Question #351
Topic 1
A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?
Computers 2h
Quiz
•
Computers
•
12th Grade
•
Easy
Akau Anyieth
Used 5+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #351
Topic 1
A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?
A. Educate the end user on best practices for security.
B. Quarantine the host in the antivirus system.
C. Investigate how the system was infected with malware.
D. Create a system restore point.
Answer explanation
Before educating the user you should create a system restore point.
CompTIA has identified a seven-step best practice procedure for malware removal: 1. Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore in Windows. 4. Remediate infected systems: a) Update anti-malware software. b) Scanning and removal techniques (e.g., safe mode, preinstallation environment). 5. Schedule scans and run updates. 6. Enable System Restore and create a restore point in Windows. 7. Educate the end user.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #352
Topic 1
An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?
A. Preserving chain of custody
B. Implementing data protection policies
C. Informing law enforcement
D. Creating a summary of the incident
Answer explanation
A. Preserving chain of custody The administrator demonstrated the concept of preserving the chain of custody by documenting the movement of the evidence, which, in this case, involves the financial data copied to a portable hard drive. Explanation: Preserving chain of custody (Option A): Chain of custody refers to the chronological documentation or paper trail showing the collection, transfer, control, analysis, and disposition of physical or electronic evidence.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #353
Topic 1
A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive?
A. gpupdate
B. net use
C. hostname
D. dir
Answer explanation
Type the following command to map the network drive: "net use [drive letter]: \[network location][shared folder name]." For example, to map the network drive to drive letter Z: and the network location \server\shared, type "net use Z: \server\shared
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #354
Topic 1
Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and its files. Which of the following will MOST likely allow all users to access the new folders?
A. Assigning share permissions
B. Enabling inheritance
C. Requiring multifactor authentication
D. Removing archive attribute
Answer explanation
B. Enabling inheritance Enabling inheritance is the action that would most likely allow all users to access the new folders. Explanation: Enabling inheritance (Option B): Enabling inheritance allows new folders and files to inherit the permissions of their parent folder. If a user creates a new subfolder within the department share, enabling inheritance would mean that the new subfolder automatically inherits the permissions of the parent department share, providing access to other users.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #355
Topic 1
A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?
A. Phishing
B. Dumpster diving
C. Tailgating
D. Evil twin
Answer explanation
This scenario describes a Phishing attack. Phishing often involves tricking the user into opening a malicious attachment or visiting a malicious site. In this case, the user received a USB device (the “prize”) in the mail, which likely contained malicious software that caused the computer to stop booting. So, the correct answer is: A. Phishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #356
Topic 1
A macOS user is installing a new application. Which of the following system directories is the software most likely to install by default?
A. /etc/services
B. /Applications
C. /usr/bin
D. C:\Program Files
Answer explanation
The default installation directory for applications on Mac OS is /Applications/
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #357
Topic 1
A customer is requesting help with a technical issue. Which of the following techniques should the technician use to properly evaluate and correct the customer concern?
A. Have a videoconference using the customer’s personal phone so the customer can share the screen.
B. Ask yes or no questions so that the answers are clear.
C. Use open-ended questions to get additional information.
D. Ask for the customer’s password so the issue can be resolved quickly and directly by the technician.
Answer explanation
C. Use open-ended questions to get additional information. When dealing with technical issues, using open-ended questions is a good technique to gather additional information and understand the customer's concern more thoroughly. Open-ended questions encourage customers to provide detailed explanations, helping the technician to diagnose the problem accurately.
53 questions
Computers 4
Quiz
•
12th Grade
45 questions
Cybersecurity Quiz
Quiz
•
12th Grade
46 questions
CompTIA ITFundamentals CRAM
Quiz
•
6th Grade - University
47 questions
Computers 2d
Quiz
•
12th Grade
50 questions
Computers 2f
Quiz
•
12th Grade
50 questions
Computers 2c
Quiz
•
12th Grade
55 questions
Computers 7
Quiz
•
12th Grade
50 questions
Computers 2b
Quiz
•
12th Grade
15 questions
Multiplication Facts
Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz
Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set
Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025
Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)
Quiz
•
9th - 12th Grade
15 questions
June Review Quiz
Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles
Quiz
•
8th Grade
25 questions
Triangle Inequalities
Quiz
•
10th - 12th Grade
40 questions
Week 4 Student In Class Practice Set
Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025
Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)
Quiz
•
9th - 12th Grade
25 questions
Triangle Inequalities
Quiz
•
10th - 12th Grade
65 questions
MegaQuiz v2 2025
Quiz
•
9th - 12th Grade
10 questions
GPA Lesson
Lesson
•
9th - 12th Grade
15 questions
SMART Goals
Quiz
•
8th - 12th Grade
45 questions
Week 3.5 Review: Set 1
Quiz
•
9th - 12th Grade