X~0/1 (fully verified) Flashcards

1
Q
  1. (?)
    A technician is setting up a conference room computer with a script that boots the application on log-in. Which of the following would the technician use to accomplish this task? (Choose two)

A. File Explorer
B. Startup Folder
C. System Information
D. Programs and Features
E. Task Scheduler
F. Device Manager

A

B. Startup Folder
The startup folder contains shortcuts or programs that automatically execute when a user logs in. Placing the application shortcut in this folder achieves the desired outcome.

E. Task Scheduler
Task Scheduler allows creating automated tasks to run at specific times or triggers, including user login. The technician can configure a task to launch the application upon user login.

A. File Explorer helps navigate the file system, it’s not used for configuring startup applications.
C. System Information provides details about the system hardware and software but doesn’t manage startup applications.
D. Programs and Features allows viewing and managing installed programs but doesn’t configure startup applications.
F. Device Manager manages hardware devices and their drivers, not application startup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. (2.9)
    A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?

A. Bridge the LAN connection between the laptop and the desktop.
B. Set the laptop configuration to DHCP to prevent conflicts.
C. Remove the static IP configuration from the desktop.
D. Replace the network card in the laptop, as it may be defective.

A

C. Remove the static IP configuration from the desktop
If both the laptop and desktop have the same static IP address assigned, it creates a conflict. Removing the static IP from the desktop (if it’s not critical for another reason) would allow the laptop to use that address and potentially resolve the software licensing conflict.

A. Bridging the LAN connection wouldn’t solve the software licensing issue. It would create a single network segment and wouldn’t address the IP address conflict within the software.
B. Setting the laptop configuration to DHCP helps avoid manual IP conflicts, it wouldn’t necessarily address the software licensing restriction. The software might require a specific static IP assigned to the user’s machine.
D. Replacing the network card is unnecessary hardware troubleshooting. The network card is likely functioning correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. (3.3)
    A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user’s files?

A. Run the virus scanner in an administrative mode.
B. Reinstall the operating system.
C. Reboot the system in safe mode and rescan.
D. Manually delete the infected files.

A

C. Reboot the system in safe mode and rescan.
Booting into Safe Mode loads Windows with only the essential drivers and programs needed to run the operating system. This limits the malware’s ability to interfere with the antivirus software, potentially allowing for a more thorough scan and removal.
Running the antivirus scan again in Safe Mode might allow it to effectively remove the malware that it previously couldn’t in the regular operating system mode.

A. While giving the antivirus administrative rights might help, it doesn’t guarantee successful removal and doesn’t address the potential issue of the malware interfering with the scan itself.
B. Reinstalling the operating system would erase all user data.
D. Manually deleting infected files is risky. It requires accurately identifying the infected files, which can be challenging for a non-expert user. Accidentally deleting essential system files could render the system unbootable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. (3.1)
    A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

A. The SNTP server is offline.
B. A user changed the time zone on a local machine.
C. The Group Policy setting has disrupted domain authentication on the system.
D. The workstations and the authentication server have a system clock difference.

A

D. The workstations and the authentication server have a system clock difference.
Many domain authentication protocols rely on synchronized time between clients and servers to prevent security risks like replay attacks. A significant time difference between the workstations and the authentication server could disrupt the validation process and prevent logins.

A. The SNTP server is offline: While an offline SNTP server wouldn’t provide time updates, it shouldn’t directly prevent logins. There might be a grace period or fallback mechanism.
B. A user changing the time zone on a local machine might cause inconvenience but wouldn’t entirely prevent logins on its own.
C. The Group Policy setting has disrupted domain authentication on the system: Disrupted domain authentication is a possibility, but it’s less likely than a time synchronization issue. Some authentication protocols might be time-sensitive, and a large time discrepancy could cause problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. (4.1)
    A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the user’s account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

A. acceptable use policy.
B. regulatory compliance requirements.
C. non-disclosure agreement.
D. incident response procedures.

A

A. acceptable use policy.
Accessing another user’s account would likely violate the AUP’s guidelines around authorized access and data privacy.

