Test 4 Flashcards

1
Q

Which of the following commands are used from a Linux command line interface to elevate a user’s access level to administrative privilege? (Select TWO).

A. chmod
B. passwd
C. sudo
D. su
E. runas
F. pwd
A

C. sudo

D. su

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating the Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance in the host operating system? (Select TWO).

A. Install more physical memory.
B. Increase the size of the virtual hard drive.
C. Install a different hypervisor.
D. Reduce physical memory allocated to the VM.
E. Clear temporary files in the VM.
F. Install additional physical hard drives.

A

A. Install more physical memory.

D. Reduce physical memory allocated to the VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is in need of a device that would give the BEST network protection within a single device. Which of the following devices would the technician use?

A. NLX
B. IDS
C. UTM
D. ATX

A

C. UTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user needs their email set up on their iOS device. The email needs to synchronize all changes made with the server and the PC. Which of the following would the technician use to accomplish this?

A. IMAP
B. SMTP
C. SMNP
D. POP3

A

A. IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user needs to connect securely to the company network while working from a hotel room. Which of the following would the user need available to accomplish this?

A. AES
B. VPN
C. UTM
D. WPA2

A

B. VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician is tasked with analyzing computer settings managed by Microsoft Group Policy configuration. The technician wants to print a report to an HTML file for offline review. Which of the following Windows command line tools would allow the technician to accomplish this task?

A. gpedit.msc
B. gpupdate
C. gpresult
D. gpmc.msc

A

C. gpresult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technician has just upgraded RAM on a user’s workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings. Which of the following should be entered for the “Min” portion of the page file setting if using these best practices?

A. 4096MB
B. 8192MB
C. 12288MB
D. 16328MB

A

C. 12288MB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician has been informed by the IT security manager that a vulnerability has been discovered in the wireless router. The vulnerability could allow an attacker to take remote control of the device. Which of the following should the technician perform to address the issue?

A. Power off the device
B. Install an add-on card
C. Update the WiFi antenna
D. Update firmware

A

D. Update firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

While navigating a Windows machine through command prompt, which of the following commands will a technician use to display the contents of the current folder?

A. cd
B. dir
C. md
D. rd

A

B. dir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technician is using a domain account to access files located on a server at the path \computername\C$. The technician receives an “Access denied” error message. Which of the following is MOST likely the cause of the error?

A. The server is no longer accepting connections since reaching its limit of open shares.
B. The password is incorrect, requiring the user to reset it before authentication will proceed.
C. The username should be prefixed by the domain, followed by a backslash (e.g., domain\username).
D. The account does not have local administrative permissions to access the server share.

A

D. The account does not have local administrative permissions to access the server share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user in a corporate environment needs to have a laptop device repaired and takes the device to the appropriate technician. Which of the following should the technician offer to the user in order to maintain professionalism?

A. Ask to user to wait in the area while repairs are being made.
B. Offer a temporary loaner laptop for the user to work on.
C. Inform the user that it will be ready “sometime” and to come back later.
D. Ask the user to bring the laptop back when the department is less busy.

A

B. Offer a temporary loaner laptop for the user to work on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Joe, a technician, arrives onsite at a customer’s home. Upon entering the home, Joe notices an unpleasant odor. In response to this, Joe pinches his nose and holds his breath. After Joe leaves, the customer reports the behavior to Joe’s supervisor. The supervisor decides the issue must be addressed. Which of the following topics would the supervisor be MOST likely to cover?

A. Maintaining good communications with the customer
B. Maintaining good personal hygiene
C. Avoiding being judgmental
D. Avoid dismissing the customer’s problems

A

C. Avoiding being judgmental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A technician is working a trouble ticket for a user. After addressing the issue, the technician asks the user to verify functionality. The user confirms the system is functioning, but the computer’s speakers now emit an irritating noise. The technician states this is a byproduct of the solution, and the user will eventually get used to the noise. Which of the following professionalism principles is the technician failing to address?

A. Avoiding being judgmental
B. Avoiding dismissal of the customer’s problems
C. Avoiding an argument with the customer
D. Maintaining a positive attitude

A

B. Avoiding dismissal of the customer’s problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be:

A. a detriment to employer/employee relations.
B. personally identifiable information.
C. a violation of information access policies.
D. proof of employee corporate affiliation.

