Test 3 Flashcards Preview

902 Exam Test > Test 3 > Flashcards

Flashcards in Test 3 Deck (72)
Loading flashcards...
1
Q

Which of the following is the MAIN reason that corporate policies protect access to PII?

A. To protect proprietary company data
B. To reduce the likelihood of identity theft
C. To maintain the integrity of knowledge management systems
D. To limit access to those who “need to know”

A

B. To reduce the likelihood of identity theft

2
Q

A technician performs an in-place upgrade from Windows 7 to 8.1. After the upgrade is complete, a user reports that a frequently used file will not open. Instead, the user is prompted to search the Windows Store for an appropriate program to open the file. Which of the following should the technician do FIRST?

A. Install the most recent Windows updates
B. Verify the USMT worked properly
C. Reconfigure the default program for the file type
D. Perform System Restore
E. Reinstall the program that is usually used to open the file

A

A. Install the most recent Windows updates

3
Q

A technician is working on a computer when the PC suddenly experiences a blue screen and restarts before the technician can note the error message. The computer boots up normally, and the technician now wants to know which error message was displayed.
Which of the following should the technician use to help troubleshoot the issue?

A. sfc
B. msconfig
C. regedit32
D. eventvwr
E. msinfo32
A

D. eventvwr

4
Q

An administrator needs to create a new folder on a Windows PC. Which of the following commands should the administrator use?

A. cd
B. md
C. sc
D. ftp
E. mkdir
A

E. mkdir

5
Q

A home user reports the PC is running slow, and pop-up advertisements are appearing on screen. The user can access the Internet and performs an antivirus scan. A technician is now troubleshooting the problem and cannot update the antivirus to the latest definitions or navigate to the vendor’s support website. Which of the following is the BEST next step to resolve this issue?

A. Uninstall the antivirus program and apply operating system patches
B. Utilize a different antivirus program and scan method
C. Format and reinstall
D. Reinstall the antivirus program from a shared executable

A

B. Utilize a different antivirus program and scan method

6
Q

Which of the following are examples of possession authentication? (Choose three.)

A. Key fob
B. RFID badge
C. Passphrase
D. PIN
E. Passwords
F. Smartphone
G. Fingerprint reader
A

A. Key fob
B. RFID badge
F. Smartphone

7
Q

A technician installs Windows 7 on a 4TB hard drive. Which of the following should the technician choose when initializing the drive for the machine to access all the disk space?

A. GPT
B. FAT32
C. MBR
D. exFAT

A

B. FAT32

8
Q

An employee installed a new application on a shared Windows 10 PC. The next day, it becomes the employee who installed the application is the only one who has access to the application. Which of the following types of user accounts does the employee MOST likely have?

A. Administrator
B. Guest
C. Super user
D. Standard user
E. Limited user
A

A. Administrator

9
Q

A technician has been tasked with remotely imaging a computer tab. The imaging process is failing because there is no response from the computers over the network. Which of the following should the technician perform to resolve the issue? (Choose two.)

A. Configure remote desktop connection
B. Configure BIOS to enable Wake-on-LAN
C. Configure BIOS to enable SSH
D. Configure automatic updates
E. Configure startup applications
F. Configure BIOS to enable PXE boot
A

A. Configure remote desktop connection

B. Configure BIOS to enable Wake-on-LAN

10
Q

A technician is attempting to troubleshoot a Linux home folder issue, but does not remember which directory is current. Which of the following tools should the technician use to find the current directory?

A. dir
B. sudo
C. cd
D. pwd

A

D. pwd

11
Q

A technician needs to upgrade 20 PCs that have the same hardware specifications. The PCs must be configured with identical settings tailored for the network. Which of the following provides the BEST solution with the LEAST administrative effort?

A. PC backup and multiboot setup
B. PC backup and system image deployment
C. PC backup and OS upgrade
D. PC backup and clean install

A

B. PC backup and system image deployment

12
Q

A client has requested a workspace environment configuration that will allow employees to work in a virtual space for specific projects, but when working on other projects, allow them to work locally. Which of the following is the BEST solution for this virtual configuration?

A. Multiheaded client
B. Thin client
C. Zero client
D. Thick client

A

A. Multiheaded client

13
Q

A technician was told that 50 new computers were delivered. The company’s standard Windows image needs to be installed on all of them. Which of the following would be the MOST efficient way to get the image on all 50 computers?

A. Multiboot installation
B. Repair installation
C. Unattended installation
D. Clean installation

A

C. Unattended installation

14
Q

A company wants to leverage a cloud infrastructure that allows it to keep confidential information away from other companies outside its industry while allowing data to be shared with other companies in the same field. Which of the following is the BEST option to accomplish this task?

A. Public
B. Hybrid
C. Community
D. Private

A

B. Hybrid

15
Q

A domain administrator has applied a Group Policy that restricts the installation of USB devices. The technician has asked the domain administrator to exempt this policy for a computer that needs to have a USB digital camera installed. Once the domain administrator has exempted the computer from the policy, which of the following is the BEST command for the technician to run locally on the computer so the digital camera can be installed without waiting?

A. grupdate /?
B. grupdate /bootings
C. grupdate /force
D. grupdate /logoff
E. grupdate /sync
A

E. grupdate /sync

16
Q

A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue?

A. Remove and reinstall the application
B. Hard reset the cell phone
C. Reconnect the wireless network connection
D. Close all running applications

A

B. Hard reset the cell phone

17
Q

A technician is troubleshooting a computer that has been infected with a virus. Upon rebooting, the computer states that NTLDR is missing. The computer cannot boot into safe mode, and reinstalling the OS is not an option. Which of the following is the BEST option to use to restore the machine to a bootable state?

A. Remove the CMOS battery
B. Run Startup Repair
C. Format the C drive
D. Repair the MBR and then reboot

A

B. Run Startup Repair

18
Q

A user reports the screen on a mobile device frequently dims even when the device settings are not being changed. Which of the following is MOST likely the cause?

A. Faulty backlight
B. High contrast mode
C. Auto-brightness
D. Power saving mode

A

D. Power saving mode

19
Q

To implement additional security on a small office wireless network, the administrator disables the DHCP server on the wireless router. To ensure traffic from specific network interfaces is able to traverse the router, which of the following should be used to limit traffic?

A. DHCP reservations
B. SSID broadcast deactivation
C. MAC filtering
D. Two-factor authentication

A

A. DHCP reservations

20
Q

A user reports personal files have been renamed and are undecipherable. Images have been to the user’s folder that request payment to unlock the files. The technician has quarantined the infected system and disabled System Restore. Which of the following should the technician do to unlock the user’s files?

A. Perform a clean installation of Windows
B. Remove the malware and recover the files from a backup
C. Initialize and repartition the hard drive to recover the files
D. Run safe mode to decrypt the user’s files

A

B. Remove the malware and recover the files from a backup

21
Q

A user wants to connect a Windows notebook computer to an external desktop monitor, keyboard, and mouse. However, each time the user closes the notebook lid, the computer shuts down automatically. Which of the following options in the Power Settings menu should the technician select to prevent the automatic shutdown?

A. Do nothing
B. Sleep
C. Hibernate
D. Shut down

A

A. Do nothing

22
Q

A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

A. Domain name, location, IP address
B. Domain name, location, asset ID
C. Asset ID, MAC address
D. Location, RFID

A

C. Asset ID, MAC address

23
Q

Users are reporting web browsers are not working. A technician confirms that the end users can navigate to websites using the site’s IP address. Which of the following is MOST likely causing this issue?

A. Proxy server
B. DHCP server
C. DNS server
D. SMTP server

A

C. DNS server

24
Q

A help desk technician receives a call from a user stating a program was installed and now random pop-ups are appearing on the computer. The technician notices a lot of suspicious network traffic generated by the user’s computer. The technician quarantines the computer and disables System Restore. Which of the following is the NEXT step technician should take?

A. Update the anti-malware software
B. Perform a malware scan in safe mode
C. Set up scheduled scans and updates
D. Educate the end user on best practices

A

B. Perform a malware scan in safe mode

25
Q

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hotspot and gets 2000 Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15 Mbps. The technician checks the hotspot settings on Joe’s phone and sees the following:

Network name:Joe’s Hotspot
Security:WPA2/PSK
Password:hotspot
Band:2.4 GHz
Client DHCP start address:192.168.23.1

Which of the following is the MOST likely cause of the problem?

A. Joe should be using WEP security on his hotspot for faster throughput
B. Someone else is using Joe’s hotspot due to a weak password
C. Joe’s hotspot gave him an invalid IP address
D. Joe is likely in a poor signal area and should try another area

A

B. Someone else is using Joe’s hotspot due to a weak password

26
Q

A technician wants to deploy a solution that will detect and prevent sensitive information from being saved on external storage. Which of the following should the technician implement?

A. IPS
B. FTPS
C. TPM
D. DLP

A

C. TPM

27
Q

A technician recently removed a malware infection from a client’s computer. After removing the computer from the network, the technician used an approved customized tool to remove the malware, then updated the antivirus suite, and performed a scan that reported the system was clean. A week later, the client reports the same malware infection has returned. Which of the following is MOST likely the cause of the reinfection?

A. The technician did not disable the System Restore utility
B. The technician ran the malware remover before the antivirus scan
C. The technician did not install a second antivirus suite to complement the first suite
D. The technician did not put the computer back onto the network

A

A. The technician did not disable the System Restore utility

28
Q

When starting a computer, a technician notices the computer displays a blue screen and reboots after POST. The technician completed several updates prior to encountering the blue screen. Which of the following tools would the technician use to resolve this issue?

A. Disk Management
B. Secure Boot
C. System Restore
D. msconfig
E. fixboot
A

C. System Restore

29
Q

The office of admissions at a university has requested that all staff desktops be replaced with laptops. The staff members frequently go off-site for recruitment purposes and handle sensitive information. The technician is concerned about data leaks if a laptop is stolen. Which of the following is the BEST practice to use in this scenario?

A. Cable locks
B. Biometric security
C. Data encryption
D. Login time restriction
E. LoJack
A

C. Data encryption

30
Q

In Windows 8.1, \E$ is an example of which of the following types of share?

A. EFS
B. Administrative
C. Local
D. NAS

A

B. Administrative

31
Q

A home server rack is being installed in the computer room and is outfitted with a power distribution block. Which of the following safety precautions is required?

A. Cable management
B. Electrostatic discharge mat
C. Equipment grounding
D. Uninterruptible power supply

A

C. Equipment grounding

32
Q

When working on a system, Joe, a technician, needs to prevent computer component failure by following a few simple rules. Joe is handling internal components but is not using an ESD strap. After opening the computer, which of the following should Joe do NEXT?

A. Remove dust from the system
B. Ground himself to the chassis
C. Unplug the power cable
D. Use an antistatic bag

A

B. Ground himself to the chassis

33
Q

A user has reported that when a document is being edited a pop-up appears and locks the workstation. The pop-up states that federal authorities have detected illegal copyrighted material on the workstation. The technician removes the malware and creates a restore point. Which of the following should the technician perform NEXT before closing the report?

A. Contact the local computer emergency response team
B. Quarantine the workstation for possible infections
C. Train the user on safe Internet browsing
D. Restore to an earlier state and disable System Restore

A

C. Train the user on safe Internet browsing

34
Q

A technician is configuring settings on a Windows PC and wants to temporarily disable the UAC prompt. Which of the following Control Panel options would allow the technician to accomplish this task?

A. Windows Firewall
B. User Accounts
C. Administrative Tools
D. Parental Controls

A

B. User Accounts

35
Q

A technician has a single computer that continually shuts down every evening for no apparent reason and must be turned on each day. The technician has verified hibernate and sleep settings do not exist on the computer and the computer power is not the problem. Which of the following would the technician use to troubleshoot the root cause of the random shut downs? (Choose two.)

A. System Restore
B. Event Viewer
C. Safe mode
D. System file checker
E. Logs
F. MSConfig
A

B. Event Viewer

E. Logs

36
Q

A technician wants to secure a company’s laptops by preventing the USB flash drive from being used. Which of the following would be the BEST and FASTEST way for the technician to accomplish this goal?

A. Use intrusion prevention systems
B. Disable physical ports
C. Uninstall USB drivers
D. Install HIDS

A

B. Disable physical ports

37
Q

A technician for a large accounting firm is in the process of delivering all assets for retired equipment to a third-party vendor. The equipment contains printers, laptops, desktops, and hard drives. Which of the following should the technician receive from the thirdparty vendor for audit and compliance purposes?

A. Sensitive and proprietary data
B. Certificate of destruction
C. Equipment security logs
D. Incident reports

A

B. Certificate of destruction

38
Q

After completing a fresh Windows 7 installation for a customer, a technician wants to ensure the OS files are hidden and protected from accidental deletion or alteration. Which of the following locations should the technician view to make this change?

A. Control Panel – folder options
B. Insert Windows disc – i386 folder
C. Start menu – run – REGEDIT
D. Right-click desktop – view

A

A. Control Panel – folder options

39
Q

A mobile device user is concerned about security. The user wants to use multifactor authentication on the device. Which of the following would BEST accomplish this?

