Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
95 Cards in this Set
- Front
- Back
What is the next best step after you quarentined a system with malware? |
Disable System Restore |
|
Why is a computer shutting down and unable to start after 20 minutes? |
Overheating (Check CPU fan, thermal paste) |
|
What should you do after you installed new hardware and then the OS blue screens shutdown? |
Reseat Hardware |
|
A user reports that the computer can not find their OS. What is the first thing you should check? |
Boot order |
|
What command should you run if the boot config database is corrupted/missing files? |
Bootrec /rebuildBCD |
|
What command should you run if the boot manager is missing? |
Bootrec /rebuildbcd |
|
What should you run if the OS had an improper shutdown, and you suspect a restart would not solve the issue? |
Startup Repair |
|
What command should you run if the system has corrupt files or its missing the GUI? |
sfc /scannow |
|
What can you use to troubleshoot videocard issues? |
Safe mode |
|
What tool can you check if a device stops working? |
Device manager |
|
Where would be the best place to see error logs? |
Event viewer |
|
What does a blue screen give you after a shutdown from installing new hardware? |
Windows Stop error |
|
Where can you check real time CPU utilization? |
Task Manager |
|
What tool can you use to check a 24 hour graphical gui of hardware performance? |
Performance Monitor |
|
Your system is running slow, and you suspect your HDD is the cause. What can you run to solve this issue? |
Disk Defrag |
|
What drive setting would you chose for a 4TB+ hard drive? |
GPT (MBR for less than 2 TB) |
|
What should a technician do first, if the computer discharges static while wearing a bracelet? |
Remove jewelry |
|
What kind of social engineering attack is called, when the attacker wants you to disclose personal information? |
Whaling |
|
What hardware should you check when your computer starts to make clicking noises? |
Hard drive |
|
Where can you check internal temperatures / status? |
BIOS |
|
What cmd can you use to check the integrity of system files? |
sfc /scannow |
|
Where can you see error logs? |
Event viewer |
|
Linux command for individual app logs |
/var/log |
|
What tool is used to enable or disable an app from startup? |
msconfig |
|
Where can you schedule backups? |
Task Scheduler |
|
Where can you register DLLs? |
regsvr32 |
|
What can you enable to recover from a bad video driver install? |
Low resolution vga mode |
|
What kind of virus wants users to pay money? |
Ransomware |
|
What can you use to check the history of application problems? |
Reliability Monitor |
|
What would an iOS phone do after 10 login attempts? |
Erase the device |
|
What license determines how the software is used? |
EULA |
|
A customer calls the help desk to report an issue. The costumer suggest that the probem is hardware related but the technician knows from the description that this is not the case. What is the best course of action? |
Acknowledge the customer's input, but follow another course of action. |
|
A technician has purchased a new surge protector to protect equipment in the production environment. The surge protector's features safegaurd the connected equipment by directing surges to what? |
Path of least resistance |
|
What action should you take on a customer's call if you never encountered a certain problem? |
Ask customer to hold for two minutes to check resources |
|
What should a technician do before connecting a cable TV line to a TV tuner card? |
Unplug computer power cable |
|
What safety procedures should you take while replacing a faulty video card? |
Self ground and handle new card by the edges |
|
What safety procedure should a technician take before replacing a power supply? |
Remove jewelry |
|
What should a technician do if they discover torrented/illegal material a system? |
Secure the workstation in a limited access facility |
|
Before establishing remote desktop assistance with a customer, what should a technician ask them to do? |
Close any personal items |
|
A user calls a help desk and is adamant that the folder was there previously even though it is missing today. The tech sees a back up listed on the 'prior versions' tab. According to troubleshooting theory, what should the tech do next? |
Establish a theory of probable cause |
|
A newly deployed windows PC cannot connect to anti virus server on local network for updates, but it can connect to other file servers and printers without issue. What is the most likely cause? |
PC windows firewall is misconfigured |
|
What network has a maximum theoretical throughout of 150Mb/s? |
802.11n |
|
Which networks run on a 2.4Ghz frequency? |
802.11b 802.11g 802.11n |
|
A PC technician has been asked to verify certain group policies applied on a workstation. What command should be run? |
gpresult |
|
What email config allows user to sync email from multiple devices? |
IMAP |
|
A technician has decided to upgrade all users' iPhones to the latest model. What should the technician advise the users to do before turning in the old phones? |
Back up mobile data with a cloud backup service |
|
What tool can you check if you installed a new video card, but it does not work after a test bench? |
Device manager |
|
What can prevent user data loss on machines that power off during thunderstorms? |
UPS |
|
What feature is used to allow smartphone payments within a short range? |
NFC |
|
An admin wants to give a user limited access rights in windows VISTA, so that the user can install printers and create local user accounts. What account should be given to the user? |
Power User |
|
A computer has a valid IP address on a corporate network, that can connect to network shares and it can view local intranet web pages. However, the PC can not connect to public web sites. What should you configure? |
Proxy Settings |
|
An IPS appliance is installed on a network. What is the purpose of the IPS? |
Check and stop unwanted activity |
|
A user wants their email to only be stored on their tablet. What email server setting type should you use? |
POP3 |
|
An admin must upgrade multiple workstations with a new image being deployed using WDS. What client side boot methods initiates deployment of the new image? |
PXE |
|
Best practice to fix zero day vulnerabilty on linux? |
Patch management |
|
What is bluetooth's range? |
30ft (9meters) |
|
What cloud system allows a company to manage their own cloud while using third party vendors for storage? |
Hybrid |
|
What backup can you run while the system is running? |
Shadow copy |
|
What mobile feature operates the touch screen? |
Digitizer |
|
Why can't a network admin install programs on a workstation? |
Username not part of local admin group |
|
Type of security threat that uses other computers or other networks to accept and pass on viruses? |
Botnets |
|
What mobile screen lock is most secure? |
Fingerprint lock |
|
What should a tech do to protect an organization from further data exposure after passwords have been leaked? |
Multifactor authentication Educate end users |
|
What should a user do to secure a home workstation? |
Remove default accounts Disable guest |
|
What can you run to remove malware installed programs that can't be killed? |
Msconfig - clean boot |
|
What first safety step should a tech take to install new RAM? |
Disconnect power |
|
What should a tech use to search for a specific string within a file name? |
grep |
|
Why can't a user open encrypted emails on a movile device? |
A valid certificate suitable for S/MIME is not installed |
|
What device gives the best network protection within a single device? |
UTM |
|
What action should you perform if you discovered a vulnerability on a wireless router that could allow an attacker to take remote control of the device? |
Update firmware |
|
What tool can a user use to import a .dll? |
Regsvr32 |
|
What tool can you use to change the number of cpu cores available to the OS to enhance productivity? |
msconfig |
|
A tech is onsite troubleshooting a user's issue and receives a call from another customer. What is the best course of action? |
Let the call go to voicemail |
|
How should you repurpose a hard drive with confidential information on it? |
Quick format |
|
What should you do if a RAID 0 crashes? |
Reformat the drive |
|
POP3 |
110 |
|
IMAP |
143 |
|
SSL/TLS over IMAP |
993 |
|
SSL/TLS over POP3 |
995 |
|
SMTP |
25 |
|
SSL/TLS over SMTP |
465 |
|
Non-secured ports for email? |
POP3 -110 SMTP - 25 |
|
Where could you disable a Windows service before the OS starts? |
Recovery Console Command prompt |
|
Where can you enable Windows boot log? |
System Configuration |
|
What windowa feature prevents the system from overwriting an important DLL? |
Windows Resource Protection |
|
While playing audio from a mobile device, the audio keeps stopping. Why is this happening? |
Another app is conflicting with the audio player |
|
What technology manages the use of software? |
DRM |
|
What command should you run in Win RE to search your storage devices for Windows installations? |
Bootrec /scanos |
|
Malware that reproduces with human interactions |
Virus |
|
Malware that self-replicates |
Worms |
|
Malware that pretends to be something else |
Trojan Horse |
|
One device that pretends to be another device |
Spoofing |
|
All communcations is intercepted and forwarded by a third-party |
Man in the middle |
|
Malware that can be invisible to the OS |
Rootkit |
|
What command would you use to terminate a task in cmd line? |
Taskkill /pid xxxx /t |