Systems Administration Exam Questions
40 Questions
0 Views

Systems Administration Exam Questions

Created by
@CompatibleAmericium

Questions and Answers

What is the most likely next step if a user reports a sluggish workstation that is otherwise operating normally for others?

  • Increase the paging file size
  • Add more system memory
  • Rebuild the user's profile (correct)
  • Run the chkdsk command
  • Which methods provide the BEST way to secure physical access to a data center server room?

  • Biometric lock (correct)
  • Video surveillance
  • USB token
  • Badge reader (correct)
  • What can contribute to a user's workstation performance issues if other users on the same machine do not experience the same problem?

  • Network connection issues unique to the user
  • Insufficient hard drive space
  • Faulty hardware components
  • Malware affecting the user's environment (correct)
  • Which option is NOT an effective measure for securing access to a server room?

    <p>USB token</p> Signup and view all the answers

    What is the primary advantage of a biometric lock for server room security?

    <p>It requires unique biometric identification.</p> Signup and view all the answers

    In which scenario would it be most appropriate to run the chkdsk command?

    <p>Disk errors have been reported.</p> Signup and view all the answers

    What is a possible reason for user profile corruption on a workstation?

    <p>Sudden power loss</p> Signup and view all the answers

    What is the result of an effective server room security management system?

    <p>It ensures data integrity and protects against unauthorized access.</p> Signup and view all the answers

    What is the first step the technician should take after the user reports potential malware?

    <p>Disconnect the affected machine from the network.</p> Signup and view all the answers

    What specific unusual activities should the user report when suspecting malware?

    <p>Slow performance, excessive pop-ups, and browser redirections.</p> Signup and view all the answers

    What method can help verify if the anomalous activities persist?

    <p>Reboot the machine into safe mode.</p> Signup and view all the answers

    Which action should the technician avoid taking regarding the user's situation?

    <p>Instruct the user to ignore the suspicious email.</p> Signup and view all the answers

    What is the technician's responsibility towards the user after resolving a device issue?

    <p>Educate the user on the solution that was performed.</p> Signup and view all the answers

    What could be a crucial piece of information for the technician when investigating malware?

    <p>Recently installed applications since the email link was clicked.</p> Signup and view all the answers

    Which action is recommended after identifying malware activity?

    <p>Document all findings and inform cybersecurity.</p> Signup and view all the answers

    What should be prioritized when handling a reported malware incident?

    <p>Mitigating risks to prevent further spread of malware.</p> Signup and view all the answers

    What can requiring a PIN on the unlock screen help to prevent?

    <p>Unauthorized access to the device</p> Signup and view all the answers

    Why would blocking third-party application installation be important?

    <p>It helps prevent malicious applications from being installed</p> Signup and view all the answers

    What is the primary reason the technician set the phone to silent?

    <p>To avoid distractions while working</p> Signup and view all the answers

    If a user reports that files cannot be opened due to ransomware, what should the technician do FIRST?

    <p>Quarantine the system</p> Signup and view all the answers

    What does the technician's action of not taking the call exemplify?

    <p>Maintaining work efficiency</p> Signup and view all the answers

    What is the best initial response when faced with a ransomware threat?

    <p>Isolate the infected system immediately</p> Signup and view all the answers

    In the context of security measures, what does 'requiring a PIN' indicate?

    <p>A strategy to improve device security</p> Signup and view all the answers

    What is one potential consequence of not blocking third-party application installations?

    <p>Increased risk of malware attacks</p> Signup and view all the answers

    What is the first step to set up Windows Hello Fingerprint?

    <p>Go to the Windows 10 Settings menu</p> Signup and view all the answers

    Which submenu must be selected after accessing the Windows 10 Settings menu for fingerprint setup?

    <p>Accounts</p> Signup and view all the answers

    During the setup of Windows Hello Fingerprint, what is required from the user?

    <p>Place a fingerprint on the reader repeatedly</p> Signup and view all the answers

    What is indicated when the fingerprint setup process is complete?

    <p>Windows indicates that setup is complete</p> Signup and view all the answers

    Which of the following is NOT a correct step in setting up Windows Hello Fingerprint?

    <p>Navigate to the Windows Security section</p> Signup and view all the answers

    Which tool is used to manage the setup of Windows Hello Fingerprint?

    <p>Control Panel utility</p> Signup and view all the answers

    What happens when a user incorrectly follows the setup steps for Windows Hello Fingerprint?

    <p>An error message will appear</p> Signup and view all the answers

    If a user wants to change their fingerprint settings after initial setup, where should they navigate?

    <p>The Accounts submenu in Windows Settings</p> Signup and view all the answers

    To configure a user's Windows device to require a password after sleep, which setting should the administrator access?

    <p>Screensaver settings</p> Signup and view all the answers

    What tool should a technician use to resize a partition on a macOS internal storage drive?

    <p>Disk Utility</p> Signup and view all the answers

    Which solution is best for securing data on smartphones if they are lost or stolen?

    <p>Remote wipe</p> Signup and view all the answers

    In Windows, which feature needs to be configured to ensure security upon resuming from inactivity?

    <p>Screensaver timeout</p> Signup and view all the answers

    What function does Disk Utility perform in macOS?

    <p>Resize partitions</p> Signup and view all the answers

    When considering data security on issued smartphones, which solution specifically aids in erasing data remotely?

    <p>Remote wipe functionality</p> Signup and view all the answers

    What is the main purpose of a locking rack in a server room?

    <p>To prevent unauthorized access to servers</p> Signup and view all the answers

    What feature should an administrator enable to protect user data during a device's sleep mode?

    <p>Require password on wake</p> Signup and view all the answers

    Study Notes

    Workstation Troubleshooting

    • If one user experiences sluggish performance on a shared workstation while others do not, rebuilding the user’s profile should be the next step to address potential corruption.
    • Validating the workstation's normal functioning indicates the issue is likely user-specific rather than hardware-related.

    Securing Physical Access to Server Room

    • Biometric locks and badge readers are optimal security measures to control access to server rooms.
    • Biometric locks require unique identifiers, such as fingerprints, ensuring only authorized users gain access.
    • Badge readers necessitate swiping access cards, adding an additional layer of security.
    • Other options like video surveillance and locking racks can enhance physical security.

    Configuring Password Requirements on Windows Devices

    • To require a password when resuming from sleep on Windows devices, access Screensaver settings through the Settings menu.
    • This configuration caters to corporate policies regarding data security.

    Partition Resizing on macOS

    • Disk Utility is the proper tool for resizing a partition on macOS.
    • This built-in tool manages disks, partitions, and volumes efficiently, allowing actions like resizing and formatting.

    Securing Data on Issued Smartphones

    • Remote wipe capabilities provide the best solution for ensuring data security on lost or stolen smartphones.
    • This feature allows the company to erase data remotely, preventing unauthorized access.

    Handling Malware Reports from Users

    • If a user suspects malware after clicking a suspicious link, disconnecting the affected system from the network is critical to preventing spread.
    • Quarantine actions help isolate the issue before further troubleshooting.

    Executive Support and Issue Resolution

    • After resolving an executive's mobile device issue, closing the support ticket confirms completion of assistance.
    • Sending a follow-up email to relevant departments may help address systemic issues and prevent recurrence.

    Technician Focus and Productivity

    • Setting a phone to silent to avoid distractions while troubleshooting a PC is an effective way to maintain focus on tasks.
    • This practice emphasizes the importance of minimizing interruptions in a technical support environment.

    Initial Response to Ransomware Infection

    • When a user reports being unable to access files due to a payment request, quarantining the infected system is the first essential step.
    • Quarantine helps contain the malware and prevents further spread within the network.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz focuses on troubleshooting scenarios commonly encountered by systems administrators. It presents a case where a user experiences issues on a workstation that appears to function normally for others. Participants will assess the best next step for the administrator to take.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser