X~0/1 (fully verified) Flashcards
- (?)
A technician is setting up a conference room computer with a script that boots the application on log-in. Which of the following would the technician use to accomplish this task? (Choose two)
A. File Explorer
B. Startup Folder
C. System Information
D. Programs and Features
E. Task Scheduler
F. Device Manager
B. Startup Folder
The startup folder contains shortcuts or programs that automatically execute when a user logs in. Placing the application shortcut in this folder achieves the desired outcome.
E. Task Scheduler
Task Scheduler allows creating automated tasks to run at specific times or triggers, including user login. The technician can configure a task to launch the application upon user login.
A. File Explorer helps navigate the file system, it’s not used for configuring startup applications.
C. System Information provides details about the system hardware and software but doesn’t manage startup applications.
D. Programs and Features allows viewing and managing installed programs but doesn’t configure startup applications.
F. Device Manager manages hardware devices and their drivers, not application startup.
- (2.9)
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?
A. Bridge the LAN connection between the laptop and the desktop.
B. Set the laptop configuration to DHCP to prevent conflicts.
C. Remove the static IP configuration from the desktop.
D. Replace the network card in the laptop, as it may be defective.
C. Remove the static IP configuration from the desktop
If both the laptop and desktop have the same static IP address assigned, it creates a conflict. Removing the static IP from the desktop (if it’s not critical for another reason) would allow the laptop to use that address and potentially resolve the software licensing conflict.
A. Bridging the LAN connection wouldn’t solve the software licensing issue. It would create a single network segment and wouldn’t address the IP address conflict within the software.
B. Setting the laptop configuration to DHCP helps avoid manual IP conflicts, it wouldn’t necessarily address the software licensing restriction. The software might require a specific static IP assigned to the user’s machine.
D. Replacing the network card is unnecessary hardware troubleshooting. The network card is likely functioning correctly.
- (3.3)
A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user’s files?
A. Run the virus scanner in an administrative mode.
B. Reinstall the operating system.
C. Reboot the system in safe mode and rescan.
D. Manually delete the infected files.
C. Reboot the system in safe mode and rescan.
Booting into Safe Mode loads Windows with only the essential drivers and programs needed to run the operating system. This limits the malware’s ability to interfere with the antivirus software, potentially allowing for a more thorough scan and removal.
Running the antivirus scan again in Safe Mode might allow it to effectively remove the malware that it previously couldn’t in the regular operating system mode.
A. While giving the antivirus administrative rights might help, it doesn’t guarantee successful removal and doesn’t address the potential issue of the malware interfering with the scan itself.
B. Reinstalling the operating system would erase all user data.
D. Manually deleting infected files is risky. It requires accurately identifying the infected files, which can be challenging for a non-expert user. Accidentally deleting essential system files could render the system unbootable.
- (3.1)
A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?
A. The SNTP server is offline.
B. A user changed the time zone on a local machine.
C. The Group Policy setting has disrupted domain authentication on the system.
D. The workstations and the authentication server have a system clock difference.
D. The workstations and the authentication server have a system clock difference.
Many domain authentication protocols rely on synchronized time between clients and servers to prevent security risks like replay attacks. A significant time difference between the workstations and the authentication server could disrupt the validation process and prevent logins.
A. The SNTP server is offline: While an offline SNTP server wouldn’t provide time updates, it shouldn’t directly prevent logins. There might be a grace period or fallback mechanism.
B. A user changing the time zone on a local machine might cause inconvenience but wouldn’t entirely prevent logins on its own.
C. The Group Policy setting has disrupted domain authentication on the system: Disrupted domain authentication is a possibility, but it’s less likely than a time synchronization issue. Some authentication protocols might be time-sensitive, and a large time discrepancy could cause problems.
- (4.1)
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the user’s account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:
A. acceptable use policy.
B. regulatory compliance requirements.
C. non-disclosure agreement.
D. incident response procedures.
A. acceptable use policy.
Accessing another user’s account would likely violate the AUP’s guidelines around authorized access and data privacy.
B: While regulatory compliance might be a concern, it’s not the most direct reason for refusal in this scenario. The AUP would likely be aligned with relevant regulations.
C: Non-disclosure Agreements typically apply to confidential information, not necessarily user account access.
D: Incident response procedures are usually triggered by a security event, not a user requesting access to their own account while on vacation.
- (1.6)
A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?
A. Updating the operating system
B. Changing proxy settings
C. Reinstalling the browser
D. Enabling port forwarding
B. Changing proxy settings
A proxy server acts as an intermediary between the user’s computer and the internet. If the proxy server is misconfigured or compromised, it could redirect users to unintended websites.
C. Reinstalling the browser could resolve issues caused by browser extensions or corrupted files, but it wouldn’t necessarily address redirection caused by proxy settings.
A. Updating the operating system: While an outdated OS might have security vulnerabilities, it’s not the most direct cause of unexpected redirects in this scenario.
D. Port forwarding is typically used to allow access to specific services on a private network from the internet. It wouldn’t directly affect web browsing behaviour.
- (4.8)
A help desk technician runs the following script: Inventory.py.
The technician receives the following error message: How do you want to open this file?
Which of the following is the MOST likely reason this script is unable to run?
A. Scripts are not permitted to run.
B. The script was not built for Windows.
C. The script requires administrator privileges.
D. The runtime environment is not installed.
D. The runtime environment is not installed.
Python scripts, for instance, rely on the Python interpreter to be installed on the system. The error message (“How do you want to open this file?”) suggests the system doesn’t recognize the file type (.py) and lacks the necessary environment to handle it.
