Podcast
Questions and Answers
What is the best method to address occasional voltage spikes in a power system?
What is the best method to address occasional voltage spikes in a power system?
What is the maximum amount of RAM that a 32-bit operating system can support?
What is the maximum amount of RAM that a 32-bit operating system can support?
Which tool would provide details on a previously crashed application?
Which tool would provide details on a previously crashed application?
What type of attack involves trying every combination of characters to discover a password?
What type of attack involves trying every combination of characters to discover a password?
Signup and view all the answers
Which of the following tasks is NOT typically managed by Device Manager?
Which of the following tasks is NOT typically managed by Device Manager?
Signup and view all the answers
During which situation is it most appropriate to use maintenance of power supplies?
During which situation is it most appropriate to use maintenance of power supplies?
Signup and view all the answers
Why is it important to confirm electrical grounding in a building?
Why is it important to confirm electrical grounding in a building?
Signup and view all the answers
Which statement is true regarding a technician who uses Task Manager?
Which statement is true regarding a technician who uses Task Manager?
Signup and view all the answers
What change would most effectively improve battery life on the phone?
What change would most effectively improve battery life on the phone?
Signup and view all the answers
Why would connecting to a VPN decrease battery performance?
Why would connecting to a VPN decrease battery performance?
Signup and view all the answers
How does increasing available storage space affect battery life?
How does increasing available storage space affect battery life?
Signup and view all the answers
What would likely be the first step in resolving a print spooler issue?
What would likely be the first step in resolving a print spooler issue?
Signup and view all the answers
Which tool can provide the system administrator with additional information when an application randomly shuts down without error messages?
Which tool can provide the system administrator with additional information when an application randomly shuts down without error messages?
Signup and view all the answers
What is a primary reason to reboot the computer after addressing a print spooler service error?
What is a primary reason to reboot the computer after addressing a print spooler service error?
Signup and view all the answers
What is the BEST troubleshooting step for a workstation on the manufacturing floor that is booting slower than normal?
What is the BEST troubleshooting step for a workstation on the manufacturing floor that is booting slower than normal?
Signup and view all the answers
During the installation of a new application that includes a service, which permission is required for the installation to proceed?
During the installation of a new application that includes a service, which permission is required for the installation to proceed?
Signup and view all the answers
Which option would NOT be effective in fixing the print spooler service issue?
Which option would NOT be effective in fixing the print spooler service issue?
Signup and view all the answers
Which statement best describes the effect of keeping Wi-Fi enabled on battery life?
Which statement best describes the effect of keeping Wi-Fi enabled on battery life?
Signup and view all the answers
What is the MOST likely reason a user working from home cannot print to a corporate laser printer?
What is the MOST likely reason a user working from home cannot print to a corporate laser printer?
Signup and view all the answers
What happens to the print spooler service when issues are identified?
What happens to the print spooler service when issues are identified?
Signup and view all the answers
Why might users from a different computer be unable to access a local file that has had NTFS permissions modified to allow read access to Everyone?
Why might users from a different computer be unable to access a local file that has had NTFS permissions modified to allow read access to Everyone?
Signup and view all the answers
Which of the following might NOT be a viable solution if an application constantly crashes during use?
Which of the following might NOT be a viable solution if an application constantly crashes during use?
Signup and view all the answers
If a workstation is experiencing prolonged boot times, which of the following actions could have the least impact on improving startup performance?
If a workstation is experiencing prolonged boot times, which of the following actions could have the least impact on improving startup performance?
Signup and view all the answers
In the event of a printing issue, which of the following checks should be prioritized first?
In the event of a printing issue, which of the following checks should be prioritized first?
Signup and view all the answers
What is the term used to describe the action of following someone closely to gain unauthorized access through a secure door?
What is the term used to describe the action of following someone closely to gain unauthorized access through a secure door?
Signup and view all the answers
Which utility would a Linux administrator use to modify configuration text files?
Which utility would a Linux administrator use to modify configuration text files?
