Operating Systems
Malware
Policies
Management
Various Questions
100

A Mac user needs to configure a network device using a serial connection to enable a remote network connection. Which of the following utilities would MOST likely be used to make the necessary changes?

What is Terminal.

100

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the Internet. Which of the following actions should the user take?

What is Install anti-malware software 

100

A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access. Which of the following policies is needed?

What is Acceptable Use Policy

100

A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business?

What is risk analysis of change.

100

A Windows user is attempting to install a local printer and is unsuccessful based on permissions. Which of the following user types BEST describes this user?

What is a Guest user.

200

A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?

What is EFS

200

Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot. A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a "click hereג €button to resolve it. There is a timer in the pop-up, counting down the time until the computer is no longer usable. Which of the following should the technician do NEXT?

What is disconnect the computer from the network

200

Joe, a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action?

What is inventory Management

200

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

What is Document a backout plan to roll back changes to the router 

200

Which of the following file types should be opened when executing a PowerShell script?

What is .ps1

300

An end user reports a Windows computer is infected with a virus. Which of the following should be the technicians FIRST troubleshooting step?

What is Identify Malware symptions

300

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?

What is use an antivirus product capable of performing heuristic analysis 

300

What a user is allowed to do on a computer network would be addressed in:

What is an acceptable use policy.

300

A systems administrator needs to add security to the server room. Which of the following would provide the BEST security for the room? (Choose two.)

What is door locks and privacy windows.

300

A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change?

What is inheritance.

400

A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem. Which of the following should the technician do FIRST?

What is Log in as an administrative user and determine if the problem persists 

400

A small office wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)

What is using the default login and using WEP.

400

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy?

What is disable the users account

400

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

What is acknowledge base articles and AUP.

400

What BEST describes the Guest account on a Windows system?

What is this account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions.

500

A users personal settings are not saving, and a technician suspects the users local Windows profile is corrupt. The technician wants to check the size of the ntuser.dat file, but it does not appear in the users profile directory. Which of the following Control Panel utilities should the technician use to correct this?

What is Folder Options.

500

Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some websites, and web services are not responding from any of the web browsers, although Joe can access these services from his smartphone without issue. The computers malware scanner has the latest definitions installed. Which of the following would BEST explain why the computer is functioning this way?

Expired root certificate

500

A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users mobile devices. Which of the following should the security administrator recommend? (Choose two.)

What is BYOD and MDM.

500

Corporate management is concerned about the security of the companyגTM€s mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two)

What is implement remote wipe features and using full device encryption.

500

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the businessגTM€s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Choose two.)

What is signal strength and MAC filtering.

M
e
n
u