running
extremely slow. Which of the following is the MOST likely cause of this issue?
A. Files disappearing
B. File permission changes
C. Application crash
D. Too many startup items
Correct Answer: D
Corporate management is concerned about the security of the companys mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following
would provide the BEST level of protection in this scenario? (Choose two.)
A. Use full device encryption
B. Enable a pattern lock
C. Implement remote wipe features
D. Use device lockout policies
E. Require complex administrator passwords
F. Disable unknown application installations
Correct Answer: AC
A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?
A. Provide documentation of the repair to the customer
B. Allow the customer to voice concerns and post the story to social media later
C. Inform the customer the job is done and return to the office
D. Defend each step and why it was necessary
Correct Answer: A
A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook?
A. Installation method
B. System requirements
C. OS compatibility
D. File permissions
Correct Answer: B
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.
Which of the following security measures should be used?
A. Biometric device B. Common access card C. Cable lock D. Privacy screen E. Mantrap
Correct Answer: D
A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10.
Which of the following installation methods would the technician MOST likely use to accomplish this quickly?
A. Unattended installation
B. Remote network installation
C. In-place upgrade
D. Clean installation
Correct Answer: A
A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task?
A. Drill
B. Hammer
C. Low-level format
D. Degaussing
Correct Answer: D