Search Header Logo
review 1002  50 questions

review 1002 50 questions

Assessment

Presentation

Computers

University

Practice Problem

Medium

Created by

earnest colvin

Used 16+ times

FREE Resource

1 Slide • 127 Questions

1

review 1002 50 questions

Slide image

2

Multiple Choice

A technician responds to a call from a user who claims to have a virus on a workstation. The

technician observes the following notification from the system tray:

There are 1033 infected files on this computer. Click here to disinfect.

The link is blocked by the corporate content filter and displays a message stating the site contains

known malware.

Which of the following should the technician complete to secure the computer with MINIMAL

impact to the user?

1

Compare the startup items and services to a known clean image, and remove any startup items

not found in the other image. Run an anti-malware scan.

2

Validate that the alerts are false positives, and disable security software on the workstation to

prevent further false notifications.

3

Multiple Choice

A user’s corporate email is missing the shared inbox folders that were present before the user

went on vacation. The technician verifies the user is connected to the domain and can still send

and receive email.

Which of the following is MOST likely causing the missing folders issue?

1

The operating system updates have changed

2

The network directory permissions have changed

4

Multiple Choice

During the firmware upgrade of a web server, a power outage occurred. The outage caused a

failure within the upgrade.

Which of the following plans must be implemented to revert back to the most recent version of the

firmware?

1

Alternative plan

2

Backup plan

3

Contingency plan

5

Multiple Choice

An office manager emails a technical support contractor about a new desktop for one of the

workers. The office manager provides a specific configuration for the desktop. The technician

notes the request will require the purchase of a new system. New system purchases are not in the

scope of the support agreement.

Which of the following should the technician do NEXT?

1

Create a risk analysis report for review

2

Submit a change order for approval

3

Insist the worker accepts the standard desktop

6

Multiple Choice

Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?

1

Image deployment installation

2

Repair installation

7

Multiple Choice

A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization.

Which of the following security concepts has the company just enabled?

1

Least privilege

2

Certificates

8

Multiple Choice

A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST?

1

Disconnect the PC from the network

2

Perform an antivirus scan

9

Multiple Choice

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a

phishing website. System Restore was turned off before the cleaning. The technician runs the

machine through several scanners, and then tests for redirection. A smaller number of sites are

still redirecting to the phishing website. The antivirus software correctly blocks the website.

Which of the following should the technician do NEXT?

1

Check the contents of the hosts file

2

Do a System Restore to a date before the infection

10

Multiple Select

A user calls a technician to report issues when logging in to a vendor’s website. The technician is

able to log in successfully before going to the office. However, the technician is unable to log in

when in the user’s office. The user also informs the technician of strange pop-up notifications.

Which of the following are the MOST likely causes of these issues? (Choose two.)

1

Proxy settings are configured improperly

2

There is a rogue anti-malware program

3

System files have been deleted

11

Multiple Choice

Which of the following is a reason to use WEP over WPA?

1

Device compatibility

2

Increased security

12

Multiple Choice

When a user browses to a favorite website on a Windows laptop, a different website opens. A

technician installs an additional web browser, but it also opens to the same unfamiliar site. The

technician resets the web browser settings back to default, but the issue persists.

Which of the following troubleshooting steps should the technician complete NEXT?

1

Check the Windows host file

2

Update the default web browser

13

Multiple Choice

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?

1

BranchCache

2

Domain access

14

Multiple Choice

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connectedto the hotspot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has ahotspot on her phone, and the speed test result on that hotspot is 15Mbps. The technician checks the hotspot settings on Joe’s phone and sees the following:

1

Joe should be using WEP security on his hotspot for faster throughput

2

Someone else is using Joe’s hotspot due to weak password

15

Multiple Choice

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining

user settings. The users currently have Windows 8 and want to upgrade to Windows 10.

Which of the following installation methods would the technician MOST likely use to accomplish

this quickly?

1

Unattended installation

2

Remote network installation

16

Multiple Choice

A technician received 300 old desktops following a recent computer upgrade. After taking

inventory of the old machines, the technician must destroy the data on the HDDs.

Which of the following would be the MOST effective method to accomplish this task?

