1102 Flashcards
(303 cards)
A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?
A. SFTP
B. SSH
C. VNC
D. MSRA
B. SSH (Secure Shell)
Explanation:
When the GUI (Graphical User Interface) of a Linux server is crashing, the most reliable way to access and troubleshoot the system is through a command-line interface using SSH. SSH allows the administrator to:
Log in remotely to the server
Bypass the broken GUI
Check system logs (/var/log/), running processes, and system resources
Restart services or the graphical environment if needed
SSH is the standard remote management tool for Linux systems in both server and enterprise environments.
A company wants to remove information from past users’ hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?
A. Reinstalling Windows
B. Performing a quick format
C. Using disk-wiping software
D. Deleting all files from command-line interface
C. Using disk-wiping software
Explanation:
The most secure method for removing data from a hard drive—while still allowing it to be reused—is to use disk-wiping software. These tools overwrite the drive’s contents with random data (often multiple times), making it extremely difficult or impossible to recover the original data, even with forensic tools.
Popular disk-wiping tools include:
DBAN (Darik’s Boot and Nuke)
Eraser
KillDisk
A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor’s website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?
A. Reset the phone to factory settings.
B. Uninstall the fraudulent application.
C. Increase the data plan limits.
D. Disable the mobile hotspot.
B. Uninstall the fraudulent application
Explanation:
The first step in resolving this issue is to uninstall the suspicious or fraudulent application. The app is clearly causing high network usage and triggering security alerts, indicating it may be malicious or poorly coded. Removing the app will likely stop the abnormal behavior and is the least invasive step to start with.
A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?
A. End user acceptance
B. Perform risk analysis
C. Communicate to stakeholders
D. Sandbox testing
double check, Possibly A
C. Communicate to stakeholders
Explanation:
Once the Change Advisory Board (CAB) approves a change request, the next logical step is to communicate the approved change to stakeholders. This includes IT staff, end users, management, and any other parties affected by or involved in the change. The communication typically covers:
The scope and purpose of the change
Implementation schedule
Downtime or service interruptions (if any)
Rollback plan and support contact info
This step ensures everyone is informed and prepared, helping to avoid confusion and minimize disruptions during implementation.
*Reference Change Management Lifecycle
A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user’s PC is infected with ransomware. Which of the following should the technician do FIRST?
A. Scan and remove the malware.
B. Schedule automated malware scans.
C. Quarantine the system.
D. Disable System Restore.
C. Quarantine the system
Explanation:
The first step when dealing with ransomware is to quarantine the infected system. This means disconnecting it from the network (wired or wireless) to prevent the ransomware from:
Spreading to other devices or shared drives
Communicating with command-and-control (C2) servers for instructions or data exfiltration
Once quarantined, the technician can safely proceed with analysis, removal, or recovery actions.
A company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?
A. Anti-malware
B. Remote wipe
C. Locator applications
D. Screen lock
B. Remote wipe
Explanation:
Remote wipe is the best and most comprehensive solution to ensure sensitive company data is protected if a smartphone is lost or stolen. It allows administrators or users to remotely erase all data on the device, including emails, documents, apps, and cached credentials, preventing unauthorized access.
This feature is typically managed through a Mobile Device Management (MDM) system, which gives companies centralized control over corporate devices.
A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the BEST solution for a technician to implement?
A. Disable the browser from sending notifications to the Action Center.
B. Run a full antivirus scan on the computer.
C. Disable all Action Center notifications.
D. Move specific site notifications from Allowed to Block.
double check, Possibly B
D. Move specific site notifications from Allowed to Block.
Explanation:
This issue is typically caused by the user unintentionally allowing push notifications from websites when prompted by the browser (like Chrome, Edge, or Firefox). These notifications appear in the Windows Action Center, often disguised as “ads” but aren’t technically malware.
The best solution is to go into the browser settings and:
Navigate to the Notifications or Site Permissions section
Identify the specific sites sending the spammy alerts
Move them from “Allowed” to “Blocked”
This targets the root cause without disabling helpful system features.
A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?
A. Run a startup script that removes files by name.
B. Provide a sample to the antivirus vendor.
C. Manually check each machine.
D. Monitor outbound network traffic.
B. Provide a sample to the antivirus vendor
Explanation:
When dealing with a new or unknown virus that your current antivirus doesn’t detect, the most effective response is to submit a sample of the suspicious file to the antivirus vendor. This allows the vendor to analyze the file, create a new signature if it’s confirmed as malware, and update their threat database—which helps protect all systems in your environment going forward.