A. While some systems might have restrictions on script execution, the error message suggests the system recognizes the file as a script but lacks the necessary environment to run it.
B. If the script was built for a different operating system (e.g., Linux), it might not run directly on Windows. However, the error message doesn’t indicate an OS incompatibility.
C. Some scripts might require administrator rights to execute certain actions. However, the error message suggests the system can’t even process the script, not that it lacks sufficient permissions.
- (3.1)
A BSOD appears on a user’s workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?
A. Stop code
B. Event Viewer
C. Services
D. System Configuration
A. Stop code
The BSOD typically displays a specific error code or message that points to the root cause of the system crash. Looking up the stop code provided on the BSOD, the technician can diagnose the issue and determine the appropriate repair steps.
B. Event Viewer can provide additional details about system events, but the stop code from the BSOD itself is a more direct source of information related to the crash. Event Viewer might offer supplementary logs after analyzing the stop code.
C. Services: While some service failures might contribute to BSODs, the stop code provides more specific guidance for troubleshooting.
D. System Configuration is a tool for managing startup programs and services. While it can be helpful in troubleshooting stability issues, the stop code offers a more targeted approach for diagnosing the BSOD cause.
- (4.7)
While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?
A. Send a quick message regarding the delay to the next customer.
B. Cut the current customer’s time short and rush to the next customer.
C. Apologize to the next customer when arriving late.
D. Arrive late to the next meeting without acknowledging the time.
A. Send a quick message regarding the delay to the next customer.
- (3.3)
Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?
A. Power off the machine.
B. Run a full antivirus scan.
C. Remove the LAN card.
D. Install a different endpoint solution.
A. Power off the machine.
This is the best first step. Ransomware often works by actively encrypting files. Shutting down the machine halts this process and minimizes damage.
C. Remove the LAN card: Disconnecting the network cable would achieve a similar effect to powering off, but it’s a less complete solution and might not be practical in all situations.
B. Run a full antivirus scan: While scanning is important, it won’t necessarily stop ongoing encryption. It’s better to isolate the machine first.
D. Install a different endpoint solution: This might be necessary later, but it’s not the first priority. You need to stop the current infection before adding new software.
- (1.3)
A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound.
The following error is received: The Audio Driver is not running.
Which of the following will MOST likely resolve the issue?
A. compmgmt.msc
B. regedit.exe
C. explorer.exe
D. taskmgr.exe
E. gpmc.msc
F. services.msc
F. services.msc
Similar to Task Manager, Services provides a more detailed list and management options for system services, including audio drivers.
D. taskmgr.exe (Task Manager) is a strong contender! It allows viewing running processes, including services. You can check if the audio driver service is running and restart it if necessary.
A. compmgmt.msc (Computer Management) allows managing various aspects of a computer, but wouldn’t directly address audio drivers.
B. regedit.exe (Registry Editor): While the registry might hold audio driver configurations, modifying it carries risk and should be a last resort.
C. explorer.exe (File Explorer) is for managing files and folders, not audio drivers.
E. gpmc.msc (Group Policy Management Console) is for managing group policies in a domain environment, not relevant to a single machine’s audio driver.
- (1.4)
A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?
A. System
B. Indexing Options
C. Device Manager
D. Programs and Features
A. System
System properties allow accessing advanced settings, which include environment variables
(The PATH environment variable is a list of directories that your operating system searches for executable files (programs) when you try to run them from the command line or terminal.)
B. Indexing Options helps configure search indexing for files, not system environment variables.
C. Device Manager manages hardware devices installed on the system.
D. Programs and Features allows viewing and uninstalling installed programs, but not modifying environment variables.
- (2.8)
A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?
A. Degaussing
B. Low-level formatting
C. Recycling
D. Shredding
D. Shredding
Shredding breaks the disc into tiny pieces, making data recovery extremely difficult if not impossible.
Degaussing works for magnetic media like hard drives, but not for optical discs which store data differently.
Low-level formatting only erases the directory structure and doesn’t guarantee complete data removal. Data could potentially be recovered with effort.
Recycling the discs leaves the data vulnerable if someone gets their hands on them.
- (1.3)
A technician installed an application on a user’s desktop and received an error message. Which of the following tools can the technician use to research the error?
A. Resource Monitor > CPU > Services
B. Task Manager > Processes > Apps
C. Event Viewer > Windows Logs > Application
D. Device Manager > Computer
C. Event Viewer > Windows Logs > Application
Event Viewer is specifically designed to record system events, including application errors.
The “Windows Logs” section categorizes logs, and the “Application” log contains information related to software applications running on the system. This log would likely have detailed information about the error the technician encountered during installation.
A. Resource Monitor > CPU > Services: Helps monitor resource usage but wouldn’t provide specific error message details.
B. Task Manager > Processes > Apps: Shows running applications, it wouldn’t necessarily show detailed error messages.
D. Device Manager > Computer: Manages hardware devices and wouldn’t be helpful for application errors.
- (1.5)
A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?
A. Settings > Devices > Display, and change the display resolution to a lower resolution option.
B. Settings > System > Display, and change the display resolution to a lower resolution option.
C. Settings > System > Display, and change the Scale and layout setting to a higher percentage.
D. Settings > Personalisation > Display, and change the Scale and layout setting to a higher percentage.
C. Open Settings, select System, select Display, and change the Scale and layout setting to a higher percentage.
Changing the “Scale and layout” setting allows Windows to enlarge all text, applications, and other elements on the screen proportionally, making them easier to see without compromising image quality.