Deck #015 Flashcards

1
Q

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hotspot and gets 200Kbps. Ann, Joes coworker with whom he
is travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15Mbps. The technician checks the hotspot settings on Joes phone and sees the following:
Which of the following is the MOST likely cause of the problem?

A. Joe should be using WEP security on his hotspot for faster throughput
B. Someone else is using Joes hotspot due to weak password
C. Joes hotspot gave him an invalid IP address
D. Joe is likely in a poor signal area and should try another area

A

Correct Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the My Documents folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?

A. Remove the registry entry and rename the local account folder
B. Delete or rename the local user folder
C. Run DISM and re-add the local power user account
D. Remove the user account in Credential Manager and restart the PC

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician accessed a network share from a computer joined to workgroup. The technician logged in as user1 and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the user1 account. Which of the following would allow the technician to log in using the administrator username?

A. Use the command: net use Z: \fileservershare
B. Go to the Sync Center and disable the offline files feature.
C. Delete the user account for the network share in Credential Manager.
D. Join the computer and file server to a domain and delegate administrator rights to user1.
E. Use the Advanced Sharing options in the Network and Sharing Center and enable turn on network discovery.

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?

A. Disable System Restore.
B. Create a restore point.
C. Apply system updates.
D. Restart into safe mode.

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?

A. Local Administrator
B. Standard User
C. Power User
D. Guest User

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users mobile devices? (Choose two.)

A. Full device encryption
B. Remote backup application
C. SSO authentication
D. Device profiles update
E. OS security updates
F. Biometric authentication
A

Correct Answer: AF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to test a theory. Which of the following should the technician use to accomplish this?

A. Devices and Printers
B. Sync Center
C. Device Manger
D. Power Options

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician logs on to a Linux computer and runs the following command:
ps -aux | grep vi

Which of the following MOST accurately describes the effect of the command?

A. It kills any running programs starting with the letters vi.
B. It opens a list of directories that start with the letters vi.
C. It creates a new file named grep in the current working directory.
D. If finds a list of processes running a text editor.

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A small office calls a technician to investigate some invalid certificate errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.)

A. Remove any proxy servers configured on the users browsers.
B. Assist the user with purchasing an SSL certificate and save the certificate to the desktop.
C. Disable the SPI firewall on the offices gateway and any other routers.
D. Instruct the user to ignore the certificate error since the user is connecting to a secure website.
E. Create an outbound rule in Windows Firewall named after the users homepage.
F. Run anti-malware scans and download the latest Windows updates.

A

Correct Answer: AF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error.
Which of the following tools should the technician use?

A. Performance Monitor
B. Component Services
C. Task Manager
D. Event Viewer

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation.
Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?

A. Acceptable use policy violations
B. Server configuration
C. Chain of custody
D. Data loss incidents

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician is repairing a computer. Which of the following should the technician do to protect the computer from accidental voltage spikes?

A. Practice electrical fire safety.
B. Clean tools properly before use.
C. Remove any jewelry.
D. Connect a proper ESD strap.

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly