Test 1 Flashcards Preview

902 Exam Test > Test 1 > Flashcards

Flashcards in Test 1 Deck (70)
Loading flashcards...
1
Q

A technician is instructed to configure a new workstation to boot the OS from the network. The technician must enable which of the following FIRST?

A. PXE
B. WOL
C. WiFi
D. UPNP

A

A. PXE

2
Q

A technician is troubleshooting a PC with multiple volumes. To verify which are active and assigned drive letters, the technician should use the LIST function of which of the following commands?

A. extract
B. diskpart
C. bootrec
D. chkdsk

A

B. diskpart

3
Q

When using Microsoft Windows 8.1 Operating System, which of the following features allows scripts and snippets to run?

A. One Drive
B. XP Mode
C. Power Shell
D. Windows Firewall

A

C. Power Shell

4
Q

A PC technician notices that the printers deployed via a new Group Policy are not showing up on the workstation. Which of the following commands should be run on the PC?

A. extract
B. robocopy
C. gpupdate
D. tasklist

A

C. gpupdate

5
Q

A technician is tasked with installing Windows on numerous network PCs. Which of the following is the QUICKEST method for getting a standard configuration to the PCs?

A. Prebuilt image using PXE
B. Single solid state/flash drive with answer file
C. Hot swappable image drive
D. Internal hard drive partition with the image

A

A. Prebuilt image using PXE

6
Q

A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however, when the laptop lid is closed, it goes into sleep mode. Which of the following Control Panel items can be used to disable this feature?

A. Action Center
B. System
C. Display Settings
D. Power Options

A

D. Power Options

7
Q

A technician is remotely connecting to a workstation using SSH to transfer a security hotfix. Which of the following command line tools would the technician use to create a directory to store the hotfix?

A. dir
B. rd
C. cd
D. md

A

D. md

8
Q

A small office experiences frequent power outages. Upon rebooting the Windows workstations after each power outage, users report the inability to open shared files. Which of the following MUST a technician configure to resolve this issue in the future?

A. Check the “Reconnect at logon” checkbox for the mapped network drive
B. Connect all computers in the office to UPS devices
C. Re-map the mapped network drive with the domain administrator account
D. Replace the hard drives on the file server hosting the shared files

A

A. Check the “Reconnect at logon” checkbox for the mapped network drive

9
Q

Which of the following updates should be performed on a regular basis to ensure the OS has the latest security patches?

A. Anti-malware updates
B. Driver updates
C. Windows updates
D. Firmware updates

A

C. Windows updates

10
Q

A technician is trying to install Windows on a computer. The install process reports there are no storage devices available, but the BIOS shows a hard drive is installed. Which of the following does the technician need to do?

A. Create a primary partition
B. Use NTFS
C. Enable PXE
D. Install third-party drivers

A

D. Install third-party drivers

11
Q

A customer with a PC has requested assistance setting up Windows 7 parental controls within the web browser. The customer would like to limit how much time a child can spend on a particular website. Which of the following tabs under Internet Options will allow the user to create those settings?

A. Privacy
B. Advanced
C. Security
D. Content

A

D. Content

12
Q

A technician is performing a clean install of Windows on a new hard drive from a factory DVD, but the computer does not recognize the optical disc. A “non-system disk or disk error” is observed. Which of the following should the technician do FIRST?

A. Update the motherboard firmware
B. Check the cables
C. Replace the optical drive
D. Check the BIOS setting

A

D. Check the BIOS setting

13
Q

An administrator has a new workstation that has been loaded with the Windows OS and configured with the proper IP settings. The workstation needs to be added to the corporation’s domain. Which of the following utilities will the administrator access to configure this setting?

A. System Properties
B. System Information
C. System Protection
D. System Management

A

A. System Properties

14
Q

Which of the following should be used to ensure that a Windows OS is functioning optimally?

A. Driver updates
B. Scheduled backups
C. Application updates
D. Restore points

A

A. Driver updates

15
Q

A technician needs to log into a user’s computer to fix the user’s corrupt local profile. Which of the following connectivity tools will allow the technician to connect to the user’s computer?

A. Remote Assistance
B. Virtual Private Network
C. Computer Management
D. Remote Desktop

A

D. Remote Desktop

16
Q

An end user needs to completely re-install Windows 7 on a home computer but it did not come with any OS discs. How would a technician accomplish this?

A. Recovery partition
B. Primary partition
C. System restore
D. System refresh

A

A. Recovery partition

17
Q

A user is unable to find the preferred default network printer in the printers list in the user profile. Which of the following is the FIRST step that should be taken?

A. Map printer
B. Reboot computer
C. Check to see if printer is turned on
D. Log in as a different user and see if printer is mapped

A

A. Map printer

18
Q

A technician needs to perform a backup while a system is running. Which of the following services allows this task to be accomplished?

A. Robocopy
B. Shadow copy
C. Xcopy
D. System restore

A

B. Shadow copy

19
Q

A technician has been tasked with loading the operating system on every PC with a blank hard drive on a network. The technician wishes to install the operating system with minimal physical interaction with the PCs. Which of the following is the BEST way to accomplish this?

A. Clone the operating system from an image onto optical media.
B. Use the original software media to load the operation system on every PC.
C. Set up a central image that the PCs can load from a PXE boot.
D. Create an image and copy it from a USB drive using an unattended answer file.

A

C. Set up a central image that the PCs can load from a PXE boot.

20
Q

A technician is attempting to remove malware from a customer’s workstation. Which of the following Control Panel utilities should the technician use?

A. Folder Options > View hidden files
B. System > Performance
C. Display Settings > Refresh rate
D. Internet Options > Privacy

A

A. Folder Options > View hidden files

21
Q

A technician is navigating through a Windows OS via command prompt. The technician needs to display the content of a folder. Which of the following is the BEST option for accomplishing this task?

A. dir
B. ls
C. rd
D. cmd

A

A. dir

22
Q

A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network?

A. SSH
B. VPN
C. SFTP
D. RDP

A

B. VPN

23
Q

A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates to Java, but is still unable to view the map. The technician should change which of the following Internet Options?

A. Compatibility view
B. Manage add-ons
C. Clear browser cache
D. Pop-up blocker

A

A. Compatibility view

24
Q

A technician has successfully completed a gpupdate from a CMD box of a user’s PC and is ready to move to the next user. Which of the following is the appropriate NEXT step? (Select TWO).

A. View the CMD process in Task Manager
B. Type EXIT at the command prompt and press Enter
C. Minimize the CMD box to the taskbar
D. Click the “x” in the top right of the CMD window
E. Select Switch User on the PC

A

B. Type EXIT at the command prompt and press Enter

D. Click the “x” in the top right of the CMD window

25
Q

An administrator is in a Remote Assistance session, sharing a user’s desktop. While trying to map a shared network drive for the user, an “access denied” error is encountered while using the user’s credentials. Which of the following should be the administrator’s NEXT step?

A. Ensure the user’s account is not locked out
B. Use the fully qualified domain name of the share
C. Open the location with administrator privileges
D. Try mapping with a different drive letter

A

C. Open the location with administrator privileges

26
Q

Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open?

A. Backup
B. Recovery Image
C. chkdsk
D. System Restore

A

D. System Restore

27
Q

A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser. Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings?

A. Advanced
B. Security
C. Privacy
D. Connections

A

A. Advanced

28
Q

Which of the following network hosts would MOST likely provide the services needed to allow client access to Internet web pages?

A. File server
B. Web server
C. WINS server
D. Proxy server

A

D. Proxy server

29
Q

Which of the following best practices is used to fix a zero-day vulnerability on Linux?

A. Scheduled backup
B. Scheduled disk maintenance
C. Patch management
D. Antivirus update

A

C. Patch management

30
Q

Which of the following tools is used to type or paste recovery commands directly into a Linux box?

A. Shell/terminal
B. Backup/time machine
C. Command/cmd
D. Restore/snapshot

A

A. Shell/terminal

31
Q

A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers?

A. 10 feet (3 meters)
B. 15 feet (5 meters)
C. 30 feet (9 meters)
D. 45 feet (14 meters)

A

C. 30 feet (9 meters)

32
Q

A user has a Windows 8.1 RT operating system and wants to add additional programs to the computer. Which of the following is available for installing more applications?

A. Microsoft Store
B. DVD
C. Google Play
D. iTunes

A

A. Microsoft Store

33
Q

A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types?

A. Hybrid
B. Community
C. Private
D. Public

A

A. Hybrid

34
Q

An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem?

