1/50
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The motherboard of a server in the corporate data center has center has started smoking and flames can be seen inside the computer case. Which of the following would be the BEST way to extinguish this fire?
Carbon dioxide extinguisher
Each time a user starts a specific corporate application, a page of disclaimers and usage requirements is shown before the login prompt. Which of the following would BEST describe this page?
Splash screen
What is the maximum amount of RAM supported by a 32-bit version of an operating system?
4 GB
When connecting a new USB webcam to windows 10, a message appears stating” The controller does not have enough resources for this device.” Which of the following would be the BEST next troubleshooting step?
Move the webcam to a different USB interface
A desktop administrator is installing a 64-bit version of windows 10 Pro on a workstation, but the installation will not start. The workstation configuration is:
1 GHz CPU
2 GB of RAM
15 GB of free storage space
1280 × 720 video resolution
Which of the following would allow this installation to proceed?
Increase free storage space to 32 GB
An internal audit has found that a server in the DMZ appears to be infected with malware. The malware does not appear to be part of a file in the OS, and the malware is started each time system is started. What type of malware would be MOST likely found on this server?
Boot sector virus
A user has delivered a broken laptop to the help desk, and they are visibly upset and quite vocal about the problem they're having. The user is also asking for a very specific repair that doesn't appear to have any relationship to his issue. What's the best way to handle this situation?
Repeat your understanding of the issue to the customer and provide an estimate and follow-up time.
Daniel, a user in the finance department, has purchased a new Android smartphone and has installed a number of productivity apps. After a day of use, Daniel finds the phone displaying a large number of advertisements when browsing the Internet. Which of the following tasks should Daniel perform after completing a factory reset?
Verify the source of each app before installation
A network administarator has configured all of their wireless access points with WPA3 security? Which of the following technologies would be associated with this configuration?
GCMP
A user has installed multiple applications over the last week. During the startup process, the computer now takes over fifteen minutes to display the Windows 10 desktop. Which of the following utilities would help the system administrator troubleshoot this issue?
Task Manager
A server administrator is replacing the memory in a database server. Which of the following steps should be followed FIRST?
Disconnect all power sources
A system administrator is configuring a server to use eight bootable partitions on a single SSD. Which of the following partition styles would be the BEST choice for this configuration?
GPT
A technician is installing a fresh Windows operating system on a file server. Unfortunately, the drive controller in the system is not recognized during the installation process. Which of the following would be the BEST way to manage this issue?
Load third party drivers
A user in the marketing department is using an application that randomly shuts down during normal use. When the problem occurs, the application suddenly disappears and no error messages are shown on the screen. Which of the following would provide the system administrator with additional information regarding this issue?
Event Viewer
A user working from home is not able to print to a laser printer at the corporate office. Which of the following would be the MOST likely reason for this issue?
Disconnected VPN
A user has received a pop up message on their computer that states applications on their computer are infected with a virus. A technician has determined that the pop up message is a hoax that needs to be removed from the computer. The technician has disabled System Restore to remove all previous restore points. Which of the following tasks would be the best NEXT step?
Update the anti-virus signatures
In which of the following file types would a system administrator expect to see the command, “cd c:\source” ?
.bat
A malware infection has recently been removed from a computer. When starting the operating system, Windows shows errors during the startup process indicating some core operating system files are missing. Which of the following should be used to restore these missing files?
sfc
A desktop administrator has determined that an employee in the corporate office has been using their computer to share copyrighted materials on the Internet. Which of the following should be the best NEXT step?
Retrieve and securely store the computer
Jack, a user, is having problems with the 802.11 wireless connection on his iOS phone. Although there are names appearing in the network list, his phone does not show any connectivity to a wireless network. Jack has confirmed that airplane mode is not enabled, Bluetooth is on, and VPN is not enabled. Which of the following is the MOST likely reason for this lack of wireless connectivity?
The Wi-Fi password is incorrect
A technician is troubleshooting a computer infected with a virus. The user thought they were opening a spreadsheet, but the file was actually a virus executable. Which of the following Windows options were MOST likely associated with this issue?
Hide extensions for known file types
A network consulting firm is upgrading the Internet firewalls for a large corporation. The proposal includes a description of the project and the network topology changes required to support the upgrade. The proposal also describes the risks involved in the process of making this upgrade. Which of the following would be the LAST step in this upgrade?
End-user acceptance
A data center manager requires each server to maintain at least fifteen minutes of uptime during a power failure. Which of these would be the BEST choice for this requirement?
UPS
A financial corporation is deploying tablets to their salespeople in the field. The company would like to ensure that the data on the tablets would remain private if the devices were ever stolen or lost. Which of the following would be the BEST way to meet this requirement?
