Windows
Security
Operational Procedures
Troubleshooting
Linux/MAC
100

You want to view detailed information about startup programs on Windows 10 computer and manage startup behavior. Which tool should you use?

System configuration

100

What action should the network administrator take to improve the wireless networks performance if the network is experiencing interference from neighboring networks?

Changing channels

100

 Which safety tools would technicians use to prevent damage to sensitive components from electrostatic discharge while repairing a computer?

ESD straps and antistatic bags

100

 What could be a potential action if of a user is experiencing slow response times when using various applications on their mobile device?

Clear the application cache

100

Which command-line tool would you use for package mgnt in a Debian-based Linux?

apt-get install

200

You want to view detailed information about the current Group policy settings applied to Windows 10. Which Command line tool should you use to get this info?

gpresult

200

What disposal method should a small business use to ensure that sensitive data stored on the hard drives of old desktop computers is completely erased?

Standard formatting

200

What should be included in a change request form when implementing change management best practices especially to minimize the disruptions to operations?

Date and time of the change

200

What troubleshooting step should be taken first to address a user being unable to access the network on their personal computer?

Check network cable connections

200

Which command-line tool would you use to change permissions of a file or directory in linux? 

chmod

300

To deploy a Windows 10 image with pre-configured settings, applications and drivers  across multiple computers in an organization you would what installation method?

Image deployment

300

What action would a company take to implement account management best practices to enhance security for new workstations?

Restrict log in times

300

Which combination of controls should be implemented to maintain optimal conditions for a server room?

Proper ventilation, surge suppressor, and temp/humidity monitoring

300

What could be a potential concern is a user notices that their mobile device is displaying fake security warnings and experiencing unexpected application behavior?

Application spoofing

300

Which command-line tool would you use to search for a specific keyword within the contents of multiple files on linux desktop?

grep

400

Which installation method would be most suitable for upgrading the computers from Windows 7 to Windows 10 while preserving user data and applications?

Upgrade installation

400

Which type of malware is specifically designed to hide it's presence and maintain privileged access to a computer system evidenced by system crashes and unexpected reboots?

Rootkit

400

Which remote access method should the IT administrator use to securely manage Linux servers?

SSH

400

Once the malware is isolated on a computer, what step should be taken to prepare the system for removal?

Disable System Restore in Windows

400

Which built-in macOS feature allows users to terminate unresponsive applications?

Force Quit or Command+Option+Esc

500

In a Windows 10 desktop that accepts wired and wireless connections. Which networking feature should you configure to prioritize the wired connection over wireless?

Establish network connections

500

What step should the user take to ensure a secure browser installation when using untrusted sources?

Verify the browser's hash value

500

Which script file type should the developer use for manipulating and displaying data within a web browser that would interact with HTML elements and handle user input dynamically?

.js JavaScript

500

What troubleshooting step should the user take if a user's Windows computer is unable to boot properly, displaying an error indicating no OS found?

Verify hardware connections

500

Which step is typically involved in installing an application from a .dmg file on macOS?

Mounting the .dmg file and launching from the mounted volume

M
e
n
u