• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/59

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

59 Cards in this Set

  • Front
  • Back

QUESTION 61




A technician receives a helpdesk ticket about an employee having a problem sending text messages with a company Android smartphone. It has been determinedthat it is not a carrier issue. Which of the following should the technician perform FIRST?




A. Verify data connectivity




B. Reformat the MicroSD card




C. Replace the SIM card




D. Perform a soft restore

Correct Answer: A




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 62




A networked PC has started to display adware pop-ups when the user opens the browser. Which of the following best practices should the technician employFIRST when responding to the problem?




A. Disable System Restore




B. Schedule scans and run updates in safe mode




C. Quarantine the system




D. Create a System Restore point

Correct Answer: C




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 63




Joe, a user, states he is unable to use his Android phone after updating the OS. Joe is in a hurry and would like a quick solution that would most likely fix the issue.Which of the following methods can the technician use?




A. Initiate a factory reset




B. Perform a hard reset




C. Remove the MicroSD card




D. Rollback the OS update

Correct Answer: B




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 64




A customer reports that a smartphone is experiencing a very short battery life. The user has been using this phone for a short time and has installed several appsrecently. Which of the following might be the cause of the issue?




A. Slow data speeds




B. Defective SD card




C. Unauthorized root access




D. Signal drop or weak signal

Correct Answer: C




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 65




A customer has recently installed several applications on a Windows 7 workstation and is now experiencing slow system performance and spontaneous restarts.After removing some of the recently installed applications, the issue persists. Which of the following tools could the technician use to troubleshoot the problem whilepreventing data loss?




A. Factory restore




B. SecureBoot




C. msconfig




D. diskpart

Correct Answer: C




Section: Soft Troubleshooting ExplanationExplanation/Reference:

QUESTION 66




A user’s smartphone runs very slow at the end of the day. When the user restarts the phone in the morning, it runs at its normal speed. Which of the followingshould be done throughout the day to BEST resolve this issue?




A. Reset to the smartphone to factory default.




B. Uninstall any unused apps.




C. Close all running apps.




D. Charge the smartphone.

Correct Answer: C




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 67




After installing a critical update from Windows Update, a user accidentally types an incorrect URL into the browser and malware is automatically installed. Themalware disables the computer’s antivirus software and Internet connection. Which of the following would be the BEST tool to remove the malware without riskingloss of the user’s data?




A. Run System Restore




B. Reinstall Windows with the Repair Option




C. Reinstall Windows on top of itself




D. Run System File Checker

Correct Answer: A




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 68




Joe, a user, is using his smartphone for navigation while driving. As he drives, an icon frequently appears on the screen informing the user additional information isrequired to log in. Which of the following is causing this?




A. Unintended WiFi connections




B. Cellular data roaming notifications




C. Weak cellular signal




D. Unintended Bluetooth connections

Correct Answer: A




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 69




An engineer working with large detailed CAD files notices over time that the workstation is taking significantly longer to open files that used to launch quickly. Otherapplications work fine, and the engineer confirms all of the data has been backed up the night before. A technician determines that the workstation is about twoyears old. Which of the following would be the technician’s FIRST step in troubleshooting the problem?




A. Run defrag on the hard drive




B. Restore the CAD files from backup




C. Replace the hard drive




D. Remove and reinstall the CAD software

Correct Answer: A




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 70




Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to retrieve documents. Joe is thenrequired to type in his username and password to unlock the computer. The technician looks at the settings on the PC and notices that the screensaver and screen-lock options are grayed out on the computer and cannot be changed. Which of the following is the MOST likely cause of this issue?





A. Domain-level group policies




B. Antivirus domain-level policies




C. Corrupted registry settings




D. Incorrect local-level user policies

Correct Answer: A




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 71




A Windows workstation is suspected of having malicious software that created an infected start-up item or service. Which of the following tools would a technicianuse to test this theory?




A. chkdsk




B. msconfig




C. dxdiag




D. ipconfig

Correct Answer: B




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 72




A user reports unexpected icons appearing on the desktop. The technician identifies that the symptoms point to a malware infection. Which of the followingprocedures would be performed NEXT?




A. Quarantine infected system




B. Schedule scans and run updates




C. Report the issue to the information security officer




D. Disable System Restore (in Windows)




E. Educate end user

Correct Answer: A




Section: Soft TroubleshootingExplanation

QUESTION 73




A user updates the video driver on the computer and it requests a restart after installation. The computer never gets past the loading Windows page withoutrebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs?




A. Emergency Repair Disk




B. Restore from OEM image




C. System Recovery




D. Restore from backup

Correct Answer: C




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 74




A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Whichof the following would be the BEST course of action for the technician to perform NEXT?




A. Copy the DLL file from a working PC and use the regsvr32 command to load the file




B. Run the Windows Update utility to manually reinstall the DLL file




C. Run the defrag utility to correct any fragmentation that may have damaged the file




D. Research the DLL file to identify the application it corresponds to before continuing

Correct Answer: D




Section: Soft Troubleshooting ExplanationExplanation/Reference:

QUESTION 75




A user, Ann, receives a phone call from the company’s mail administrator who indicates her email account has been disabled due to high volumes of emails beingsent in a very short period of time. Which of the following types of attack has the user experienced?




A. Virus infection




B. Man-in-the-middle attack




C. Phishing attack




D. Malware infection

Correct Answer: A




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 76




A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. Which of the following is the BEST stepthe user can take to fix this problem?




A. Perform a force stop




B. Reset to factory default




C. Upgrade to a larger battery




D. Close running apps

Correct Answer: B




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 77




A user reports browsing the Internet is slow and an icon with a picture of a person with a headset keeps asking them to “click here for help.” The user has clickedon the icon to try to resolve the slowness but all that happens is the computer redirects them to a website to purchase software. Which of the following should be performed FIRST to resolve the issue?




A. Create a restore point




B. Run O/S updates




C. Train the user of malicious software




D. Identify the type of malware

Correct Answer: D




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 78




A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take muchlonger than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the followingshould the technician do NEXT?




A. Reload the OS using FAT32 instead of NTFS.




B. Change the disk from basic to dynamic.




C. Run chkdsk with the /r switch and reboot the PC.




D. Open the defrag utility and run a drive analysis.

Correct Answer: C




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 79




A technician has just fixed a user’s PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technicianshould do?




A. Educate the user regarding Internet browsing best practices




B. Update the anti-malware software on the user’s PC




C. Schedule scans and run updates




D. Enable system restore and create restore point

Correct Answer: A




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 80




Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction. The WiFi icon is displaying that it has connectivity but she is stillunable to browse. Which of the following could be the issue?




A. PRAM needs to be reset




B. iCloud is corrupted




C. The router needs to be rebooted




D. The upgrade needs to be uninstalled

Correct Answer: A




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 81




Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device. He now notices the battery is rapidly draining. Which of thefollowing can Joe MOST likely do to resolve the issue without a loss of data?




A. Restart the mobile device.




B. Update the device’s firmware.




C. Uninstall the GPS-enabled app.




D. Readjust the location settings.

Correct Answer: D




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 82




Joe, a user, has connected a tablet to his personal mobile hotspot device in a public location for Internet access. The device display indicates there are twoconnections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO).




A. Change the SSID to a different broadcast name




B. Add the intruding device to a blocked access list




C. Access the intruder’s device and shut it down




D. Shut down the device until the intruder is no longer in the area




E. Set up a WiFi analyzer to identify the intruding device

Correct Answer: AB




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 83




Ann, a customer, reports that when she occasionally works in the office basement, her smartphone battery drains faster than normal and she has poor cellularreception. Which of the following is the reason for the fast battery drain?




A. Unpaired Bluetooth




B. Weak signal




C. Defective SD card




D. Malware

Correct Answer: B




Section: Soft TroubleshootingExplanationExplanation/Reference:

QUESTION 84




A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technicianshould take?




A. Identify the problem




B. Document findings, actions and outcome




C. Verify full system functionality




D. Establish a theory of probable cause




E. Test the theory to determine cause

Correct Answer: E




Section: Op ProcedureExplanationExplanation/Reference:

QUESTION 85




A new help desk technician receives a trouble call from a user. The issue is something the technician has never encountered before, and does not know where tobegin troubleshooting. The FIRST course of action is for the technician to:




A. tell the customer the issue needs to be escalated to a higher tier technician.




B. ask the customer if they would mind holding for no more than two minutes to check resources.




C. tell the customer this is the first time encountering the issue and to please be patient.




D. ask the customer to please hold while a senior technician is consulted regarding the issue.

Correct Answer: B




Section: Op ProcedureExplanationExplanation/Reference:

QUESTION 86




A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation,which of the following should the computer technician do before connecting a cable TV line to a TV tuner card?




A. Perform self-grounding




B. Unplug the computer power cable




C. Use an ESD strap




D. Require the electrical system be brought up to code

Correct Answer: B




Section: Op Procedure ExplanationExplanation/Reference:

QUESTION 87




When dealing with a difficult customer, which of the following is the BEST way to handle the situation?




A. Do not argue with the customer and/or be defensive




B. Use technical terms to assure customer confidence




C. Escalate the customer’s issue to a supervisor




D. Sympathize with the customer about issue

Correct Answer:




ASection: Op ProcedureExplanationExplanation/Reference:

QUESTION 88




A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to preventdamaging the new part?




A. Ground the computer and remove jewelry.




B. Self ground and handle the new card by the edges.




C. Place the computer on an ESD mat.




D. Attach an ESD strap to the new card during handling.

Correct Answer: B




Section: Op ProcedureExplanationExplanation/Reference:

QUESTION 89




A technician opens a customer’s computer and sees large amounts of accumulated dust. Which of the following is the BEST method of removing the dust from thecomputer?




A. Use compressed air to free the dust from the components and remove it with an ESD vacuum.




B. Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away.




C. Use a shop vacuum with enough power to ensure all dust has been removed.




D. Remove as much dust as possible by hand and use compressed air to blow the rest out.

Correct Answer: A




Section: Op ProcedureExplanationExplanation/Reference:

QUESTION 90




A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to bereplaced. Which of the following is the NEXT step in the process of performing the repair?




A. The technician should replace the power supply




B. The technician should review disposal regulations




C. The technician should check the environment




D. The technician should remove jewelry

Correct Answer: D




Section: Op ProcedureExplanationExplanation/Reference:

QUESTION 91




A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user hasindeed been violating company policy. Which of the following would be the next BEST step for this technician to perform?




A. Secure the workstation in a limited access facility.




B. Document the incident, purge all policy violating materials.




C. Immediately delete all unauthorized materials.




D. Reprimand the user and apply a content filter to their profile.

Correct Answer: A




Section: Op ProcedureExplanationExplanation/Reference:

QUESTION 92




A customer is experiencing issues with email and calls the help desk. The technician determines it would help clarify the issue if the customer agrees to share theirdesktop. Prior to establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to:




A. close any items of a personal nature.




B. reboot the computer and log back in.




C. capture a screen-shot of the error message.




D. take steps to reproduce the error.

Correct Answer: A




Section: Op ProcedureExplanationExplanation/Reference:

QUESTION 93




A user calls the help desk because a folder containing critical business files is missing from the local drive. The user is adamant that the folder was there theprevious day, and cannot understand why it is gone. The technician views the properties of the parent folder and sees a back up listed on the “Prior Versions” tab.According to the theory of troubleshooting, which of the following is the technician’s NEXT step?




A. Establish a theory of probable cause




B. Establish a plan of action and implement the solution




C. Document findings, actions and outcomes




D. Verify full system functionality and implement preventive measures

Correct Answer: A




Section: Op ProcedureExplanationExplanation/Reference:

QUESTION 94




A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers withoutissue. Which of the following is the MOST likely cause of this issue?




A. The PC’s Windows firewall is misconfigured




B. The PC has an incorrect IP address configured




C. The PC is on the wrong wireless network




D. The PC does not have remote assistance turned on

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 95




Ann, an end user, receives a call from someone claiming to be from the help desk and asking for her username and password to prevent her email box from beingdeleted immediately. Which of the following BEST describes this type of attack?




A. Shoulder surfing




B. Man-in-the-middle




C. Social engineering




D. Ransomware

Correct Answer: C




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 96




Which of the following is the BEST option to prevent data breaches on lost mobile devices?




A. Install a locator application on the mobile device so that it can be traced.




B. Apply a restriction to lock the device after a certain number of failed login attempts.




C. Configure the device to remote wipe as soon as it is reported lost.




D. Utilize the fingerprint scanner and passcode for multifactor authentication.

Correct Answer: C




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 97




A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the following commands should be run on the workstation?




A. extract




B. tasklist




C. gpupdate




D. gpresult




E. chkdsk

Correct Answer: D




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 98




A user is configuring the email settings on a smartphone. Which of the following configurations will allow the user to synchronize email from multiple devices?




A. IMAP




B. S/MIME




C. POP3




D. SMTP

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 99




An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contactthe IT department and report a violation of which of the following policies?




A. DRM




B. EULA




C. IRP




D. PII

Correct Answer: D




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 100




Which of the following file formats does Android use for application installation?




A. .ipa




B. .api




C. .apk




D. .exe




E. .sdk

Correct Answer: C




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 101




A technician has decided to upgrade all users’ iPhones to the latest model. Which of the following is the FIRST thing the technician should advise the users to dowith the old phones before turning them in?




A. Back up the mobile data with a cloud backup service.




B. Enable remote wipe to clear all personal and corporate data.




C. Go into the device settings to remove personal customizations.




D. Factory reset the old phones to ensure the data is no longer on the device.

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 102




A technician has just installed a video card in a PC. The video card is not working, although it was working fine on the test bench. Which of the following Windowstools should the technician use to start troubleshooting the problem?




A. Task Manager




B. Device Manager




C. System Configuration




D. Computer Management

Correct Answer: B




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 103




A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following is the BEST option to modify the size of the partition?




A. Credential Manager




B. Computer Management




C. Device Manager




D. TPM Manager

Correct Answer: B




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 104




Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slow performance after a couple of hours and that the problemworsens as the day goes by. If Ann restarts the device, it works fine for a couple of hours and then starts to run slow again. Which of the following is the BESTaction to troubleshoot this problem?




A. Check running apps




B. Reset to factory default




C. Disable cloud syncing




D. Replace the device’s battery

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 105




A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform beforeconfiguring the phone for access?




A. Check the phone for unauthorized root access




B. Disable the phone’s Bluetooth chip




C. Erase all personal data from the phone




D. Check the phone for location tracking

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 106




Which of the following features is being used when a smartphone is used to purchase a product at a retail kiosk?




A. NFC




B. Virtual assistant




C. SDK




D. Bluetooth

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 107




Which of the following security threats happens when another person enters a secured area with an authorized person?




A. Tailgating




B. Shoulder surfing




C. Spoofing




D. Phishing

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 108




Which of the following is a risk of implementing a BYOD policy?




A. Introducing malware onto the network




B. DHCP may fail due to incompatibility




C. Different encryption technology




D. Higher risk of phishing attacks

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 109




A company is concerned about users tailgating into restricted areas. In order to prevent unauthorized users from following others, which of the following should beimplemented?




A. Biometric locks




B. CCTV




C. Mantraps




D. Badge readers

Correct Answer:




CSection: Mix QuestionsExplanationExplanation/Reference:

QUESTION 110




An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of thefollowing accounts should the administrator create for the user?




A. Power user




B. Administrator




C. Standard




D. Guest

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 111




A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computerhas a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internetpage and it times out. Which of the following should the technician configure next?




A. Hosts files




B. IPv6 settings




C. Proxy settings




D. Lmhosts files

Correct Answer: C




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 112




A user reports several technicians have been unable to solve a problem and requests that the technician on the phone comes out to fix the problem because theuser is unable to work. After the technician has effectively communicated a willingness to help, which of the following is the NEXT step?




A. Allow the user to speak with a supervisor.




B. Identify the problem.




C. Establish a theory.




D. Immediately go to the user’s office.

Correct Answer: B




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 113




An IPS appliance is installed on the network. Which of the following is the purpose of the IPS?




A. To check the network for unwanted activity




B. To check and stop unwanted activity




C. To provide connectivity to the network




D. To test the resilience of the network

Correct Answer: B




Section: Mix QuestionsExplanationhttp://www.gratisexam.com/Explanation/Reference:

QUESTION 114




A user wants to be able to access email from all devices. Which of the following formats should be used to allow this synchronization?




A. SMTP




B. iCal




C. POP3




D. IMAP

Correct Answer: D




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 115




Which of the following tasks is automatically added to the task scheduler in Windows to keep hard disk performance up?




A. defrag




B. chkdsk




C. cleanmgr




D. diskpart

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 116




A user notices the social media apps are constantly updated with the user’s precise location. The user is worried about privacy and would like to keep thisinformation from being broadcast online. Which of the following features should the user adjust in order to accomplish this?




A. Geotracking




B. Filtering




C. WiFi




D. Tethering

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 117




A user’s personal laptop was hacked. A technician troubleshooting the issue discovers the user used the numbers 123456789 as their account password. The userhas not changed the password in two years. Which of the following best practices should the technician recommend the user implement to prevent future hacking?(Select TWO).




A. Configure screen saver




B. Set a strong password




C. Set login time restrictions




D. Use a more secure browser




E. Change the password frequently

Correct Answer: BE




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 118




A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust whileprotecting internal hardware components? (Select TWO).




A. Mask




B. ESD mat




C. ESD strap




D. Antistatic bag




E. Safety goggles




F. Rubber gloves

Correct Answer: AE




Section: Mix QuestionsExplanationExplanation/Reference:

QUESTION 119




A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of thefollowing cloud concepts does this represent?




A. Measured service




B. Rapid elasticity




C. On-demand




D. Resource pooling

Correct Answer: A




Section: Mix QuestionsExplanationExplanation/Reference: