Study sets, textbooks, questions
Upgrade to remove ads
A+ 220-1002 Prep
Terms in this set (113)
A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. What should the technician do FIRST?
Update the OS of the smartphones
A technician is working on a Windows 10 PC that is running slowly.
What commands should the technician use to correct this issue? (Choose two.)
An administrator is setting up a Windows terminal server.
What settings should the administrator modify to increase server security? (Choose two.)
Put the terminal server into the router's DMZ, Block all unused ports on the LAN smart switch
A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. What will provide the ability to access these devices?
A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to
the entire network. What configurations MOST likely allowed the attack to take place? (Choose two.)
Default login, WEP
A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. What naming convention formats should the technician follow?
Asset ID, MAC address
What will provide the BEST security for a server room? (Choose two.)
Badge reader, Biometric lock
What threat uses personalized information in an attempt at obtaining information?
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?
Date and time
A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. What Control Panel utility should the technician use to configure the setting?
Internet Options - Connections
What amount of memory a user is limited to with a 32-bit version of Windows?
A technician is working at a help desk firm and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. What is the BEST choice for the technician to make?
Ask another technician to take the call
A user's phone contains customer's PII. The user cannot have the phone automatically wiped because the data is very valuable. What is the BEST method of securing the phone?
What devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? (Choose two.)
UPS, Server rack
A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the
boot.ini file is correct. What is MOST likely causing this error?
An incompatible partition is marked as active
A technician is installing a private PC in a public workspace.
What password practice should the technician implement on the PC to secure network access?
Require authentication on wake-up
Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. What would explain why Joe cannot access his personal shares?
A firewall exception must be set
A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. What should a technician do to resolve the issue and avoid recurrence?
Remove the user-installed antivirus software
A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. What OS should the technician recommended to ensure the BEST performance on this computer?
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. What should the technician do?
Ask more open-ended questions to see if the issue can be narrowed down in order to properly
identify the issue and save time
What security method BEST describes when a user enters a username and password once for multiple applications?
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs in automatically without a password. What account type would the technician MOST likely set up on this kiosk machine?
A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. What license type should the technician recommend?
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. What can Joe do to ensure the backups will work if needed?
Set up alerts to let administrators know when backups fail
A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. What recommendations should the contractor give to the customer? (Choose two.)
Cloud storage, Hot site
A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to
install the failed updates again. The updates continue to fail. What is the FIRST option to check?
Look up the error number associated with the failed update
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. What Control Panel utility should the technician use?
A technician has identified malware on a user's system. What should the technician do NEXT according to malware removal best practices?
Move the infected system to a lab with no network connectivity
A user's Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. What is a tool the technician can use to resolve the issue?
A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. What should a technician recommend?
Uninterruptible power supply
What installation types would require the use of an answer file to install the OS?
A Mac user's operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the Mac. What built-in utilities should be used?
A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server.
Before granting the access, what is the MOST important step a technician can take to protect against possible infection?
Ensure the server is patched with the latest security updates
A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the
user's computer and identifies the problem. What should the technician do NEXT?
Restart the network services
A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. What are the MOST likely reasons for these issues? (Choose two.)
Mapped drives, Denied write/delete permissions
With what type is a man-in-the-middle attack associated?
An employee reported that a suspicious individual was looking through the recycle bin. What type of social engineering threat is this?
A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically.
What step should the technician take NEXT to resolve the problem?
Update the antivirus software, run an antivirus scan, verify the browser settings, and check all
An employee is unable to view in-office network folders while working at home. What is the MOST likely cause of the problem?
A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. What document did the network administrator MOST likely give to the technician?
Physical network diagram
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. What command-line tool should the technician use to apply the new policy?
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With what types of infections are the PCs MOST likely infected? (Choose two.)
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. What setting or feature is responsible for the problems Ann is experiencing?
Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. What should the technician have covered previously as part of the original repair?
In what file extension type would a user expect to see the command. "net use T:\\server\files"?
A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. What should the technician replace to prevent these issues in the future?
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?
Disconnect the power before servicing the PC
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. What message will be displayed?
No boot device available
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as "ConnectMe" and appears as unsecure. What should the help desk perform to fix the issue?
Ask Ann to open a browser and watch for a redirect page
A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. What would the project team MOST likely add to the SOW?
A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not
fix the problem. What would MOST likely fix the issue?
Roll back updates
An end user's PC is taking a long time to boot. What operations would be the BEST to resolve this issue with minimal expense?
Remove applications from startup, Defragment the hard drive
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources. What protocol and authentication method should the technician implement? (Choose two.)
A technician is PXE booting a computer. What is the technician MOST likely performing on the computer?
Ann, an employee at a company, calls the help desk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. What are the NEXT steps Joe should take to resolve the issue? (Choose two.)
Check all browser cached files on Ann's laptop and log on to another vendor's website, Ask Ann about the notification and review the installed programs
What is the maximum RAM limit of a Windows 32-bit version?
A user's smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. What step should be taken FIRST to determine the cause of the issue?
Check the application permissions
Joe, an end user, has been prompted to provide his username and password to access the payroll system. What authentication method is being requested?
Which of the following devices provides protection against brownouts?
Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she opens a browser, she gets a message indicating the page cannot be displayed. She notices there is a "?" in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. What is the MOST likely issue Ann is experiencing?
There is unauthenticated wireless connectivity
A junior Linux systems administrator needs to update system software. What shell command would allow the administrator to gain the necessary permissions to update the software?
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, what configuration setting should be changed to address these concerns?
A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. What should the technician attempt NEXT?
Reboot into safe mode and roll back the updates
A Windows user is attempting to install a local printer and is unsuccessful based on permissions. What user types BEST describes this user?
An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the Internet. What action should the user take?
Install anti-malware software
A desktop technician is attempting to upgrade several machines to Windows 10. After realizing there is only one disc for the installation, the technician decides to upgrade over the network. What boot method initiates such an upgrade?
A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. What is an important part of the change request process for which the
administrator still must plan?
Document a backout plan to roll back changes to the router
A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. What BEST enforces this policy?
Disable the user accounts
A wireless access point is going to be configured in a small office located in a crowded building. What should the installation technician perform to increase the security of the wireless network? (Choose two.)
Reduce the transmit power, Disable the SSID broadcast
A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the machine are:
Two 1GHz CPUs
2GB of memory
15GB hard drive
800 × 600 screen resolution
What should the technician do to resolve the problem?
Increase the amount of hard drive space
A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. What type of infection does the user MOST likely have?
What feature has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?
What is considered government-regulated data?
A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. What configuration settings should the technician change to satisfy the requirements of the business? (Choose two.)
MAC filtering, Signal strength
A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. What actions should be taken to close the vulnerability? (Choose two.)
Disable guest account, Modify AutoRun settings
A technician is installing the latest OS on a user's system. The user wants all of the settings and files to remain intact during the installation. What upgrade method should the technician use?
A team needs to deploy a temporary server room at a site to provide support during construction. What should they use at this site while setting up the server room?
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. What would BEST accomplish this goal?
Use an antivirus product capable of performing heuristic analysis
What technique is used by malicious employees to obtain user passwords?
A technician is recycling PCs to be reused by a middle school. What methods is MOST appropriate for ensuring data has been removed from the PCs?
A user reports that when opening a web browser, the initial page loads to a search engine the user does not recognize. When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups. What should a technician do to resolve these issues? (Choose two.)
Reset the user's browser to default settings, Remove any unapproved applications from the user's startup items
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. What method would the technician MOST likely perform on the computer?
What is the MOST secure wireless security protocol?
Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. What is the MOST likely cause of this issue?
Too many startup items
Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. What would provide the BEST level of protection in this scenario? (Choose two.)
Use full device encryption, Implement remote wipe features
A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. What should the technician do NEXT?
Provide documentation of the repair to the customer
A user is attempting to install an application and receives an error stating there is not enough space to install the application. What did the user overlook?
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. What security measures should be used?
A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10. What installation methods would the technician MOST likely use to accomplish
A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. What would be the MOST effective method to accomplish this task?
A user reports malware activity on an isolated workstation used for testing. It is running an end-of-life OS, and a USB drive is the only method used to transfer files. After removing the malware and replacing the USB drive with a brand new one, the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system. What did the technician forget to do to prevent reinfection?
Update the local antivirus and set it to scan automatically every evening
A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. What best practice could have prevented the attack?
What technology can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?
A technician has installed a second monitor for a customer, but the desktop font sizes do not match. What display setting should the technician adjust to correct this issue?
What built-in accounts was removed in Windows 10?
A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting. What step should the technician take NEXT?
Check the boot order
Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. What is the MOST likely cause of Joe's slow data speeds?
Joe's data transmission is over the limit
After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. What features should the technician implement to BEST meet these requirements? (Choose three.)
Screen locks, Screensaver passwords, BitLocker
A new business will be using credit cards in a physical location as well as its web presence. What does the business need?
A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. What should the technician do NEXT?
Install all of the latest Windows Updates to patch the system
A user's smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. What troubleshooting step should the technician take NEXT?
Verify the SSID with which the device is associated
A company's security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. What command should the administrator run on the user's workstation?
A user's computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. What action should the IT department perform NEXT?
Preserve data integrity
What would a technician use to store memory chips from a laptop safely after an upgrade?
Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server. What is the FIRST step the technician should take to correct this issue?
Isolate Joe's computer from the network
A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. What action should the user take FIRST?
Check the status of the print server queue
A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company's AUP. What would be the NEXT appropriate act?
Promptly notify the administrator's immediate supervisor
A technician is disposing of computer hardware that contains PHI. The drive must be reusable. What method should be used?
What provide the MOST security for PCs and mobile devices? (Choose two.)
Multifactor authentication, Trusted software sources
A network administrator needs to be able to securely connect to a local router from within the office. What protocol should the administrator ensure is enabled on the router?
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter "J" assigned only to the drive. What type of partitioning should be performed to give the customer full use of the 3 TB drive?
Users notify the help desk of an email that was just received. The email came from the help desk's email address and asked the users to click on an embedded link.
This email is BEST described as:
Sets with similar terms
Security Fundamentals Certification
Types of Information Systems and Technology Risks
Sets found in the same folder
PSY2012 Chapters 1-3
PSY2012 Chapters 4-6
Other sets by this creator
A+ 220-1001 Prep
IT Fundamentals Prep
IT Fundamentals Prep
Other Quizlet sets
Modernity and War: 1894-1914
Chinese History Unit 10 Study Guide
Flowers for Algernon