Use full device encryption
A system administrator is adding an additional drive to a server and extending the size of an existing volume. Which of the following utilities would provide a graphical summary of the existing storage configuration?
Disk Management
A security administrator has received an alert that a user’s workstation in the shipping department has attempted to communicate to a command and control server for a well-known botnet. The logs on the workstation show that the user manually installed a new Internet browser the previous day. Which of the following would be the BEST next step for troubleshooting this issue?
Disable the user’s account
A technician is installing a new wireless network in a small remote office. Which of the following should the technician choose to provide the highest level of security on the network?
WPA3
A user would like to encrypt a small group of files in a shared folder without modifying other files on the drive. Which of the following would be the BEST way to accomplish this?
EFS
A user needs to modify a spreadsheet for an upcoming meeting. The spreadsheet is currently stored on a remote computer in a shared drive. The user would like to access the shared drive as a drive letter inside of Windows File Explorer. Which of the following command line options would provide this functionality?
net use
A user is performing a series of Google searches, but the results pages are displaying links and advertisements from a different website. This issue occurs each time a Google search is performed. The same Google search on a different computer results in a normal Google results page. Which of the following would resolve this issue?
Run a malware removal utility
A security administrator has been asked to reinstall Windows on a web server diagnosed with a rootkit infection. Which of the following installation methods would be the BEST choice for this server?
Clean install
A local coffee shop has a public wireless network for customers and a private wireless network for company devices. The shop owner wants to be sure that customers can never connect to the company network. Which of the following should be configured on this network?
Configure WPA3 on the company network
A user in the shipping department has logged into the Windows domain. However, the desktop does not show the user’s normal wallpaper and all of the user’s spreadsheets and documents in the “My Documents” folder are missing. Which of these would be the BEST way to restore the user’s normal work environment?
Rename the user’s folder and delete their profile in the registry
A company’s shipping department maintains ten different computers to print shipping labels and track outgoing shipments. All of the systems are displaying an error when they access a third-party shipping management website over a secure connection. Which of the following would be the MOST likely reason for this issue?
The website certificate has expired
A desktop administrator is troubleshooting an older computer that has been slowing down as more applications and files are stored on the hard drive. Which of the following commands would be the BEST choice for increasing the performance of this computer?
defrag
Which of the following Windows Share permissions has the priority when assigning access on a mapped drive?
Deny
A desktop administrator has just removed malware from a user’s desktop computer and has configured the system to automatically update anti-virus signatures and perform a scan each night. Which of the following should be the NEXT step in the removal process?
Enable System Protection
A security administrator is installing a new VPN connection for remote users. The administrator would like all users to authenticate with their Windows Active Directory credentials. Which of the following technologies would provide this functionality?
RADIUS
Which of the following partition types limit a Windows installation to a maximum partition size of 2 TB?
MBR
A help desk technician has been tasked with rebuilding an email server that recently crashed. Which of the following would be the BEST source for this information?
Knowledge base
A server administrator is installing a 4 TB drive in a database server and would like to use all free space as a single partition. Which of the following technologies should be used with this drive?
GPT
A technician is troubleshooting an issue with an iOS tablet randomly restarting during normal use. A check of the device shows no significant application updates and the operating system was upgraded to a new version three days ago. The user states the tablet was working normally last week. Which of the following would be the MOST likely reason for these random reboots?
Faulty OS upgrade
A technician would like to modify a configuration in a user's UEFI BIOS, but the system will not provide a BIOS configuration hotkey after shutting down and powering on the computer. Which of the following would be the BEST way to address this issue?
Turn off Fast Startup
An IT manager would like to provide users with the option to recover daily versions of documents and spreadsheets. A user will have the option to roll back to any daily version in the last month. Which of the following would be the BEST way to implement this feature?
Create a file-level backup each day
A network administrator has a report showing a single user with numerous visits to a website. This website is known to violate the company’s AUP. Which of the following should the administrator do NEXT?
Contact the company’s security officer
An employee used their tablet to take pictures of the company's newest product. Those pictures were posted on an industry rumor website the following week. Which of the following should be evaluated as the MOST likely security concern?
Cloud storage
A manufacturing company in the United States sells monthly subscriptions from their website. Which of the following regulated data types would be the MOST important to manage?
Credit card transaction
A system administrator needs to configure a laptop to support inbound Remote Desktop services for the help desk team. Which of these Control Panel features provides access to these settings?
System
A system administrator is installing a new video editing application on a user’s workstation from an installation USB flash drive. However, the installation process fails due to lack of available drive space. Which of the following would be the BEST way to complete the installation process?
Install the application to a network share
A user has downloaded a browser add-on that assists with new car purchases. During the installation, the Windows UAC is requesting administrative permissions to continue with the install. Which of these is the MOST likely situation?
The software is a Trojan horse