Questions Flashcards
An administrator is concerned about users accessing network shares outside of their job role.
Which of the following would BEST prevent this?
Set up shares with permissions based upon group membership.
After accidentally removing a hard drive from a server with three drives in a RAID 5 configuration, a technician notices the server locks up and shuts down. Which of the following can the technician do to quickly fix the problem?
Reinsert the drive and boot.
After being relocated to an enclosed position under a desk, a computer experiences intermittent shutdowns. Which of the following conditions is MOST likely the cause?
Overheating
After installing a new printer the organization determines that there are problems printing images and very large files. Which of the following will MOST likely resolve the issue?
Install additional memory to the printer
After installing a single new RIMM memory module the system fails to start properly or recognize the new memory. Which of the following is MOST likely the problem?
RIMM modules must be installed in pairs
After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?
Run the malware removal program in Windows Safe Mode
A /all switch is MOST likely to be used with which of the following commands?
IPCONFIG
Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a technician recommend? (Select TWO).
Backup all data on the drive
Purchase a new hard drive
Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayeD. “Access Denied. Please Enter Encryption Password.” Which of the following is the reason that this error is displayed?
BitLocker is being used
Ann, a user, has brought her laptop in for service. She reports that her battery is at 100%, but whenever it is unplugged it immediately shuts down. Which of the following should the technician do?
Replace the battery
Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST?
Set the application to run in XP compatibility mode
Ann reports that printouts from the department laser printer have become faded. She has already replaced the toner cartridge. Which of the following is the MOST likely component causing the faded printing?
Transfer roller
An attack that creates a website that looks like another website, with the purpose of learning someone’s account information is called which of the following?
Phishing
A client calls after connecting the keyboard and mouse to a new computer. The client indicates that neither the keyboard nor the mouse works. The technician has determined these devices are connected through the PS/2 ports. Which of the following recommendations is BEST?
Make sure the PS/2 plugs and ports are color matched.
A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?
Low level 7-pass random wipe
A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?
Regular user education
A company wants to prevent non-authorized users from entering into a secure building. Which of the following will BEST mitigate this activity?
Install mantraps
A corporate end user reports that random keys on their laptop are sticking. After taking the laptop in for repair a technician discovers that soda has been spilled inside the keyboard, possibly reaching other components inside the laptop. Which of the following should the technician do?
Replace the keyboard and clean the interior of the laptop if necessary
A critical server was replaced by the IT staff the previous night. The following morning, some users are reporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shut down their workstations the previous day are able to connect to the Internet. A technician looks at the following report from a workstation with no Internet connectivity:
IP Address: 192.168.1.101
Netmask: 255.255.255.0
DHCP Server:192.168.1.1
DNS Server:192.168.1.2
Default Gateway:192.168.1.1
Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?
The DHCP server is misconfigured.
A customer calls an IT consultant to explain an issue they are having with their Windows 7 Professional PC. Windows Update attempts to install patches upon each startup but fails on the same single update. The customer has attempted to re-run Windows Update from Control Panel but the issue remains. Which of the following courses of action would BEST resolve the problem?
Clearing the Windows Update download cache entirely
A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system?
Internet Options
The customer reports their PC freezes up every day around the same time. Which of the following utilities would be BEST to check for any error codes?
Event Viewer
A customer states that their laptop has stability issues after a recent memory upgrade. Which of the following is the MOST likely cause?
The memory is not properly seated
An employee at a company lost their mobile device that contains proprietary information. Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?
Remote wipe
An end user reports that they are unable to access any websites or network resources by the fully qualified domain name (FQDN); however, the technician is able to access these resources by IP address. Which of the following is the MOST likely cause for this problem?
The customer’s DSN server is unavailable.
For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?
Annual cyber security education
If a customer wants to create a multi-boot PC with different editions of Windows, which of the following is MOST important to consider?
Using multiple partitions
In order to prevent other users from editing files in `C:\ Files’, which of the following steps should be taken?
Set NTFS permissions to read only
In which of the following locations is the Windows Vista local user settings found?
%userprofile%\AppData\Local
In which of the following locations would a technician go to show file extensions?
Folder Options
Joe, a technician, receives an error message on his tower PC just after POST which reads:
“WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics.”
Which of the following is generating this error message?
S.M.A.R.T.
Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?
NET
Laptops and tablets have which of the following in common?
Solid state drives
A large magnet is placed too close to a CRT monitor. Which of the following will MOST likely occur?
Distorted image
A local administrator would like to determine why a laptop is taking so long to boot into the operating system. Which of the following tabs in MSCONFIG would the administrator access to BEST determine this?
Startup
An office of 25 computers is interested in employing a file server, network shares, and print server functionality. Which of the following network setups would be BEST suited for this situation?
Domain
On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?
Proxy Settings
A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?
Low level format
A PC is powering on but the only activity a technician can see is spinning fans. Which of the following components would MOST likely be at fault for such a condition? (Select TWO).
CPU
Memory
A PC uses RAID 1. Ann, a technician, has read in the event log that the drive “SATA 1” is no longer in sync with drive “SATA 0”. Which of the following steps should she try FIRST to repair this PC to optimal running conditions?
Remove SATA 1 from the RAID group then try to re-add it
A printer is suddenly not printing using Windows XP. Which of the following is the BEST procedure to get the printer restarted?
Examine the print queue, stop and then restart the spooler service.
Privacy filters applied to users computer screens are used to combat which of the following security risks?
Shoulder surfing
Which of the following commands, in Windows 7, could a technician use to schedule a disk integrity scan upon next boot?
CHKDSK
Which of the following tabs under MSCONFIG would allow a technician to configure all of the applications that launch at boot?
Startup
A technician believes a machine loaded with Windows XP Professional has issues with file integrity of the core OS components. Which of the following commands could be used to both check and replace damaged files?
SFC /SCANNOW
A technician is tasked with building three systems that are capable of utilizing the new Windows HomeGroup functionality. Which of the following versions of Windows would need to be used?
Windows 7 only
Which of the following security threats does NOT use software to extract sensitive information or credentials?
Shoulder surfing
A user is reporting that their screen is flickering at a rapid rate. Which of the following Control Panel paths should a technician use in order to remedy this issue?
Display -> Settings -> Advanced -> Adapter -> Refresh
A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off the screen or go into standby before their presentation is complete. Which of the following Control Panel paths should the technician use in order to prevent this from occurring?
Power Options -> Power Schemes
Which of the following data transfers will retain the current NTFS permissions of a file?
Moving the file to a different location on the same volume
A user’s computer keeps producing a “low virtual memory” alert and the speed of the system degrades afterwards. Which of the following Control Panel locations can provide information to review and correct this issue?
System > Advanced
A user states their workstation will not reach the login screen. Which of the following commands can be used to write a new partition boot sector to the system partition in the Recovery Console?
FIXBOOT
Which of the following features helps to prevent shoulder surfing?
Privacy screen
A user wants to change the functionality that occurs when the laptop lid is closed. Which of the following Control Panel options is the MOST direct way to adjust this?
Power Options
Which of the following Control Panel items will allow for easy streaming of pictures, music, and videos to other Windows 7 PCs?
HomeGroup
The folder “Documents” is shared. The user can create and delete documents when on the local PC, but can only read documents when accessing them remotely. Which of the following should be adjusted?
Share Permissions
Which of the following security controls would be an example of the least privilege principle on a
home PC?
Create a standard user account for kids.
A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?
Lock the workstation
A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the CRT but not the LCD. Which of the following controls should be used in troubleshooting?
Degauss
A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?
Select load driver
Which of the following accounts is MOST restrictive?
Guest
A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error is received that the application cannot be installed because the OS is not supported. Which of the following should the technician do FIRST to try to get the application installed in Windows 7?
Install the application with compatibility mode
A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST?
Restart the smartphone
A technician needs to format a file system to be compatible with the WIDEST range of operating systems. Which of the following file systems should be used?
FAT32
For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?
Proper SSID
A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?
The parent folder has explicit Deny rights set for this user.
A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?
Mantraps
A consultant is looking to consolidate six company servers onto one physical system. Which of the following requirements is MOST important on the new setup to ensure stable functionality of the virtual environment?
Server hardware resources
Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?
Least privilege
A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss of video during operation. Which of the following are MOST likely causes of this problem? (Select TWO).
Integrated system video chip is failing and/or near death.
Incompatible or untested video drivers have been installed.
A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company’s content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?
Anti-malware software
After being infected with a virus, a user’s computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user’s backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?
Factory restore CD
A technician installed a second hard drive in a computer. Upon restart, a message appears stating. “primary drive 0 not found. Press F1 to continue.” Which of the following should the technician check FIRST?
Proper drive installation (e.g. cables/jumpers)
The shared folder named C$ is an example of which of the following?
Administrative share
Which of the following is BEST used to prevent other people from viewing a user’s computer screen?
Privacy filter
A pest exterminator tries to gain access to a company’s computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
Social engineering
Which of the following can be used as an appropriate boot device?
USB drive
A user tries to connect to the Internet using a dial-up modem and receives a “No dial tone detected” message. Which of the following is the FIRST thing the technician should check to troubleshoot the issue?
Check if the cable is connected on the modem’s line RJ-11 port.
Which of the following software types would need to be installed on a mobile device to help prevent data from being viewed if the device is lost?
Remote wipe
Which of the following is the BEST tool to verify the cable is plugged into the correct port on the patch panel?
Toner probe