B: While regulatory compliance might be a concern, it’s not the most direct reason for refusal in this scenario. The AUP would likely be aligned with relevant regulations.
C: Non-disclosure Agreements typically apply to confidential information, not necessarily user account access.
D: Incident response procedures are usually triggered by a security event, not a user requesting access to their own account while on vacation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. (1.6)
    A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?

A. Updating the operating system
B. Changing proxy settings
C. Reinstalling the browser
D. Enabling port forwarding

A

B. Changing proxy settings
A proxy server acts as an intermediary between the user’s computer and the internet. If the proxy server is misconfigured or compromised, it could redirect users to unintended websites.

C. Reinstalling the browser could resolve issues caused by browser extensions or corrupted files, but it wouldn’t necessarily address redirection caused by proxy settings.
A. Updating the operating system: While an outdated OS might have security vulnerabilities, it’s not the most direct cause of unexpected redirects in this scenario.
D. Port forwarding is typically used to allow access to specific services on a private network from the internet. It wouldn’t directly affect web browsing behaviour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. (4.8)
    A help desk technician runs the following script: Inventory.py.
    The technician receives the following error message:
How do you want to open this file?

    Which of the following is the MOST likely reason this script is unable to run?

A. Scripts are not permitted to run.
B. The script was not built for Windows.
C. The script requires administrator privileges.
D. The runtime environment is not installed.

A

D. The runtime environment is not installed.
Python scripts, for instance, rely on the Python interpreter to be installed on the system. The error message (“How do you want to open this file?”) suggests the system doesn’t recognize the file type (.py) and lacks the necessary environment to handle it.

A. While some systems might have restrictions on script execution, the error message suggests the system recognizes the file as a script but lacks the necessary environment to run it.
B. If the script was built for a different operating system (e.g., Linux), it might not run directly on Windows. However, the error message doesn’t indicate an OS incompatibility.
C. Some scripts might require administrator rights to execute certain actions. However, the error message suggests the system can’t even process the script, not that it lacks sufficient permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. (3.1)
    A BSOD appears on a user’s workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?

A. Stop code
B. Event Viewer
C. Services
D. System Configuration

A

A. Stop code
The BSOD typically displays a specific error code or message that points to the root cause of the system crash. Looking up the stop code provided on the BSOD, the technician can diagnose the issue and determine the appropriate repair steps.

B. Event Viewer can provide additional details about system events, but the stop code from the BSOD itself is a more direct source of information related to the crash. Event Viewer might offer supplementary logs after analyzing the stop code.
C. Services: While some service failures might contribute to BSODs, the stop code provides more specific guidance for troubleshooting.
D. System Configuration is a tool for managing startup programs and services. While it can be helpful in troubleshooting stability issues, the stop code offers a more targeted approach for diagnosing the BSOD cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. (4.7)
    While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?

A. Send a quick message regarding the delay to the next customer.
B. Cut the current customer’s time short and rush to the next customer.
C. Apologize to the next customer when arriving late.
D. Arrive late to the next meeting without acknowledging the time.

A

A. Send a quick message regarding the delay to the next customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. (3.3)
    Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

A. Power off the machine.
B. Run a full antivirus scan.
C. Remove the LAN card.
D. Install a different endpoint solution.

A

A. Power off the machine.
This is the best first step. Ransomware often works by actively encrypting files. Shutting down the machine halts this process and minimizes damage.

C. Remove the LAN card: Disconnecting the network cable would achieve a similar effect to powering off, but it’s a less complete solution and might not be practical in all situations.
B. Run a full antivirus scan: While scanning is important, it won’t necessarily stop ongoing encryption. It’s better to isolate the machine first.
D. Install a different endpoint solution: This might be necessary later, but it’s not the first priority. You need to stop the current infection before adding new software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. (1.3)
    A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound.
    The following error is received:

The Audio Driver is not running.

    Which of the following will MOST likely resolve the issue?

A. compmgmt.msc
B. regedit.exe
C. explorer.exe
D. taskmgr.exe
E. gpmc.msc
F. services.msc

A

F. services.msc
Similar to Task Manager, Services provides a more detailed list and management options for system services, including audio drivers.

