1002 Flashcards
(99 cards)
Which of the following key and mouse combinations can be used to run an application as a different user?
Shift + right click
Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?
Dumpster Diving
A technician determines a newly installed service is keeping a device from functioning in Windows. Which of the following tools should the technician use to keep the service from being loaded on the PC reboot?
MSConfig
Which of the following forms of regulated data is MOST important to consider when browsing e-commerce sites on the internet?
PII
A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime?
Connect to a UPS that utilizes the emergency power source
Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?
Quarantine the affected systems.
An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all the users are able to work. Which of the following is the BEST solution for the technician to recommend?
Increase the capacity of the backup generator.
A desktop technician needs to replace a laptop’s SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement?
ESD straps
A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which of the following should the technician monitor during the installation?
Impact to the network
Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?
End-of-life
A SOHO user is working on a laptop, but the wireless connection indicator is showing a limited connection. Each time the user tries to access a website, the browser redirects to an unfamiliar authentication page. Which of the following should the user check to troubleshoot the cause of the issue?
The existing wireless network connection.
A systems administrator creates a new folder in the user profile. The administrator wants it to use different NTFS permissions than its parent folder. Which of the following settings should the administrator change?
Inheritance.
What a user is allowed to do on a computer network would be addressed in:
An acceptable use policy.
A technician is troubleshooting a computer that may have some corrupt operating system files. Which of the following command line tools should the technician use to check these files?
chkdsk
A network support technician takes a call from an office manager who wants to change the wireless security key on the access point in that particular office. The office manager explains that a label on the access point indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect securely to the access point to make the change?
SSH to 10.0.100.2
The Chief executive officer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?
Whaling
A windows user reports that clicking on links when browsing the internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose 2)
Run a virus scan with updated signature files
Uninstall any unknown browser extensions or add-ons
Which of the following variable types should be used to store the data “Chicago” within a script or code?
String
A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information. Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?
Impact to the device
Which of the following wireless security protocols supports the use of a 40-bit encryption key?
WEP
While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?
Remove then replace the CMOS battery.
A technician receives the Chief Executive Officer’s (CEO) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario? (Choose three)
Disconnect the device from the network
Identify and research the symptoms
Scan and use removal techniques
A customer has a LINUX desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which of the following filesystem types would the customer’s drive require?
Ext4
A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take?
Take the print job to the office manager