• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/95

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

95 Cards in this Set

  • Front
  • Back

What is the next best step after you quarentined a system with malware?

Disable System Restore

Why is a computer shutting down and unable to start after 20 minutes?

Overheating



(Check CPU fan, thermal paste)

What should you do after you installed new hardware and then the OS blue screens shutdown?

Reseat Hardware

A user reports that the computer can not find their OS. What is the first thing you should check?

Boot order

What command should you run if the boot config database is corrupted/missing files?

Bootrec /rebuildBCD

What command should you run if the boot manager is missing?

Bootrec /rebuildbcd

What should you run if the OS had an improper shutdown, and you suspect a restart would not solve the issue?

Startup Repair

What command should you run if the system has corrupt files or its missing the GUI?

sfc /scannow

What can you use to troubleshoot videocard issues?

Safe mode

What tool can you check if a device stops working?

Device manager

Where would be the best place to see error logs?

Event viewer

What does a blue screen give you after a shutdown from installing new hardware?

Windows Stop error

Where can you check real time CPU utilization?

Task Manager

What tool can you use to check a 24 hour graphical gui of hardware performance?

Performance Monitor

Your system is running slow, and you suspect your HDD is the cause. What can you run to solve this issue?

Disk Defrag

What drive setting would you chose for a 4TB+ hard drive?

GPT


(MBR for less than 2 TB)

What should a technician do first, if the computer discharges static while wearing a bracelet?

Remove jewelry

What kind of social engineering attack is called, when the attacker wants you to disclose personal information?

Whaling

What hardware should you check when your computer starts to make clicking noises?

Hard drive

Where can you check internal temperatures / status?

BIOS

What cmd can you use to check the integrity of system files?

sfc /scannow

Where can you see error logs?

Event viewer

Linux command for individual app logs

/var/log

What tool is used to enable or disable an app from startup?

msconfig

Where can you schedule backups?

Task Scheduler

Where can you register DLLs?

regsvr32

What can you enable to recover from a bad video driver install?

Low resolution vga mode

What kind of virus wants users to pay money?

Ransomware

What can you use to check the history of application problems?

Reliability Monitor

What would an iOS phone do after 10 login attempts?

Erase the device

What license determines how the software is used?

EULA

A customer calls the help desk to report an issue. The costumer suggest that the probem is hardware related but the technician knows from the description that this is not the case. What is the best course of action?

Acknowledge the customer's input, but follow another course of action.

A technician has purchased a new surge protector to protect equipment in the production environment. The surge protector's features safegaurd the connected equipment by directing surges to what?

Path of least resistance

What action should you take on a customer's call if you never encountered a certain problem?

Ask customer to hold for two minutes to check resources

What should a technician do before connecting a cable TV line to a TV tuner card?

Unplug computer power cable

What safety procedures should you take while replacing a faulty video card?

Self ground and handle new card by the edges

What safety procedure should a technician take before replacing a power supply?

Remove jewelry

What should a technician do if they discover torrented/illegal material a system?

Secure the workstation in a limited access facility

Before establishing remote desktop assistance with a customer, what should a technician ask them to do?

Close any personal items

A user calls a help desk and is adamant that the folder was there previously even though it is missing today. The tech sees a back up listed on the 'prior versions' tab. According to troubleshooting theory, what should the tech do next?

Establish a theory of probable cause

A newly deployed windows PC cannot connect to anti virus server on local network for updates, but it can connect to other file servers and printers without issue. What is the most likely cause?

PC windows firewall is misconfigured

What network has a maximum theoretical throughout of 150Mb/s?

802.11n

Which networks run on a 2.4Ghz frequency?

802.11b


802.11g


802.11n

A PC technician has been asked to verify certain group policies applied on a workstation. What command should be run?

gpresult

What email config allows user to sync email from multiple devices?

IMAP

A technician has decided to upgrade all users' iPhones to the latest model. What should the technician advise the users to do before turning in the old phones?

Back up mobile data with a cloud backup service

What tool can you check if you installed a new video card, but it does not work after a test bench?

Device manager

What can prevent user data loss on machines that power off during thunderstorms?

UPS

What feature is used to allow smartphone payments within a short range?

NFC

An admin wants to give a user limited access rights in windows VISTA, so that the user can install printers and create local user accounts. What account should be given to the user?

Power User

A computer has a valid IP address on a corporate network, that can connect to network shares and it can view local intranet web pages. However, the PC can not connect to public web sites. What should you configure?

Proxy Settings

An IPS appliance is installed on a network. What is the purpose of the IPS?

Check and stop unwanted activity

A user wants their email to only be stored on their tablet. What email server setting type should you use?

POP3

An admin must upgrade multiple workstations with a new image being deployed using WDS. What client side boot methods initiates deployment of the new image?

PXE

Best practice to fix zero day vulnerabilty on linux?

Patch management

What is bluetooth's range?

30ft (9meters)

What cloud system allows a company to manage their own cloud while using third party vendors for storage?

Hybrid

What backup can you run while the system is running?

Shadow copy

What mobile feature operates the touch screen?

Digitizer

Why can't a network admin install programs on a workstation?

Username not part of local admin group

Type of security threat that uses other computers or other networks to accept and pass on viruses?

Botnets

What mobile screen lock is most secure?

Fingerprint lock

What should a tech do to protect an organization from further data exposure after passwords have been leaked?

Multifactor authentication


Educate end users

What should a user do to secure a home workstation?

Remove default accounts


Disable guest

What can you run to remove malware installed programs that can't be killed?

Msconfig - clean boot

What first safety step should a tech take to install new RAM?

Disconnect power

What should a tech use to search for a specific string within a file name?

grep

Why can't a user open encrypted emails on a movile device?

A valid certificate suitable for S/MIME is not installed

What device gives the best network protection within a single device?

UTM

What action should you perform if you discovered a vulnerability on a wireless router that could allow an attacker to take remote control of the device?

Update firmware

What tool can a user use to import a .dll?

Regsvr32

What tool can you use to change the number of cpu cores available to the OS to enhance productivity?

msconfig

A tech is onsite troubleshooting a user's issue and receives a call from another customer. What is the best course of action?

Let the call go to voicemail

How should you repurpose a hard drive with confidential information on it?

Quick format

What should you do if a RAID 0 crashes?

Reformat the drive

POP3

110

IMAP

143

SSL/TLS over IMAP

993

SSL/TLS over POP3

995

SMTP

25

SSL/TLS over SMTP

465

Non-secured ports for email?

POP3 -110


SMTP - 25

Where could you disable a Windows service before the OS starts?

Recovery Console Command prompt

Where can you enable Windows boot log?

System Configuration

What windowa feature prevents the system from overwriting an important DLL?

Windows Resource Protection

While playing audio from a mobile device, the audio keeps stopping. Why is this happening?

Another app is conflicting with the audio player

What technology manages the use of software?

DRM

What command should you run in Win RE to search your storage devices for Windows installations?

Bootrec /scanos

Malware that reproduces with human interactions

Virus

Malware that self-replicates

Worms

Malware that pretends to be something else

Trojan Horse

One device that pretends to be another device

Spoofing

All communcations is intercepted and forwarded by a third-party

Man in the middle

Malware that can be invisible to the OS

Rootkit

What command would you use to terminate a task in cmd line?

Taskkill /pid xxxx /t