D. taskmgr.exe (Task Manager) is a strong contender! It allows viewing running processes, including services. You can check if the audio driver service is running and restart it if necessary.
A. compmgmt.msc (Computer Management) allows managing various aspects of a computer, but wouldn’t directly address audio drivers.
B. regedit.exe (Registry Editor): While the registry might hold audio driver configurations, modifying it carries risk and should be a last resort.
C. explorer.exe (File Explorer) is for managing files and folders, not audio drivers.
E. gpmc.msc (Group Policy Management Console) is for managing group policies in a domain environment, not relevant to a single machine’s audio driver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. (1.4)
    A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

A. System
B. Indexing Options
C. Device Manager
D. Programs and Features

A

A. System
System properties allow accessing advanced settings, which include environment variables

(The PATH environment variable is a list of directories that your operating system searches for executable files (programs) when you try to run them from the command line or terminal.)

B. Indexing Options helps configure search indexing for files, not system environment variables.
C. Device Manager manages hardware devices installed on the system.
D. Programs and Features allows viewing and uninstalling installed programs, but not modifying environment variables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. (2.8)
    A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

A. Degaussing
B. Low-level formatting
C. Recycling
D. Shredding

A

D. Shredding
Shredding breaks the disc into tiny pieces, making data recovery extremely difficult if not impossible.

Degaussing works for magnetic media like hard drives, but not for optical discs which store data differently.
Low-level formatting only erases the directory structure and doesn’t guarantee complete data removal. Data could potentially be recovered with effort.
Recycling the discs leaves the data vulnerable if someone gets their hands on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. (1.3)
    A technician installed an application on a user’s desktop and received an error message. Which of the following tools can the technician use to research the error?

A. Resource Monitor > CPU > Services
B. Task Manager > Processes > Apps
C. Event Viewer > Windows Logs > Application
D. Device Manager > Computer

A

C. Event Viewer > Windows Logs > Application
Event Viewer is specifically designed to record system events, including application errors.
The “Windows Logs” section categorizes logs, and the “Application” log contains information related to software applications running on the system. This log would likely have detailed information about the error the technician encountered during installation.

A. Resource Monitor > CPU > Services: Helps monitor resource usage but wouldn’t provide specific error message details.
B. Task Manager > Processes > Apps: Shows running applications, it wouldn’t necessarily show detailed error messages.
D. Device Manager > Computer: Manages hardware devices and wouldn’t be helpful for application errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. (1.5)
    A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?

A. Settings > Devices > Display, and change the display resolution to a lower resolution option.
B. Settings > System > Display, and change the display resolution to a lower resolution option.
C. Settings > System > Display, and change the Scale and layout setting to a higher percentage.
D. Settings > Personalisation > Display, and change the Scale and layout setting to a higher percentage.

A

C. Open Settings, select System, select Display, and change the Scale and layout setting to a higher percentage.
Changing the “Scale and layout” setting allows Windows to enlarge all text, applications, and other elements on the screen proportionally, making them easier to see without compromising image quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. (?)
    Which of the following is a data security standard for protecting credit cards?

A. PHI
B. NIST
C. PCI
D. GDPR

A

C. PCI
PCI DSS (Payment Card Industry Data Security Standard) is a set of requirements designed to ensure organizations that handle credit card information maintain a secure environment. It’s widely adopted by credit card companies and helps protect cardholder data from breaches.

A. PHI (Protected Health Information): Protects health data.
B. NIST (National Institute of Standards and Technology): Provides cybersecurity frameworks.
D. GDPR (General Data Protection Regulation): European regulation for data privacy.

17
Q
  1. (1.7)
    A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to MOST likely resolve the issue?

A. Grant permissions to the installation directory.
B. Attach the external hardware token.
C. Install OS updates.
D. Restart the workstation after installation

A

B. Attach the external hardware token
Hardware tokens are commonly used for software licensing and authorisation. Attaching the external hardware token provides the necessary verification for the software to run properly.

A. Grant permissions to the installation directory: While permission issues can cause software to not run, it’s less likely for specialized software, which might have specific activation requirements beyond file permissions.
C. Install OS updates: Outdated OS might cause compatibility issues, but it’s not the most specific solution to software authorization.
D. Restart the workstation: Restarting can sometimes resolve temporary glitches, but it’s not a guaranteed fix for authorization issues, especially with specialized software.

18
Q
  1. (3.3)
    A user’s system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?

A. Enabling System Restore
B. Educating the user
C. Booting into safe mode
D. Scheduling a scan

A

C. Booting into safe mode
Booting into safe mode loads the operating system with minimal drivers and services. This can prevent malware that relies on those components from functioning properly and allows the anti-malware software to run a more thorough scan and potentially remove the malware completely. Additionally, some antimalware software might have specific features or tools designed to run within safe mode for enhanced detection and removal capabilities.

A. Enabling System Restore: Can revert the system to a previous state before the infection, it might not be effective if the malware has already established persistence mechanisms to reinstall itself upon reboot.
B. Educating the user: Is important to prevent future infections, but it likely won’t address the current malware already on the system.
D. Scheduling a scan: Is a good practice, but it might not be enough if the malware is actively evading detection during regular scans.

19
Q
  1. (4.3)
    A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

A. Full
B. Mirror
C. Incremental
D. Differential

A

C. Incremental
space-efficient and allowing for retention of many versions.
1. An initial full backup is created.
2. Subsequent backups only capture the changes made since the last backup (incremental changes).
3. This allows for retaining many versions of backups while using less storage space compared to full backups.
(Restore times are slower with incremental backups due to needing multiple backups for full restoration.)

A. Full backups: Can only retain 3 versions where the company wants to retain as many versions as possible.
B. Mirror backups: Creates an exact copy of all data, using even more storage space and not addressing the need for retaining multiple versions.
D. Differential backups: Only backs up the changes since the last full backup, requiring the initial full backup to be present for restoration. This method saves space compared to full backups but wouldn’t be ideal for retaining as many versions as possible.

20
Q
  1. (4.9)
    A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

A. VPN
B. MSRA
C. SSH
D. RDP

A

D. RDP
(Remote Desktop Protocol)

B. MSRA (Microsoft Remote Assistance): Requires the user to be present at their computer to initiate the remote assistance session. Since the user won’t be in the office, this wouldn’t be a suitable option.
A. VPN (Virtual Private Network): Creates a secure tunnel between the user’s device and another network. While this might be necessary for the technician to access internal resources to assist with software installation, it wouldn’t directly provide remote access to the user’s desktop.
C. SSH (Secure Shell): SSH is primarily used for remote access to Unix-based systems. It wouldn’t be the right tool for remotely controlling a Windows PC.

21
Q
  1. (3.3)
    A user is unable to access files on a work PC after opening a text document. The text document was labeled “URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read”. Which of the following should a support technician do FIRST?

A. Quarantine the host in the antivirus system.
B. Run antivirus scan for malicious software.
C. Investigate how malicious software was installed.
D. Reimage the computer.

A

A. Quarantine the host in the antivirus system
The first step a support technician should take if malware is suspected is to stop the spread of malware by isolating the system

B. Run antivirus scan for malicious software:
The filename suggests it might be disguised malware. Running an antivirus scan will quickly check the system for malicious software and potentially remove it before further harm is done.
D. Reimage the computer: Reimaging the computer is a drastic step that wipes out everything on the system. It should only be considered as a last resort if the antivirus fails to remove the malware.
C. Investigate how malicious software was installed: This is an important step for future prevention, but it should come after the immediate threat is addressed.

22
Q
  1. (1.3)
    A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the MMC console. Which of the following is the NEXT step the technician should take to resolve the issue?

A. Run the antivirus scan.
B. Add the required snap-in.
C. Restore the system backup.
D. Use the administrator console.

A

B. Add the required snap-in.
Local Users and Groups is a Microsoft Management Console (MMC) snap-in, which means it’s an extension that adds specific functionalities to the MMC console. By adding the “Local Users and Groups” snap-in, the technician will be able to manage user profiles, which is required for troubleshooting the user profile issue.