1

Drill

2

Hammer

3

Degaussing

17

Multiple Choice

A user reports malware activity on an isolated workstation used for testing. It is running an end-oflife

OS, and a USB drive is the only method used to transfer files. After removing the malware and

replacing the USB drive with a brand new one, the technician gives the approval to use the

equipment. The next day the user reports the same malware activity is present after powering on

the system.

Which of the following did the technician forget to do to prevent reinfection?

1

Connect to the network and update the OS with the latest security patches

2

Update the local antivirus and set it to scan automatically every evening

18

Multiple Choice

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network.Which of the following best practices could have prevented the attack?

1

Changing default credentials

2

Disabling AutoRun

3

Removing Guest account

19

Multiple Choice

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future?

1

Surge protector

2

Battery backup

20

Multiple Choice

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

1

Disconnect the power before servicing the PC

2

Put on an ESD strap.

21

Multiple Choice

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed?

1

No boot device available

2

Operating system not found

3

BIOS ROM checksum error

22

Multiple Choice

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure. Which of the following should the help desk perform to fix the issue?

1

Remote into Ann’s system and restart the wireless adapter

2

Ask Ann to open a browser and watch for a redirect page

23

Multiple Choice

A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage.Which of the following would the project team MOST likely add to the SOW?

1

Risk analysis

2

Plan to change

3

Backout plan

24

Multiple Choice

A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?

1

Roll back updates

2

Restore hidden updates

25

Multiple Select

An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense?

(Choose two.)

1

Remove applications from startup

2

Defragment the hard drive

3

Install a faster hard drive

4

End the processes in Task Manager

26

Multiple Choice

In which of the following file extension types would a user expect to see the command. “net use

T:\\server\files”?

1

.bat

2

.vbs

27

Multiple Choice

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the

following should the technician do FIRST?

1

Update the OS of the smartphones

2

Roll back the application to the earlier version

28

Multiple Select

A technician is working on a Windows 10 PC that is running slowly.

Which of the following commands should the technician use to correct this issue? (Choose two.)

1

chkdsk

2

dism

3

ipconfig

4

format

29

Multiple Select

An administrator is setting up a Windows terminal server.

Which of the following settings should the administrator modify to increase server security?

(Choose two.)

1

Put the terminal server into the router’s DMZ

2

Block all unused ports on the LAN smart switch

3

Use the local client certificate for server authentication

30

Multiple Choice

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?

1

SSH

2

RDP

31

Multiple Select

A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)

1

Default login

2

WEP

3

Outdated firmware

32

Multiple Choice

In which of the following file extension types would a user expect to see the command. “net use

T:\\server\files”?

1

.bat

2

.vbs

33

Multiple Choice

A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.

Which of the following naming convention formats should the technician follow?

1

Asset ID, MAC address

2

Domain name, location, IP address

34

Multiple Select

Which of the following provide the BEST security for a server room? (Choose two.)

1

Badge reader

2

Cable lock

3

USB token

4

Privacy window shades

35

Multiple Choice

Which of the following threats uses personalized information in an attempt at obtaining information?

1

Spear phishing

2

Spoofing

36

Multiple Choice

A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?

1

Date and time

2

UEFI boot mode

3

Logon times

37

Multiple Choice

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

1

Internet Options – Connections

2

Internet Options – Content

38

Multiple Choice

Which of the following is the amount of memory a user is limited to with a 32-bit version of

Windows?

1

4GB

2

8GB

39

Multiple Choice

A technician is working at a help desk firm and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?

1

Ask another technician to take the call

2

Input the issue as a ticket and escalate to Tier 2

40

Multiple Choice

A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

1

Fingerprint lock

2

Swipe lock

41

Multiple Select

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Choose two.)

1

UPS

2

Server rack

3

Desktop printer

42

Multiple Choice

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

1

Require authentication on wake-up

2

Disable single sign-on

43

Multiple Choice

Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?

1

A firewall exception must be set

2

A corporate VPN is enabled

44

Multiple Choice

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

1

Uninstall one antivirus software program and install a different one

2

Remove the user-installed antivirus software

45

Multiple Choice

A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive spacewith a 1.7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance

on this computer

1

Windows 7

2

Windows 8

46

Multiple Choice

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?

1

Ask more open-ended questions to see if the issue can be narrowed down in order to properly

identify the issue and save time

2

Since Joe is concerned about time, suggest calling back later when Joe has more time to

troubleshoot

47

Multiple Choice

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

1

SSO

2

Permission propagation

48

Multiple Choice

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs in automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk

machine?

1

Guest

2

Remote Desktop User

49

Multiple Choice

A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license types should the technician recommend?

1

Open license

2

Enterprise license

50

Multiple Choice

Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed?

1

Set up alerts to let administrators know when backups fail

2

Set up scripts that automatically rerun failed backup jobs

51

Multiple Select

A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Choose

two.)

1

Cloud storage

2

Hot site

3

Waterproof devices

52

Multiple Choice

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?

1

Look up the error number associated with the failed update

2

Download the failed update to install manually

53

Multiple Choice

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

1

Folder Options

2

System

54

Multiple Choice

A technician has identified malware on a user’s system.

Which of the following should the technician do NEXT according to malware removal best practices?

1

Move the infected system to a lab with no network connectivity

2

Educate the user about how to avoid malware in the future

55

Multiple Choice

A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?

1

Task Manager

2

MSConfig

56

Multiple Choice

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?

1

Uninterruptible power supply

2

Power strip

57

Multiple Choice

Which of the following installation types would require the use of an answer file to install the OS?

1

Unattended

2

Repair

3

Upgrade

58

Multiple Choice

A Mac user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the Mac. Which of the following built-in utilities should be used?

1

Time Machine

2

System Restore

59

Multiple Choice

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

1

Ensure the server is patched with the latest security updates

2

Educate the manager on safe Internet browsing practices

3

Create a policy to remove Internet access from the server during off hours

60

Multiple Choice

A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to theuser’s computer and identifies the problem.

Which of the following should the technician do NEXT?

1

Reboot the computer

2

Restart the network services

3

Roll back the device drivers

4

Rebuild the Windows profiles

61

Multiple Select

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Choose two.)

1

Administrative share permissions

2

Mapped drives

3

Group Policy hours restriction

4

Denied write/delete permissions

62

Multiple Choice

With which of the following types is a man-in-the-middle attack associated?

1

Brute force

2

Spoofing

3

DDoS

63

Multiple Choice

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

1

Phishing

2

Dumpster diving

64

Multiple Choice

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages load slowly or not atall, CPU performance is normal, and the local router can successfully ping. The remote connection

drops periodically.

1

Update the antivirus software, run an antivirus scan, verify the browser settings, and check all

email settings

2

Send a test email, open a command prompt to check the file system, and empty the browser

cache

65

Multiple Choice

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

1

Inactive VPN

2

Outdated antivirus

66

Multiple Choice

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?

1

Process diagram

2

Physical network diagram

3

Fiber backbone diagram

4

Logical topology diagram

67

Multiple Choice

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

1

grupdate

2

gpresult

68

Multiple Select

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Choose two.)

1

Spyware

2

Zombies

3

Virus

4

Worm

69

Multiple Choice

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.Which of the following settings or features is responsible for the problems Ann is experiencing?

1

Full device encryption

2

Multifactor authentication

70

Multiple Choice

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair?

1

End-user education

2

Disabling of System Restore

71

Multiple Choice

A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?

1

Roll back updates

2

Restore hidden updates

72

Multiple Select

An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense?

(Choose two.)

1

Remove applications from startup

2

Defragment the hard drive

3

Install a faster hard drive

73

Multiple Select

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement?

(Choose two.)

1

WPA2

2

Multifactor

3

WEP

4

SSO

74

Multiple Choice

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?

1

Image deployment

2

In-place upgrade

3

System repair

75

Multiple Select

Ann, an employee at a company, calls the help desk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.)

1

Ask Ann about the notification and review the installed programs

2

Attempt to log on to another vendor’s website from Ann’s laptop

3

Check all browser cached files on Ann’s laptop and log on to another vendor’s website

4

Reinstall the browser, reboot the laptop, and check the vendor’s website again

76

Multiple Choice

Which of the following is the maximum RAM limit of a Windows 32-bit version

1

32GB

2

8GB

3

no limit

4

4GB

77

Multiple Choice

A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

1

Check the application permissions

2

Reset the phone to factory settings

3

Run any pending OS updates

78

Multiple Choice

Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?

1

Single-factor

2

RADIUS

79

Multiple Choice

Which of the following devices provides protection against brownouts?