A

B. personally identifiable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An IT manager needs to reimage 30 computers in a lab. The image has already been created and is ready to be deployed via the network. Which of the following tasks should be completed FIRST?

A. Boot from PXE.
B. Install Windows using DVD.
C. Reboot computers with USB drive.
D. Press F8 while rebooting.

A

A. Boot from PXE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does not run correctly and is reporting that the .dll is missing. Which of the following tools would the technician use to complete the import of the .dll?

A. gpresult
B. msconfig
C. regedit
D. gpupdate
E. regsrv32
A

E. regsrv32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements?

A. GPT
B. Logical
C. MBR
D. Extended

A

A. GPT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A technician is tasked to change the number of CPU cores available to the OS to enhance productivity. Which of the following tools would allow the technician to perform this task?

A. msconfig
B. perfmon
C. taskmgr
D. dxdiag

A

A. msconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A technician is tasked with removing a virus file that created a custom service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not successfully remove the file. When the technician attempts to manually remove the file, an error message appears that says, “The file is in use by another program.” Which of the following tools would be the BEST to use to correct the issue?

A. Terminal
B. SFC
C. Event Viewer
D. Services Console
E. Recovery Console
A

D. Services Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The system administrator is tasked with installing Windows to 100 computers over the network. The systems administrator needs to remove system-specific identifiers. Which of the following would the system administrator use to accomplish this?

A. Windows Deployment Services
B. Remote Installation Services
C. System Preparation Tool
D. Unattended installation

A

C. System Preparation Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A technician installs a new application and restarts the computer. After signing in to Windows, an error message appears stating that the application did not start automatically as intended. After confirming the software has installed correctly, which of the following tools would be used to troubleshoot this problem?

A. msconfig
B. appwiz.cpl
C. gpedit
D. regsrv32

A

A. msconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A technician is installing Windows 7 on a computer with a previously used hard drive. After receiving an error, the technician realizes the hard drive does not support this install. Which of the following tasks should the technician perform?

A. Partition the hard drive in Extended format.
B. Use Windows Update to download the appropriate driver.
C. Enable Multiboot in the BIOS.
D. Convert the file system to NTFS.

A

D. Convert the file system to NTFS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A technician’s is onsite troubleshooting a user’s issue and receives a call from another customer. Which of the following is the BEST course of action for the technician to take in this situation?

A. Let the call go to voicemail and respond when time permits.
B. Leave the current appointment to assist the calling customer.
C. Ignore the call and continue with the scheduled itinerary.
D. Apologize to the customer and answer the call.

A

A. Let the call go to voicemail and respond when time permits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A computer is displaying a pop-up message demanding payment or the hard drive will be encrypted. Which of the following BEST describes this type of malware?

A. Trojan
B. Ransomware
C. Spyware
D. Worm

A

B. Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Several users of a shared computer report that Windows often indicates an improper shutdown was experienced upon power on. Which of the following would be the BEST course of action to determine which user is responsible for causing the issue?

A. Review the System Log
B. Check msconfig utility
C. Checkboot. ini
D. Review the ntuser.dat file

A

A. Review the System Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

After confirming BIOS support, technician has added a second video card and a new sound card to a computer’s motherboard. The computer continuously restarts. This is an indication of which of the following.

A. Incompatible sound card
B. Insufficient power supply
C. Insufficient memory
D. Defective video card

A

B. Insufficient power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Home
220-902 – Q186
A computer on a Windows domain has been identified as not having the most current policy. Which of the following tools would a technician run on the local machine to rectify this?

A. gpresult
B. msconfig
C. ipconfig
D. gpupdate

A

D. gpupdate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A user running Windows 7 has reported that a computer has crashed and a BSOD displayed. The computer was restarted and now the user reports that it is running slower than usual, especially when multiple programs are open at the same time. The technician knows the system has 8GB of memory (2x 4G DIMMS), and suspects that the system has a faulty memory module and has disabled one of the DIMMs. Which of the following would a technician do to confirm that the OS is now only detecting 4GB of memory?

A. In the Control Panel, click Devices and Printers.
B. In the Control Panel, click System.
C. In the Control Panel, click Device Manager.
D. In the Control Panel, click Performance Information and Tools.

A

B. In the Control Panel, click System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A technician needs to repurpose a hard drive that has confidential information on it. Which of the following methods is MOST appropriate?

A. Incineration
B. Overwrite
C. Degauss
D. Quick format

A

D. Quick format

30
Q

A network administrator has moved several users’ folders to a different server. After mapping to the new shared drive, the users can access each other’s’ files. Which of the following could be the cause of this issue?

A. Administrator permissions
B. File permissions
C. File fragmentation
D. Network segmentation

A

B. File permissions

31
Q

A technician is trying to perform a new installation of an operating system on a computer without an optical drive. Which of the following boot sources can be used?

A. Windows easy transfer
B. Copy of SYSTEM folder
C. USMT
D. Flash drive

A

D. Flash drive

32
Q

A user wants to reuse a flash drive and ensure that no one can view the previous data. Which of the following is the BEST way to accomplish this?

A. Delete the files
B. Perform a full format
C. Degauss the drive
D. Make the files hidden

A

B. Perform a full format

33
Q

An administrator has verified that a PC has no Internet connectivity. Using ipconfig shows that the IP address for the machine is completely different than the assigned network address. After using ipconfig /release and ipconfig /renew, the computer is still assigned the same address. Which of the following is MOST likely the cause of the issue?

A. The NIC drivers are not properly installed
B. HomeGroup is misconfigured
C. DHCP server is unavailable
D. A static IP address is configured

A

D. A static IP address is configured

34
Q

A user tries to login and receives the error message “The User Profile Service failed to login. User Profile can not be leaded.” Which of the following should be the FIRST method to troubleshoot the issue?

A. Use Automated System Recovery
B. Boot PC into Safe Mode
C. Use System File Checker
D. Perform hardware diagnostics

A

B. Boot PC into Safe Mode

35
Q

A technician is removing malware from a computer in safe mode and is having trouble with one of the infected files. The anti-malware suite is unable to remove or quarantine it and the system will not let the technician manually delete it, even though it is not in use. Which of the following can the technician use to remove the file?

A. Open the defrag utility and run a full analysis and defragmentation of the hard drive.
B. Boot from a pre-installation environment CD and delete the file from the hard drive.
C. Run attrib followed by the file name with the –h switch from the command prompt.
D. Install a second full antivirus suite onto the system and run another removal scan.

A

B. Boot from a pre-installation environment CD and delete the file from the hard drive.

36
Q

A user starts up a PC and notices it appears to boot from CD or DVD-ROM, but after a few seconds continues to boot into Windows. Once Windows starts up, Media Player opens and starts playing music. Which of the following is MOST likely occurring?

A. The boot order in the BIOS is incorrectly set
B. The machine was improperly shutdown
C. The Media Player software has been recently updated.
D. A disc has been left in the CD/DVD-ROM drive

A

D. A disc has been left in the CD/DVD-ROM drive

37
Q

Which of the following is a security best practice?

A. Use multifactor VPN authentication.
B. Use only commercially licensed software.
C. Use only WiFi instead of Ethernet cabling.
D. Use only solid state hard drives in servers.

A

A. Use multifactor VPN authentication.

38
Q

Which of the following Linux commands is used to configure an Ethernet address?

A. ifconfig
B. traceroute
C. ipconfig
D. chmod

A

A. ifconfig

39
Q

A technician has cleaned a virus infection off of a PC using corporate approved software. After a short period of time, the infection returned. Updated virus signatures have also detected the presence of a rootkit. Which of the following would be the BEST course of action to resolve the issue?

A. Run a System Restore to a time before the first infection was cleaned.
B. Install a second antivirus suite and run both antivirus products concurrently.
C. Back up the client’s data and scan it for infections on a known-working PC.
D. Reformat the hard drive and reload the operation system and applications

A

A. Run a System Restore to a time before the first infection was cleaned.

40
Q

A technician is installing a new router at a computer that wants to protect the configuration of the DMZ. To prevent unauthorized remote access, which of the following should the technician perform when installing a new wireless router?

A. Secure the room the router is stored in
B. Change the default password on the router.
C. Disable SSID broadcasting
D. Ensure that all cables to the router are shielded

A

B. Change the default password on the router.

41
Q

A user wants to see the file extensions for all files when navigating the desktop’s file structure. Which of the following Control Panel utilities should the technician access to configure the display of file extensions?

A. System
B. User Accounts
C. Personalization
D. Administrative Tools
E. Folder Options
A

E. Folder Options

42
Q

A corporate customer has contacted a technician about a database issue. After a reboot, no one can connect to the database. When the technician arrives on-site, the database service is not started. The technician starts the service, and the database comes up without issue. After some testing, the technician realizes the database service is coming up to quickly on startup before dependent services can start. Which of the following is the BEST solution?

A. Set the database service to ‘Automatic (Delayed Start)”
B. Show the customer how to manually start the service
C. Create a scheduled task that will start the service on reboot.
D. Set the service to manual and write a script to start it on reboot.

A

A. Set the database service to ‘Automatic (Delayed Start)”

43
Q

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

A. Remove the guest from the administrators group
B. Disable single sign-on
C. Issue a default strong password for all users
D. Require authentication on wake-up

A

A. Remove the guest from the administrators group

44
Q

A technician wants to delete all information from a laptop so it is not recoverable, but needs to repurpose the laptop drive for future use. Which of the following is the BEST option to accomplish this task?

A. Degauss
B. Overwrite
C. Standard format
D. Low-level format

A

D. Low-level format

45
Q

A technician is installing the latest OS on a user’s system. The user wants all of the settings and files to remain intact during the installation. Which of the following upgrade methods should the technician use?

A. Network installation
B. Clean install
C. In-place upgrade
D. Image deployment

A

C. In-place upgrade

46
Q

To prevent electrical damage to a PC while working on it, which of the following should be disconnected before work begins?

A. Power cable
B. Video cable
C. USB cable
D. Serial cable

A

A. Power cable

47
Q

A technician is running a Cat 5 cable from the IDF to a user’s PC in the office. Which of the following should the technician use for safety reasons?

A. Dusk mask
B. ESD strap
C. Multimeter
D. Cable tester

A

C. Multimeter

48
Q

Which of the following is used for building entry and computer access?

A. Smart card
B. Personal identity verification card
C. Hardware tokens
D. Key fobs

A

B. Personal identity verification card

49
Q

Which of the following is a physical device used to prevent tailgating into a facility?

A. Privacy filter
B. ID badge
C. Retinal scanner
D. Mantrap

A

D. Mantrap

50
Q

A file is moved from one folder to another within the same disk volume. Which of the following will happen to the permissions on the file?

A. The file will get the permissions of both folders
B. The file will get the permissions of the destination folder
C. The file will keep the original permissions
D. The file will have all permissions removed

A

C. The file will keep the original permissions

51
Q

A SOHO customer has taken precautions against malware and viruses on a Windows 8 workstation. After implementing the precautions, standard applications are crashing or failing to start. Which of the following could be used to remedy the customer’s issue after a virus scan reports no infections?

A. Use Event Viewer to clear the logs
B. Perform a hard drive defragmentation
C. Turn off DEP for all programs and services
D. Use System Restore to create a restore point

A

C. Turn off DEP for all programs and services

52
Q

A computer repair technician must open a computer case to remove and replace a graphics card. An ESD mat and strap are not available. Which of the following should be done PRIOR to touching the components? (Select two.)

A. Touch both hands to a bare-metal portion of the chassis.
B. Take off shoes and any headwear.
C. Remove all jewelry.
D. Remove the power supply unit.
E. Place the chassis on a non-metal surface.

A

A. Touch both hands to a bare-metal portion of the chassis.

C. Remove all jewelry.

53
Q

An employee was arrested after it was determined that an office computer was used for illegal activity that damaged the company. Which of the following MUST be documented on the employee’s computer to ensure the evidence is admissible on court?

A. Software inventory
B. Personality identifiable information
C. Security best practices
D. Chain of custody

A

D. Chain of custody

54
Q

A technician needs to format a new drive on a workstation. The technician will need to configure read attributes to specific local files and write extended attributes to specific folders. Which of the following will allow the technician to configure these settings in a Windows environment?

A. ext4
B. HFS+
C. FAT32
D. NTFS

A

D. NTFS

55
Q

that should have access to this, and they are all company owned. Users do not want to put in a password when they connect these devices to the wireless. Given this scenario, which of the following is the MOST secure method of deployment?

A. Disable SSID broadcasting
B. Media access control filtering
C. Disable ports 80 and 443 on the access point
D. Lower radio power levels

A

A. Disable SSID broadcasting

56
Q

A technician wants to change the security level for a set of internal websites accessed frequently by a user. Which of the following Control Panel utilities would allow the technician to complete this task?

A. Windows Firewall
B. Credential Manager
C. Network and Sharing Center
D. Internet Options
E. Homegroup
A

A. Windows Firewall

57
Q

Utilizing login information for social media platforms or email providers without requiring additional credentials is commonly referred to as……

A. system federation
B. mutual authentication
C. single sign-in
D. multifactor authentication

A

C. single sign-in

58
Q

Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?

A. An IP conflict is present.
B. A corporate VPN is enabled.
C. A firewall exception must be set.
D. HomeGroup must be enabled.

A

C. A firewall exception must be set.

59
Q

A computer was recently infected by malware after a flash drive was plugged in. The user, Ann, indicates she never opened any files or folders from the flash drive. A technician needs to prevent this from occurring in the future. Which of the following would accomplish this?

A. BitLocker To Go
B. Set strong passwords
C. Disable usermin
D. Disable AutoRun

A

D. Disable AutoRun

60
Q

A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following is the BEST option to modify the size of the partition?

A. Credential Manager
B. Computer Management
C. Device Manager
D. TPM Manager

A

B. Computer Management

61
Q

Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slow performance after a couple of hours and that the problem worsens as the day goes by. If Ann restarts the device, it works fine for a couple of hours and then starts to run slow again. Which of the following is the BEST action to troubleshoot this problem?

A. Check running apps
B. Reset to factory default
C. Disable cloud syncing
D. Replace the device’s battery

A

A. Check running apps

62
Q

A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before configuring the phone for access?

A. Check the phone for unauthorized root access
B. Disable the phone’s Bluetooth chip
C. Erase all personal data from the phone
D. Check the phone for location tracking

A

A. Check the phone for unauthorized root access

63
Q

Which of the following features is being used when a smartphone is used to purchase a product at a retail kiosk?

A. NFC
B. Virtual assistant
C. SDK
D. Bluetooth

A

A. NFC

64
Q

Which of the following security threats happens when another person enters a secured area with an authorized person?

A. Tailgating
B. Shoulder surfing
C. Spoofing
D. Phishing

A

A. Tailgating

65
Q

Which of the following is a risk of implementing a BYOD policy?

A. Introducing malware onto the network
B. DHCP may fail due to incompatibility
C. Different encryption technology
D. Higher risk of phishing attacks

A

A. Introducing malware onto the network

66
Q

A company is concerned about users tailgating into restricted areas. In order to prevent unauthorized users from following others, which of the following should be implemented?

A. Biometric locks
B. CCTV
C. Mantraps
D. Badge readers

A

C. Mantraps

67
Q

An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the user?

A. Power user
B. Administrator
C. Standard
D. Guest

A

A. Power user

68
Q

A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the technician configure next?

A. Hosts files
B. IPv6 settings
C. Proxy settings
D. Lmhosts files

A

C. Proxy settings

69
Q

A user reports several technicians have been unable to solve a problem and requests that the technician on the phone comes out to fix the problem because the user is unable to work. After the technician has effectively communicated a willingness to help, which of the following is the NEXT step?

A. Allow the user to speak with a supervisor.
B. Identify the problem.
C. Establish a theory.
D. Immediately go to the user’s office.

A

B. Identify the problem.

70
Q

An IPS appliance is installed on the network. Which of the following is the purpose of the IPS?

A. To check the network for unwanted activity
B. To check and stop unwanted activity
C. To provide connectivity to the network
D. To test the resilience of the network

A

B. To check and stop unwanted activity