23
Q
  1. (2.1)
    Which of the following physical security controls can prevent laptops from being stolen?

A. Encryption
B. LoJack
C. Multifactor authentication
D. Equipment lock
E. Bollards

A

D. Equipment lock
An equipment lock, like a cable lock attached to a secure object, physically secures the laptop to a desk or other stationary object, making it difficult to steal.

B. LoJack - LoJack is a tracking system used for stolen vehicles, not laptops.

24
Q
  1. (1.11)
    A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

A. ipconfig
B. ifconfig
C. arpa
D. ping

A

B. ifconfig
While ifconfig can be used for this, it’s important to note that Apple recommends using the networksetup command for managing network settings. ifconfig has limitations and might not interact well with the system’s network management tools.

A. ipconfig: is not a built-in command in macOS for network configuration.
C. arpa: Is associated with the Address Resolution Protocol (ARP) and might be used for network troubleshooting.
D. ping: Used to test connectivity to another device on a network.

25
Q
  1. (1.5)
    A technician is securing a new Windows 10 workstation and wants to enable a screensaver lock. Which of the following options in the Windows settings should the technician use?

A. Ease of Access
B. Privacy
C. Personalization
D. Update and Security

A

C. Personalization
Within the Personalization settings, navigate to the “Lock screen” option and then access “Screen saver settings”

A. Ease of Access focuses on accessibility features for users with disabilities, not screen saver settings.
B. Privacy deals with controlling how apps access user data and device settings, not screen saver settings.
D. Update and Security manages updates, security features like firewalls, and virus protection, not screen saver settings.

26
Q
  1. (4.9)
    A technician receives a call from a user who is having issues with an application. To best understand the issue, the technician simultaneously views the user’s screen with the user. Which of the following would BEST accomplish this task?

A. SSH
B. VPN
C. VNC
D. RDP

A

C. VNC (Virtual Network Computing)
Real-time viewing: Allows the technician to see exactly what the user sees.
Platform compatibility: VNC is available for various OS’s, making it a versatile solution for remote desktop sharing.

D. RDP is a Microsoft protocol for remote desktop access, similar to VNC. However, RDP might require additional setup or software installation on the user’s device, whereas VNC viewers are often readily available for download.
A. SSH is primarily designed for secure command-line access to Unix-based systems. It wouldn’t provide a graphical view of the user’s desktop.
B. A VPN creates a secure tunnel between the user’s device and the technician’s network. While this might be necessary if the application is internal or requires access to specific resources, it wouldn’t directly provide remote control of the user’s desktop.

27
Q
  1. (1.4)
    After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired.
    Which of the following Windows 10 utilities should a technician use to address this concern?

A. Device Manager
B. Administrator Tools
C. Programs and Features
D. Recovery

A

C. Programs and Features
Application Repair: There are options to repair or reinstall applications. Repairing an application attempts to fix corrupted files or registry entries, potentially resolving the issue caused by the failed update.
Targeted Approach: Programs and Features specifically deals with managing installed applications, making it the most relevant tool for addressing application launch issues.

A. Device Manager: Focuses on managing hardware devices and their drivers.
B. Administrator Tools: This is a broad category that encompasses various administrative tools. Programs and Features is a specific tool within Administrator Tools that directly addresses application management.
D. Recovery: Typically involves restoring the system to a previous point in time or resetting the entire system. This is overkill compared to attempting to repair the specific application using Programs and Features.

28
Q
  1. (2.1)
    Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

A. apt-get
B. CIFS
C. Samba
D. grep

A

C. Samba
An open-source software suite that allows for file and print services interoperability between Unix-based systems (like Linux) and Windows systems.
It acts as a bridge, enabling Linux machines to participate in a Windows Active Directory domain. This allows for centralized authentication and authorization management for Linux users and resources within the Windows Active Directory environment.

A. apt-get is a package manager for Debian-based Linux distributions used to install software packages. While it might be used to install software required for Active Directory integration, it’s not the core service for such integration.
B. CIFS (Common Internet File System) is a file-sharing protocol used by Windows systems. While Samba utilizes CIFS for communication, it provides a more comprehensive solution including Active Directory integration features beyond just file sharing.
D. grep is a command-line utility used for text search in Linux environments. It wouldn’t be helpful for system integration with Active Directory.