1/91
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Snapshot
You have a Linux server on your network. You want to back up all files in the /user/files volume without disrupting user access. What should you use to do this?
Store 30 days of backups on premises and then age the backups to the public cloud
A security team recommends a disaster recovery plan with the following requirements: Recent backups should be readily available. Only long-term backups should be stored off premises. There should be minimum expenditure on hardware. Which of the following satisfies all of these requirements?
Escalate the problem to the next level.
A user has called the help desk, and you've entered their ticket. The problem they describe is beyond your training. What do you do?
Investigate and verify malware symptoms.
A user has a computer that suddenly started running very sluggishly. Upon inquiry, you find that they went to some websites yesterday that they don't normally visit, so you decide to follow the best practice procedures for malware removal. What is the first step?
Boot to a bootable media from your anti-malware provider and run a remediation.
A Windows computer user reports that their computer just completely locked up. On the screen is a message saying that the person pictured has participated in an illegal activity. The webcam turned on by itself, and the computer user was pictured. The message also says they can resolve the charges against them by paying a $500 fine. They are understandably shaken by the incident. What should you do next?
Verify the date and time on your computer.
You've tried to access a website that you're sure is safe, but you're getting an invalid certificate warning. What should you do?
SSH - secure shell/22
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?
Force close the application
An application on your mobile device has crashed and is unresponsive. What should be your first choice to fix it?
I can help you fix that. It's easy.
Your friend has a new Windows 11 computer, and they're getting way too many notifications while they're trying to work. What will you tell them?
Control Panel - Network and Sharing Center, Settings - Network & Internet
You need to configure a VPN for a new salesperson. Where is this done in Windows 10?
Turn your phone off and apologize to the client and Ignore your phone.
You are on-site fixing a client's laptop that will not load the OS. Your phone starts to vibrate repeatedly with notifications. What should you do? (Choose two.)
Subnet Mask
You need to manually configure the IP address for a server, so you go to Network and Sharing Center, click Change Adapter Settings, then right-click the connection, choose Properties, and select IPv6. Which of the following pieces of information is not needed to configure IPv6?
Vishing - social engineering attack that uses phone calls or voice messages to trick people into giving up personal or financial info.
Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?
chkdsk and dism check disk and disk management)
A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use? (Choose two.)
Turn on Airplane mode.
You're at a favorite coffee shop using their Wi-Fi, when suddenly you notice that your mouse is moving, and you aren't moving it. You knew using this unsecured Wi-Fi was a bad idea, and now you've been hacked and want to stop the attacker as soon as possible, but you need time to save your files. What is the best course of action?
MSRA (Microsoft Remote Assistance): A Windows feature that lets someone invite a trusted person to view or control their computer remotely to help troubleshoot issues.
Your friend in another state is having a problem with their Windows 11 Home edition computer and wants your help. What could you do to provide the quickest possible help?
GPT - (GUID Partition Table): A type of partition that allows you to create multiple logical drives within it. Used with MBR (Master boot record) disks to bypass the 4 primary partition limit.
You have installed a second hard drive in a Windows workstation. In Disk Management, what type of partition can you create to allow unlimited logical partitions?
TACACS - (Terminal Access Controller Access-Control System) A protocol used for authentication, authorization, and accounting (AAA) of users accessing network devices.
Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?
Network utilization will be significantly increased due to the size of CAD files
An architecture firm is upgrading its CAD (Computer-Aided Design) software, which stores backups on a cloud server. What is MOST likely the IT manager’s concern?
Put user accounts into groups. Grant permissions to groups.
When configuring NTFS permissions on a Windows workstation, what is the recommended method?
Join a windows Domain, RDP (Remote Desktop Protocol), Group policy editor
Which features are not available in the Home edition of Windows but are available in Pro and higher? (Choose three.)
You can't use the copy command to perform this task. (can only copy files not directories)
You are at a Windows command prompt in the D:\users folder. You want to use the copy command to copy the D:\users\jdoe folder to the D:\files folder. Which of the following statements is true?
Default Login and WPS (WPS lets you connect with a PIN instead of a password)
A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)
Facial Recognition and Fingerprint Reader
Your mobile device locks after a short inactivity period for security reasons. Which of the following are common biometric devices for opening a mobile device whose screen is locked? (Choose two.)
Off-site
A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?
Biometric Lock and Badge reader
Which of the following provide the BEST security for a server room? (Choose two.)
Educate users regarding threats.
A user called the help desk because their mouse is moving across the screen and windows are opening and closing. They believe it's not malware because they said they didn't do anything; they just opened an email with a strange subject. Which of the following will be most important to prevent malware on this computer going forward?
Clear the browser's cache and Clear the browser's stored cookies
A website you use often isn’t showing updates on your desktop but does on your phone. What should you do? (Choose two.)
Increase physical memory and virtual memory
Your friend gets low memory warnings when launching a game. What can you do to prevent this? (Choose two.)
tracert - command line tool that shows the path packets take from your computer to a endpoint
Which command shows the hops between your computer and a destination?
sfc - System File Checker
A Windows workstation isn't booting properly. Which utility scans and repairs corrupt system files?
Avoid distractions
A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?
Uninstall the fraudulent application
A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?