Windows commands
Linux commands
Troubleshooting hardware
Security
Troubleshooting Hardware
200

A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?

  1. Netstat

  2. Ping

  3. Traceroute

  4. nslookup

Netstat

200

A junior Linux systems administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

  1. Sudo

  2. Chmod

  3. Chown

  4. Cd

  5. Superuser

  6. Root

Sudo

200

A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting. Which of the following steps should the technician take NEXT?

A. Reboot into safe mode
B. Check the boot order
C. Format the drive
D. Perform Windows Recovery

Check the boot order

200

A user received a call from a bank to confirm a wire transfer; however, the user created no such request. While troubleshooting, a technician discovers there are rules on the user's account that are forwarding the emails to an external email address and deleting the emails from the bank.
This is an example of:
A. spam email.
B. invalid certificates.
C. hijacked email.
D. browser pop-ups.

C. hijacked email.

200

Following a recent password change, a user can log on successfully to an Apple computer but cannot access a web-based service. An error message displays each time the user attempts to authenticate to the service stating incorrect login credentials. Prior to changing the password, the computer had no communication issues. Which of the following should a technician use to continue troubleshooting the issue?
A. passwd
B. FileVault
C. Keychain
D. Gatekeeper

Keychain

400

Which of the following command-line tools should a technician use to apply a new policy?

  1. Dism

  2. Chkdsk

  3. Gpresult

  4. Gpget

  5. gpupdate

gpupdate

400

A Linux user wants to use a command to identify every file in the current directory that contains the word "mandatory". Which of the following commands would BEST accomplish this?

  1. find

  2. grep

  3. ps

  4. ls

grep

400

A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a "Stop" error on every boot. Which of the following should the technician complete to resolve the issue?
A. Boot the workstation in safe mode and roll back the graphics driver
B. Boot the workstation in safe mode with networking and install the latest stable graphics driver
C. Boot the workstation in safe mode and disable Windows driver signing requirements
D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings

Boot the workstation in safe mode and roll back the graphics driver

400

Which of the following attack types exploits vulnerabilities in software that have not yet been known?
A. Zero-day
B. Man-in-the-middle
C. Spoofing
D. Phishing

A. Zero-day

400

A user cannot print to a network printer. A technician runs the Windows 10 troubleshooting utility, but it does not find any errors. Which of the following printer settings should the technician check NEXT?
A. Duplex
B. Spooler
C. Collate
D. Resolution

Spooler

600

You are a technician assisting a user with troubleshooting network connectivity. Which of the following would NOT be a command that could be useful in diagnosing their network issues? (pick two) 

  1. cp

  2. Ping

  3. Ifconfig

  4. Tracert

  5. pathping

cp 

Ifconfig

600

You are a server administrator managing a Linux file server and have found a few directories you believe to be empty. Which command would allow you to delete only directories that have no contents, ensuring you do not delete files by mistake?

  1. rm –R

  2. dirdel

  3. rmdir

  4. del

rmdir

600

A technician is troubleshooting an issue affecting all company laptops. All the laptops have the same hardware. The screens glitch and go dark every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode does not present the issue. Which of the following should the technician do NEXT?

A. Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.
B. Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed.
C. Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video card vendor.
D. Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.

 Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.

600

Which of the following would not harden our network against malware?

  1. End-user education

  2. Keeping anti-malware updated

  3. Disabling scheduled anti-malware scans

  4. Disabling any unneeded USB ports

Disabling scheduled anti-malware scans

600

A user has reported that a computer is running extremely slow when opening applications. A technician checks the computer and needs to verify memory utilization. Which of the following tools should the technician use to begin troubleshooting the issue?
A. Task Scheduler
B. Device Manager
C. Drive Status
D. Performance Monitor

Performance Monitor

800

You are a technician troubleshooting network connectivity on a user’s laptop. You suspect that the user does not have a valid IP address from the DHCP server and would like to run commands to reset the device’s IP address. Which two commands would  you use?

  1. ipconfig /dropip

  2. ipconfig /releasedns

  3. ipconfig /release

  4. ipconfig /renew

  5. ipconfig /newip

  6. ipconfig /ipgrab

  1. ipconfig /release

  2. ipconfig /renew

800

A technician is updating a Linux server that had been in storage. After logging into the terminal, a command is issued that displays the technician's current location in the filesystem. Which of the following commands was issued?

  1. passwd

  2. apt

  3. pwd

  4. grep

pwd

800

what are the 6 Troubleshooting steps

  1. Identify the problem

  2. Establish a theory of probable cause

  3. Test the theory

  4. Establish and implement plan of action

  5. Verify full system functionality

  6. Document findings, actions, and outcomes

800

Name at least 5 forms of social engineering.

  • Phishing 

  • Vishing

  • Smishing

  • Whaling

  • Spear phishing

  • Tailgaiting

  • Piggybacking

  • Dumpster diving

  • Shoulder Surfing

  • Impersonation

  • Intimidation

800

A technician is configuring a static IP address on a Windows machine. The information is as follows:

IP address: 192.168.10.120

Subnet mask: 255.255.255.0
Which of the following would be a valid default gateway address?
A. 192.168.0.1
B. 192.168.9.1
C. 192.168.10.254
D. 192.168.15.10

192.168.10.254

1000

A network technician is troubleshooting connectivity issues between users and the corporate file server. Which of the following commands would NOT be helpful in troubleshooting this issue?  

  1. Ping 127.0.0.1 

  1. tracert 

  1. hostname

  1. ipconfig 

  1. hostname

1000

A user is trying to find a file that contains a specific string on a Linux workstation. The user locates the file and then needs to navigate to another directory to work with it. Which of the following commands should the user enter to accomplish both of these tasks? (Choose two.)

  1. chmod

  2. chown

  3. cd

  4. rm

  5. pwd

  6. sudo

  7. grep

  8. ls

cd 

grep

1000

You are assisting a client with troubleshooting a computer that is unable to connect to any network resources or to the internet. Which of the following hardware components would NOT be likely to cause this issue?

  1. NIC

  2. PCIe slot

  3. Rj-11 cable

  4. ethernet port

Rj-11 cable

1000

A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet. Which of the following types of infection does the user MOST likely have? (choose two)
A. Rootkit
B. Keylogger
C. Trojan
D. Ransomware

A. Rootkit

C. Trojan  

1000

A technician receives the Chief Executive Officer's (CEO's) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario? (Choose three.)

A. Disconnect the device from the network
B. Disable system restore
C. Restore the computer to the previous checkpoint
D. Scan and use removal techniques
E. Create a restore point
F. Educate the end user
G. Schedule scans and run updates

A. Disconnect the device from the network
B. Disable system restore
D. Scan and use removal techniques

M
e
n
u