Test 3 Flashcards
Which of the following is the MAIN reason that corporate policies protect access to PII?
A. To protect proprietary company data
B. To reduce the likelihood of identity theft
C. To maintain the integrity of knowledge management systems
D. To limit access to those who “need to know”
B. To reduce the likelihood of identity theft
A technician performs an in-place upgrade from Windows 7 to 8.1. After the upgrade is complete, a user reports that a frequently used file will not open. Instead, the user is prompted to search the Windows Store for an appropriate program to open the file. Which of the following should the technician do FIRST?
A. Install the most recent Windows updates
B. Verify the USMT worked properly
C. Reconfigure the default program for the file type
D. Perform System Restore
E. Reinstall the program that is usually used to open the file
A. Install the most recent Windows updates
A technician is working on a computer when the PC suddenly experiences a blue screen and restarts before the technician can note the error message. The computer boots up normally, and the technician now wants to know which error message was displayed.
Which of the following should the technician use to help troubleshoot the issue?
A. sfc B. msconfig C. regedit32 D. eventvwr E. msinfo32
D. eventvwr
An administrator needs to create a new folder on a Windows PC. Which of the following commands should the administrator use?
A. cd B. md C. sc D. ftp E. mkdir
E. mkdir
A home user reports the PC is running slow, and pop-up advertisements are appearing on screen. The user can access the Internet and performs an antivirus scan. A technician is now troubleshooting the problem and cannot update the antivirus to the latest definitions or navigate to the vendor’s support website. Which of the following is the BEST next step to resolve this issue?
A. Uninstall the antivirus program and apply operating system patches
B. Utilize a different antivirus program and scan method
C. Format and reinstall
D. Reinstall the antivirus program from a shared executable
B. Utilize a different antivirus program and scan method
Which of the following are examples of possession authentication? (Choose three.)
A. Key fob B. RFID badge C. Passphrase D. PIN E. Passwords F. Smartphone G. Fingerprint reader
A. Key fob
B. RFID badge
F. Smartphone
A technician installs Windows 7 on a 4TB hard drive. Which of the following should the technician choose when initializing the drive for the machine to access all the disk space?
A. GPT
B. FAT32
C. MBR
D. exFAT
B. FAT32
An employee installed a new application on a shared Windows 10 PC. The next day, it becomes the employee who installed the application is the only one who has access to the application. Which of the following types of user accounts does the employee MOST likely have?
A. Administrator B. Guest C. Super user D. Standard user E. Limited user
A. Administrator
A technician has been tasked with remotely imaging a computer tab. The imaging process is failing because there is no response from the computers over the network. Which of the following should the technician perform to resolve the issue? (Choose two.)
A. Configure remote desktop connection B. Configure BIOS to enable Wake-on-LAN C. Configure BIOS to enable SSH D. Configure automatic updates E. Configure startup applications F. Configure BIOS to enable PXE boot
A. Configure remote desktop connection
B. Configure BIOS to enable Wake-on-LAN
A technician is attempting to troubleshoot a Linux home folder issue, but does not remember which directory is current. Which of the following tools should the technician use to find the current directory?
A. dir
B. sudo
C. cd
D. pwd
D. pwd
A technician needs to upgrade 20 PCs that have the same hardware specifications. The PCs must be configured with identical settings tailored for the network. Which of the following provides the BEST solution with the LEAST administrative effort?
A. PC backup and multiboot setup
B. PC backup and system image deployment
C. PC backup and OS upgrade
D. PC backup and clean install
B. PC backup and system image deployment
A client has requested a workspace environment configuration that will allow employees to work in a virtual space for specific projects, but when working on other projects, allow them to work locally. Which of the following is the BEST solution for this virtual configuration?
A. Multiheaded client
B. Thin client
C. Zero client
D. Thick client
A. Multiheaded client
A technician was told that 50 new computers were delivered. The company’s standard Windows image needs to be installed on all of them. Which of the following would be the MOST efficient way to get the image on all 50 computers?
A. Multiboot installation
B. Repair installation
C. Unattended installation
D. Clean installation
C. Unattended installation
A company wants to leverage a cloud infrastructure that allows it to keep confidential information away from other companies outside its industry while allowing data to be shared with other companies in the same field. Which of the following is the BEST option to accomplish this task?
A. Public
B. Hybrid
C. Community
D. Private
B. Hybrid
A domain administrator has applied a Group Policy that restricts the installation of USB devices. The technician has asked the domain administrator to exempt this policy for a computer that needs to have a USB digital camera installed. Once the domain administrator has exempted the computer from the policy, which of the following is the BEST command for the technician to run locally on the computer so the digital camera can be installed without waiting?
A. grupdate /? B. grupdate /bootings C. grupdate /force D. grupdate /logoff E. grupdate /sync
E. grupdate /sync
A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue?
A. Remove and reinstall the application
B. Hard reset the cell phone
C. Reconnect the wireless network connection
D. Close all running applications
B. Hard reset the cell phone
A technician is troubleshooting a computer that has been infected with a virus. Upon rebooting, the computer states that NTLDR is missing. The computer cannot boot into safe mode, and reinstalling the OS is not an option. Which of the following is the BEST option to use to restore the machine to a bootable state?
A. Remove the CMOS battery
B. Run Startup Repair
C. Format the C drive
D. Repair the MBR and then reboot
B. Run Startup Repair
A user reports the screen on a mobile device frequently dims even when the device settings are not being changed. Which of the following is MOST likely the cause?
A. Faulty backlight
B. High contrast mode
C. Auto-brightness
D. Power saving mode
D. Power saving mode
To implement additional security on a small office wireless network, the administrator disables the DHCP server on the wireless router. To ensure traffic from specific network interfaces is able to traverse the router, which of the following should be used to limit traffic?
A. DHCP reservations
B. SSID broadcast deactivation
C. MAC filtering
D. Two-factor authentication
A. DHCP reservations
A user reports personal files have been renamed and are undecipherable. Images have been to the user’s folder that request payment to unlock the files. The technician has quarantined the infected system and disabled System Restore. Which of the following should the technician do to unlock the user’s files?
A. Perform a clean installation of Windows
B. Remove the malware and recover the files from a backup
C. Initialize and repartition the hard drive to recover the files
D. Run safe mode to decrypt the user’s files
B. Remove the malware and recover the files from a backup
A user wants to connect a Windows notebook computer to an external desktop monitor, keyboard, and mouse. However, each time the user closes the notebook lid, the computer shuts down automatically. Which of the following options in the Power Settings menu should the technician select to prevent the automatic shutdown?
A. Do nothing
B. Sleep
C. Hibernate
D. Shut down
A. Do nothing
A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?
A. Domain name, location, IP address
B. Domain name, location, asset ID
C. Asset ID, MAC address
D. Location, RFID
C. Asset ID, MAC address
Users are reporting web browsers are not working. A technician confirms that the end users can navigate to websites using the site’s IP address. Which of the following is MOST likely causing this issue?
A. Proxy server
B. DHCP server
C. DNS server
D. SMTP server
C. DNS server
A help desk technician receives a call from a user stating a program was installed and now random pop-ups are appearing on the computer. The technician notices a lot of suspicious network traffic generated by the user’s computer. The technician quarantines the computer and disables System Restore. Which of the following is the NEXT step technician should take?
A. Update the anti-malware software
B. Perform a malware scan in safe mode
C. Set up scheduled scans and updates
D. Educate the end user on best practices
B. Perform a malware scan in safe mode
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hotspot and gets 2000 Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15 Mbps. The technician checks the hotspot settings on Joe’s phone and sees the following:
Network name:Joe’s Hotspot Security:WPA2/PSK Password:hotspot Band:2.4 GHz Client DHCP start address:192.168.23.1
Which of the following is the MOST likely cause of the problem?
A. Joe should be using WEP security on his hotspot for faster throughput
B. Someone else is using Joe’s hotspot due to a weak password
C. Joe’s hotspot gave him an invalid IP address
D. Joe is likely in a poor signal area and should try another area
B. Someone else is using Joe’s hotspot due to a weak password
A technician wants to deploy a solution that will detect and prevent sensitive information from being saved on external storage. Which of the following should the technician implement?
A. IPS
B. FTPS
C. TPM
D. DLP
C. TPM
A technician recently removed a malware infection from a client’s computer. After removing the computer from the network, the technician used an approved customized tool to remove the malware, then updated the antivirus suite, and performed a scan that reported the system was clean. A week later, the client reports the same malware infection has returned. Which of the following is MOST likely the cause of the reinfection?
A. The technician did not disable the System Restore utility
B. The technician ran the malware remover before the antivirus scan
C. The technician did not install a second antivirus suite to complement the first suite
D. The technician did not put the computer back onto the network
A. The technician did not disable the System Restore utility
When starting a computer, a technician notices the computer displays a blue screen and reboots after POST. The technician completed several updates prior to encountering the blue screen. Which of the following tools would the technician use to resolve this issue?
A. Disk Management B. Secure Boot C. System Restore D. msconfig E. fixboot
C. System Restore