Sample Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

how to fix "no boot device" found error

  • Reinstall windows os
  • go with automated repair installation
  • check bios (correct)
  • replace the HDD drive

a company experiences DDOS attack several internal pc are source of traffic select two

  • botnet (correct)
  • zombies (correct)
  • spyware
  • keylogger
  • Ransomware

which file system used for journaling

  • NTFS (correct)
  • fat32
  • EXFAT32
  • EXT4

web browsing speed on customers phone slows down every few weeks and then returns to normal after 3 days or 4 days. which of following should IT person do first to troubleshoot

<p>Data usage limits (A)</p> Signup and view all the answers

what should a technician do if there is a virus over the network

<p>isolate the device from the network (B)</p> Signup and view all the answers

A technician has been tasked with migrating team of users to windows 11 they have been asked to preserve their files but no problems or issues persist

<p>back up user data (A), perform clean install (C)</p> Signup and view all the answers

which of following file system formats would be best choice to ensure read nad write of USB flash drive across generations of MS operating systems.

<p>fat32 (D)</p> Signup and view all the answers

what protocol number does email uses

<p>SMTP port 587 (A), port 25 for unencrypted (B)</p> Signup and view all the answers

you need to recommend the best back up method that will protect against ransomware attacks only a few files regularly modified However storage space is concern

<p>offsite (A)</p> Signup and view all the answers

you need to establish back up method for workstation that requires two sets of tapes to restore

<p>differential (B)</p> Signup and view all the answers

you have problem with users constantly forget their passports to their mobile device and apps

<p>implement single sign on with biocentrics (C)</p> Signup and view all the answers

What will a EULA most likely address?

<p>Restrictions of use (B)</p> Signup and view all the answers

A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?

<p>Remove the static IP configuration from the desktop. (C)</p> Signup and view all the answers

You are deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in addition to the user's existing username and password. How does this improve network security?

<p>Wi-Fi will be forced to use MFA. (A)</p> Signup and view all the answers

You are preparing an existing Windows 10 laptop for a new employee to use. What can you do to refresh the laptop?

<p>A clean install (B)</p> Signup and view all the answers

What should you implement to prevent users from enabling virtual technology on their laptops?

<p>UEFI password (A)</p> Signup and view all the answers

You need to provide remote support to a user’s desktop. Which tool would let you see the issue along with the user? (Choose two)

<p>VNC (B), MSRA (D)</p> Signup and view all the answers

You are trying to deploy software to a large group of computers. You locate a script on the Internet that can perform this task, however you do not understand the scripting language. What best describes the risk you take in running the script?

<p>The script performs unknown actions. (C)</p> Signup and view all the answers

You are installing new network equipment in a small office. You want to make sure the equipment is secured against external Internet threats. What should you do first?

<p>Change the default administrator password. (C)</p> Signup and view all the answers

You're unable to access a website. You have confirmed that the website is online. Which of the following would most likely resolve the problem?

<p>Clearing the cache. (C)</p> Signup and view all the answers

Your client has a 10-year-old SOHO wireless router. You want to configure it for the most secure wireless network possible. What would you choose?

<p>WPA2 with AES (B)</p> Signup and view all the answers

Your new wireless network is experiencing interference from other nearby SSIDs. What can you do to resolve the interference?

<p>Change channels. (D)</p> Signup and view all the answers

You are deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in addition to the user's existing username and password. How does this improve network security?

<p>Wi-Fi will be forced to use MFA. (A)</p> Signup and view all the answers

A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?

<p>Remove the static IP configuration from the desktop. (C)</p> Signup and view all the answers

A bank wants to enhance building security. They want to prevent vehicles from being able to drive into the building, while still making it easy for customers to enter. What do they need to implement?

<p>bollards (B)</p> Signup and view all the answers

A user's account was successfully breached over the weekend. The log shows that 500 logon attempts, each with a different password, occurred before the attack succeeded. What is the best way to mitigate this threat?

<p>Account lockout (B)</p> Signup and view all the answers

You have a user in a corporate office who cannot seem to connect to any network drives. No one else has this problem. What is the most likely cause?

<p>A login script failed. (A)</p> Signup and view all the answers

ou are setting up a server for a small company. The company has a policy that says static IP addresses cannot be used, but at the same time they want to maintain the same IP address for that server. What can you do to satisfy both requirements?

<p>DHCP reservation (A)</p> Signup and view all the answers

You have a Windows workstation that frequently experiences malware symptoms. You have tried to roll back the System State several times but the malware persists. What can you do to resolve the issue?

<p>Re-image the workstation. (B)</p> Signup and view all the answers

The user tells you that an antivirus software is giving them a message that their computer is infected with a virus. They think this occurred while they were browsing the Internet. You take a look, and do not recognize the interface that the antivirus tool presents. What should you do next?

<p>Investigate what the interface is and what triggered it to pop up. (B)</p> Signup and view all the answers

A user clicked a link for a free gift card and now their computer is acting strange. What do you tell them to do first?

<p>Unplug the computer's Ethernet cable. (A)</p> Signup and view all the answers

A company workstation displayed a popup claiming that the computer has been infected with 168 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. Apparently the problem only happens when the user opens a web browser. Which steps are most likely to resolve the issue? (Choose two.)

<p>Perform a reset on the user's web browser. (D), Scan the computer with the company-provided antivirus software. (A)</p> Signup and view all the answers

You are trying to secure a company phone. You want to make sure that company data is secure in case the phone is stolen or lost. Which of the following would best suit your needs?

<p>remote wipe (B)</p> Signup and view all the answers

An Android user reports that when they try to open the company’s proprietary mobile app, it immediately closes. They still have the problem even after rebooting the phone. The app contains critical information that cannot be lost. What should you try first to resolve the problem?

<p>Clear the application cache. (D)</p> Signup and view all the answers

The help desk is having a difficult time managing the volume of requests. What is the best solution for addressing this problem?

<p>Implement a support portal. (A)</p> Signup and view all the answers

You have a situation in which security software was accidentally uninstalled from all servers in your data center. You have found out that you will need to fill out a change request to have the same version software be reinstalled. Why would you want to follow the change management process in this scenario?

<p>A rollback plan can be implemented in case the software breaks and application. (D)</p> Signup and view all the answers

a user had a license for an application that is in use on a personal home laptop. THe user approaches a system admin about using the same license on multiple comouters on the coporate network which of following is best desribes what the systems admin should tell the user?

<p>use application at home and contact vendor regarding a coporate licence (A)</p> Signup and view all the answers

a technician is upgrading the backup system for documents at high volume law firm. The current back up system can retain no more than 3 versions of full back ups before failing. The law firm is not concerned about restore times but asks the technician to retain more verions when possible =. which of following backup methods should technician Most likely implement.

<p>incremental (C)</p> Signup and view all the answers

a company is retiring old workstations and needs a ceritificate of desruction for all hard drives which of following would be best to perform on the Hard drives to ensure the data is unrecoverable. Select two

<p>incinerating (D), Drilling (A)</p> Signup and view all the answers

Flashcards

Capital of France (example flashcard)

Paris

More Like This

Sample Quiz
12 questions

Sample Quiz

EffectiveTopology2534 avatar
EffectiveTopology2534
Sample Quiz
20 questions

Sample Quiz

EffectiveTopology2534 avatar
EffectiveTopology2534
Sample Quiz
228 questions

Sample Quiz

lazidasey avatar
lazidasey
Sample Quiz
20 questions

Sample Quiz

UnquestionableNovaculite2668 avatar
UnquestionableNovaculite2668
Use Quizgecko on...
Browser
Browser