Test 2 Flashcards
A technician receives a helpdesk ticket about an employee having a problem sending text messages with a company Android smartphone. It has been determined that it is not a carrier issue. Which of the following should the technician perform FIRST?
A. Verify data connectivity
B. Reformat the MicroSD card
C. Replace the SIM card
D. Perform a soft restore
A. Verify data connectivity
A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employ FIRST when responding to the problem?
A. Disable System Restore
B. Schedule scans and run updates in safe mode
C. Quarantine the system
D. Create a System Restore point
C. Quarantine the system
Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue. Which of the following methods can the technician use?
A. Initiate a factory reset
B. Perform a hard reset
C. Remove the MicroSD card
D. Rollback the OS update
B. Perform a hard reset
A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several apps recently. Which of the following might be the cause of the issue?
A. Slow data speeds
B. Defective SD card
C. Unauthorized root access
D. Signal drop or weak signal
C. Unauthorized root access
A customer has recently installed several applications on a Windows 7 workstation and is now experiencing slow system performance and spontaneous restarts. After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem while preventing data loss?
A. Factory restore
B. SecureBoot
C. msconfig
D. diskpart
C. msconfig
A user’s smartphone runs very slow at the end of the day. When the user restarts the phone in the morning, it runs at its normal speed. Which of the following should be done throughout the day to BEST resolve this issue?
A. Reset to the smartphone to factory default.
B. Uninstall any unused apps.
C. Close all running apps.
D. Charge the smartphone.
C. Close all running apps.
After installing a critical update from Windows Update, a user accidentally types an incorrect URL into the browser and malware is automatically installed. The malware disables the computer’s antivirus software and Internet connection. Which of the following would be the BEST tool to remove the malware without risking loss of the user’s data?
A. Run System Restore
B. Reinstall Windows with the Repair Option
C. Reinstall Windows on top of itself
D. Run System File Checker
A. Run System Restore
Joe, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently appears on the screen informing the user additional information is required to log in. Which of the following is causing this?
A. Unintended WiFi connections
B. Cellular data roaming notifications
C. Weak cellular signal
D. Unintended Bluetooth connections
A. Unintended WiFi connections
An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Other applications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about two years old. Which of the following would be the technician’s FIRST step in troubleshooting the problem?
A. Run defrag on the hard drive
B. Restore the CAD files from backup
C. Replace the hard drive
D. Remove and reinstall the CAD software
A. Run defrag on the hard drive
A Windows workstation is suspected of having malicious software that created an infected start-up item or service. Which of the following tools would a technician use to test this theory?
A. chkdsk
B. msconfig
C. dxdiag
D. ipconfig
B. msconfig
A user reports unexpected icons appearing on the desktop. The technician identifies that the symptoms point to a malware infection. Which of the following procedures would be performed NEXT?
A. Quarantine infected system B. Schedule scans and run updates C. Report the issue to the information security officer D. Disable System Restore (in Windows) E. Educate end user
A. Quarantine infected system
Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Joe is then required to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screen-lock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue?
A. Domain-level group policies
B. Antivirus domain-level policies
C. Corrupted registry settings
D. Incorrect local-level user policies
A. Domain-level group policies
A user updates the video driver on the computer and it requests a restart after installation. The computer never gets past the loading Windows page without rebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs?
A. Emergency Repair Disk
B. Restore from OEM image
C. System Recovery
D. Restore from backup
C. System Recovery
A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT?
A. Copy the DLL file from a working PC and use the regsvr32 command to load the file
B. Run the Windows Update utility to manually reinstall the DLL file
C. Run the defrag utility to correct any fragmentation that may have damaged the file
D. Research the DLL file to identify the application it corresponds to before continuing
D. Research the DLL file to identify the application it corresponds to before continuing
A user, Ann, receives a phone call from the company’s mail administrator who indicates her email account has been disabled due to high volumes of emails being sent in a very short period of time. Which of the following types of attack has the user experienced?
A. Virus infection
B. Man-in-the-middle attack
C. Phishing attack
D. Malware infection
A. Virus infection
A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. Which of the following is the BEST step the user can take to fix this problem?
A. Perform a force stop
B. Reset to factory default
C. Upgrade to a larger battery
D. Close running apps
B. Reset to factory default
A user reports browsing the Internet is slow and an icon with a picture of a person with a headset keeps asking them to “click here for help.” The user has clicked on the icon to try to resolve the slowness but all that happens is the computer redirects them to a website to purchase software. Which of the following should be performed FIRST to resolve the issue?
A. Create a restore point
B. Run O/S updates
C. Train the user of malicious software
D. Identify the type of malware
D. Identify the type of malware
A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT?
A. Reload the OS using FAT32 instead of NTFS.
B. Change the disk from basic to dynamic.
C. Run chkdsk with the /r switch and reboot the PC.
D. Open the defrag utility and run a drive analysis.
C. Run chkdsk with the /r switch and reboot the PC.
A technician has just fixed a user’s PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?
A. Educate the user regarding Internet browsing best practices
B. Update the anti-malware software on the user’s PC
C. Schedule scans and run updates
D. Enable system restore and create restore point
A. Educate the user regarding Internet browsing best practices
Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction. The WiFi icon is displaying that it has connectivity but she is still unable to browse. Which of the following could be the issue?
A. PRAM needs to be reset
B. iCloud is corrupted
C. The router needs to be rebooted
D. The upgrade needs to be uninstalled
A. PRAM needs to be reset
Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device. He now notices the battery is rapidly draining. Which of the following can Joe MOST likely do to resolve the issue without a loss of data?
A. Restart the mobile device.
B. Update the device’s firmware.
C. Uninstall the GPS-enabled app.
D. Readjust the location settings.
D. Readjust the location settings.
Joe, a user, has connected a tablet to his personal mobile hotspot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO).
A. Change the SSID to a different broadcast name
B. Add the intruding device to a blocked access list
C. Access the intruder’s device and shut it down
D. Shut down the device until the intruder is no longer in the area
E. Set up a WiFi analyzer to identify the intruding device
A. Change the SSID to a different broadcast name
B. Add the intruding device to a blocked access list
Ann, a customer, reports that when she occasionally works in the office basement, her smartphone battery drains faster than normal and she has poor cellular reception. Which of the following is the reason for the fast battery drain?
A. Unpaired Bluetooth
B. Weak signal
C. Defective SD card
D. Malware
B. Weak signal
A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take?
A. Identify the problem B. Document findings, actions and outcome C. Verify full system functionality D. Establish a theory of probable cause E. Test the theory to determine cause
E. Test the theory to determine cause
Which of the following is the BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment?
A. Commercial license
B. Enterprise license
C. Seat license
D. Open source license
B. Enterprise license
In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed FIRST?
A. Use safety goggles
B. Remove jewelry
C. Put on an ESD strap
D. Disconnect power
D. Disconnect power
Which of the following explains why it is important to secure Personally Identifiable Information (PII)?
A. So phishing attacks are not launched against employees of the organization.
B. So sensitive information, such as corporate passwords, is not stolen.
C. So man-in-the-middle attacks are not launched against the organization.
D. So sensitive information, such as social security numbers, is not stolen.
D. So sensitive information, such as social security numbers, is not stolen.
A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician?
A. Follow the customer’s prescribed course of action.
B. Convince the customer to take a better course of action to resolve the issue.
C. Explain why the customer’s prescribed course of action is incorrect.
D. Acknowledge the customer’s input, but follow another course of action.
D. Acknowledge the customer’s input, but follow another course of action.