1

surge suppressor

2

battery backup

3

line conditioner

80

Multiple Choice

Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she opens a browser, she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?

1

There is unauthenticated wireless connectivity

2

She has exceeded the data allowance

3

It is an unrooted phone

4

A data plan was not purchased

81

Multiple Choice

A junior Linux systems administrator needs to update system software.

Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

1

sudo

2

grep

82

Multiple Choice

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

1

Firewall

2

Power levels

3

MAC filtering

4

Default SSID

83

Multiple Choice

A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?

1

Reboot into safe mode and roll back the updates

2

Repair the Windows Registry

3

Configure boot options in the BIOS

4

Disable Windows services and applications

84

Multiple Choice

A Windows user is attempting to install a local printer and is unsuccessful based on permissions. Which of the following user types BEST describes this user?

1

Guest

2

Power User

3

Administrator

4

Standard User

85

Multiple Choice

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the Internet. Which of the following actions should the user take?

1

Install anti-malware software

2

Update antivirus definitions

3

Enable the pop-up blocker

4

Reboot the PC

86

Multiple Choice

A desktop technician is attempting to upgrade several machines to Windows 10. After realizing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?

1

SSD

2

Optical drive

3

PXE

87

Multiple Choice

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

1

Document a backout plan to roll back changes to the router

2

Make the downtime window larger than actually anticipated

3

Configure a redundant data path to eliminate downtime

88

Multiple Choice

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?

1

Disable the user accounts

2

Restrict the user accounts

3

Reset the user accounts

89

Multiple Select

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the

wireless network? (Choose two.)

1

Reduce the transmit power

2

Reduce the channel availably

3

Disable the SSID broadcast

4

Implement WPA encryption

90

Multiple Choice

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the machine are:

Two 1GHz CPUs

2GB of memory

15GB hard drive

800 × 600 screen resolution

Which of the following should the technician do to resolve the problem?

1

Increase the amount of hard drive space

2

Increase the number of CPUs

91

Multiple Choice

A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have?

1

Rootkit

2

Keylogger

3

Trojan

92

Multiple Choice

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

1

Metro interface

2

Driver detection

93

Multiple Choice

Which of the following is considered government-regulated data?

1

End-user license agreement

2

PHI

3

Digital Millennium Copyright Act

94

Multiple Select

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Choose two.)

1

Default SSID

2

MAC filtering

3

QoS

4

Signal strength

95

Multiple Select

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Choose two.)

1

Disable guest account

2

Remove admin permissions

3

Modify AutoRun settings

96

Multiple Choice

A technician is installing the latest OS on a user’s system. The user wants all of the settings and files to remain intact during the installation. Which of the following upgrade methods should the technician use?

1

clean install

2

in-place upgrade

97

Multiple Choice

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?

1

Air filters

2

Privacy screens

3

Vacuums

98

Multiple Choice

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?

1

Use an antivirus product capable of performing heuristic analysis

2

Use a host-based intrusion detection system on each computer

3

Disallow the password caching of accounts in the administrators group

99

Multiple Choice

Which of the following techniques is used by malicious employees to obtain user passwords?

1

Main-in-the-middle

2

Phishing

3

Shoulder surfing

100

Multiple Choice

A technician is recycling PCs to be reused by a middle school.

Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

1

Standard formatting

2

HD drilling

3

Low-level formatting

101

Multiple Select

A user reports that when opening a web browser, the initial page loads to a search engine the user does not recognize. When the user performs searches on the site, the results are often irrelevant,

and there are many pop-ups. Which of the following should a technician do to resolve these issues? (Choose two.)

1

Reset the user’s browser to default settings

2

Remove any unapproved applications from the user’s startup items

3

Convince the user to use a different web browser that is currently unaffected

4

Reboot the user’s computer and install a secondary antivirus

102

Multiple Choice

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?

1

Unattended installation

2

Refresh upgrade

3

Clean installation

4

In-place upgrade

103

Multiple Choice

Which of the following is the MOST secure wireless security protocol?

1

AES

2

WPA

3

WPA2

4

WEP

104

Multiple Choice

Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?

1

Files disappearing

2

File permission changes

3

Application crash

4

Too many startup items

105

Multiple Select

Corporate management is concerned about the security of the company’s mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users.

Which of the following would provide the BEST level of protection in this scenario? (Choose two.)

1

Use full device encryption

2

Enable a pattern lock

3

Implement remote wipe features

4

Use device lockout policies

106

Multiple Choice

technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?

1

Provide documentation of the repair to the customer

2

Allow the customer to voice concerns and post the story to social media later

3

Inform the customer the job is done and return to the office

107

Multiple Choice

A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook?

1

Installation method

2

System requirements

3

OS compatibility

4

File permissions

108

Multiple Choice

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used?

1

Common access card

2

Privacy screen

109

Multiple Choice

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

1

RADIUS

2

WPA2

110

Multiple Choice

A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should the technician adjust to correct this issue?

1

Resolution

2

Refresh rate

3

Extended monitor

111

Multiple Choice

Which of the following built-in accounts was removed in Windows 10?

1

Power User

2

Administrator

3

Guest

112

Multiple Choice

A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. Thetechnician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT?

1

Check the boot order

2

Format the drive

3

Reboot into safe mode

113

Multiple Choice

Joe, a user who is travelling for business, reports that his mobile phone was getting approximately

35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the

device as a GPS to visit customers and as a hotspot to check work email and watch movies

online. Which of the following is the MOST likely cause of Joe’s slow data speeds?

1

Joe’s data transmission is over the limit

2

The use of GPS interferes with data speeds

114

Multiple Select

After a security audit, a technician is tasked with implementing new measures to help secure

company workstations. The new policy states that all workstations must be signed off at night, a

password is necessary to boot the computer, and encryption must be enabled.

Which of the following features should the technician implement to BEST meet these

requirements? (Choose three.)

1

Screen locks

2

Screensaver passwords

3

BitLocker

4

Smart card

115

Multiple Choice

A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?

1

PHI certification

2

PCI compliance

116

Multiple Choice

A technician has been dispatched to resolve a malware problem on a user’s workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT?

1

Quarantine the infected workstation from the network

2

Install all of the latest Windows Updates to patch the system

3

Educate the user on safe browsing practices

117

Multiple Choice

A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?

1

Check the data usage statistics on the device

2

Verify the SSID with which the device is associated

3

Run any pending application or OS updates

118

Multiple Choice

A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user’s workstation?

1

gpupdate

2

chkdsk

3

netstat

119

Multiple Choice

A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local

authorities arrive. Which of the following actions should the IT department perform NEXT?

1

Preserve data integrity

2

Collect evidence of illegal activity

3

Report through proper channels

120

Multiple Choice

Which of the following would a technician use to store memory chips from a laptop safely after an

upgrade?

1

Antistatic containers

2

Paper envelopes

121

Multiple Choice

Joe, a user, reports that several of his colleagues have received a suspicious email from his

account that he did not send. A technician asks one of the colleagues to forward the email for

inspection. After ruling out spoofing, the technician verifies the email originated from the corporate

email server.

Which of the following is the FIRST step the technician should take to correct this issue?

1

Change the password on Joe’s email account

2

Isolate Joe’s computer from the network

3

Update the antivirus and perform a full scan on the PC

122

Multiple Choice

A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST?

1

Check the status of the print server queue

2

Cancel all documents and print them again

123

Multiple Choice

systems administrator has discovered a folder on the server with numerous inappropriate

pictures and videos, which is in violation of the company’s AUP.

Which of the following would be the NEXT appropriate act?

1

Promptly notify the administrator’s immediate supervisor

2

Ask the owner to move the files from the server to a local computer

124

Multiple Choice

A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?

1

Degauss

2

Drive wipe

125

Multiple Select

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)

1

Access control lists

2

Multifactor authentication

3

Trusted software sources

126

Multiple Choice

A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?

1

rdp

2

SSH

127

Multiple Choice

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J”

assigned only to the drive.

Which of the following types of partitioning should be performed to give the customer full use of

the 3 TB drive?

1

GPT

2

Dynamic

128

Multiple Choice

Users notify the help desk of an email that was just received. The email came from the help desk’s email address and asked the users to click on an embedded link. This email is BEST described as:

1

whaling.

2

spoofing.

review 1002 50 questions

Slide image

Show answer

Auto Play

Slide 1 / 128

SLIDE