A. Passcode lock and swipe lock
B. Fingerprint lock and passcode lock
C. Picture passcode and pin lock
D. Face lock and fingerprint lock

A

B. Fingerprint lock and passcode lock

40
Q

A SOHO user calls a technician and reports that after an on-site technician replaced all of the ink cartridges in a printer, characters are not printing clearly. Which of the following is the BEST course of action for the technician to take NEXT?

A. Reinstall the printer drivers
B. Train the user on how to calibrate the printer
C. Suggest the user replace the ink cartridges
D. Recommend replacing the printer

A

B. Train the user on how to calibrate the printer

41
Q

When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT?

A. Change the browser’s home page
B. Check the Windows host file
C. Update the default web browser
D. Restore Windows to a previous date

A

B. Check the Windows host file

42
Q

A technician has received new computers to upgrade the marketing department on a large company. The old computers are to be refreshed and donated as part of company policy. Data contained on the drives needs to be inaccessible prior to donation. Which of the following methods BEST achieves this goal?

A. Single drive wipe
B. Degaussing
C. Low-level format
D. Multipass overwrite

A

D. Multipass overwrite

43
Q

A security administrator is developing workstation hardening standards. As part of the baseline, the administrator recommends implementing controls to mitigate risks associated with dictionary attacks. Which of the following would BEST meet the requirements of the administrator?

A. Account lockout
B. Login time restrictions
C. Mobile tokenization
D. Full-disk encryption

A

A. Account lockout

44
Q

Which of the following BEST describes kernel panic?

A. An OS feature that provides an administrator with the ability to override the boot sequence if fault detection has occurred
B. An OS call that results from rootkit malware being detected and the system rebooting in safe mode
C. A low-level OS function that handles any fatal errors by sending an image of the system’s memory to disk
D. A condition in the OS where low-level system calls are preempted by lower priority services, resulting in an unstable operating environment

A

C. A low-level OS function that handles any fatal errors by sending an image of the system’s memory to disk

45
Q

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?

A. Air filters
B. Privacy screens
C. Vacuums
D. ESD mats

A

A. Air filters

46
Q

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

A. System
B. Display
C. Folder Options
D. Indexing Options

A

C. Folder Options

47
Q

A technician is upgrading the memory on a laptop in the field. The technician has misplaced the ESD strap. Which of the following should the technician do?

A. Return to the shop and obtain a replacement strap
B. Conduct the upgrade using ESD bags as mitts
C. Employ effective self-grounding techniques
D. Improvise an ESD strap with a length of copper wire

A

C. Employ effective self-grounding techniques

48
Q

Which of the following security features is ONLY available in the Windows 7 Enterprise?

A. Windows Firewall
B. FTP connectivity
C. BitLocker
D. SSL encryption

A

C. BitLocker

49
Q

A SOHO customer has recently experienced a major hurricane. The customer had no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Choose two.)

A. Backup testing
B. Cloud storage
C. Local storage backups
D. Data recovery
E. Hot site
F. Waterproof devices
A

B. Cloud storage

E. Hot site

50
Q

Which of the following Windows Enterprise OS versions offers BitLocker as a feature that can be enabled?

A. Windows 7
B. Windows 8
C. Windows 8.1
D. Windows 10

A

A. Windows 7

51
Q

A technician is running a Windows Update on a Windows 7 PC. The process usually takes a few minutes before reporting if there are updates, but this time it has taken 30 minutes with no change. Which of the following should the technician do?

A. Use the Microsoft Windows Update Troubleshooter
B. Delete all of the files and folders in the Software Distribution folder
C. Reboot to safe mode and run Windows Update
D. Run the System Update Readiness Tool

A

A. Use the Microsoft Windows Update Troubleshooter

52
Q

A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following Oss should the technician recommend to ensure the BEST performance on this computer?

A. Windows 7
B. Windows 8
C. Windows 8.1
D. Windows 10

A

A. Windows 7

53
Q

technician arrives on site to find that two users who have the same model of smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do NEXT?

A. Reinstall the application
B. Roll back the application to the earlier version
C. Clear the application cache
D. Update the OS of the smartphones

A

D. Update the OS of the smartphones

54
Q

A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers. Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

A. Degaussing
B. Standard format
C. Overwrite
D. Low-level format

A

D. Low-level format

55
Q

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs in automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine?

A. Guest
B. Administrator
C. Power User
D. Remote Desktop User

A

D. Remote Desktop User

56
Q

A technician wants to set up a virtual machine in a public cloud environment. Which of the following cloud models should the technician use?

A. IaaS
B. SaaS
C. PaaS
D. DBaaS

A

A. IaaS

57
Q

When synchronizing a cell phone to an Exchange Email Server, which of the following are MOST likely to be synchronized? (Choose two.)

A. Photos
B. Passwords
C. Bookmarks
D. Notes
E. Music
F. Calendar
A

D. Notes

F. Calendar

58
Q

Which of the following are only available in Windows Professional versions but not Windows Standard versions? (Choose two.)

A. Remote Desktop
B. Join a domain
C. Secure network connections
D. Remote access capability
E. Encryption file service
F. Group Policy Editor
A

A. Remote Desktop

F. Group Policy Editor

59
Q

A user needs to replace an open-source software package with a commercially licensed package. The user has requested support to complete this task. Which of the following tools would BEST assist with this task?

A. Programs
B. Regedit
C. Task Manager
D. MSConfig

A

A. Programs

60
Q

A domain user logs into a computer and notices there are no mapped network drives connected. The network drives are managed by Group Policy. A technician is dispatched to troubleshoot. Which of the following command-line tools should the technician use to troubleshoot the issue?

A. gpresult
B. nslookup
C. net use
D. tracert

A

A. gpresult

61
Q

A systems administrator wants to take advantage of the benefits of the major cloud providers while retaining some data and services in the local datacenter. Which of the following types of cloud model should the administrator consider?

A. Public
B. Private
C. Hybrid
D. Community

A

C. Hybrid

62
Q

A technician notices a PC displays a missing DLL error message every time on start up. Which of the following tools should the technician use to find out which application is responsible for the error message?

A. msinfo32.exe
B. System Recovery Options
C. Event Viewer
D. Programs and Features

A

C. Event Viewer

63
Q

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms returned. Which of the following should the technician have covered previously as part of the original repair?

A. End-user education
B. Pre-installation environment cleaning
C. Disabling of System Restore
D. Infected system quarantine

A

A. End-user education

64
Q

A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users’ mobile devices? (Choose two.)

A. Full device encryption
B. Remote backup application
C. SSO authentication
D. Device profiles update
E. OS security updates
F. Biometric authentication
A

E. OS security updates

F. Biometric authentication

65
Q

A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices?

A. Identify symptoms, quarantine infected system, and create restore point.
B. Quarantine infected system, identify symptoms, and create restore point.
C. Identify symptoms, educate end user, and create restore point.
D. Create restore point, identify symptoms, and quarantine infected system.

A

A. Identify symptoms, quarantine infected system, and create restore point.

66
Q

Which of the following Windows OS capabilities allows modern Windows versions to run applications written for older versions natively?

A. Microsoft Virtual PC
B. Compatibility mode
C. Hyper-V
D. Virtual XP mode

A

B. Compatibility mode

67
Q

An administrator must upgrade multiple workstations with a new image being deployed using Windows Deployment Services. Which of the following client-side boot methods initiates the deployment of the new image?

A. USB flash drive
B. CD-ROM
C. PXE
D. GRUB

A

C. PXE

68
Q

Which of the following would a technician use to search for a specific string within a file name?

A. grep
B. chmod
C. wget
D. sudo

A

A. grep

69
Q

Data on full disk encrypted drives using BitLocker is MOST secure from loss when combined with which of the following technologies?

A. USB authentication token
B. Filesystem access controls
C. Trusted platform module
D. Fingerprint reader

A

C. Trusted platform module

70
Q

A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue?

A. Unsupported operating system
B. Unacceptable CPU type and speed
C. Insufficient airflow and cooling
D. Inadequate video RAM amount

A

C. Insufficient airflow and cooling

71
Q

An end user calls the company’s IT service desk to report an inability to open encrypted emails on a mobile device. Which of the following BEST represents a possible cause?

A. A valid certificate suitable for S/MIME is not installed.
B. Emails received by the user lack suitable digital signatures.
C. SSL/TLS certificates stored on the device are expired.
D. The sender did not have the addressee’s public certificate.

A

A. A valid certificate suitable for S/MIME is not installed.

72
Q

An office manager mistakenly uninstalled a valuable application. Which of the following utilities may allow the manager to correct this issue?

A. System Restore
B. Computer Management
C. Disk Management
D. System Configuration

A

A. System Restore