ExamTopics Practice Questions Flashcards
A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.
Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?
a) Reinstall the application
b) Roll back the application to the earlier version
c) Clear the application cache
d) Update the OS of the smartphones
d) Update the OS of the smartphones
A technician is working on a Windows 10 PC that is running slowly.
Which of the following commands should the technician use to correct this issue? (Choose two.)
a) dir
b) chkdsk
c) dism
d) ipconfig
e) format
f) diskpart
b) chkdsk
c) dism
b) chkdsk: This command is used to check and fix disk errors. Running chkdsk can help improve system performance if the system is running slowly due to disk errors or bad sectors.
c) dism: The DISM (Deployment Imaging Service and Management Tool) command can be used to repair and restore the health of the system image, which can help improve system performance if the issue is related to corrupted system files or settings.
*Why the other options are incorrect:
a) dir: This command is used to display the contents of a directory. It doesn’t help with performance issues.
d) ipconfig: This command displays network configuration details and can be useful for network troubleshooting, but it won’t fix performance issues related to a slow system.
e) format: This command is used to format a disk or drive, which would erase all data on the drive. It’s a drastic measure and not typically used to resolve performance issues unless you’re planning to reinstall Windows from scratch.
f) diskpart: This is a disk partitioning tool. While useful for disk management tasks (e.g., creating, deleting, or resizing partitions), it is not specifically used to address system performance issues.*
An administrator is setting up a Windows terminal server.
Which of the following settings should the administrator modify to increase server security? (Choose two.)
A. Change the default access port
B. Enforce password complexity
C. Put the terminal server into the router’s DMZ
D. Disable logon time restrictions
E. Block all unused ports on the LAN smart switch
F. Use the local client certificate for server authentication
A. Change the default access port
B. Enforce password complexity
*A. Change the default access port: By default, Terminal Services (RDP) uses port 3389. Changing this to a non-standard port can help reduce the chances of automated attacks that specifically target the default port. While this won’t completely secure the server, it adds an additional layer of obfuscation.
B. Enforce password complexity: Enforcing password complexity requirements (e.g., a mix of upper and lowercase letters, numbers, and special characters) is an important security measure. It ensures that users choose strong passwords, which can help protect against unauthorized access to the terminal server.
Why the other options are less relevant:
C. Put the terminal server into the router’s DMZ: Placing the terminal server in the DMZ may expose it to more risks, as the DMZ is often a less secure area meant for public-facing services. A better approach would be to secure the terminal server with proper firewall rules and VPN access, not to expose it more directly.
D. Disable logon time restrictions: While logon time restrictions may be useful for controlling access during certain times, disabling them is unlikely to improve security. In fact, enabling time-based restrictions could enhance security by limiting when users can log on.
E. Block all unused ports on the LAN smart switch: While blocking unused ports is generally good practice for securing the network, this measure is more related to physical network security. It’s useful in preventing unauthorized devices from connecting but does not directly improve the security of the terminal server itself.
F. Use the local client certificate for server authentication: This option refers to certificate-based authentication for securing communication between clients and the server. While using certificates can enhance security, it’s not directly about increasing server security in this case, as the main concern here seems to be securing the server’s access and user credentials.*
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices.
Which of the following will provide the ability to access these devices?
A. Telnet
B. SSH
C. RDP
D. VNC
B. SSH
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)
A. Guest network
B. TKIP
C. Default login
D. Outdated firmware
E. WPS
F. WEP
C. Default login
E. WPS
*key word: PIN for WPS)
Which of the following provide the BEST security for a server room? (Choose two.)
A. Badge reader
B. Bollard
C. Biometric lock
D. Cable lock
E. USB token
F. Privacy window shades
A. Badge reader
C. Biometric lock
*A. Badge reader: A badge reader provides physical security by requiring authorized personnel to swipe or scan a badge to gain access to the server room. This helps ensure that only authorized users can enter the space, offering a layer of access control.
C. Biometric lock: A biometric lock enhances security by using unique physical characteristics (like fingerprints or retina scans) to verify the identity of individuals. This provides a very high level of access control, as biometrics are difficult to replicate or bypass.
Why the other options are less effective for server room security:
B. Bollard: Bollards are typically used to prevent vehicle access or damage to buildings. While useful for protecting the exterior of a facility, they don’t directly enhance the security of the server room itself.
D. Cable lock: Cable locks are used to secure devices (like laptops or external hard drives) to desks or stationary objects. They are effective for device security, but do not provide meaningful protection for securing a server room or controlling access to it.