This is a proactive and scalable approach to address unknown or zero-day threats across the network.
A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?
A. Keyboard
B. Touch pad
C. Ease of Access Center
D. Display settings
C. Ease of Access Center
Explanation:
The Ease of Access Center in Windows is specifically designed to help users with disabilities customize their experience. It allows for changes to cursor size and color, screen magnification, narrator settings, and more. For a visually impaired user, this utility provides options to make the cursor more visible by changing its color, thickness, or contrast.
A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?
A. Enable multifactor authentication.
B. Increase the failed log-in threshold.
C. Remove complex password requirements.
D. Implement a single sign-on with biometrics.
D. Implement a single sign-on with biometrics
Explanation:
Implementing Single Sign-On (SSO) with biometrics allows users to access multiple systems and applications using one secure login, often authenticated by a fingerprint, facial recognition, or other biometric factor. This greatly reduces the need to remember multiple passwords, thus decreasing the number of password-related help desk tickets.
A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?
A. Application updates
B. Anti-malware software
C. OS reinstallation
D. File restore
C. OS reinstallation
Explanation:
A rootkit is one of the most dangerous types of malware because it embeds itself deep into the operating system, often at the kernel level, making it extremely hard to detect and remove. Even advanced anti-malware tools may not fully eliminate a rootkit once it has entrenched itself.
The most effective and reliable method to remove a rootkit is to completely reinstall the operating system. This ensures that all system files, boot records, and hidden processes installed by the rootkit are wiped out.
A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?
A. WPA2 with TKIP
B. WPA2 with AES
C. WPA3 with AES-256
D. WPA3 with AES-128
B. WPA2 with AES
Explanation:
Since the wireless router is about ten years old, it’s unlikely to support WPA3, which is the latest and most secure Wi-Fi standard. The best available security option on most older routers is WPA2 with AES (Advanced Encryption Standard). AES is significantly stronger than TKIP and is the preferred encryption method for WPA2 networks.
A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?
A. Right-click the Windows button, then select Run… entering shell:startup and clicking OK, and then move items one by one to the Recycle Bin.
B. Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run.
C. Manually disable all startup tasks currently listed as enabled and reboot, checking for issue resolution at startup.
D. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for
issue resolution at each startup.
D. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.
Explanation:
The Startup tab is located in the Task Manager in Windows 10 and is the proper and safest method to manage startup applications. This tab allows a technician to enable or disable individual startup programs without removing them from the system, giving a controlled and reversible way to troubleshoot boot performance.
The correct process is to disable one or a few items at a time, then reboot and evaluate whether boot performance improves—this is a methodical, low-risk approach to isolate the issue.
A call center technician receives a call from a user asking how to update Windows. Which of the following describes what the technician should do?
A. Have the user consider using an iPad if the user is unable to complete updates.
B. Have the user text the user’s password to the technician.
C. Ask the user to click in the Search field, type Check for Updates, and then press the Enter key.
D. Advise the user to wait for an upcoming, automatic patch.
C. Ask the user to click in the Search field, type Check for Updates, and then press the Enter key.
Explanation:
The most appropriate and secure response is to guide the user through the Windows Update process. Having the user type “Check for Updates” into the Search field and pressing Enter brings them directly to the Windows Update settings, where they can view and install available updates.
This response:
Is safe and practical
Provides hands-on assistance
Empowers the user to learn the process independently
When a user calls in to report an issue, a technician submits a ticket on the user’s behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?
A. Have the user provide a callback phone number to be added to the ticket.
B. Assign the ticket to the department’s power user.
C. Register the ticket with a unique user identifier.
D. Provide the user with a unique ticket number that can be referenced on subsequent calls.
double check, possibly D
C. Register the ticket with a unique user identifier
Explanation:
To ensure a help desk ticket is accurately associated with the correct user, the technician should register the ticket using a unique user identifier—such as a username, employee ID, or email address. This links the issue directly to the user’s account and ensures proper tracking, prioritization, and communication throughout the support process.
Which of the following is the MOST important environmental concern inside a data center?
A. Battery disposal
B. Electrostatic discharge mats
C. Toner disposal
D. Humidity levels
D. Humidity levels
Explanation:
Humidity levels are the most critical environmental concern inside a data center because they directly affect the safety and stability of sensitive electronic equipment.
A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the log-in issue?
A. Expired certificate
B. OS update failure
C. Service not started
D. Application crash
E. Profile rebuild needed
A. Expired certificate
Explanation:
The network uses 802.1X with EAP-TLS (Extensible Authentication Protocol-Transport Layer Security), which relies on digital certificates for authenticating users or devices. If the user has been on extended leave and hasn’t logged in for months, it’s very likely their certificate has expired and hasn’t been renewed—especially if certificate renewal is configured to happen automatically only when the device is online.
A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?
A. FAT32
B. ext4
C. NTFS
D. exFAT
D. exFAT
Explanation:
exFAT (Extended File Allocation Table) is the most appropriate filesystem in this scenario because:
It supports large file sizes (over 4GB, unlike FAT32)
It is readable and writable by both Linux and Windows systems with appropriate support
It is designed for removable drives and flash storage with minimal overhead
This makes it ideal for transferring 20GB of data between Linux and Windows machines.
Following the latest Windows update, PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?
A. Network and Sharing Center
B. Programs and Features
C. Default Apps
D. Add or Remove Programs
C. Default Apps
Explanation:
To change the default program used to open specific file types—like making Adobe Reader the default for PDFs—you use the Default Apps utility in Windows. This setting allows users to:
Choose which application opens files by default (e.g., PDFs, images, videos)
Override default associations that may have been changed by updates or new software installs
A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?
A. Privacy
B. Indexing Options
C. System
D. Device Manager
B. Indexing Options
Explanation:
To exclude a folder from being indexed (i.e., cataloged for search) in Windows 10, the technician should use the Indexing Options utility. This tool allows users to:
Manage which locations are indexed by Windows Search
Add or remove folders from the indexing list
Improve performance and protect privacy by excluding sensitive or unnecessary folders
As part of a CYOD policy, a systems administrator needs to configure each user’s Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?
A. Use Settings to access Screensaver settings.
B. Use Settings to access Screen Timeout settings.
C. Use Settings to access General.
D. Use Settings to access Display.
A. Use Settings to access Screensaver settings
Explanation:
To require a password on wake from sleep or inactivity in Windows, the setting is found under Screensaver settings, even if a screensaver isn’t being used. This area includes the option:
“On resume, display logon screen”
Enabling this ensures the user is prompted for their password when returning from sleep, aligning with Choose Your Own Device (CYOD) security policies.
A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company’s compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?
A. Deploy a secondary hard drive with encryption on the appropriate workstation.
B. Configure a hardened SFTP portal for file transfers between file servers.
C. Require files to be individually password protected with unique passwords.
D. Enable BitLocker To Go with a password that meets corporate requirements.
D. Enable BitLocker To Go with a password that meets corporate requirements
Explanation:
Since the company wants to keep using USB drives and the compliance officer requires encryption of media at rest, the best solution is to use BitLocker To Go, a Microsoft tool designed specifically to encrypt removable storage devices like USB flash drives.
The command cat comptia.txt was issued on a Linux terminal. Which of the following results should be expected?
A. The contents of the text comptia.txt will be replaced with a new blank document.
B. The contents of the text comptia.txt would be displayed.
C. The contents of the text comptia.txt would be categorized in alphabetical order.
D. The contents of the text comptia.txt would be copied to another comptia.txt file.
B. The contents of the text comptia.txt would be displayed.
Explanation:
In Linux, the command:
cat comptia.txt
is used to display the contents of the file comptia.txt directly in the terminal window. It does not modify the file, sort it, or copy it—just outputs its contents to the screen.
An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?
A. Encrypt the files.
B. Clone any impacted hard drives.
C. Contact the cyber insurance company.
D. Inform law enforcement.
B. Clone any impacted hard drives
Explanation:
In an incident response involving potential litigation, the most critical step in preserving digital evidence is to create a forensic clone (bit-by-bit copy) of any impacted hard drives or storage devices. This ensures:
An unchanged original is maintained (evidence integrity)
The clone can be used for analysis without altering the original data
It complies with chain-of-custody requirements for legal proceedings
This is a standard practice in digital forensics to support potential legal action while preserving evidence authenticity.