Class B

Card Set Information

Author:
raschwe
ID:
239840
Filename:
Class B
Updated:
2013-10-10 02:55:49
Tags:
131011
Folders:

Description:
B
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user raschwe on FreezingBlue Flashcards. What would you like to do?


  1. For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?
    A. Annual cyber security education
    B. Block all email attachments
    C. Install an IPS on each workstation
    D. Update antivirus signatures more often
    A. Annual cyber security education
    (this multiple choice question has been scrambled)
  2. A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?

    A. Message of the Day
    B. Email lists
    C. Company forums
    D. Regular user education
    D. Regular user education
    (this multiple choice question has been scrambled)
  3. Which of the following operating systems can be upgraded directly to Windows 7 Professional by a default installation? (Select TWO).

    A. Windows 7 Home Premium
    B. Windows Vista Business
    C. Windows XP Home
    D. Windows XP Professional 64-bit
    E. Windows XP Media Center
    • A. Windows 7 Home Premium
    • B. Windows Vista Business
  4. A technician has finished replacing the network card in a laptop and has verified full system functionality. Which of the following troubleshooting steps should the technician take NEXT?

    A. Perform a full system backup
    B. Document findings, actions, and outcomes
    C. Escalate problem to a senior technician
    D. Re-establish new theory of probable cause
    B. Document findings, actions, and outcomes
    (this multiple choice question has been scrambled)
  5. A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?

    A. Turning down the radio power level
    B. Enabling MAC filtering
    C. Disabling the SSID broadcast
    D. Setting a high encryption level
    B. Enabling MAC filtering
    (this multiple choice question has been scrambled)
  6. A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone's knowledge. Which of the following would prevent this from occurring?

    A. Change default usernames and passwords
    B. Disable the SSID from broadcasting
    C. Enable static IP addresses
    D. Change to user MAC filtering
    A. Change default usernames and passwords
    (this multiple choice question has been scrambled)
  7. A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?

    A. Logically move the server to the DMZ
    B. Disable the remote desktop port
    C. Reallocate the server to a different networking closet
    D. Configure the server to use a static IP
    B. Disable the remote desktop port
    (this multiple choice question has been scrambled)
  8. Which of the following is an example of client-side virtualization?

    A. XP mode running in Windows 7 64-bit operating system
    B. Running a DOS application on a Windows 7 32-bit operating system
    C. Compatibility mode on a program icon properties menu
    D. Cloud hosted office applications
    A. XP mode running in Windows 7 64-bit operating system
    (this multiple choice question has been scrambled)
  9. Laptops and tablets have which of the following in common?

    A. Contain an accelerometer
    B. Solid state drives
    C. No field serviceable parts
    D. Not upgradable
    B. Solid state drives
    (this multiple choice question has been scrambled)
  10. Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?

    A. NSLOOKUP
    B. NBTSTAT
    C. NET
    D. NETSTAT
    C. NET
    (this multiple choice question has been scrambled)
  11. A local administrator would like to determine why a laptop is taking so long to boot into the operating system.Which of the following tabs in MSCONFIG would the administrator access to BEST determine this?

    A. Tools
    B. Boot
    C. Startup
    D. General
    C. Startup
    (this multiple choice question has been scrambled)
  12. A user, Ann, reports that she suspects her workstation has malware. Joe, the technician, confirms malware exists and starts the process of removing the malware. Which of the following is the FIRST step he should take in removing the malware?

    A. Enable hard drive encryption
    B. Format the hard drive
    C. Disable antivirus
    D. Disable system restore
    D. Disable system restore
    (this multiple choice question has been scrambled)
  13. A user reports paper jams at the location of the paper trays. Which of the following components would need to be replaced to resolve this issue?

    A. Imaging drum
    B. Fuser
    C. Duplexer
    D. Pickup roller
    D. Pickup roller
    (this multiple choice question has been scrambled)
  14. A user has plugged in a mobile phone to a PC and received a message that the driver was not successfully installed. Which of the following system tools should be used to troubleshoot this error?

    A. Windows Memory Diagnostics
    B. Data Sources
    C. Device Manager
    D. Component Services
    C. Device Manager
    (this multiple choice question has been scrambled)
  15. On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?