E. USB token: A USB token is typically used for authentication in remote systems, especially for logging into systems via two-factor authentication. While it’s a useful authentication tool, it doesn’t help with physical security of the server room itself.
F. Privacy window shades: Privacy window shades can prevent outsiders from seeing into the server room, but they don’t significantly contribute to access control or physical security. The server room should be secured through controlled access mechanisms, not just visual obfuscation.*
Which of the following threats uses personalized information in an attempt at obtaining information?
A. Whaling
B. Impersonation
C. Spoofing
D. Spear phishing
D. Spear phishing
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom.
Which of the following needs to be adjusted on the workstation to fix the issue?
A. Date and time
B. UEFI boot mode
C. Logon times
D. User access control
A. Date and time
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server.
Which of the following Control Panel utilities should the technician use to configure the setting?
A. Internet Options Advanced
B. Internet Options Connections
C. Internet Options Security
D. Internet Options Content
E. Internet Options Privacy
B. Internet Options Connections
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
A. 2GB
B. 4GB
C. 8GB
D. 16GB
B. 4GB
A technician is working at a help desk firm and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in.
Which of the following is the BEST choice for the technician to make?
A. Politely ask the user to call back
B. Ask another technician to take the call
C. Troubleshoot the issue for the user
D. Input the issue as a ticket and escalate to Tier 2
E. Put the user on hold and troubleshoot after the scheduled break
B. Ask another technician to take the call
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Choose two.)
A. UPS
B. Server rack
C. PoE phone
D. Desktop printer
E. Modem
F. Patch panel
A. UPS
B. Server rack
UPS and the server rack has multiple connected to it therefore needs to remain grounded due to high power usage
A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.
Which of the following is MOST likely causing this error?
A. The computer has GRUB Legacy installed
B. Windows Startup services are not running
C. An incompatible partition is marked as active
D. An unsupported version of Windows is installed
C. An incompatible partition is marked as active
A technician is installing a private PC in a public workspace.
Which of the following password practices should the technician implement on the PC to secure network access?
A. Remove the guest account from the administrators group
B. Disable single sign-on
C. Issue a default strong password for all users
D. Require authentication on wake-up
D. Require authentication on wake-up
A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail.
Which of the following is the FIRST option to check?
A. Visit the Microsoft Update website to see if there is an issue with a specific update
B. Look up the error number associated with the failed update
C. Look at the system Event Viewer to find more information on the failure
D. Download the failed update to install manually
B. Look up the error number associated with the failed update
If an automated system update fails to install, you should research the error number for the failed update to determine if the issue is a known error. Based on the error code, you can then determine the best method to overcome the issue. For example, a common cause of errors is inadequate space on the hard disk. If a technician needs to determine how to best solve this issue, researching the error code at Microsoft.com can help.
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory.
Which of the following Control Panel utilities should the technician use?
A. System
B. Display
C. Folder Options
D. Indexing Options
C. Folder Options
*The Folder Options utility in Control Panel allows you to modify the settings for file visibility and how files are displayed in Windows. In this case, the .dll file might be hidden due to system settings that are designed to protect critical system files. By using Folder Options, the technician can enable the option to show hidden files and protected operating system files, which might reveal the .dll file that is not appearing in the System32 directory.
Why the other options are incorrect:
A. System: The System utility in Control Panel is used to access system settings like the computer name, hardware configuration, and system protection options. It doesn’t deal with file visibility or accessing hidden files.
B. Display: The Display utility is used to configure screen resolution, appearance, and related settings. It does not affect file visibility.
D. Indexing Options: Indexing Options is used to configure and manage the index of files that Windows searches. It does not affect the visibility or location of system files like .dll files.*
A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%.
After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem.
Which of the following is a tool the technician can use to resolve the issue?
A. Task Manager
B. MSTSC
C. MSConfig
D. PerfMon
A. Task Manager
The Task Manager is an advanced tool in Windows that provides a number of tabs that allow a user to monitor the applications, processes, services, and CPU utilization on a computer. The Processes tab more than anything else, because it lets you quickly see how system resources are utilized, which can be very helpful when trying to troubleshoot applications or find out why the computer is suddenly performing slowly. The Task Manager can be used to identify and stop processes that use excessive system resources and to keep the computer operating at high speeds.
A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions.
Which of the following should a technician recommend?
A. Uninterruptible power supply
B. Surge protector
C. Power strip
D. Power distribution unit
A. Uninterruptible power supply (UPS)
Which of the following installation types would require the use of an answer file to install the OS?
A. Unattended
B. Clean
C. Repair
D. Upgrade
A. Unattended
A Mac user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC.
Which of the following built-in utilities should be used?
A. Time Machine
B. Snapshot
C. System Restore
D. Boot Camp
A. Time Machine
A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server.
Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?
A. Create a policy to remove Internet access from the server during off hours
B. Set the local antivirus software on the server to update and scan daily
C. Ensure the server is patched with the latest security updates
D. Educate the manager on safe Internet browsing practices
C. Ensure the server is patched with the latest security updates
To prevent infection, it is important that all servers and workstations remain patched and up to date on their security updates. After that, the next best thing would be to set up the anti-virus to automatically update itself daily and run a full scan nightly. Beyond that, educating your supervisor would be a good idea, as well.
With which of the following types is a man-in-the-middle attack associated?
A. Brute force
B. Spoofing
C. DDoS
D. Zero-day
B. Spoofing
A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically.
Which of the following steps should the technician take NEXT to resolve the problem?
A. Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS
B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode
D. Send a test email, open a command prompt to check the file system, and empty the browser cache
B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
*Why the other options are incorrect:
A. Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS: While running a repair on the OS might help in some situations, this approach seems too drastic for the problem at hand, and safe mode isn’t necessary unless the technician suspects a system-wide issue (such as a driver conflict or OS corruption). The problem appears more related to network connectivity and settings than to an OS-level issue.
C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode: TPM (Trusted Platform Module) and BIOS settings are unlikely to be the cause of the reported issues. System Restore might be an option, but it’s a bit too extreme for this type of problem, especially given that the issue seems more related to internet and email connectivity, which can be fixed through the software and configuration level.
D. Send a test email, open a command prompt to check the file system, and empty the browser cache: While sending a test email and emptying the browser cache could be helpful in diagnosing some of the issues, checking the file system (e.g., using commands like chkdsk) seems unnecessary in this scenario. The symptoms point more to network and software configuration problems, which makes Option B the most relevant choice.*
A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade.
Which of the following documents did the network administrator MOST likely give to the technician?
A. Process diagram
B. Physical network diagram
C. Fiber backbone diagram
D. Logical topology diagram
B. Physical network diagram
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.
When testing the policy, a removable drive is plugged in but can still be accessed.
Which of the following command-line tools should the technician use to apply the new policy?
A. gpupdate
B. diskpart
C. gpresult
D. net use
A. gpupdate
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.
Which of the following settings or features is responsible for the problems Ann is experiencing?
A. Full device encryption
B. Account lock
C. Multifactor authentication
D. Strong password requirements
C. Multifactor authentication
OBJ-2.8: If a user or system has configured their email accounts to require two-factor authentication (2FA) or multifactor authentication, then even if they enter their username and password correctly in the third-party email client they will receive the “Invalid credentials” error message. To overcome this, some email servers will allow the user to create an Application Specific Password to bypass the multifactor authentication requirement, or the user will have to use an email client that supports multifactor authentication.
In which of the following file extension types would a user expect to see the command. net use T:\\server\files
?
A. .bat
B. .vbs
C. .js
D. .py
A. .bat
.bat files are batch files, which are used to execute a series of commands in Windows Command Prompt (CMD). The command net use T:\server\files is a network command used to map a network drive (T:) to a shared folder on a server (\server\files). This type of command is commonly found in batch files (.bat), which can be executed in a Windows environment to automate processes such as network drive mappings.
A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.
Which of the following should the technician replace to prevent these issues in the future?
A. System memory
B. Surge protector
C. Hard drives
D. Battery backup
D. Battery backup
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?
A. Put on an ESD strap.
B. Place components on an ESD mat
C. Disconnect the power before servicing the PC
D. Place the PC on a grounded work bench
C. Disconnect the power before servicing the PC
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized.
Which of the following messages will be displayed?
A. NTLDR not found
B. No boot device available
C. Operating system not found
D. BIOS ROM checksum error
B. No boot device available
If the hard drive is not recognized, the system cannot find a device to boot from. This would typically result in a message like B. No boot device available.
Option C, “Operating system not found”, might be displayed if the hard drive was recognized but the operating system could not be loaded, which is not the case here. The other options, “NTLDR not found” and “BIOS ROM checksum error”, are related to other types of errors.
Not Option C because the hard drive is not recognized. If the the hard drive was recognized and it still doesn’t boot, then the answer would be C.