A. The cable connected to the network
B. Virtual host network adapter
C. USB host adapter
D. The domain of the virtual machine

A

B. Virtual host network adapter

35
Q

A Google account on an Android device by default will synchronize to which of the following locations?

A. Cloud
B. SSD
C. PC desktop
D. MicroSD

A

A. Cloud

36
Q

How would a technician install Windows OS on a MAC OS computer without using third-party software?

A. Terminal
B. Boot Disk
C. Disk Utility
D. Boot Camp

A

D. Boot Camp

37
Q

A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this?

A. Google Drive
B. iCloud
C. One Drive
D. FTP

A

C. One Drive

38
Q

Virtual machines provide users with the ability to do which of the following?

A. Extend 32-bit machines to 64-bits
B. Share hardware resources
C. Increase the network download speed
D. Use less memory in the machine

A

B. Share hardware resources

39
Q

Which of the following features of a mobile device operates the touch screen?

A. Gyroscope
B. Digitizer
C. Accelerometer
D. Geotracking

A

B. Digitizer

40
Q

A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information?

A. DHCP server
B. DNS server
C. File server
D. Proxy server

A

A. DHCP server

41
Q

A technician is tasked with setting up a user’s webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail? (Select THREE).

A. Free/busy
B. Programs
C. Documents
D. Calendar
E. Favorites
F. Social media
G. Contacts
A

A. Free/busy
D. Calendar
G. Contacts

42
Q

A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications?

A. The workstation is victim of a denial of service attack.
B. The username is not authenticating on the network.
C. The username is not part of the local administrator group.
D. The administrator has not applied appropriate security patches.

A

C. The username is not part of the local administrator group.

43
Q

A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal?

A. VPN
B. ACL
C. RDP
D. DLP

A

B. ACL

44
Q

An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue?

A. The HIPS device is blocking the messages
B. The access control list is blocking the messages
C. The email filter has quarantined the messages
D. The firewall is blocking the sender’s email address

A

C. The email filter has quarantined the messages

45
Q

A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?

A. Enter all passwords they have used in the past
B. Verify a smart card has been issued
C. Check the network cable
D. Reboot the computer

A

B. Verify a smart card has been issued

46
Q

A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?

A. Require biometric identification to log into the laptop.
B. Require multifactor authentication to log into laptop.
C. Require laptop hard drives to be encrypted.
D. Require users to change their password at frequent intervals.
E. Require users to have strong passwords.

A

C. Require laptop hard drives to be encrypted.

47
Q

The type of security threat that uses computers or other networks to accept and pass on viruses is called:

A. phishing.
B. botnets.
C. logic bomb.
D. man-in-the-middle.

A

B. botnets.

48
Q

Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following?

A. Trojan horse
B. Spyware
C. Social engineering
D. Worms

A

A. Trojan horse

49
Q

A technician is attempting to manually migrate a user’s profile from one Windows PC to another. Files in the user’s My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur?

A. exFAT
B. COMPRESSED
C. EFS
D. NTFS

A

C. EFS

50
Q

When securing a mobile device, which of the following types of screen locks is the MOST secure?

A. Fingerprint lock
B. Swipe lock
C. Passcode lock
D. Face lock

A

A. Fingerprint lock

51
Q

A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?

A. chkdsk
B. Degauss
C. Quick format
D. Drive wipe

A

D. Drive wipe

52
Q

A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees’ laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change?

A. Enable MAC filtering
B. Disable SSID broadcast
C. Reduce radio power level
D. Update router firmware

A

A. Enable MAC filtering

53
Q

A technician is configuring wireless for a home office. The customer wants to prevent others from accessing the wireless network. The customer has a small number of devices on the network and does not want to have to remember a complicated password. Which of the following should the technician recommend?

A. Enable MAC filtering
B. Disable SSID broadcast
C. Assign static IP addresses
D. Turn on content filtering

A

A. Enable MAC filtering

54
Q

A technician has been notified that recent vulnerabilities have been discovered related to a type of SOHO router. The technician has verified that all connections and settings are appropriate. Which of the following actions should the technician take NEXT?

A. Change the router firewall settings
B. Check for and apply a firmware update
C. Reconfigure the QoS settings
D. Change router user-names and passwords

A

B. Check for and apply a firmware update

55
Q

A technician needs to quickly destroy data on several hard drives that are no longer wanted. Which of the following methods is MOST effective?

A. Physical destruction
B. Quick format
C. Low level format
D. Overwrite

A

A. Physical destruction

56
Q

Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO).

A. Use multi-factor authentication
B. Require strong passwords
C. Enable file encryption
D. Educate end users
E. Restrict user permissions
A

A. Use multi-factor authentication

D. Educate end users

57
Q

A technician has been tasked with disposing of hard drives that contain sensitive employee data. Which of the following would be the BEST method to use for disposing of these drives?

A. Recycling
B. Shredding
C. Overwriting
D. Reformatting

A

B. Shredding

58
Q

Ann, an executive, reports that she received a call from someone asking for information about her email account. Which of the following type of potential security threats does this scenario describe?

A. Social engineering
B. Spoofing
C. Zero-day
D. Man-in-the-middle

A

A. Social engineering

59
Q

A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? (Select TWO).

A. Rename default accounts
B. Disable Windows Update
C. Configure single sign-on
D. Run gpupdate tool
E. Disable guest account
F. Disable Action Center pop-ups
A

A. Rename default accounts

E. Disable guest account

60
Q

Which of the following prevention methods is considered to be digital security?

A. RFID badge
B. Mantrap
C. Biometrics
D. Firewalls
E. ID badge
A

D. Firewalls

61
Q

Which of the following Windows features would be used to encrypt a single file or folder?

A. EFS
B. NTFS
C. BitLocker
D. Security

A

A. EFS

62
Q

A turnstile is an example of which of the following forms of physical security?

A. Entry control roster
B. Biometrics
C. Mantrap
D. Cipher lock

A

C. Mantrap

63
Q

A user wants to save a file into another user’s directory, but the file save is denied. Which of the following is the MOST likely reason the file save cannot be completed?

A. The user must be a member of the Users group
B. The user requires write permissions to the folder
C. The user requires read permission to the folder
D. The user must be a member of the Administrators group

A

B. The user requires write permissions to the folder

64
Q

A user leaves the workstation frequently and does not want sensitive material to be accessed. In addition, the user does not want to turn off the computer every time in the evening. Which of the following is the BEST solution for securing the workstation?

A. Set a strong password that requires a renewal every 30 days.
B. Run a screensaver after one minute of nonuse and fingerprint lock for afterhours.
C. Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours.
D. Require a password and fingerprint lock afterhours.

A

C. Apply a screen lock after five minutes of nonuse and login time restrictions for afterhours.

65
Q

A technician is configuring a SOHO router to ensure network computers can only use secured protocols on the Internet. Which of the following ports should be allowed?

A. 143
B. 23
C. 443
D. 3269
E. 3389
A

C. 443

66
Q

An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?

A. Antivirus software
B. Internet connectivity issues
C. Ransomware infection
D. Content-filtering

A

D. Content-filtering

67
Q

Joe, an end-user, reports that the PC he uses periodically logs off his user account and displays a message that updates are being installed. Which of the following is the MOST likely cause of this issue?

A. Time of day restrictions are enabled on the machine
B. Scheduled antivirus scans and updates are enabled on the machine
C. Remote desktop is enabled and an administrator has logged into the machine
D. Automatic Windows Update is enabled on the machine

A

D. Automatic Windows Update is enabled on the machine.

68
Q

A user advises that a computer is displaying pop-ups when connected to the Internet. After updating and running anti-malware software, the problem persists and the technician finds that two rogue processes cannot be killed. Which of the following should be done NEXT to continue troubleshooting the problem?

A. Run msconfig to clean boot the computer
B. Run Event Viewer to identify the cause
C. Run System Restore to revert to previous state
D. Run Recovery Console to kill the processes

A

A. Run msconfig to clean boot the computer

69
Q

A user reports that any URL entered redirects to the same web page. A technician concludes that the user’s computer has been compromised. Which of the following tools would the technician use to resolve the issue?

A. Last known good configuration
B. Anti-malware
C. System restore
D. Rogue antivirus

A

B. Anti-malware

70
Q

A user’s email inbox is suddenly receiving dozens of rejection messages from various mail servers. Which of the following would the technician perform to BEST solve the issue?

A. Change the user’s email password.
B. Enable spam filtering on the email account.
C. Change the email account from POP to IMAP.
D. Disable the user’s email account.

A

A. Change the user’s email password.