AUGHHHHHHHHHHHHHHH

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/91

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

92 Terms

1
New cards

Snapshot

You have a Linux server on your network. You want to back up all files in the /user/files volume without disrupting user access. What should you use to do this?

2
New cards

Store 30 days of backups on premises and then age the backups to the public cloud

A security team recommends a disaster recovery plan with the following requirements: Recent backups should be readily available. Only long-term backups should be stored off premises. There should be minimum expenditure on hardware. Which of the following satisfies all of these requirements?

3
New cards

Escalate the problem to the next level.

A user has called the help desk, and you've entered their ticket. The problem they describe is beyond your training. What do you do?

4
New cards

Investigate and verify malware symptoms.

A user has a computer that suddenly started running very sluggishly. Upon inquiry, you find that they went to some websites yesterday that they don't normally visit, so you decide to follow the best practice procedures for malware removal. What is the first step?

5
New cards

Boot to a bootable media from your anti-malware provider and run a remediation.

A Windows computer user reports that their computer just completely locked up. On the screen is a message saying that the person pictured has participated in an illegal activity. The webcam turned on by itself, and the computer user was pictured. The message also says they can resolve the charges against them by paying a $500 fine. They are understandably shaken by the incident. What should you do next?

6
New cards

Verify the date and time on your computer.

You've tried to access a website that you're sure is safe, but you're getting an invalid certificate warning. What should you do?

7
New cards

SSH - secure shell/22

A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?

8
New cards

Force close the application

An application on your mobile device has crashed and is unresponsive. What should be your first choice to fix it?

9
New cards

I can help you fix that. It's easy.

Your friend has a new Windows 11 computer, and they're getting way too many notifications while they're trying to work. What will you tell them?

10
New cards

Control Panel - Network and Sharing Center, Settings - Network & Internet

You need to configure a VPN for a new salesperson. Where is this done in Windows 10?

11
New cards

Turn your phone off and apologize to the client and Ignore your phone.

You are on-site fixing a client's laptop that will not load the OS. Your phone starts to vibrate repeatedly with notifications. What should you do? (Choose two.)

12
New cards
Inside its antistatic bag
You're installing a new video card in a computer. It was an expensive card and you want to ensure that it isn't damaged by ESD. Until you are ready to place the card in the slot, what is the safest place for the card?
13
New cards
.app
A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?
14
New cards
credential manager
Joe, an end user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his password again. Which of the following Control Panel utilities can Joe use to help with this situation?
15
New cards
Check the battery charge
You're on your smartphone and notice that the apps are all responding slowly, almost jittery when you change from one to the other. What is the first thing to do?
16
New cards
Ensure that Google Chrome is a permitted program in Windows Defender Firewall.
A user is trying to use Google Chrome on their Windows computer, but they receive the error message "Unable to access the network." If they use Microsoft Edge, they are able to access websites with no problem. What do you need to do?
17
New cards
Enable System Restore and create a restore point in Windows.
You are troubleshooting a Windows workstation that has malware on it. Following the best practice procedures for malware removal, you have gotten to the point where you've scheduled system scans and run anti-malware updates. What is the next step you should take?
18
New cards
Call the client and apologize. Let them know the situation, and ask if they would prefer to reschedule or see you a bit later.
You are running late because your morning appointment took longer than expected. Your next client meeting is in five minutes, and they're 20 minutes away. What do you do?
19
New cards
communicate to stakeholders
The change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?
20
New cards
Tailgating
In which type of security threat will someone try to gain access to a secure area without credentials by following someone else into the secured area?
21
New cards
NewUser_Admin, which is an administrator account and NewUser, a standard user account
You have hired a new network administrator. How many and what type of accounts will you set up for them?
22
New cards
processes
A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which tab in Task Manager would contain the information needed to identify the cause of this issue?
23
New cards

Subnet Mask

You need to manually configure the IP address for a server, so you go to Network and Sharing Center, click Change Adapter Settings, then right-click the connection, choose Properties, and select IPv6. Which of the following pieces of information is not needed to configure IPv6?

24
New cards
Tie back any loose jewelry, long hair, or neckties. Bend at the knees and lift with your legs.
You are going to move a desktop computer from one office location to another. Which of the following are good personal safety procedures to follow? (Choose two.)
25
New cards
Sunday Monday and Tuesday
Your company does a full backup every Sunday and incremental backups all the other days. If your system crashes Wednesday morning, what backups will need to be restored?
26
New cards
Quarantine the infected system
You're troubleshooting a computer that appears to have contracted a boot sector virus. You've created a restore point in Windows. What is your next step?
27
New cards

Vishing - social engineering attack that uses phone calls or voice messages to trick people into giving up personal or financial info.

