Search Header Logo

ET-C2 (1-25)

Authored by Roger White

Computers

2nd Grade

Used 7+ times

ET-C2 (1-25)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

SFTP

SSH

VNC

MSRA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?

Reinstalling Windows

Performing a quick format

Using disk-wiping software

Deleting all files from command-line interface

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

Reset the phone to factory settings.

Uninstall the fraudulent application.

Increase the data plan limits.

Disable the mobile hotspot.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

End user acceptance

Perform risk analysis

Communicate to stakeholders

Sandbox testing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user's PC is infected with ransomware. Which of the following should the technician do FIRST?

Scan and remove the malware.

Schedule automated malware scans.

Quarantine the system.

Disable System Restore.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

Anti-malware

Remote wipe

Locator applications

Screen lock

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?

Run a full antivirus scan on the computer.

Disable the browser from sending notifications to the Action Center.

Disable all Action Center notifications.

Move specific site notifications from Allowed to Block.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?