

review 1002 50 questions
Presentation
•
Computers
•
University
•
Practice Problem
•
Medium
earnest colvin
Used 16+ times
FREE Resource
1 Slide • 127 Questions
1
review 1002 50 questions

2
Multiple Choice
A technician responds to a call from a user who claims to have a virus on a workstation. The
technician observes the following notification from the system tray:
There are 1033 infected files on this computer. Click here to disinfect.
The link is blocked by the corporate content filter and displays a message stating the site contains
known malware.
Which of the following should the technician complete to secure the computer with MINIMAL
impact to the user?
Compare the startup items and services to a known clean image, and remove any startup items
not found in the other image. Run an anti-malware scan.
Validate that the alerts are false positives, and disable security software on the workstation to
prevent further false notifications.
3
Multiple Choice
A user’s corporate email is missing the shared inbox folders that were present before the user
went on vacation. The technician verifies the user is connected to the domain and can still send
and receive email.
Which of the following is MOST likely causing the missing folders issue?
The operating system updates have changed
The network directory permissions have changed
4
Multiple Choice
During the firmware upgrade of a web server, a power outage occurred. The outage caused a
failure within the upgrade.
Which of the following plans must be implemented to revert back to the most recent version of the
firmware?
Alternative plan
Backup plan
Contingency plan
5
Multiple Choice
An office manager emails a technical support contractor about a new desktop for one of the
workers. The office manager provides a specific configuration for the desktop. The technician
notes the request will require the purchase of a new system. New system purchases are not in the
scope of the support agreement.
Which of the following should the technician do NEXT?
Create a risk analysis report for review
Submit a change order for approval
Insist the worker accepts the standard desktop
6
Multiple Choice
Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?
Image deployment installation
Repair installation
7
Multiple Choice
A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization.
Which of the following security concepts has the company just enabled?
Least privilege
Certificates
8
Multiple Choice
A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST?
Disconnect the PC from the network
Perform an antivirus scan
9
Multiple Choice
A technician performs a virus cleaning on a computer that has been redirecting all browsers to a
phishing website. System Restore was turned off before the cleaning. The technician runs the
machine through several scanners, and then tests for redirection. A smaller number of sites are
still redirecting to the phishing website. The antivirus software correctly blocks the website.
Which of the following should the technician do NEXT?
Check the contents of the hosts file
Do a System Restore to a date before the infection
10
Multiple Select
A user calls a technician to report issues when logging in to a vendor’s website. The technician is
able to log in successfully before going to the office. However, the technician is unable to log in
when in the user’s office. The user also informs the technician of strange pop-up notifications.
Which of the following are the MOST likely causes of these issues? (Choose two.)
Proxy settings are configured improperly
There is a rogue anti-malware program
System files have been deleted
11
Multiple Choice
Which of the following is a reason to use WEP over WPA?
Device compatibility
Increased security
12
Multiple Choice
When a user browses to a favorite website on a Windows laptop, a different website opens. A
technician installs an additional web browser, but it also opens to the same unfamiliar site. The
technician resets the web browser settings back to default, but the issue persists.
Which of the following troubleshooting steps should the technician complete NEXT?
Check the Windows host file
Update the default web browser
13
Multiple Choice
Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?
BranchCache
Domain access
14
Multiple Choice
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connectedto the hotspot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has ahotspot on her phone, and the speed test result on that hotspot is 15Mbps. The technician checks the hotspot settings on Joe’s phone and sees the following:
Joe should be using WEP security on his hotspot for faster throughput
Someone else is using Joe’s hotspot due to weak password
15
Multiple Choice
A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining
user settings. The users currently have Windows 8 and want to upgrade to Windows 10.
Which of the following installation methods would the technician MOST likely use to accomplish
this quickly?
Unattended installation
Remote network installation
16
Multiple Choice
A technician received 300 old desktops following a recent computer upgrade. After taking
inventory of the old machines, the technician must destroy the data on the HDDs.
Which of the following would be the MOST effective method to accomplish this task?
Drill
Hammer
Degaussing
17
Multiple Choice
A user reports malware activity on an isolated workstation used for testing. It is running an end-oflife
OS, and a USB drive is the only method used to transfer files. After removing the malware and
replacing the USB drive with a brand new one, the technician gives the approval to use the
equipment. The next day the user reports the same malware activity is present after powering on
the system.
Which of the following did the technician forget to do to prevent reinfection?
Connect to the network and update the OS with the latest security patches
Update the local antivirus and set it to scan automatically every evening
18
Multiple Choice
A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network.Which of the following best practices could have prevented the attack?
Changing default credentials
Disabling AutoRun
Removing Guest account
19
Multiple Choice
A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future?
Surge protector
Battery backup
20
Multiple Choice
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?
Disconnect the power before servicing the PC
Put on an ESD strap.
21
Multiple Choice
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed?
No boot device available
Operating system not found
BIOS ROM checksum error
22
Multiple Choice
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure. Which of the following should the help desk perform to fix the issue?
Remote into Ann’s system and restart the wireless adapter
Ask Ann to open a browser and watch for a redirect page
23
Multiple Choice
A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage.Which of the following would the project team MOST likely add to the SOW?
Risk analysis
Plan to change
Backout plan
24
Multiple Choice
A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?
Roll back updates
Restore hidden updates
25
Multiple Select
An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense?
(Choose two.)
Remove applications from startup
Defragment the hard drive
Install a faster hard drive
End the processes in Task Manager
26
Multiple Choice
In which of the following file extension types would a user expect to see the command. “net use
T:\\server\files”?
.bat
.vbs
27
Multiple Choice
A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the
following should the technician do FIRST?
Update the OS of the smartphones
Roll back the application to the earlier version
28
Multiple Select
A technician is working on a Windows 10 PC that is running slowly.
Which of the following commands should the technician use to correct this issue? (Choose two.)
chkdsk
dism
ipconfig
format
29
Multiple Select
An administrator is setting up a Windows terminal server.
Which of the following settings should the administrator modify to increase server security?
(Choose two.)
Put the terminal server into the router’s DMZ
Block all unused ports on the LAN smart switch
Use the local client certificate for server authentication
30
Multiple Choice
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?
SSH
RDP
31
Multiple Select
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)
Default login
WEP
Outdated firmware
32
Multiple Choice
In which of the following file extension types would a user expect to see the command. “net use
T:\\server\files”?
.bat
.vbs
33
Multiple Choice
A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.
Which of the following naming convention formats should the technician follow?
Asset ID, MAC address
Domain name, location, IP address
34
Multiple Select
Which of the following provide the BEST security for a server room? (Choose two.)
Badge reader
Cable lock
USB token
Privacy window shades
35
Multiple Choice
Which of the following threats uses personalized information in an attempt at obtaining information?
Spear phishing
Spoofing
36
Multiple Choice
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?
Date and time
UEFI boot mode
Logon times
37
Multiple Choice
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?
Internet Options – Connections
Internet Options – Content
38
Multiple Choice
Which of the following is the amount of memory a user is limited to with a 32-bit version of
Windows?
4GB
8GB
39
Multiple Choice
A technician is working at a help desk firm and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?
Ask another technician to take the call
Input the issue as a ticket and escalate to Tier 2
40
Multiple Choice
A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?
Fingerprint lock
Swipe lock
41
Multiple Select
Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Choose two.)
UPS
Server rack
Desktop printer
42
Multiple Choice
A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?
Require authentication on wake-up
Disable single sign-on
43
Multiple Choice
Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?
A firewall exception must be set
A corporate VPN is enabled
44
Multiple Choice
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?
Uninstall one antivirus software program and install a different one
Remove the user-installed antivirus software
45
Multiple Choice
A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive spacewith a 1.7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance
on this computer
Windows 7
Windows 8
46
Multiple Choice
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?
Ask more open-ended questions to see if the issue can be narrowed down in order to properly
identify the issue and save time
Since Joe is concerned about time, suggest calling back later when Joe has more time to
troubleshoot
47
Multiple Choice
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?
SSO
Permission propagation
48
Multiple Choice
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs in automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk
machine?
Guest
Remote Desktop User
49
Multiple Choice
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license types should the technician recommend?
Open license
Enterprise license
50
Multiple Choice
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed?
Set up alerts to let administrators know when backups fail
Set up scripts that automatically rerun failed backup jobs
51
Multiple Select
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Choose
two.)
Cloud storage
Hot site
Waterproof devices
52
Multiple Choice
A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?
Look up the error number associated with the failed update
Download the failed update to install manually
53
Multiple Choice
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?
Folder Options
System
54
Multiple Choice
A technician has identified malware on a user’s system.
Which of the following should the technician do NEXT according to malware removal best practices?
Move the infected system to a lab with no network connectivity
Educate the user about how to avoid malware in the future
55
Multiple Choice
A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?
Task Manager
MSConfig
56
Multiple Choice
A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?
Uninterruptible power supply
Power strip
57
Multiple Choice
Which of the following installation types would require the use of an answer file to install the OS?
Unattended
Repair
Upgrade
58
Multiple Choice
A Mac user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the Mac. Which of the following built-in utilities should be used?
Time Machine
System Restore
59
Multiple Choice
A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?
Ensure the server is patched with the latest security updates
Educate the manager on safe Internet browsing practices
Create a policy to remove Internet access from the server during off hours
60
Multiple Choice
A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to theuser’s computer and identifies the problem.
Which of the following should the technician do NEXT?
Reboot the computer
Restart the network services
Roll back the device drivers
Rebuild the Windows profiles
61
Multiple Select
A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Choose two.)
Administrative share permissions
Mapped drives
Group Policy hours restriction
Denied write/delete permissions
62
Multiple Choice
With which of the following types is a man-in-the-middle attack associated?
Brute force
Spoofing
DDoS
63
Multiple Choice
An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?
Phishing
Dumpster diving
64
Multiple Choice
A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages load slowly or not atall, CPU performance is normal, and the local router can successfully ping. The remote connection
drops periodically.
Update the antivirus software, run an antivirus scan, verify the browser settings, and check all
email settings
Send a test email, open a command prompt to check the file system, and empty the browser
cache
65
Multiple Choice
An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?
Inactive VPN
Outdated antivirus
66
Multiple Choice
A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?
Process diagram
Physical network diagram
Fiber backbone diagram
Logical topology diagram
67
Multiple Choice
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?
grupdate
gpresult
68
Multiple Select
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Choose two.)
Spyware
Zombies
Virus
Worm
69
Multiple Choice
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.Which of the following settings or features is responsible for the problems Ann is experiencing?
Full device encryption
Multifactor authentication
70
Multiple Choice
Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair?
End-user education
Disabling of System Restore
71
Multiple Choice
A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue?
Roll back updates
Restore hidden updates
72
Multiple Select
An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense?
(Choose two.)
Remove applications from startup
Defragment the hard drive
Install a faster hard drive
73
Multiple Select
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. Which of the following protocols and authentication methods should the technician implement?
(Choose two.)
WPA2
Multifactor
WEP
SSO
74
Multiple Choice
A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?
Image deployment
In-place upgrade
System repair
75
Multiple Select
Ann, an employee at a company, calls the help desk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.)
Ask Ann about the notification and review the installed programs
Attempt to log on to another vendor’s website from Ann’s laptop
Check all browser cached files on Ann’s laptop and log on to another vendor’s website
Reinstall the browser, reboot the laptop, and check the vendor’s website again
76
Multiple Choice
Which of the following is the maximum RAM limit of a Windows 32-bit version
32GB
8GB
no limit
4GB
77
Multiple Choice
A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?
Check the application permissions
Reset the phone to factory settings
Run any pending OS updates
78
Multiple Choice
Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested?
Single-factor
RADIUS
79
Multiple Choice
Which of the following devices provides protection against brownouts?
surge suppressor
battery backup
line conditioner
80
Multiple Choice
Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she opens a browser, she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?
There is unauthenticated wireless connectivity
She has exceeded the data allowance
It is an unrooted phone
A data plan was not purchased
81
Multiple Choice
A junior Linux systems administrator needs to update system software.
Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?
sudo
grep
82
Multiple Choice
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?
Firewall
Power levels
MAC filtering
Default SSID
83
Multiple Choice
A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT?
Reboot into safe mode and roll back the updates
Repair the Windows Registry
Configure boot options in the BIOS
Disable Windows services and applications
84
Multiple Choice
A Windows user is attempting to install a local printer and is unsuccessful based on permissions. Which of the following user types BEST describes this user?
Guest
Power User
Administrator
Standard User
85
Multiple Choice
An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the Internet. Which of the following actions should the user take?
Install anti-malware software
Update antivirus definitions
Enable the pop-up blocker
Reboot the PC
86
Multiple Choice
A desktop technician is attempting to upgrade several machines to Windows 10. After realizing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?
SSD
Optical drive
PXE
87
Multiple Choice
A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?
Document a backout plan to roll back changes to the router
Make the downtime window larger than actually anticipated
Configure a redundant data path to eliminate downtime
88
Multiple Choice
A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?
Disable the user accounts
Restrict the user accounts
Reset the user accounts
89
Multiple Select
A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the
wireless network? (Choose two.)
Reduce the transmit power
Reduce the channel availably
Disable the SSID broadcast
Implement WPA encryption
90
Multiple Choice
A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the machine are:
Two 1GHz CPUs
2GB of memory
15GB hard drive
800 × 600 screen resolution
Which of the following should the technician do to resolve the problem?
Increase the amount of hard drive space
Increase the number of CPUs
91
Multiple Choice
A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have?
Rootkit
Keylogger
Trojan
92
Multiple Choice
Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?
Metro interface
Driver detection
93
Multiple Choice
Which of the following is considered government-regulated data?
End-user license agreement
PHI
Digital Millennium Copyright Act
94
Multiple Select
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Choose two.)
Default SSID
MAC filtering
QoS
Signal strength
95
Multiple Select
A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Choose two.)
Disable guest account
Remove admin permissions
Modify AutoRun settings
96
Multiple Choice
A technician is installing the latest OS on a user’s system. The user wants all of the settings and files to remain intact during the installation. Which of the following upgrade methods should the technician use?
clean install
in-place upgrade
97
Multiple Choice
A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?
Air filters
Privacy screens
Vacuums
98
Multiple Choice
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?
Use an antivirus product capable of performing heuristic analysis
Use a host-based intrusion detection system on each computer
Disallow the password caching of accounts in the administrators group
99
Multiple Choice
Which of the following techniques is used by malicious employees to obtain user passwords?
Main-in-the-middle
Phishing
Shoulder surfing
100
Multiple Choice
A technician is recycling PCs to be reused by a middle school.
Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?
Standard formatting
HD drilling
Low-level formatting
101
Multiple Select
A user reports that when opening a web browser, the initial page loads to a search engine the user does not recognize. When the user performs searches on the site, the results are often irrelevant,
and there are many pop-ups. Which of the following should a technician do to resolve these issues? (Choose two.)
Reset the user’s browser to default settings
Remove any unapproved applications from the user’s startup items
Convince the user to use a different web browser that is currently unaffected
Reboot the user’s computer and install a secondary antivirus
102
Multiple Choice
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?
Unattended installation
Refresh upgrade
Clean installation
In-place upgrade
103
Multiple Choice
Which of the following is the MOST secure wireless security protocol?
AES
WPA
WPA2
WEP
104
Multiple Choice
Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?
Files disappearing
File permission changes
Application crash
Too many startup items
105
Multiple Select
Corporate management is concerned about the security of the company’s mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users.
Which of the following would provide the BEST level of protection in this scenario? (Choose two.)
Use full device encryption
Enable a pattern lock
Implement remote wipe features
Use device lockout policies
106
Multiple Choice
technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?
Provide documentation of the repair to the customer
Allow the customer to voice concerns and post the story to social media later
Inform the customer the job is done and return to the office
107
Multiple Choice
A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook?
Installation method
System requirements
OS compatibility
File permissions
108
Multiple Choice
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used?
Common access card
Privacy screen
109
Multiple Choice
Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?
RADIUS
WPA2
110
Multiple Choice
A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should the technician adjust to correct this issue?