    A. Content Advisor
    B. Local Security Policy
    C. Network Drive Mapping
    D. Proxy Settings
    D. Proxy Settings
    (this multiple choice question has been scrambled)
  16. Which of the following describes when an application is able to reuse Windows login credentials?

    A. Principle of least privilege
    B. Access control list
    C. Single sign-on
    D. Pass-through authentication
    C. Single sign-on
    (this multiple choice question has been scrambled)
  17. In order to prevent other users from editing files in `C: Files', which of the following steps should be taken?

    A. Set the folder to index files for search
    B. Set NTFS permissions to read only
    C. Set network share permissions to read only
    D. Set the local administrator as the owner of the folder
    B. Set NTFS permissions to read only
    (this multiple choice question has been scrambled)
  18. Which of the following security threats requires the attacker to be physically located near the target machine?

    A. Rootkit
    B. Social engineering
    C. Phishing
    D. Shoulder surfing
    D. Shoulder surfing
    (this multiple choice question has been scrambled)
  19. A technician recently replaced a user's monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue?

    A. Lower refresh rate
    B. Lower the resolution
    C. Increase refresh rate
    D. Raise the resolution
    A. Lower refresh rate
    (this multiple choice question has been scrambled)
  20. A user recently installed a new video driver on a PC but now it will not boot. Which of the following is the BEST option to correct the issue?

    A. FIXBOOT
    B. Automated system recovery
    C. Safe mode
    D. Emergency repair disks
    C. Safe mode
    (this multiple choice question has been scrambled)
  21. An unauthorized user observing system security procedures is known as:

    A. a worm.
    B. shoulder surfing.
    C. phishing.
    D. spyware.
    B. shoulder surfing.
    (this multiple choice question has been scrambled)
  22. Privacy filters applied to users computer screens are used to combat which of the following security risks?

    A. Spear phishing
    B. Rootkits
    C. Social Engineering
    D. Shoulder surfing
    D. Shoulder surfing
    (this multiple choice question has been scrambled)
  23. A critical server was replaced by the IT staff the previous night. The following morning, some users arereporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shutdown their workstations the previous day are able to connect to the Internet. A technician looks at the followingreport from a workstation with no Internet connectivity:

    IP Address: 192.168.1.101
    Netmask: 255.255.255.0
    DHCP Server:192.168.1.1
    DNS Server:192.168.1.2
    Default Gateway:192.168.1.1

    Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?

    A. The workstation has an APIPA address.
    B. The default gateway router is misconfigured.
    C. The DHCP server is misconfigured.
    D. The DHCP server is unavailable.
    C. The DHCP server is misconfigured.
    (this multiple choice question has been scrambled)
  24. Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage?

    A. Virus
    B. Worm
    C. Rootkit
    D. Trojan
    C. Rootkit
    (this multiple choice question has been scrambled)
  25. Joe, a technician, receives an error message on his tower PC just after POST which reads: 
    "WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics."
    Which of the following is generating this error message?

    A. CHKDSK
    B. S.M.A.R.T.
    C. eSATA
    D. QoS
    B. S.M.A.R.T.
    (this multiple choice question has been scrambled)
  26. Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayed. "Access Denied. Please Enter Encryption Password." Which of the following is the reason that this error is displayed?

    A. The TPM security chip inside the bench system is not enabled
    B. The hard drive is experiencing S.M.A.R.T. failure errors
    C. The BIOS of the bench system is out of date
    D. BitLocker is being used
    D. BitLocker is being used
    (this multiple choice question has been scrambled)
  27. A technician is tasked with repairing a Windows 7 system including the removal of recently installed files and software. Which of the following system restoration methods would be the LEAST destructive way to achieve this?

    A. CHKDSK
    B. Windows Memory Diagnostic
    C. System Image Recovery
    D. System Restore
    D. System Restore
    (this multiple choice question has been scrambled)
  28. A user, Ann, reports that her computer is able to connect to devices on her local network but not on the remote office network. Ann's computer shows the following ipconfig information:

    IP address: 192.168.10.45
    Subnetmask: 255.255.255.0
    Gateway: 192.168.11.1
    DNS server 1: 192.168.10.2
    DNS server 2: 8.8.8.8

    Which of the following is the cause of the problem?

