For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?
A. Annual cyber security education
A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?
A. Regular user education
Which of the following operating systems can be upgraded directly to Windows 7 Professional by a default installation? (Select TWO).
A. Windows 7 Home Premium
B. Windows Vista Business
C. Windows XP Home
D. Windows XP Professional 64-bit
E. Windows XP Media Center
A. Windows 7 Home Premium
B. Windows Vista Business
A technician has finished replacing the network card in a laptop and has verified full system functionality. Which of the following troubleshooting steps should the technician take NEXT?
D. Document findings, actions, and outcomes
A technician is implementing a SOHO wireless network for Company A that shares a floor with Company B. Which of the following would BEST secure the wireless network so that only Company A employees are allowed access?
D. Enabling MAC filtering
A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone's knowledge. Which of the following would prevent this from occurring?
A. Change default usernames and passwords
A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?
C. Disable the remote desktop port
Which of the following is an example of client-side virtualization?
A. XP mode running in Windows 7 64-bit operating system
Laptops and tablets have which of the following in common?
B. Solid state drives
Joe, a technician, would like to map a network drive when he starts up his computer in the morning. Which of the following commands would he use to accomplish this task?
A. NET
A local administrator would like to determine why a laptop is taking so long to boot into the operating system.Which of the following tabs in MSCONFIG would the administrator access to BEST determine this?
B. Startup
A user, Ann, reports that she suspects her workstation has malware. Joe, the technician, confirms malware exists and starts the process of removing the malware. Which of the following is the FIRST step he should take in removing the malware?
B. Disable system restore
A user reports paper jams at the location of the paper trays. Which of the following components would need to be replaced to resolve this issue?
B. Pickup roller
A user has plugged in a mobile phone to a PC and received a message that the driver was not successfully installed. Which of the following system tools should be used to troubleshoot this error?
D. Device Manager
On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?
C. Proxy Settings
Which of the following describes when an application is able to reuse Windows login credentials?
C. Single sign-on
In order to prevent other users from editing files in `C: Files', which of the following steps should be taken?
B. Set NTFS permissions to read only
Which of the following security threats requires the attacker to be physically located near the target machine?
B. Shoulder surfing
A technician recently replaced a user's monitor and now the user is reporting that the screen is filled with static and appears distorted. Which of the following will resolve the issue?
B. Lower refresh rate
A user recently installed a new video driver on a PC but now it will not boot. Which of the following is the BEST option to correct the issue?
A. Safe mode
An unauthorized user observing system security procedures is known as:
D. shoulder surfing.
Privacy filters applied to users computer screens are used to combat which of the following security risks?
C. Shoulder surfing
A critical server was replaced by the IT staff the previous night. The following morning, some users arereporting that they are unable to browse to the Internet upon booting their workstations. Users who did not shutdown their workstations the previous day are able to connect to the Internet. A technician looks at the followingreport from a workstation with no Internet connectivity:
IP Address: 192.168.1.101
Netmask: 255.255.255.0
DHCP Server:192.168.1.1
DNS Server:192.168.1.2
Default Gateway:192.168.1.1
Given the above report, which of the following is the cause of why some workstations are unable to browse the Internet?
C. The DHCP server is misconfigured.
Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage?
B. Rootkit
Joe, a technician, receives an error message on his tower PC just after POST which reads:
"WARNING! Your drive is about to fail. Please back up your data and run full drive diagnostics."
Which of the following is generating this error message?
C. S.M.A.R.T.
Ann, a technician, is trying to recover some files for a user from a damaged laptop. Since the Windows installation has been corrupted and does not boot, Ann plugs the drive into a bench system to attempt a recovery. After trying to access the drive on the bench computer, the following message is displayed. "Access Denied. Please Enter Encryption Password." Which of the following is the reason that this error is displayed?
D. BitLocker is being used
A technician is tasked with repairing a Windows 7 system including the removal of recently installed files and software. Which of the following system restoration methods would be the LEAST destructive way to achieve this?
D. System Restore
A user, Ann, reports that her computer is able to connect to devices on her local network but not on the remote office network. Ann's computer shows the following ipconfig information:
IP address: 192.168.10.45
Subnetmask: 255.255.255.0
Gateway: 192.168.11.1
DNS server 1: 192.168.10.2
DNS server 2: 8.8.8.8
Which of the following is the cause of the problem?
C. Gateway is set incorrectly.
Ann reports that printouts from the department laser printer have become faded. She has already replaced the toner cartridge. Which of the following is the MOST likely component causing the faded printing?
C. Transfer roller
A user, Ann, reports that her laptop will no longer connect to wireless. Joe, a technician, checks the device manager and does not see a wireless networking card or any unknown devices. Which of the following should Joe do FIRST?
A. Check to make sure the wireless card was not turned off via the hardware switch or keyboard shortcut.
Which of the following passwords is the MOST secure according to industry best practices?
D. E@sy2Remember
A user, Joe, has just finished upgrading his computer with a wireless keyboard/mouse combination, additional memory, installed new speakers, and replaced his 15 inch flat screen with a 24 inch flat screen. When he boots the computer it immediately starts making a loud beeping noise and will go no further in the boot process. Which of Joe's system upgrades is the cause of the problem?
C. Memory is mismatched
A PC uses RAID 1. Ann, a technician, has read in the event log that the drive "SATA 1" is no longer in sync with drive "SATA 0". Which of the following steps should she try FIRST to repair this PC to optimal running conditions?
A. Remove SATA 1 from the RAID group then try to re-add it
A user, Ann, receives a call from Joe who states that he is brand new in the help desk. Joe states that he needs to update Ann's email client to prevent corruption. At Joe's request, Ann discloses her user name and password. She later discovers that Joe is not a member of the help desk. Which of the following has occurred?
A. Social engineering
Ann recently upgraded a computer from Windows XP to Windows 7, but one of her applications does not work now. Which of the following should be done FIRST?
B. Set the application to run in XP compatibility mode
Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer?
A. Disable autorun
Which of the following is one of the major differences between a new tablet and a new laptop computer?
C. Tablet has no field serviceable parts.
Ann, a home user, brings a Windows XP PC in for repair and reports that several disk read errors are occurring. She has run check disk and errors have been reported several times. Which of the following should a technician recommend? (Select TWO).
D. Backup all data on the drive
D. Purchase a new hard drive
Which of the following data types can be synchronized to a mobile device by default? (Select TWO).
A. Biometric information
B. Pictures
C. Contacts
D. Credentials
E. SMS
B. Pictures
C. Contacts
Which of the following mobile device features disables cellular and wireless communication?
A. Airplane Mode
Ann, a user, has brought her laptop in for service. She reports that her battery is at 100%, but whenever it is unplugged it immediately shuts down. Which of the following should the technician do?
B. Replace the battery
A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address. Which of the following should the technician do to resolve the issue?
A. Run an anti-spyware scan
DRAG
DROP
DRAG 2
DROP 2
A user is having trouble connecting to the Internet. Which of the following commands should a technician use, from the user's workstation, to ensure that the workstation has a valid IP address?
A. IPCONFIG
Which of the following operating systems supports full BitLocker functionality?
D. Windows 7 Enterprise
Which of the following protocols could a technician use to connect a smartphone to an email server? (Select TWO).
A. SMTP
B. POP3
C. HTTP
D. SNTP
E. ICMP
A. SMTP
B. POP3
Which of the following should a technician do FIRST to secure a mobile device?
A. Assign a passcode
When running Windows XP, which of the following would give a list of switches for the CHKDSK command?
D. chkdsk /?
Which of the following commands would a technician use to move one directory above or below the one the technician is currently in?
D. CD
A virtual machine running locally would be BEST utilized in which of the following situations?
B. Patch testing before rollout
A user states that the computer takes a long time to load the desktop after login. Which of the following tools should be used to help remediate the problem?
C. MSCONFIG
Which of the following security threats involve shoulder surfing and phone phishing?
B. Social engineering
Which of the following operating systems supports full usage of 8GB DDR3 RAM?
C. Windows 7 Home Premium x64
A technician would like to ensure all previous data is erased before reloading Windows 7 Home Premium onto a laptop. Which of the following procedures would accomplish this?
D. Full format
Which of the following commands, in Windows 7, could a technician use to schedule a disk integrity scan upon next boot?
D. CHKDSK
Which of the following tabs under MSCONFIG would allow a technician to configure all of the applications that launch at boot?
C. Startup
A technician believes a machine loaded with Windows XP Professional has issues with file integrity of the core OS components. Which of the following commands could be used to both check and replace damaged files?
D. SFC /SCANNOW
A technician is tasked with building three systems that are capable of utilizing the new Windows HomeGroup functionality. Which of the following versions of Windows would need to be used?
D. Windows 7 only
Which of the following security threats does NOT use software to extract sensitive information or credentials?
C. Shoulder surfing
A user is reporting that their screen is flickering at a rapid rate. Which of the following Control Panel paths should a technician use in order to remedy this issue?
C. Display -> Settings -> Advanced -> Adapter -> Refresh
A user has a laptop that they need to get ready for an outdoor presentation. The user is concerned that the laptop will turn off the screen or go into standby before their presentation is complete. Which of the following Control Panel paths should the technician use in order to prevent this from occurring?
B. Power Options -> Power Schemes
Which of the following data transfers will retain the current NTFS permissions of a file?
D. Moving the file to a different location on the same volume
A user's computer keeps producing a "low virtual memory" alert and the speed of the system degrades afterwards. Which of the following Control Panel locations can provide information to review and correct this issue?
A. System > Advanced
A user states their workstation will not reach the login screen. Which of the following commands can be used to write a new partition boot sector to the system partition in the Recovery Console?
C. FIXBOOT
Which of the following features helps to prevent shoulder surfing?
C. Privacy screen
A user wants to change the functionality that occurs when the laptop lid is closed. Which of the following Control Panel options is the MOST direct way to adjust this?
D. Power Options
Which of the following Control Panel items will allow for easy streaming of pictures, music, and videos to other Windows 7 PCs?
B. HomeGroup
The folder "Documents" is shared. The user can create and delete documents when on the local PC, but can only read documents when accessing them remotely. Which of the following should be adjusted?
C. Share Permissions
Which of the following security controls would be an example of the least privilege principle on a home PC?
C. Create a standard user account for kids.
A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?
A. Lock the workstation
A user has an LCD and a CRT monitor attached to their workstation. The colors are slightly off on the CRT but not the LCD. Which of the following controls should be used in troubleshooting?
D. Degauss
A user is installing Windows 7 on a PC with a RAID card. The user has verified all of the cables are connected correctly, but the installation media does not detect any hard drives. Which of the following should the user do to help detect the hard drives?
D. Select load driver
Which of the following accounts is MOST restrictive?
B. Guest
A technician is tasked with installing a legacy application on a Windows 7 computer. When the technician tries to install the legacy application, an error is received that the application cannot be installed because the OS is not supported. Which of the following should the technician do FIRST to try to get the application installed in Windows 7?
B. Install the application with compatibility mode
A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST?
D. Restart the smartphone
A technician needs to format a file system to be compatible with the WIDEST range of operating systems. Which of the following file systems should be used?
B. FAT32
For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?
D. Proper SSID
A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?
B. The parent folder has explicit Deny rights set for this user.
A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?
D. Mantraps
A consultant is looking to consolidate six company servers onto one physical system. Which of the following requirements is MOST important on the new setup to ensure stable functionality of the virtual environment?
C. Server hardware resources
Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?
D. Least privilege
A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss o fvideo during operation. Which of the following are MOST likely causes of this problem? (Select TWO).
E. Integrated system video chip is failing and/or near death.
C. Incompatible or untested video drivers have been installed.
A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company's content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?
D. Anti-malware software
After being infected with a virus, a user's computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user's backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?
B. Factory restore CD
A technician installed a second hard drive in a computer. Upon restart, a message appears statinG. "primary drive 0 not found. Press F1 to continue." Which of the following should the technician check FIRST?
A. Proper drive installation (e.g. cables/jumpers)
The shared folder named C$ is an example of which of the following?
C. Administrative share
Which of the following is BEST used to prevent other people from viewing a user's computer screen?
C. Privacy filter
A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
C. Social engineering
Which of the following can be used as an appropriate boot device?
D. USB drive
A user tries to connect to the Internet using a dial-up modem and receives a "No dial tone detected" message. Which of the following is the FIRST thing the technician should check to troubleshoot the issue?
B. Check if the cable is connected on the modem's line RJ-11 port.
Which of the following software types would need to be installed on a mobile device to help prevent data from being viewed if the device is lost?
B. Remote wipe
Which of the following is the BEST tool to verify the cable is plugged into the correct port on the patch panel?
A. Toner probe
Which of the following is the BEST tool for a technician to use to make sure the network wires are securely fastened in a wall jack?
D. Punch down
Which of the following is the BEST tool for a technician to use to make sure the network cable is securely fastened in the RJ-45 connector?
B. Crimper
A technician is using the troubleshooting theory to help resolve a problem that is occurring with a client's machine. The technician has verified system functionally. Which of the following is the NEXT step in the troubleshooting theory?
C. Document findings, actions, and outcomes
A client reports that their VoIP phone screen displays duplicate IP address. Which of the following is the FIRST action to try to resolve this problem?
D. Reboot the phone
After an installation of a video adapter, the screen on a Windows 7 system cannot be seen. Which of the following Windows 7 functions will resolve this?
C. Startup Repair
A user gets an error message that the trust relationship to the domain has been broken. Which of the following can be done to resolve this from the client desktop?
C. Re-join the computer to the domain
Which of the following resources is MOST important for accessing remote virtual environments on a client machine?