A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?
Netstat
Ping
Traceroute
nslookup
Netstat
A junior Linux systems administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?
Sudo
Chmod
Chown
Cd
Superuser
Root
Sudo
A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT?
A. Reboot into safe mode
B. Check the boot order
C. Format the drive
D. Perform Windows Recovery
Check the boot order
A user received a call from a bank to confirm a wire transfer; however, the user created no such request. While troubleshooting, a technician discovers there are rules on the user's account that are forwarding the emails to an external email address and deleting the emails from the bank.
This is an example of:
A. spam email.
B. invalid certificates.
C. hijacked email.
D. browser pop-ups.
C. hijacked email.
Following a recent password change, a user can log on successfully to an Apple computer but cannot access a web-based service. An error message displays each time the user attempts to authenticate to the service stating incorrect login credentials. Prior to changing the password, the computer had no communication issues. Which of the following should a technician use to continue troubleshooting the issue?
A. passwd
B. FileVault
C. Keychain
D. Gatekeeper
Keychain
Which of the following command-line tools should a technician use to apply a new policy?
Dism
Chkdsk
Gpresult
Gpget
gpupdate
gpupdate
A Linux user wants to use a command to identify every file in the current directory that contains the word "mandatory". Which of the following commands would BEST accomplish this?
find
grep
ps
ls
grep
A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a "Stop" error on every boot. Which of the following should the technician complete to resolve the issue?
A. Boot the workstation in safe mode and roll back the graphics driver
B. Boot the workstation in safe mode with networking and install the latest stable graphics driver
C. Boot the workstation in safe mode and disable Windows driver signing requirements
D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings
Boot the workstation in safe mode and roll back the graphics driver
Which of the following attack types exploits vulnerabilities in software that have not yet been known?
A. Zero-day
B. Man-in-the-middle
C. Spoofing
D. Phishing
A. Zero-day
A user cannot print to a network printer. A technician runs the Windows 10 troubleshooting utility, but it does not find any errors. Which of the following printer settings should the technician check NEXT?
A. Duplex
B. Spooler
C. Collate
D. Resolution
Spooler
You are a technician assisting a user with troubleshooting network connectivity. Which of the following would NOT be a command that could be useful in diagnosing their network issues? (pick two)
cp
Ping
Ifconfig
Tracert
pathping
cp
Ifconfig
You are a server administrator managing a Linux file server and have found a few directories you believe to be empty. Which command would allow you to delete only directories that have no contents, ensuring you do not delete files by mistake?
rm –R
dirdel
rmdir
del
rmdir
A technician is troubleshooting an issue affecting all company laptops. All the laptops have the same hardware. The screens glitch and go dark every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode does not present the issue. Which of the following should the technician do NEXT?
A. Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.
B. Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed.
C. Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video card vendor.
D. Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.
Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.
Which of the following would not harden our network against malware?
End-user education
Keeping anti-malware updated
Disabling scheduled anti-malware scans
Disabling any unneeded USB ports
Disabling scheduled anti-malware scans
A user has reported that a computer is running extremely slow when opening applications. A technician checks the computer and needs to verify memory utilization. Which of the following tools should the technician use to begin troubleshooting the issue?
A. Task Scheduler
B. Device Manager
C. Drive Status
D. Performance Monitor
Performance Monitor
You are a technician troubleshooting network connectivity on a user’s laptop. You suspect that the user does not have a valid IP address from the DHCP server and would like to run commands to reset the device’s IP address. Which two commands would you use?
ipconfig /dropip
ipconfig /releasedns
ipconfig /release
ipconfig /renew
ipconfig /newip
ipconfig /ipgrab
ipconfig /release
ipconfig /renew
A technician is updating a Linux server that had been in storage. After logging into the terminal, a command is issued that displays the technician's current location in the filesystem. Which of the following commands was issued?
passwd
apt
pwd
grep
pwd
what are the 6 Troubleshooting steps
Identify the problem
Establish a theory of probable cause
Test the theory
Establish and implement plan of action
Verify full system functionality
Document findings, actions, and outcomes
Name at least 5 forms of social engineering.
Phishing
Vishing
Smishing
Whaling
Spear phishing
Tailgaiting
Piggybacking
Dumpster diving
Shoulder Surfing
Impersonation
Intimidation
A technician is configuring a static IP address on a Windows machine. The information is as follows:
IP address: 192.168.10.120
Subnet mask: 255.255.255.0
Which of the following would be a valid default gateway address?
A. 192.168.0.1
B. 192.168.9.1
C. 192.168.10.254
D. 192.168.15.10
192.168.10.254
A network technician is troubleshooting connectivity issues between users and the corporate file server. Which of the following commands would NOT be helpful in troubleshooting this issue?
Ping 127.0.0.1
tracert
hostname
ipconfig
hostname
A user is trying to find a file that contains a specific string on a Linux workstation. The user locates the file and then needs to navigate to another directory to work with it. Which of the following commands should the user enter to accomplish both of these tasks? (Choose two.)
chmod
chown
cd
rm
pwd
sudo
grep
ls
cd
grep
You are assisting a client with troubleshooting a computer that is unable to connect to any network resources or to the internet. Which of the following hardware components would NOT be likely to cause this issue?
NIC
PCIe slot
Rj-11 cable
ethernet port
Rj-11 cable
A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have? (choose two)
A. Rootkit
B. Keylogger
C. Trojan
D. Ransomware
A. Rootkit
C. Trojan
A technician receives the Chief Executive Officer's (CEO's) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario? (Choose three.)
A. Disconnect the device from the network
B. Disable system restore
C. Restore the computer to the previous checkpoint
D. Scan and use removal techniques
E. Create a restore point
F. Educate the end user
G. Schedule scans and run updates
A. Disconnect the device from the network
B. Disable system restore
D. Scan and use removal techniques