    A. DNS server 1 is set incorrectly.
    B. Gateway is set incorrectly.
    C. IP address is set incorrectly.
    D. DNS server 2 is set incorrectly.
    B. Gateway is set incorrectly.
    (this multiple choice question has been scrambled)
  29. Ann reports that printouts from the department laser printer have become faded. She has already replaced the toner cartridge. Which of the following is the MOST likely component causing the faded printing?

    A. Fusing assembly
    B. Registration assembly
    C. Transfer roller
    D. Duplexing assembly
    C. Transfer roller
    (this multiple choice question has been scrambled)
  30. A user, Ann, reports that her laptop will no longer connect to wireless. Joe, a technician, checks the device manager and does not see a wireless networking card or any unknown devices. Which of the following should Joe do FIRST?

    A. Open the laptop and reseat the network card and both antennas.
    B. Download and install the latest wireless driver from the manufacturer's website.
    C. Install a USB wireless card to ensure that Windows networking is working properly.
    D. Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut.
    D. Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut.
    (this multiple choice question has been scrambled)
  31. Which of the following passwords is the MOST secure according to industry best practices?

    A. SimpleCorrect Answer1234
    B. thisisthecorrectCorrect Answer1
    C. E@sy2Remember
    D. VeryStrongPassword
    C. E@sy2Remember
    (this multiple choice question has been scrambled)
  32. A user, Joe, has just finished upgrading his computer with a wireless keyboard/mouse combination, additional memory, installed new speakers, and replaced his 15 inch flat screen with a 24 inch flat screen. When he boots the computer it immediately starts making a loud beeping noise and will go no further in the boot process. Which of Joe's system upgrades is the cause of the problem?

    A. The DVI cable is not properly seated
    B. Memory is mismatched
    C. Speakers are not properly connected
    D. Battery low on wireless mouse
    B. Memory is mismatched
    (this multiple choice question has been scrambled)
  33. A PC uses RAID 1. Ann, a technician, has read in the event log that the drive "SATA 1" is no longer in sync with drive "SATA 0". Which of the following steps should she try FIRST to repair this PC to optimal running conditions?

    A. Replace both drives then restore from a backup
    B. Remove both drives then switch the SATA channels
    C. Remove SATA 1 from the RAID group then try to re-add it
    D. Replace SATA 1, rebuild the RAID and replace SATA 0
    C. Remove SATA 1 from the RAID group then try to re-add it
    (this multiple choice question has been scrambled)
  34. A user, Ann, receives a call from Joe who states that he is brand new in the help desk. Joe states that he needs to update Ann's email client to prevent corruption. At Joe's request, Ann discloses her user name and password. She later discovers that Joe is not a member of the help desk. Which of the following has occurred?

    A. Social engineering
    B. Hijacking
    C. Phishing
    D. Spear phishing
    A. Social engineering
    (this multiple choice question has been scrambled)
  35. Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST?

    A. Install the application in XP mode
    B. Set the application to run in XP compatibility mode
    C. Configure a dual boot with XP and 7
    D. Reinstall Windows XP
    B. Set the application to run in XP compatibility mode
    (this multiple choice question has been scrambled)
  36. Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer?

    A. MSCONFIG >Startup Tab
    B. Disable autorun
    C. Restrict user permissions
    D. Disable the Guest account
    E. Rename the Administrator account
    B. Disable autorun
    (this multiple choice question has been scrambled)
  37. Which of the following is one of the major differences between a new tablet and a new laptop computer?

    A. Laptops have slower responsiveness than tablets.
    B. Tablet has no field serviceable parts.
    C. Tablet has faster Ethernet capability.
    D. Laptop has less field functionality.
    B. Tablet has no field serviceable parts.
    (this multiple choice question has been scrambled)
  38. Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a technician recommend? (Select TWO).

    A. Increase the amount of RAM to improve disk checks
    B. Backup all data on the drive
    C. Upgrade to a home server
    D. Purchase a new hard drive
    E. Change the drive configuration to RAID 0
    F. Upgrade to Windows 7 Professional
    • B. Backup all data on the drive
    • D. Purchase a new hard drive
  39. Which of the following data types can be synchronized to a mobile device by default? (Select TWO).

    A. Biometric information
    B. Pictures
    C. Contacts
    D. Credentials
    E. SMS
    • B. Pictures
    • C. Contacts
  40. Which of the following mobile device features disables cellular and wireless communication?

    A. Hotspot Mode
    B. Settings Reset
    C. Airplane Mode
    D. Pairing Mode
    C. Airplane Mode
    (this multiple choice question has been scrambled)
  41. Ann, a user, has brought her laptop in for service. She reports that her battery is at 100%, but whenever it is unplugged it immediately shuts down. Which of the following should the technician do?

    A. Replace the power adapter
    B. Change power settings to balanced
    C. Replace the battery
    D. Enable APM in the BIOS
    C. Replace the battery
    (this multiple choice question has been scrambled)
  42. A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address. Which of the following should the technician do to resolve the issue?

    A. Turn on windows firewall
    B. Run an anti-spyware scan
    C. Click the unsubscribe link in the spam
    D. Install privacy filter
    B. Run an anti-spyware scan
    (this multiple choice question has been scrambled)
  43. DRAG
    DROP
  44. DRAG 2
    DROP 2
  45. A user is having trouble connecting to the Internet. Which of the following commands should a technician use, from the user's workstation, to ensure that the workstation has a valid IP address?

    A. TRACERT
    B. NETSTAT
    C. IPCONFIG
    D. PING
    C. IPCONFIG
    (this multiple choice question has been scrambled)
  46. Which of the following operating systems supports full BitLocker functionality?

    A. Windows 7 Professional
    B. Windows XP
    C. Windows 7 Enterprise
    D. Windows Vista Home
    C. Windows 7 Enterprise
    (this multiple choice question has been scrambled)
  47. Which of the following protocols could a technician use to connect a smartphone to an email server? (Select TWO).

    A. SMTP
    B. POP3
    C. HTTP
    D. SNTP
    E. ICMP
    • A. SMTP
    • B. POP3
  48. Which of the following should a technician do FIRST to secure a mobile device?

    A. Assign a passcode
    B. Install antivirus
    C. Disable GPS
    D. Download updates
    A. Assign a passcode
    (this multiple choice question has been scrambled)
  49. When running Windows XP, which of the following would give a list of switches for the CHKDSK command?

    A. chkdsk ~?
    B. chkdsk :?
    C. chkdsk ?
    D. chkdsk /?
    D. chkdsk /?
    (this multiple choice question has been scrambled)
  50. Which of the following commands would a technician use to move one directory above or below the one the technician is currently in?

    A. CD
    B. DIR
    C. RD
    D. MD
    A. CD
    (this multiple choice question has been scrambled)
  51. A virtual machine running locally would be BEST utilized in which of the following situations?

    A. Patch testing before rollout
    B. Thick client configuration
    C. Gaming workstation configuration
    D. On a PC with minimal RAM
    A. Patch testing before rollout
    (this multiple choice question has been scrambled)
  52. A user states that the computer takes a long time to load the desktop after login. Which of the following tools should be used to help remediate the problem?

    A. Disk Management
    B. SFC
    C. MSCONFIG
    D. FIXMBR
    C. MSCONFIG
    (this multiple choice question has been scrambled)
  53. Which of the following security threats involve shoulder surfing and phone phishing?

    A. Spyware
    B. Trojan virus
    C. Man-in-the-Middle
    D. Social engineering
    D. Social engineering
    (this multiple choice question has been scrambled)
  54. Which of the following operating systems supports full usage of 8GB DDR3 RAM?

    A. Windows Vista Home Premium x86
    B. Windows 7 Home Premium x64
    C. Windows XP Professional
    D. Windows 7 Professional x86
    B. Windows 7 Home Premium x64
    (this multiple choice question has been scrambled)
  55. A technician would like to ensure all previous data is erased before reloading Windows 7 Home Premium onto a laptop. Which of the following procedures would accomplish this?

    A. Full format
    B. Virtual RAID configuration
    C. New partition
    D. Quick format
    A. Full format
    (this multiple choice question has been scrambled)
  56. Which of the following commands, in Windows 7, could a technician use to schedule a disk integrity scan upon next boot?

    A. SCANDISK
    B. FDISK
    C. ROBOCOPY
    D. CHKDSK
    D. CHKDSK
    (this multiple choice question has been scrambled)
  57. Which of the following tabs under MSCONFIG would allow a technician to configure all of the applications that launch at boot?

    A. Tools
    B. Boot
    C. Services
    D. Startup
    D. Startup
    (this multiple choice question has been scrambled)
  58. A technician believes a machine loaded with Windows XP Professional has issues with file integrity of the core OS components. Which of the following commands could be used to both check and replace damaged files?

    A. CHKDSK /R /F
    B. DISKPART
    C. FORMAT C:
    D. SFC /SCANNOW
    D. SFC /SCANNOW
    (this multiple choice question has been scrambled)
  59. A technician is tasked with building three systems that are capable of utilizing the new Windows HomeGroup functionality. Which of the following versions of Windows would need to be used?

    A. Windows XP Professional x64 Edition
    B. Windows Vista only
    C. Windows 7 or Windows Vista
    D. Windows 7 only
    D. Windows 7 only
    (this multiple choice question has been scrambled)
  60. Which of the following security threats does NOT use software to extract sensitive information or credentials?

    A. Malware
    B. Shoulder surfing
    C. Man-in-the-Middle exploits
    D. Grayware
    B. Shoulder surfing
    (this multiple choice question has been scrambled)
  61. A user is reporting that their screen is flickering at a rapid rate. Which of the following Control Panel paths should a technician use in order to remedy this issue?

    A. Display -> Appearance -> Effects -> Transition
    B. Display -> Settings -> Advanced -> General -> DPI
    C. Display -> Settings -> Advanced -> Adapter -> Refresh
    D. Display -> Settings -> Resolution
    C. Display -> Settings -> Advanced -> Adapter -> Refresh
    (this multiple choice question has been scrambled)
  62. A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off the screen or go into standby before their presentation is complete. Which of the following Control Panel paths should the technician use in order to prevent this from occurring?

    A. Power Options -> Power Schemes
    B. System -> Hardware
    C. System -> Advanced -> Performance
    D. Power Options -> Hibernate
    A. Power Options -> Power Schemes
    (this multiple choice question has been scrambled)
  63. Which of the following data transfers will retain the current NTFS permissions of a file?

    A. Moving the file to a different location on the same volume
    B. Copying the file to a different location on the same volume
    C. Copying the file to a different location on a different volume
    D. Moving the file to a different location on a different volume
    A. Moving the file to a different location on the same volume
    (this multiple choice question has been scrambled)
  64. A user's computer keeps producing a "low virtual memory" alert and the speed of the system degrades afterwards. Which of the following Control Panel locations can provide information to review and correct this issue?

    A. System > Remote
    B. System > Advanced
    C. System > System Restore
    D. System > Hardware
    B. System > Advanced
    (this multiple choice question has been scrambled)
  65. A user states their workstation will not reach the login screen. Which of the following commands can be used to write a new partition boot sector to the system partition in the Recovery Console?

    A. FIXMBR
    B. DISKPART
    C. BOOTCFG
    D. FIXBOOT
    D. FIXBOOT
    (this multiple choice question has been scrambled)
  66. Which of the following features helps to prevent shoulder surfing?

    A. Auto adjust
    B. Degaussing
    C. Native resolution
    D. Privacy screen
    D. Privacy screen
    (this multiple choice question has been scrambled)
  67. A user wants to change the functionality that occurs when the laptop lid is closed. Which of the following Control Panel options is the MOST direct way to adjust this?

    A. Power Options
    B. Personalization
    C. Device Management
    D. Display
    A. Power Options
    (this multiple choice question has been scrambled)
  68. Which of the following Control Panel items will allow for easy streaming of pictures, music, and videos to other Windows 7 PCs?

    A. Sync Center
    B. Ease of Access Center
    C. AutoPlay
    D. HomeGroup
    D. HomeGroup
    (this multiple choice question has been scrambled)
  69. The folder "Documents" is shared. The user can create and delete documents when on the local PC, but can only read documents when accessing them remotely. Which of the following should be adjusted?

    A. Read Only Attribute
    B. Share Permissions
    C. NTFS Permissions
    D. Firewall Settings
    B. Share Permissions
    (this multiple choice question has been scrambled)
  70. Which of the following security controls would be an example of the least privilege principle on a home PC?

    A. Disable the firewall for online gaming.
    B. Install antispyware on the PC.
    C. Create a standard user account for kids.
    D. Store all financial data in a separate folder.
    C. Create a standard user account for kids.
    (this multiple choice question has been scrambled)
  71. A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?

    A. Set the screensaver password
    B. Logon using the unprivileged guest account
    C. Lock the workstation
    D. Shutdown the computer
    C. Lock the workstation
    (this multiple choice question has been scrambled)
  72. A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the CRT but not the LCD. Which of the following controls should be used in troubleshooting?

    A. Degauss
    B. Contrast
    C. Brightness
    D. Geometry
    A. Degauss
    (this multiple choice question has been scrambled)
  73. A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?

    A. Hit the refresh button to force a re-detect
    B. Select load driver
    C. Press F8 when prompted
    D. Enable PATA in the BIOS
    B. Select load driver
    (this multiple choice question has been scrambled)
  74. Which of the following accounts is MOST restrictive?

    A. Administrator
    B. Standard User
    C. Guest
    D. Power User
    C. Guest
    (this multiple choice question has been scrambled)
  75. A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error is received that the application cannot be installed because the OS is not supported. Which of the following should the technician do FIRST to try to get the application installed in Windows 7?

    A. Install the application with compatibility mode
    B. Install Windows Security updates on the system
    C. Install the latest Windows service packs and updates
    D. Install the application in safe mode
    A. Install the application with compatibility mode
    (this multiple choice question has been scrambled)
  76. A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST?

    A. Reconfigure the smartphone email account
    B. Restart the smartphone
    C. Resynchronize the smart phone
    D. Update the operating system
    B. Restart the smartphone
    (this multiple choice question has been scrambled)
  77. A technician needs to format a file system to be compatible with the WIDEST range of operating systems. Which of the following file systems should be used?

    A. CDFS
    B. NTFS
    C. FAT32
    D. FAT16
    C. FAT32
    (this multiple choice question has been scrambled)
  78. For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?

    A. Windows password
    B. Proper SSID
    C. SSL certificate
    D. MAC address filtering
    B. Proper SSID
    (this multiple choice question has been scrambled)
  79. A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?

    A. The user forgot to share the parent folder and only shared the specific file.
    B. The parent folder has explicit Deny rights set for this user.
    C. The parent folder has explicit Allow rights set for this user.
    D. The parent folder likely has the "archive" attribute enabled.
    B. The parent folder has explicit Deny rights set for this user.
    (this multiple choice question has been scrambled)
  80. A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?

    A. Mantraps
    B. Retinal scanners
    C. Door locks
    D. Smart card badges
    A. Mantraps
    (this multiple choice question has been scrambled)
  81. A consultant is looking to consolidate six company servers onto one physical system. Which of the following requirements is MOST important on the new setup to ensure stable functionality of the virtual environment?

    A. Server software security requirements
    B. Server hardware resources
    C. Client hardware requirements
    D. Network resources
    B. Server hardware resources
    (this multiple choice question has been scrambled)
  82. Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?

    A. Least privilege
    B. Most privilege
    C. Allow all
    D. Deny all
    A. Least privilege
    (this multiple choice question has been scrambled)
  83. A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss o fvideo during operation. Which of the following are MOST likely causes of this problem? (Select TWO).

    A. Incompatible or untested video drivers have been installed.
    B. The BIOS is underclocking the video card's operating speed.
    C. Video drivers were not installed directly from Microsoft update.
    D. The BIOS is not set for the proper operation temperature of the video chipset.
    E. Integrated system video chip is failing and/or near death.
    E. Integrated system video chip is failing and/or near death.

    C. Incompatible or untested video drivers have been installed.
    (this multiple choice question has been scrambled)
  84. A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company's content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?

    A. Anti-malware software
    B. System restore
    C. Recovery console
    D. Factory pre-installation
    A. Anti-malware software
    (this multiple choice question has been scrambled)
  85. After being infected with a virus, a user's computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user's backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?

    A. Anti-malware software
    B. Recovery Console
    C. System Restore
    D. Factory restore CD
    D. Factory restore CD
    (this multiple choice question has been scrambled)
  86. A technician installed a second hard drive in a computer. Upon restart, a message appears statinG. "primary drive 0 not found. Press F1 to continue." Which of the following should the technician check FIRST?

    A. Proper drive installation (e.g. cables/jumpers)
    B. If the BIOS boot settings are correct
    C. If computer can boot into safe mode
    D. That NTLDR and boot.ini are not missing
    A. Proper drive installation (e.g. cables/jumpers)
    (this multiple choice question has been scrambled)
  87. The shared folder named C$ is an example of which of the following?

    A. Administrative share
    B. Inheritance
    C. Local share
    D. Permission propagation
    A. Administrative share
    (this multiple choice question has been scrambled)
  88. Which of the following is BEST used to prevent other people from viewing a user's computer screen?

    A. Privacy filter
    B. Anti-virus software
    C. Key fob
    D. Biometric device
    A. Privacy filter
    (this multiple choice question has been scrambled)
  89. A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?

    A. Phishing
    B. War driving
    C. Shoulder surfing
    D. Social engineering
    D. Social engineering
    (this multiple choice question has been scrambled)
  90. Which of the following can be used as an appropriate boot device?

    A. HDMI
    B. FDISK
    C. OEM recovery media
    D. USB drive
    D. USB drive
    (this multiple choice question has been scrambled)
  91. A user tries to connect to the Internet using a dial-up modem and receives a "No dial tone detected" message.  Which of the following is the FIRST thing the technician should check to troubleshoot the issue?

    A. Check if the cable is connected on the modem's line RJ-11 port.
    B. Check if the cable is connected on the modem's phone RJ-45 port.
    C. Check if the cable is connected on the modem's line RJ-45 port.
    D. Check if the cable is connected on the modem's phone RJ-11 port.
    A. Check if the cable is connected on the modem's line RJ-11 port.
    (this multiple choice question has been scrambled)
  92. Which of the following software types would need to be installed on a mobile device to help prevent data from being viewed if the device is lost?

    A. Remote backup application
    B. GPS locator
    C. Antivirus
    D. Remote wipe
    D. Remote wipe
    (this multiple choice question has been scrambled)
  93. Which of the following is the BEST tool to verify the cable is plugged into the correct port on the patch panel?

    A. Toner probe
    B. Punch down
    C. Cable certifier
    D. Cable tester
    A. Toner probe
    (this multiple choice question has been scrambled)
  94. Which of the following is the BEST tool for a technician to use to make sure the network wires are securely fastened in a wall jack?

    A. Crimper
    B. Wire strippers
    C. Punch down
    D. Small flat screwdriver
    C. Punch down
    (this multiple choice question has been scrambled)
  95. Which of the following is the BEST tool for a technician to use to make sure the network cable is securely fastened in the RJ-45 connector?

    A. Small flat screwdriver
    B. Cable tester
    C. Crimper
    D. Punch down
    C. Crimper
    (this multiple choice question has been scrambled)
  96. A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client's machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory?

    A. Identify the problem
    B. Establish a plan of action to resolve the problem
    C. Test the theory to determine cause
    D. Document findings, actions, and outcomes
    D. Document findings, actions, and outcomes
    (this multiple choice question has been scrambled)
  97. A client reports that their VoIP phone screen displays duplicate IP address. Which of the following is the FIRST action to try to resolve this problem?

    A. Reboot the phone
    B. Try another LAN connection
    C. Change MAC address settings
    D. Call the vendor
    A. Reboot the phone
    (this multiple choice question has been scrambled)
  98. After an installation of a video adapter, the screen on a Windows 7 system cannot be seen. Which of the following Windows 7 functions will resolve this?

    A. Task Manager
    B. Startup Repair
    C. Component Management
    D. Device Manager
    B. Startup Repair
    (this multiple choice question has been scrambled)
  99. A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?

    A. Re-join the computer to the domain
    B. Reboot the PC as the domain will automatically rebuild the relationship
    C. Run CHKDSK
    D. Update the BIOS using the latest version
    A. Re-join the computer to the domain
    (this multiple choice question has been scrambled)
  100. Which of the following resources is MOST important for accessing remote virtual environments on a client machine?

    A. CPU speed
    B. Drive space
    C. Network speed
    D. High speed memory
    C. Network speed
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview