1/74
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Date and time
a technician receives an invalid certificate error when visiting a website with port 443 enabled. other. computers on the same LAN dont exhibit this symptom. which of the following needs to be adjusted on the workstation to fix the issue?
an emulator converts commands to and from a host machine to an entirely different platform, whereas a VM creates an environment based on the host machine and does no converting
what is the difference between a VM and an emulator?
ISO
you are using a VM to simulate a production environment for testing purposes. you need to install a specific program on the VM to replicate the functionality of a critical app. which of the following installation methods would you use to install the program on the VM?
port forwarding
which hardware firewall feature enables incoming traffic on a specific port to reach an IP address on the LAN?
Copy and move files and change file attributes
you are organizing your files on your Windows computer and need to perform various tasks using the Windows file explorer program. Choose all actions you an accomplish using file explorer program
Windows 10 Enterprise, Windows 10 Pro, Windows 10 Pro for Workstations
These has BitLocker Drive Encryption feature
Social engineering
take advantage of human shortcomings to gain access that should otherwise be denied.
Guest
the kisok is secure and users have access to only the app needed for customer interaction. When the computer is rebooted, it logs in automatically without password.
denied write/delete permissions and mapped drives
A SOHO technician recently moved data from 1 server to another to increase storage capacity. Several users are now reporting they can't access certain shares on the network. When the users attempt to access shares, they get the error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which are the reasons for these issues?
Full
a company installed a new backup and recovery system. which of the following types of backups should be completed first?
remote wipe
a company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. which is the best solution?
net view //fileserver
which is the correct net syntax for discovering which network shares on a particular server are mapped on your computer?
expired certificate
a user is unable to log in to network. the network uses 802.1X with EAP-TLS to authenticate on the wired network. the user has been on an extended leave and has not logged in to the computer in several months. which of the following is causing the log-in issue?
spoofing
attacker is attempting to use a legit IP address to disrupt access elsewhere on the network
password enabled screensaver should automatically start
after a set period of inactivity on a Windows workstation, what should happen?
using disk-wiping softeare
a company wants to remove info from past users' hard drives in order to reuse the hard drives
displaying active TCP/IP connections and displauing network protocol stats
netstat is a command line utility used for:
hibernate
which power mode will write the contents of the RAM to the disk?
quarantine the system
none of the files on a PC will open. the program on the desktop is requesting payment in exchange for file access. this is ransomware. what should a technician do first?
anti-malware software
rootkit has been installed and needs to be removed
network utilization will be significantly increased due to the size of CAD files
an architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server.
permission to modify and redistribute the app and free access to app code
which describes the characteristic features of open-source apps and OSs?
he wont be able to change wallpaper
james installed a new copy of windows on his computer. however, he hasnt yet activated the OS with a valid license key. until james activates the OS. which restriction will be imposed on him as a Windows user?
Internet options > Connections
configures the setting of windows PC to use new proxy server.
EFI system partition
where is the boot configuration data stored on a windows installation utilizing EFI?
escalate the ticket
a technician has spent hours trying to resolve a computer issue for the company's CEO. which step should the technician take next?
the permissions will be the same as they were before the move
Jack moved a folder on the same partition. what happens with the permissions for the folder?
RDP
which microsoft remote protocol allows for local drives to be presented to remote system?
WPA3
most secure wifi protocol
PowerShell
scripting language used with Microsoft Azure and Microsoft 365
account lockout
network was breached. system logs indicate that a single user's account was breach after 400 attempts with dictionary attacks. which mitigates the threat?
enable safe boot
which startup setting option allows you to boot with basic drivers?
proceed with custom manufacturer's procedure
proper way for a technician to dispose of used printer consumables
disk utility
technician is asked to resize a partition on the internal storage drive of a computer running macOS. which of the tools should be used?
set the laptop config to DHCP to prevent conflicts
a user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. the user logs on to the old desktop and receives the same message. a technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. what should be done to fix the issue?
uninstall the fraudulent app
what action should be taken first to address phone issues caused by a newly installed app that claims to optimize performance but has resulted in high network utilization and repeated security warnings?
4 GB
What is the minimum RAM memory required for a 64-bit installation of windows 11?
system event log
what event log should be reviewed if an unexpected computer reboot is suspected?
SSH
what options can an IT firm utilize to securely access the network switches and routers while being geographically separated from the company?
System
which control panel applet would you use to join the OS to a domain?
accessibility
user requires a different cursor color. which OS utilities is used to change the color of cursor in windows 11?
biometric lock and card reader
which of the following provide best way to secure a server room?
implement single sign-on
to reduce number of help desk tickets submitted for forgotten passwords
WPA2-AES
strongest encryption and authentication for wireless networks and is the most secure form of WPA2 security.
BitLocker
encrypts an entire hard drive on a windows desktop
register the ticket with a unique user identifier
to correctly associate a ticket submitted for a user reporting an issue with the right user
netstat
determines the ports occupied by both apps and OS.
Visit the manufacturer's website.
to find the MSDS for an inkjet printer cartridge intended for home use
default apps
you have just updated windows computer and now whenever you try to open a PDF file, it opens in microsoft edge instead in adobe reader. you want to make sure that all PDF files open in adobe reader.
working copies
type of backup that is kept on site at the computer centre for immediate recovery purpose?
use settings to access general
in context of CYOD policy, to ensure each user's windows device requires a password upon resuming from sleep or inactivity.
opening system properties
to rename computer
the sharing options for the network profile need to be reconfigured
reason for being unable to print to a network printer while they can browse the web.
avoid distraction
describe the action taken by the technician who received a phone call while troubleshooting a customer's pc and set the phone to silent
robocopy
used to transfer a large number of files from one computer to another, considering the connection is unreliable and there's a risk of interruptions and the transfer process needs to be resumable if the connection is disrupted
mapped network drive
john has created a shared folder on a network server for the members of the research department. the shared folder now appears as a drive letter on each user's computer. what type of folder is created?
disk encryption
to secure a workstation for point of sale transactions that involves processing credit cards and loyalty cards in case of theft.
C:\Windows\System32\Config
Where is the Windows system registry hive data stored?
.app
file type for new software on a macOS computer
right click the printer, select properties, and click Ports tab
to determine the type of connection used by a network printer.
resource monitor
A Windows tool that monitors the performance of the processor, memory, hard drive, and network.
PII
government regulated data
msconfig
to modify startup environment of computer and troubleshoot system problems.
hash verification
unique string of characters from a larger string of data such as a file or message. takes input data and converts into fixed length, alphanumeric string. the hash of original data must match with the hash of the received data
web browser
configures SOHO router
laptop has windows home edition
can't join a windows 10 laptop to a domain
Chrome OS
provides a lightweight option and an easy to use browser-based interface.
folder options
a user's local windows profile is not working properly and you need to check the ntuser.dat file. which tool can view the file? options to show or hide hidden files and system files
vishing
attacker uses voice calls or VoIP to try and trick the victim into revealing sensitive info. they pretend to be a representative of a trusted organization.
the status of the spooler service
unable to print a document and receiving the error message print sub-system not available. what should i check first?
dfrgui.exe
to resolve PC running slow and has a bad fragmented hard drive
export the user's certificate
you're exporting the private key that was used to encrypt the files. this is necessary so that the recipient of the files can decrypt the files with their own private key and access data. it can ensure that the recipient will access the encrypted files on the second laptop rather than copying the encrypted files to the second laptop and being unable to access data.
/scannow
sfc switch that enables a file check that scans integrity of all protected system files and attempts to repair corrupted files
multithreading
OS feature that offers the ability for a single app to have multiple requests into the processor at one time
run a full antivirus scan on computer
a user reports seeing random, seemingly non-malicious ad notifications in the Windows 10 Action Center. the notifications indicate the ads are coming from a web browser. which is the best solution to implement?