Resolution
Refresh rate
Extended monitor
111
Multiple Choice
Which of the following built-in accounts was removed in Windows 10?
Power User
Administrator
Guest
112
Multiple Choice
A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. Thetechnician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT?
Check the boot order
Format the drive
Reboot into safe mode
113
Multiple Choice
Joe, a user who is travelling for business, reports that his mobile phone was getting approximately
35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the
device as a GPS to visit customers and as a hotspot to check work email and watch movies
online. Which of the following is the MOST likely cause of Joe’s slow data speeds?
Joe’s data transmission is over the limit
The use of GPS interferes with data speeds
114
Multiple Select
After a security audit, a technician is tasked with implementing new measures to help secure
company workstations. The new policy states that all workstations must be signed off at night, a
password is necessary to boot the computer, and encryption must be enabled.
Which of the following features should the technician implement to BEST meet these
requirements? (Choose three.)
Screen locks
Screensaver passwords
BitLocker
Smart card
115
Multiple Choice
A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?
PHI certification
PCI compliance
116
Multiple Choice
A technician has been dispatched to resolve a malware problem on a user’s workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT?
Quarantine the infected workstation from the network
Install all of the latest Windows Updates to patch the system
Educate the user on safe browsing practices
117
Multiple Choice
A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?
Check the data usage statistics on the device
Verify the SSID with which the device is associated
Run any pending application or OS updates
118
Multiple Choice
A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user’s workstation?
gpupdate
chkdsk
netstat
119
Multiple Choice
A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local
authorities arrive. Which of the following actions should the IT department perform NEXT?
Preserve data integrity
Collect evidence of illegal activity
Report through proper channels
120
Multiple Choice
Which of the following would a technician use to store memory chips from a laptop safely after an
upgrade?
Antistatic containers
Paper envelopes
121
Multiple Choice
Joe, a user, reports that several of his colleagues have received a suspicious email from his
account that he did not send. A technician asks one of the colleagues to forward the email for
inspection. After ruling out spoofing, the technician verifies the email originated from the corporate
email server.
Which of the following is the FIRST step the technician should take to correct this issue?
Change the password on Joe’s email account
Isolate Joe’s computer from the network
Update the antivirus and perform a full scan on the PC
122
Multiple Choice
A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST?
Check the status of the print server queue
Cancel all documents and print them again
123
Multiple Choice
systems administrator has discovered a folder on the server with numerous inappropriate
pictures and videos, which is in violation of the company’s AUP.
Which of the following would be the NEXT appropriate act?
Promptly notify the administrator’s immediate supervisor
Ask the owner to move the files from the server to a local computer
124
Multiple Choice
A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?
Degauss
Drive wipe
125
Multiple Select
Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)
Access control lists
Multifactor authentication
Trusted software sources
126
Multiple Choice
A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router?
rdp
SSH
127
Multiple Choice
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J”
assigned only to the drive.
Which of the following types of partitioning should be performed to give the customer full use of
the 3 TB drive?
GPT
Dynamic
128
Multiple Choice
Users notify the help desk of an email that was just received. The email came from the help desk’s email address and asked the users to click on an embedded link. This email is BEST described as:
whaling.
spoofing.
review 1002 50 questions

Show answer
Auto Play
Slide 1 / 128
SLIDE
Similar Resources on Wayground
121 questions
Why Big Data Matters?
Lesson
•
University
123 questions
Writing Foundation 1
Lesson
•
University
122 questions
Repaso Final Español
Lesson
•
University
123 questions
Health Skills Grade 12 Term 2 Chapter 7
Lesson
•
12th Grade
126 questions
APES Population Review
Lesson
•
12th Grade
117 questions
MAKHLUK HIDUP DAN LINGKUNGAN SEKITARNYA
Lesson
•
12th Grade
122 questions
VUS OD級三第八 Sports Success L1, L2, L3 Project
Lesson
•
University
116 questions
F6 E4 Unit 4.2 Manufacturing Industry ZDR
Lesson
•
12th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Computers
20 questions
Disney Trivia
Quiz
•
University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
14 questions
Ch.3_TEACHER-led
Quiz
•
University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University