Deck #014 Flashcards

1
Q

A users smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?

A. Reset the devices network settings
B. Check the data usage statistics on the device
C. Verify the SSID with which the device is associated
D. Run any pending application or OS updates

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A companys security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run
on the users workstation?

A. chkdsk
B. netstat
C. gpupdate
D. diskpart

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A users computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department
perform NEXT?

A. Preserve data integrity
B. Identify violations of acceptable use
C. Collect evidence of illegal activity
D. Report through proper channels

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following would a technician use to store memory chips from a laptop safely after an upgrade?

A. Mylar bags
B. Cardboard boxes
C. Antistatic containers
D. Paper envelopes

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email
originated from the corporate email server.
Which of the following is the FIRST step the technician should take to correct this issue?

A. See if Joes email address has been blacklisted
B. Change the password on Joes email account
C. Update the antivirus and perform a full scan on the PC
D. Isolate Joes computer from the network

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST?

A. Check to ensure the printer selected is the default printer
B. Check the status of the print server queue
C. Cancel all documents and print them again
D. Check that the printer is not offline print mode

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the companys AUP. Which of the following would be the NEXT appropriate act?

A. Promptly notify the administrators immediate supervisor
B. Rename the folder on the server, and notify the information security officer
C. Move the folder to another location on the server, and notify the local authorities
D. Ask the owner to move the files from the server to a local computer

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?

A. Degauss
B. Drive wipe
C. Standard format
D. Low-level format

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)

A. Access control lists
B. Multifactor authentication
C. Organizational unit
D. Trusted software sources
E. Data loss prevention
F. Pre-shared key
A

Correct Answer: BD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?

A. RDP
B. SSH
C. TFTP
D. HTTP

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter J assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?

A. GPT
B. Dynamic
C. Basic
D. Extended

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Users notify the help desk of an email that was just received. The email came from the help desks email address and asked the users to click on an embedded link. This email is BEST described as:

A. phishing.
B. zombie.
C. whaling.
D. spoofing.

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:
There are 1033 infected files on this computer. Click here to disinfect.
The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

A. Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan.
B. Validate that the alerts are false positives, and disable security software on the workstation to prevent further false notifications.
C. Back up the users files. Restore the system to the original system image designated by corporate IT policies. Restore the users files.
D. Request a content filter exception to allow access to the link from the notification. Once available, follow the instructions on the linked site.

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A users corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the
missing folders issue?

A. The Internet security options have changed
B. The operating system updates have changed
C. The network directory permissions have changed
D. The user account permissions have changed

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware?

A. Backout plan
B. Contingency plan
C. Alternative plan
D. Backup plan

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system
purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?

A. Create a risk analysis report for review
B. Submit a change order for approval
C. Insist the worker accepts the standard desktop
D. Document the request and place the order

A

Correct Answer: B

17
Q

Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?

A. Unattended installation
B. Remote installation
C. Repair installation
D. Image deployment installation

A

Correct Answer: D

18
Q

A new company policy states that all end-user access to network resources will be controlled based on the users roles and responsibilities within the organization. Which of the following security concepts has the company just enabled?

A. Certificates
B. Least privilege
C. Directory permissions
D. Blacklists

A

Correct Answer: B

19
Q

A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST?

A. Disconnect the PC from the network
B. Perform an antivirus scan
C. Run a backup and restore
D. Educate the end user

A

Correct Answer: A

20
Q

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A
smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?

A. Check the contents of the hosts file
B. Do a System Restore to a date before the infection
C. Rerun the antivirus scan with higher sensitivity
D. Rebuild the OS on the machine

A

Correct Answer: A

21
Q

A user calls a technician to report issues when logging in to a vendors website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the users office. The user also informs the technician of
strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Choose two.)

A. System files have been deleted
B. Proxy settings are configured improperly
C. The OS has been updated recently
D. There are disabled services on the vendor website
E. Program file permissions have changed recently
F. There is a rogue anti-malware program

A

Correct Answer: BF

22
Q

Which of the following BEST describes the purpose of an ESD mat?

A. Protects against accidental static discharge
B. Protects against dust/dirt contamination
C. Protects against accidental scratches
D. Protects against accidental water damage

A

Correct Answer: A

23
Q

Which of the following is a reason to use WEP over WPA?

A. Device compatibility
B. Increased security
C. TACACS
D. Multifactor authentication

A

Correct Answer: B

24
Q

When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue
persists. Which of the following troubleshooting steps should the technician complete NEXT?

A. Change the browsers home page
B. Check the Windows host file
C. Update the default web browser
D. Restore Windows to a previous date

A

Correct Answer: B

25
Q

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?

A. BranchCache
B. Swap partition
C. Domain access
D. Proxy server

A

Correct Answer: A