1/648
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal
system baselines. The technician discovers an unknown executable with a random string name running on the
system. The technician terminates the process, and the system returns to normal operation. The technician thinks
the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other
machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other
machines on the network for this unknown threat?
Manually check each machine.
A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is
the FIRST step the technician should take?
Disconnect the power before servicing the PC
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization
has added to provide content filtering. Which of the following Windows utilities is the BEST choice for accessing the
necessary configuration to complete this goal?
Internet Options
An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?
VNC with username and password
Which of the following is an example of MFA?
Smart card and password
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?
Remove the static IP configuration from the desktop.
A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.
Which of the following should a technician do to remediate the issue?
Rebuild the profile.
Which of the following is the MOST basic version of Windows that includes BitLocker?
Pro
A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?
Reboot the system in safe mode and rescan.
A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?
Installer_x86.exe
A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email.
The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?
Instruct the user to disconnect the Ethernet connection to the corporate network.
A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?
Ease of Access Center
A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?
Hard drive encryption
A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application. The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?
Enable the microphone under Windows Privacy settings to allow desktop applications to access it.
A user who is unable to connect to the network submits a help desk ticket. The assigned help desk technician inquires about whether any recent changes have been made. The user reports there is construction activity in the surrounding offices. The help desk technician proceeds to ping the user's desktop, which does not respond. Which of the following is the MOST likely cause of this issue?
The network cable has become disconnected.
A user has been unable to access a website and has submitted a help desk ticket. The website has been verified to be online. Which of the following troubleshooting steps will MOST likely resolve the issue?
Clearing the cache
A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro. The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?
In-place upgrade
The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?
Enabling BitLocker on all hard drives
A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?
WPA3
After returning from vacation, a user is unable to connect to the network at the corporate office. Windows allows the user to log in; however, no internal or external websites are accessible when running a browser. The user's expected network shares are unreachable, and all websites attempted return the message, Hmm, we can't reach this page.
Which of the following is the MOST likely cause of this issue?
The user enabled airplane mode.
Which of the following file extensions are commonly used to install applications on a macOS machine? (Choose three.)
.pkg, .dmg, .app
A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?
Performance Monitor to check for resource utilization
A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?
Implement a single sign-on with biometrics.
A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?
The workstations and the authentication server have a system clock difference.
A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?
Differential backup
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the user's account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:
regulatory compliance requirements.
A technician received a call stating that all files in a user's documents folder appear to be changed, and each of the files now has a .lock file extension. Which of the following actions is the FIRST step the technician should take?
Disconnect the machine from the network.
A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?
Changing proxy settings
An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?
Risk analysis
Which of the following is a consequence of end-of life operating systems?
Operating systems no longer receive updates.
A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?
The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.
A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?
Ease of Access Center
A user received the following error upon visiting a banking website:
The security certificate presented by this website was issued for a different website's address.
A technician should instruct the user to:
close out of the site and contact the bank.
A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?
OS reinstallation
A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor?
Rearranging the monitor's position in display settings
A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi. When the smartphone is connected to Wi-Fi, the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?
The smartphone's line was not provisioned with a data plan
A help desk technician runs the following script: Inventory.py. The technician receives the following error message:
How do you want to open this file?
Which of the following is the MOST likely reason this script is unable to run?
The runtime environment is not installed.
A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?
Distributed denial of service
A technician suspects the boot disk of a user’s computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?
Run chkdsk on the drive as the administrator
A BSOD appears on a user’s workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?
Stop code
Which of the following is the STRONGEST wireless configuration?
WPA3
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?
Change the default administrative password.
While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?
Send a quick message regarding the delay to the next customer.
A user connected a laptop to a wireless network and was tricked into providing log-in credentials for a website. Which of the following threats was used to carry out the attack?
Evil twin
A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?
WPA2 with AES
A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?
Creating a ticketing system
Which of the following Linux commands would be used to install an application?
yum
A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?
Multifactor authentication will be forced for Wi-Fi.
A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?
The log-in script failed.
A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?
resmon.exe
A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?
Failed login restrictions
Which of the following is MOST likely contained in an EULA? (end user license agreement)
Restrictions of use
A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?
The deployment script is performing unknown actions.
A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS is several versions out of date. The user is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the issue?
The device does not have enough free space to download the OS updates.
A technician receives a ticket indicating the user cannot resolve external web pages. However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?
Name server
A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?
Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.
An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT?
Implement the deployment.
A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the technician use to make adjustments?
devmgmt.msc
Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?
Power off the machine.
A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:
The Audio Driver is not running.
Which of the following will MOST likely resolve the issue?
services.msc
A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?
System
A systems administrator is setting up a Windows computer for a new user. Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?
Power user account
A technician downloads a validated security tool and notes the vendor hash of a11e11a1. When the download is complete, the technician again validates the hash, but the value returns as 2a222a2b2. Which of the following is the MOST likely cause of the issue?
Modified file
A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?
Shredding
A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?
If NFC is enabled
A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?
Zero day
A call center technician receives a call from a user asking how to update Windows. Which of the following describes what the technician should do?
Ask the user to click in the Search field, type Check for Updates, and then press the Enter key.
A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?
Use the application at home and contact the vendor regarding a corporate license.
A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?
VPN
A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?
The GPS application contains malware.
A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?
Chain of custody
A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?
Turning off AutoPlay
Which of the following is used to identify potential issues with a proposed change prior to implementation?
Sandbox testing
A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?
Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.
A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?
Mission Control
A user lost a company tablet that was used for customer intake at a doctor's office. Which of the following actions would BEST protect against unauthorized access of the data?
Performing a remote wipe on the device
A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Choose two.)
Device drivers, Installed application license keys
When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?
Register the ticket with a unique user identifier.
A technician installed an application on a user's desktop and received an error message. Which of the following tools can the technician use to research the error?
Event Viewer > Windows Logs > Application
A technician is configuring a new Windows laptop. Corporate policy requires that mobile devices make use of full disk encryption at all times. Which of the following encryption solutions should the technician choose?
BitLocker
A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST efficient way for the owner to install the application?
Use a network share to share the installation files.
A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?
Open Settings, select System, select Display, and change the Scale and layout setting to a higher percentage.
A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Choose two.)
ipconfig /all, hostname
Which of the following is a data security standard for protecting credit cards?
PCI
A technician has verified that a user's computer has a virus, and the antivirus software is out of date. Which of the following steps should the technician take NEXT?
Quarantine the computer.
A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to MOST likely resolve the issue?
Attach the external hardware token.
A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Choose two.)
Encryption, Antivirus
Which of the following editions of Windows 10 requires reactivation every 180 days?
Enterprise
Which of the following is the MOST important environmental concern inside a data center?
Humidity levels
A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?
exFAT
Which of the following threats will the use of a privacy screen on a computer help prevent?
Shoulder surfing
A technician needs to override DNS and redirect IP addresses and URLs to different locations. Which of the following should the technician do?
Edit the hosts file.
A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?
Virtual private network
A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified; however, storage space is a concern. Which of the following backup methods would BEST address these concerns?
Differential
Which of the following operating systems can allow users to have access to the source code, can host various server applications, and can be command line only?
Linux
A technician is investigating options to secure a small office wireless network. One requirement is to allow automatic logins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature?
RADIUS
A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?
Adjust the content filtering.
A technician needs a way to test software without placing company systems at risk. Which of the following features should the technician use to completely achieve this objective?
Sandbox
A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server is consistently communicating with an IP address that is traced back to a company that awards digital currency for salving hash algorithms. Which of the following was MOST likely used to compromise the server?
Cryptomining malware
A system drives nearly full, and a technician needs to free up some space. Which of the following tools should the technician use?
Disk Cleanup