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

28
New cards

chkdsk and dism check disk and disk management)

A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use? (Choose two.)

29
New cards
Multifactor
You are required to enter a username, password, and a code from an authenticator app before you can access the company website. What type of authentication is this?
30
New cards
Connected a proper ESD strap
A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working. What should they MOST likely have done to prevent damage?
31
New cards
.ps1
You are writing a script in Microsoft PowerShell to automate some processes. What file extension will the script file have?
32
New cards
Drive wiping software
You have some older drives that you intend to donate to a nonprofit organization. You want to set all data on the drive to be nothing but 0s. What should you use to accomplish this?
33
New cards
Restart the device.
An app on your Android-based device won't open. What will you try first?
34
New cards
Keychain
You are instructing a new Mac user on the features of macOS. They ask if the system is capable of storing their passwords to various Internet sites. Which feature would they use for that?
35
New cards

Turn on Airplane mode.

You're at a favorite coffee shop using their Wi-Fi, when suddenly you notice that your mouse is moving, and you aren't moving it. You knew using this unsecured Wi-Fi was a bad idea, and now you've been hacked and want to stop the attacker as soon as possible, but you need time to save your files. What is the best course of action?

36
New cards
Follow the rollback plan.
You're in the middle of a major IT systems change and realize that it won't work without shutting everything down for a week. What should you do?
37
New cards

MSRA (Microsoft Remote Assistance): A Windows feature that lets someone invite a trusted person to view or control their computer remotely to help troubleshoot issues.

Your friend in another state is having a problem with their Windows 11 Home edition computer and wants your help. What could you do to provide the quickest possible help?

38
New cards
Boot normally and see whether the error happens again.
A user tells you that they received a BSOD error on a Windows 10 computer. No changes have been made recently. What is the best way to restart Windows to see whether you can isolate the issue?
39
New cards
Check for a firmware update
Joe, a technician, is configuring advanced security settings on a SOHO router. Joe cannot locate the settings he intends to change. What should the technician perform?
40
New cards
Ransomware
Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message still appears after rebooting, requesting cryptocurrency. What is MOST likely the cause?
41
New cards
BitLocker
Which feature of Windows Pro or higher editions is designed to encrypt storage volumes and can encrypt operating system startup files?
42
New cards
Keys
A user receives an email on a company smartphone that is encrypted and cannot open it. They forward the email to a personal account but still cannot open it. What do they need?
43
New cards

GPT - (GUID Partition Table): A type of partition that allows you to create multiple logical drives within it. Used with MBR (Master boot record) disks to bypass the 4 primary partition limit.

You have installed a second hard drive in a Windows workstation. In Disk Management, what type of partition can you create to allow unlimited logical partitions?

44
New cards
The local firewall settings are incorrect
A user recently connected a Windows laptop to a free WiFi hotspot. After returning to the office, the user cannot access network shares. What is the MOST likely cause?
45
New cards
Push a group policy
After a virus outbreak due to USB usage, a technician must deny users access to removable drives. What's the BEST way to do this without interrupting users?
46
New cards

TACACS - (Terminal Access Controller Access-Control System) A protocol used for authentication, authorization, and accounting (AAA) of users accessing network devices.

Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?

47
New cards
Full
A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?
48
New cards
File and folder encryption
You are planning on formatting a hard drive with NTFS to share files between Windows 10 and Windows 11 Pro. Which features are present in NTFS? (Choose two.)
49
New cards
Striped Volume
You have just installed a second and third hard drive into a Windows Pro workstation. Each drive is 500 GB. What should you create to combine them into one 1 TB volume and boost performance?
50
New cards
Windows Defender Firewall
You have a Windows Pro workstation installed in a workgroup. There is no centralized security. Which tool should you use to protect against network attacks?
51
New cards
Acceptable use policy
Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?
52
New cards

Network utilization will be significantly increased due to the size of CAD files

An architecture firm is upgrading its CAD (Computer-Aided Design) software, which stores backups on a cloud server. What is MOST likely the IT manager’s concern?

53
New cards
Battery backup
A small business has two servers that lose data during frequent power outages. What do you recommend?
54
New cards
OS Reinstallation
A technician suspects a rootkit has been installed and needs to be removed. What would BEST resolve the issue?
55
New cards
In the manufacturers documentation
When you want to identify the chipset of a motherboard, where should you look?
56
New cards
Confirming agreement to an AUP
Whenever you log into a computer at work, a splash screen appears with company text. What's the purpose of this splash screen?
57
New cards
exFAT
Your client has macOS and Windows computers. They want a shared drive for both OSes with large file support. What file system should you use?
58
New cards
Turn the computer off and boot using boot media from your antivirus company.
A user calls the help desk saying their computer boots to a green screen with 1s and 0s. What do you do?
59
New cards
Install and run Linux and the required application as a virtual machine installed under the Windows OS
Once weekly a user needs Linux to run a specific open-source application not available on Windows. What's the MOST efficient setup?
60
New cards

Put user accounts into groups. Grant permissions to groups.

When configuring NTFS permissions on a Windows workstation, what is the recommended method?

61
New cards
Perform a remote wipe
Your iPhone has been stolen. What should you do to ensure the thief cannot access your data?
62
New cards
Begin the malware removal process
A user logs onto their computer system and notices that several of their files are missing and some are renamed. What should you do?
63
New cards
Perform a remote wipe
Your iPhone has been stolen. To ensure that the thief does not have access to your data, what should you do?
64
New cards

Join a windows Domain, RDP (Remote Desktop Protocol), Group policy editor

Which features are not available in the Home edition of Windows but are available in Pro and higher? (Choose three.)

65
New cards
Begin the malware removal process
A user logs onto their computer system and notices that several of their files are missing and some are renamed. What should you do?
66
New cards

You can't use the copy command to perform this task. (can only copy files not directories)

You are at a Windows command prompt in the D:\users folder. You want to use the copy command to copy the D:\users\jdoe folder to the D:\files folder. Which of the following statements is true?

67
New cards

Default Login and WPS (WPS lets you connect with a PIN instead of a password)

A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)

68
New cards
Jailbreaking is a safe way to get more out of your device.
A friend asks what jailbreaking a device is and if they should do it. Which of the following is NOT true about jailbreaking?
69
New cards

Facial Recognition and Fingerprint Reader

Your mobile device locks after a short inactivity period for security reasons. Which of the following are common biometric devices for opening a mobile device whose screen is locked? (Choose two.)

70
New cards
Yes, a 32-bit application will work on a 64-bit operating system.
A user has a 32-bit application they want to use on a 64-bit operating system. Will it work?
71
New cards
Check whether the Wi-Fi is enabled.
An Android phone user cannot connect to Wi-Fi but has cellular signal. What should you have them check first?
72
New cards
Lack of security updates
What is the danger in using an operating system that has reached EOL?
73
New cards
Check for any installed patches and roll them back one at a time until the issue is resolved
A customer reports a home PC with Windows 10 is having trouble loading applications after a reboot. What’s the FIRST step in troubleshooting?
74
New cards
Palmprint scanner
A security consultant recommends biometrics for building access control. What system might they be referring to?
75
New cards
Internet Options - Connections
A department sets up a proxy server. Which Control Panel utility should be used to configure Windows workstations?
76
New cards

Off-site

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

77
New cards

Biometric Lock and Badge reader

Which of the following provide the BEST security for a server room? (Choose two.)

78
New cards
Share permissions can be enabled to secure resources across the network that are not on an NTFS partition.
What is an advantage of using share permissions over NTFS permissions?
79
New cards
zero day attack
When hackers exploit a vulnerability that hasn’t been patched yet, what is this called?
80
New cards
Dock
On a MacBook Pro, what is the name of the bar of icons along the bottom of the screen for opening apps?
81
New cards
Modify, because the folder inherits permissions from its parent folder
You’ve assigned Modify permissions to the Finance group on D:\MonthlyReports. What permissions do they have on D:\MonthlyReports\January?
82
New cards

Educate users regarding threats.

A user called the help desk because their mouse is moving across the screen and windows are opening and closing. They believe it's not malware because they said they didn't do anything; they just opened an email with a strange subject. Which of the following will be most important to prevent malware on this computer going forward?

83
New cards
Share a printer
You're helping a friend with network issues on Windows 10. Which of the following is NOT an option in Network & Internet settings?
84
New cards

Clear the browser's cache and Clear the browser's stored cookies

A website you use often isn’t showing updates on your desktop but does on your phone. What should you do? (Choose two.)

85
New cards

Increase physical memory and virtual memory

Your friend gets low memory warnings when launching a game. What can you do to prevent this? (Choose two.)

86
New cards

tracert - command line tool that shows the path packets take from your computer to a endpoint

Which command shows the hops between your computer and a destination?

87
New cards
Mapped Drive
A user struggles to navigate to a network share daily. What should you configure to help?
88
New cards

sfc - System File Checker

A Windows workstation isn't booting properly. Which utility scans and repairs corrupt system files?

89
New cards

Avoid distractions

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

90
New cards
Enable Chrome's pop-up blocker.
You’re getting pop-ups in Chrome. What action stops this from happening?
91
New cards
Grandfather Father Son
Your company does weekly full backups and daily differentials, monthly full backups kept for a year. What is this scheme called?
92
New cards

Uninstall the fraudulent application

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?