General Knowledge II Flashcards

1
Q

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company wants to remove information from past users’ hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?

A

Use disk-wiping software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor’s website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

A

Uninstall the fradulent application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

A

Perform risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user’s PC is infected with ransomware. Which of the following should the technician do FIRST?

A

Quarantine the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

A

Remote Wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?

A

Run a full antivirus scan on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After clicking on a link in an email, a Chief Financial Officer (CFO) received the following error: “There is a problem with this website’s security certificate”
The CFO then reported the incident to a technician. The link is purportedly to the organization’s bank. Which of the following should the technician perform FIRST?

A

Update the browser’s CRLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?

A

Provide a sample to the antivirus vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the physical memory limit for all 32-bit (x86) editions of Windows 10?

A

4 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user’s smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user’s concern?

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

A

Disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user contacted the help desk to report pop-ups on a company workstation, indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Choose two.)

A

Scan computer with company antivirus software;

Perform a reset on the user’s web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

A

.app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician is investigating an employee’s smartphone that has the following symptoms:
✑ The device is hot, even when it is not in use.
✑ Applications crash, especially when others are launched.
✑ Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.
Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Choose two.)

A

Perform a factory reset;
Update the device’s operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

A

Check for any installed patches and roll them back one at a time until the issue is resolved.

17
Q

Which of the following could be used to implement secure physical access to a data center?

A

Badge reader

18
Q

The Chief Executive Officer at a bank recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bank’s risk? (Choose two.)

A

Enable multifactor authentication for each support account.

Enforce account lockouts after five bad password attempts.

19
Q

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

A

Resource Monitor

20
Q

Upon downloading a new ISO, an administrator is presented with the following string:
59d15a16ce90c8ee97fa7c211b7673a8
Which of the following BEST describes the purpose of this string?

A

Hash verification

21
Q

A user’s mobile phone has become sluggish. A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Choose two.)

A

Prevent a device root.

Prevent GPS Spoofing

22
Q

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

A

Resource Monitor

23
Q

A technician is unable to join a Windows 10 laptop to a domain. Which of the following is the MOST likely reason?

A

The laptop has Windows 10 Home installed.

24
Q

Which of the following OS types provides a lightweight option for workstations that need an easy-to-use, browser-based interface?

A

ChromeOS

25
Q

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain.
Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

A

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign-in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

26
Q

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software’s cloud server. Which of the following is MOST likely to be of concern to the IT manager?

A

Network utilization will be significantly increased due to the size of CAD files.

27
Q

A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?

A

Ease of Access

28
Q

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?

A

Implement single sign-on with biometrics.

29
Q

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

A

Anti-malware software

30
Q

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?

A

WPA2 with TKIP

31
Q

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

A

Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

32
Q

A call center technician receives a call from a user asking how to update Windows. Which of the following describes what the technician should do?

A

Advise the user to wait for an upcoming, automatic patch.

33
Q

When a user calls in to report an issue, a technician submits a ticket on the user’s behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

A

Provide the user with a unique ticket number that can be referenced on subsequent calls.

34
Q

Which of the following is the MOST important environmental concern inside a data center?

A

Humidity levels

35
Q

A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the log-in issue?

A

Expired certificate

36
Q

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A

NTFS

37
Q

Following the latest Windows update, PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

A

Default Apps