Signup and view all the answers
If a server in the DMZ is infected with malware that activates at system startup but is not part of an OS file, what type of malware is most likely present?
If a server in the DMZ is infected with malware that activates at system startup but is not part of an OS file, what type of malware is most likely present?
Signup and view all the answers
When dealing with a frustrated user at a help desk, what is the best initial response?
When dealing with a frustrated user at a help desk, what is the best initial response?
Signup and view all the answers
What action is typically related to someone trying to bypass security by closely following another person?
What action is typically related to someone trying to bypass security by closely following another person?
Signup and view all the answers
What is the primary purpose of the 'df' command in Linux?
What is the primary purpose of the 'df' command in Linux?
Signup and view all the answers
Which malware type remains active with the system even if it is not a regular file on the OS?
Which malware type remains active with the system even if it is not a regular file on the OS?
Signup and view all the answers
In an IT support scenario, what is the best way to address a user's unrelated repair request?
In an IT support scenario, what is the best way to address a user's unrelated repair request?
Signup and view all the answers
What should a technician use to prevent inhaling particles in a dusty environment?
What should a technician use to prevent inhaling particles in a dusty environment?
Signup and view all the answers
What is the most likely reason a user cannot see any devices available for AirDrop?
What is the most likely reason a user cannot see any devices available for AirDrop?
Signup and view all the answers
Which item would be least relevant for a cleaning process outside of a computer?
Which item would be least relevant for a cleaning process outside of a computer?
Signup and view all the answers
If a technician experiences a fire inside a computer case, they should do which of the following first?
If a technician experiences a fire inside a computer case, they should do which of the following first?
Signup and view all the answers
What impact does enabling rotation lock have on a device's ability to use AirDrop?
What impact does enabling rotation lock have on a device's ability to use AirDrop?
Signup and view all the answers
What is a potential consequence of low storage space on an iOS device regarding AirDrop functionality?
What is a potential consequence of low storage space on an iOS device regarding AirDrop functionality?
Signup and view all the answers
In a cleaning scenario involving a server, which item is unnecessary?
In a cleaning scenario involving a server, which item is unnecessary?
Signup and view all the answers
To successfully transfer files over AirDrop, which two technologies must be enabled on the device?
To successfully transfer files over AirDrop, which two technologies must be enabled on the device?
Signup and view all the answers
What type of fire extinguisher is most appropriate for electrical fires?
What type of fire extinguisher is most appropriate for electrical fires?
Signup and view all the answers
Which of the following features is primarily designed for full disk encryption on Windows systems?
Which of the following features is primarily designed for full disk encryption on Windows systems?
Signup and view all the answers
Why should water-based extinguishers be avoided for electrical fires?
Why should water-based extinguishers be avoided for electrical fires?
Signup and view all the answers
What does EFS stand for in the context of Windows features?
What does EFS stand for in the context of Windows features?
Signup and view all the answers
Which type of data is described as requiring retention for five years due to regulatory standards?
Which type of data is described as requiring retention for five years due to regulatory standards?
Signup and view all the answers
What is the main purpose of a Dry Powder extinguisher in fire safety?
What is the main purpose of a Dry Powder extinguisher in fire safety?
Signup and view all the answers
In what situation is it critical to disconnect the power source during a fire emergency?
In what situation is it critical to disconnect the power source during a fire emergency?
Signup and view all the answers
Which of the following components is specifically effective for encrypting files at the file system level?
Which of the following components is specifically effective for encrypting files at the file system level?
Signup and view all the answers
Study Notes
Performance-Based Questions
-
A1: A technician needs to analyze and repair damaged operating system files on a Windows computer using the command line. The specific command is
sfc /scannow
. This process takes time and details are in a log file. -
A2: Arrange malware removal tasks in order: Identify symptoms, Quarantine infected systems, Disable System Restore, Schedule scans and run updates, Remediate, Educate the end user, Enable System Restore. Following order is crucial to prevent reinfection.
-
A3: Match technologies to descriptions:
- EULA: The proper use of computers, tablets, and other devices is part of the employee handbook.
- PII: A database includes client first names, last names, and home addresses.
- GFS: A backup series consists of monthly, weekly, and daily backup data, a strategy for large amounts of data.
- AUP: The proper use of computers, tablets, and other devices is part of the employee handbook (same as EULA).
-
A4: Access a file on a network share called \gate-room\ship-diagnostics using drive g: The command is
net use g: \\gate-room\ship-diagnostics
. -
A5: Match commands to descriptions:
- dir: List the contents of a Windows directory.
- gpupdate: Apply Group Policy changes.
- diskpart: List volume names on storage.
- hostname: Identify the name of a database server.
- chkdsk: Repair logical file system errors.
- cd: Change to a different working directory.
Multiple Choice Questions
- A6: A technician is installing a new server. A tingling sensation during installation means equipment grounding should be tested first.
- A7: A phone battery is draining quickly and warming up after connecting to a corporate network. Disabling Wi-Fi is the best solution for improving battery life.
- A8: The error message "The print spooler service is not running" means the spooler service should be restarted. The spooler is a background service in Windows.
- A9: The best security method for a laptop in a library is a cable lock.
- A10: Rodney, a technician cleaning computer components, needs a face mask to prevent inhaling sawdust and wood chips.
- A11: AirDrop of a document will fail if Wi-Fi and Bluetooth are disabled.
- A12: A server fire should be extinguished with carbon dioxide extinguisher (not water).
- A13: BitLocker encrypts all data on a storage drive in Windows.
- A14: A company retaining customer data for five years involves PII (Personally Identifiable Information).
- A15: For restoring data if a mobile device is lost or damaged, use remote backup.
- A16: Disclaimers and usage requirements displayed during application login are called a splash screen or acceptable use policy.
- A17: For modifying UAC (User Account Control) settings in Windows 10, go to User Accounts in the Control Panel.
- A18: To mitigate voltage spikes in an office power system use a surge suppressor.
- A19: 32-bit operating systems have a maximum RAM of 4 GB.
- A20: Use Event Viewer to examine past occurrences of application crashes.
- A21: Trying every combination of letters and numbers to discover a password, is a brute force attack.
- A22: To return an email server to previous state after an upgrade failure, use a rollback plan.
- A23: If the error message appears stating "The controller does not have enough resources for this device," after installing a USB webcam, move the webcam to a different USB interface.
- A24: The MOST likely method for accessing large OS images on a network share is to map the folder to an available drive letter.
- A25: To install a 64-bit Windows 10 upgrade, when there is not enough space, increase the free storage space to 32 GB.
- A26: Rootkit is a type of malware running in the OS kernel.
- A27: When an application won't start on Android tablets, power cycle the tablets is the best troubleshooting step.
- A28: A Windows desktop taking fifteen minutes to load usually indicates slow profile load.
- A29: Installing a 64-bit software on a 32-bit OS requires OS compatibility.
- A30: A security guard noticing someone bypassing security by following another person is called tailgating.
- A31: The Linux utility to edit configuration files is nano.
- A32: If a server in the DMZ is infected without an infected file in the OS, that is most likely a boot sector virus.
- A33: When a customer is upset, repeat understanding, offer an estimate and a follow-up time.
- A34: After performing a factory reset on an Android phone showing ads, verify the source of each app is the most important step.
- A35: To configure WPA3 security on wireless access points, you use GCMP.
- A36: Use multi-factor authentication (MFA) for added security when connecting to a corporate VPN.
- A37: To troubleshoot a slow Windows 10 startup, use Task Manager.
- A38: If replacing server memory, first disconnect all power sources.
- A39: To safely remove data from a failed hard drive, use regular format.
- A40: To access a folder named "logs" using the command line, use cd logs.
- A41: To use eight bootable partitions, the GPT (GUID Partition Table) partition style is appropriate.
- A42: When a Windows installation fails to recognize the drive controller, load third-party device drivers.
- A43: When a computer is slow and files disappear, install anti-malware software.
- A44: An Android phone upgrade will fail if the smartphone storage is nearly full.
- A45: When a macOS hard drive fails, use Time Machine to restore data.
- A46: A user may have installed a personal license, causing an automatically removal on a company computer.
- A47: For upgrading files and applications when upgrading to Windows 11, a clean install is appropriate.
- A48: If identifying a malware-infected computer, disconnect the network cable first.
- A49: If a printer needs a hardware replacement, inform the user of the repair status and add a follow-up event.
- A50: When upgrading from Windows 8.1 Enterprise to Windows 10, use Windows 10 Enterprise x64.
- A51: To troubleshoot why an app keeps crashing, check the Event Viewer.
- A52: To troubleshoot a slow boot, disable startup applications.
- A53: To install an application that also installs a service on a Windows 10 computer, you need Administrator permission.
- A54: When a user can't print from home to a corporate office, it's likely the user is disconnected from the VPN.
- A55: If users can't access a network share with read access through Everyone, there are share permissions restrictions related to remote devices.
- A56: To permanently remove data from a hard drive during disposal, use a shredder
- A57: When multiple support tickets exist, contact the end-user to determine priority and urgency, triaging is unnecessary to make the decision.
- A58: To deal with a false virus alert and remove restore points, the best solution is to update anti-virus signatures.
- A59: For managing a network switch and firewall in a data center, use SSH.
- A60: If a smartphone shows fake security warnings, a virus scan is the best first step.
- A61: If a computer boots with a "missing operating system" error, modify the BIOS boot order to resolve incompatibility problems with USB boot devices .
- A62: Randomly appearing ads might be caused by adware.
-
A63: Use .bat file extensions for Windows batch files when referring to a command like
cd c:\source
. - A64: Use the sfc (System File Checker) command to restore missing operating system files.
- A65: To resolve copyright infringement on a company computer, the best next step is to securely remove and store the computer.
- A66: Group Policy is best used to enforce a password complexity policy in Active Directory.
- A67: A dollar sign ($) added to a shared network folder name makes it invisible to users browsing.
- A68: The most likely reason a phone won't connect to a wireless network is an incorrect Wi-Fi password.
- A69: Use an anti-static strap when upgrading a video adapter.
- A70: To identify and track computer systems, use Asset tags.
- A71: Hiding extensions for known file types may cause executable files to appear as spreadsheets, making it tricky to spot malware.
- A72: To ensure high-end wireless security and user verification, use multi-factor authentication and WPA3.
- A73: The final step in updating internet firewalls is end-user acceptance.
- A74: Employ gpupdate on a laptop to enforce a new password policy.
- A75: Failing to disable System Restore before malware removal may lead to reinfection .
- A76: UPS (Uninterruptible Power Supply) helps maintain server uptime during power failures.
- A77: Implement full device encryption to keep tablet data safe during theft or loss.
- A78: The best tool for seeing storage configuration is Disk Management.
- A79: Check the Event Viewer if a laptop freezes during a presentation.
- A80: For upgrading twenty systems to the latest Windows version, use remote network installation for efficiency.
- A81: After removing malware, educate the end user on how to prevent future problems.
- A82: Slow profile load is the most likely reason for a Windows desktop taking a long time to load.
- A83: To resolve pop-up windows, restore the workstation from a known good backup.
- A84: To address access issues from a business partner with a limited firewall, install the latest OS patches is the most important step.
- A85: The command sudo gives Linux administrators elevated privileges for software upgrades.
- A86: A laptop can be configured to remain active while the lid is closed via the Power Options settings in Windows.
- A87: To allow all computers except a kiosk access to a wireless network, use MAC filtering to exclude the kiosk's MAC address.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on maintaining computer systems and handling common issues. This quiz covers topics such as voltage spikes, RAM limits, and troubleshooting tools. It is designed for students and professionals looking to deepen their understanding of system management.