Podcast Beta
Questions and Answers
Which actions should the administrator take to help secure a mobile device against future threats? (Choose two.)
What tool should the technician use to help a user hide a file on a shared drive?
Which safety procedures would BEST protect the internal components of a PC during a processor replacement? (Choose two.)
Which document should be updated to reflect the prohibition of cryptocurrency mining on work desktops?
Signup and view all the answers
Which measures provide the BEST security for physical access to a data center server room? (Choose two.)
Signup and view all the answers
What is the MOST likely cause of a desktop PC not being able to log in while a laptop can on the same network?
Signup and view all the answers
Which tool should a technician use to resize a partition on a computer running macOS?
Signup and view all the answers
Which option would reduce the risk of a user accidentally deleting data from a shared drive?
Signup and view all the answers
Which of the following utilities should a technician use to add a program to the Path Environment Variable?
Signup and view all the answers
What is the BEST account access level for a user needing advanced features on a corporate system under least privilege policy?
Signup and view all the answers
What is the MOST likely cause of a hash mismatch after downloading a file?
Signup and view all the answers
Which method is the MOST effective for securely disposing of data on optical discs?
Signup and view all the answers
What is the MOST likely reason for a user's slow corporate phone after installing a GPS application?
Signup and view all the answers
What feature would prevent malicious files from executing automatically when a flash drive is plugged in?
Signup and view all the answers
Which factors should be considered when building a master image for deployment? (Choose two.)
Signup and view all the answers
What is the probable cause of an error message after installing an application on a desktop?
Signup and view all the answers
Which command should the technician verify in the command prompt to address the issue without making any changes?
Signup and view all the answers
What should the technician use to determine the cause of the BSOD reappearing on the user's workstation?
Signup and view all the answers
What should the support representative do next when the current appointment is causing a delay?
Signup and view all the answers
What is the BEST solution for managing a high volume of requests in a new service desk?
Signup and view all the answers
What security benefit is realized after deploying a client certificate for Wi-Fi access?
Signup and view all the answers
What is the MOST likely reason for a user in a corporate office unable to connect to any network drives?
Signup and view all the answers
Which action should a junior administrator take when deploying software to multiple computers?
Signup and view all the answers
Which action helps prevent rogue access points from connecting to the corporate network?
Signup and view all the answers
Which of the following would MOST likely be deployed to enhance physical security for a building?
Signup and view all the answers
What should a technician investigate NEXT if a user is redirected to unexpected websites despite clearing the web browser cache?
Signup and view all the answers
What BEST describes why malware is still detected after a system restore on a Windows workstation?
Signup and view all the answers
Which file system format ensures read and write compatibility of USB flash drives across several generations of Microsoft operating systems?
Signup and view all the answers
What might cause an Activation Lock issue on a corporate-owned iOS device?
Signup and view all the answers
What is the default GUI and file manager in macOS?
Signup and view all the answers
What should a technician use to mitigate frequent micro power outages lasting up to five minutes?
Signup and view all the answers
What could be a symptom of a malware infection if applications open without being launched?
Signup and view all the answers
What is the MOST likely reason for the application on the Android tablet to immediately close?
Signup and view all the answers
Which troubleshooting actions would MOST likely resolve the application issue on the Android tablet? (Choose two.)
Signup and view all the answers
Which utility would a technician MOST likely use to add an individual as a local administrator on a Windows home PC?
Signup and view all the answers
What is the MOST efficient way for an administrator to create user profiles with home directories and network printers?
Signup and view all the answers
What would MOST likely prevent stored data from being recovered from a stolen laptop?
Signup and view all the answers
Which program can a technician use to view startup items if MSConfig is no longer usable?
Signup and view all the answers
Which tool can a systems administrator use to remediate issues with PKI connectivity?
Signup and view all the answers
What is the first action a technician should take when reimaging a desktop PC?
Signup and view all the answers
Study Notes
Mobile Device Security
- A systems administrator should prevent device rooting and block third-party application installation to secure the device against threats in the future.
- A technician should use a PIN on the unlock screen to help secure the device against this threat in the future.
- The administrator installed MDM software to help secure the device against malicious applications.
- A user's phone became sluggish after several malicious applications were discovered on the device.
File System Security
- Device Manager, Indexing Options, and Administrative Tools are not used to hide files on a shared drive.
- File explorer can be used to help hide files from others if they are not given access.
Computer Hardware Safety
- A technician should utilize an ESD strap and disconnect the computer from the power source to ensure internal components are protected.
Company Policy Violations
- A company should update its Acceptable Use Policy to reflect its new requirements.
Data Center Security
- Biometric locks, badge readers, locking racks, and access control vestibules provide the BEST way to secure physical access to a data center server room.
- Video surveillance can work in conjunction with other access control measures to improve security.
Troubleshooting Login Issues
- If a user is unable to log in to the domain with a desktop PC but a laptop PC is working properly on the same network, the MOST likely cause of the issue is a time drift.
macOS Partition Resize
- Disk Utility should be used to resize a partition on the internal storage drive of a computer running macOS.
Troubleshooting BSOD
- A technician should utilize the Stop Code to determine the cause of a Blue Screen of Death.
Customer Service Best Practices
- A support technician should send a quick message regarding the delay to the next customer if the appointment takes longer than expected.
Service Desk Management
- The BEST solution for a new service desk having difficulty managing the volume of requests is implementing a support portal.
Network Security
- Deploying a client certificate to be used for Wi-Fi access for all devices in an organization in conjunction with the user's existing username and password provides multi-factor authentication for Wi-Fi.
- All Wi-Fi traffic will be encrypted in transit when using a client certificate for Wi-Fi access.
Network Connectivity Troubleshooting
- The MOST likely reason a user cannot connect to network drives is because the user is not connected to the VPN.
Software Deployment
- The BEST way for a junior administrator to resolve an issue deploying software to a large group of computers in an organization is to use gpmc.msc, Group Policy Management Console, to manage Group Policies.
Environment Variables
- The technician should use the System Control Panel utility to list the application in the Path Environment Variable.
User Account Access Level
- A Power User account provides the BEST description of the account access level needed for accessing advanced features and configuration settings for several applications.
File Hash Validation
- The MOST likely cause for a mismatch in file hash values is a modified file.
Data Disposal
- Shredding is the MOST effective method to securely dispose of data stored on optical discs.
Mobile Device Performance Issues
- The MOST likely cause for an abnormally slow phone after a user's data plan has reached its limit is that the GPS application contains malware.
USB Flash Drive Security
- Turning off AutoPlay would prevent a malicious file from being executed automatically when a flash drive is plugged in.
Master Image Deployment
- Device drivers and installed application license keys should be considered when building a master image for deployment to desktops.
Application Installation Errors
- Licensing agreements and incident management documentation should be considered when an application installation error occurs.
Physical Security
- Badge readers and motion sensors would MOST likely be deployed to enhance physical security for a building.
Web Browser Redirection
- A technician should examine the localhost file entries to troubleshoot a user's issue accessing commonly used web pages but being redirected to unexpected websites.
Malware Removal
- A system patch disabling the antivirus protection and host firewall would BEST describe why a workstation has malware in the root OS folder even after a System Restore.
File System Compatibility
- FAT32 would be the BEST choice for a file system format to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems.
Activation Lock
- An employee's Apple ID used on the device would cause a corporate-owned iOS device to have an Activation Lock issue.
macOS GUI and File Manager
- Finder is the default GUI and file manager in macOS.
Power Outage Mitigation
- A battery backup should be used to mitigate micro power outages.
Computer Issues
- The incorrect DNS address was assigned is the MOST likely reason why applications open without being launched and the browser redirects to unintended websites.
Android Tablet Application Issues
- Uninstalling the application and clearing the application storage are likely to resolve an issue with an Android tablet application.
Local Administrator Account Management
- Settings>Accounts>Family and Other Users is the utility used to add an individual as a local administrator on a Windows home PC.
User Profile Configuration
- Group Policy is the MOST efficient way to complete tasks for creating user profiles that include home directories and network printers for several new users.
Data Security
- Full disk encryption would MOST likely prevent stored data from being recovered if a corporate-owned laptop was stolen.
Startup Items Viewing
- Taskmgr (Task Manager) is the program used by a technician to look at startup items after MSConfig can no longer be used.
PKI Troubleshooting
- certmgr.msc is the tool a systems administrator can use to help remediate issues connecting to the corporate network using PKI.
Desktop Reimaging
- When reimaging a desktop PC, a technician should connect the PC to the network and power it on.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on securing mobile devices and file systems against various threats. This quiz covers best practices for preventing unauthorized access and ensuring data integrity. Additionally, learn about hardware safety and policy violations related to company procedures.