Is Your Computer Technician Worth IT? Only If He Passes This Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Alfredhook3
A
Alfredhook3
Community Contributor
Quizzes Created: 2924 | Total Attempts: 2,348,561
Questions: 50 | Attempts: 957

SettingsSettingsSettings
Is Your Computer Technician Worth IT? Only If He Passes This Test - Quiz

A computer repair technician is a person who repairs and maintains computers and servers. The technician's responsibilities may extend to include building or configuring new hardware, installing and updating software packages, and creating and maintaining computer networks.
Is your computer technician worth it? Only if he passes this test


Questions and Answers
  • 1. 

    A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application. Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?

    • A.

      Reinstall the application

    • B.

      Roll back the application to the earlier version

    • C.

      Clear the application cache

    • D.

      Update the OS of the smartphones

    Correct Answer
    D. Update the OS of the smartphones
    Explanation
    Updating the OS of the smartphones should be the first step for the technician because the issue is occurring on two devices with the same model. It is possible that the application requires a newer version of the operating system to function properly. By updating the OS, the technician can ensure that the smartphones have the latest software and any compatibility issues with the application are resolved. Reinstalling the application or rolling back to an earlier version may not solve the problem if it is related to the OS. Clearing the application cache is also unlikely to fix the issue in this case.

    Rate this question:

  • 2. 

    A technician is working on a Windows 10 PC that is running slowly. Which of the following commands should the technician use to correct this issue? (Choose two.

    • A.

      Dir

    • B.

      Chkdsk

    • C.

      Dism

    • D.

      Ipconfig

    • E.

      Format

    Correct Answer(s)
    B. Chkdsk
    C. Dism
    Explanation
    The technician should use the "chkdsk" command to check the integrity of the file system and fix any errors. This can help improve the performance of the PC by resolving any issues with the hard drive. Additionally, the technician should use the "dism" command to repair the Windows image and fix any corruption that may be causing the PC to run slowly. This command can help optimize the system and improve its overall performance.

    Rate this question:

  • 3. 

    An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Choose two.)

    • A.

      Change the default access port

    • B.

      Enforce password complexity

    • C.

      Put the terminal server into the router’s DMZ

    • D.

      Disable logon time restrictions

    • E.

      Block all unused ports on the LAN smart switch

    • F.

      Use the local client certificate for server authentication

    Correct Answer(s)
    C. Put the terminal server into the router’s DMZ
    E. Block all unused ports on the LAN smart switch
    Explanation
    The administrator should put the terminal server into the router's DMZ to increase server security. Placing the server in the DMZ isolates it from the internal network, providing an additional layer of protection against unauthorized access. Additionally, blocking all unused ports on the LAN smart switch helps to prevent any potential vulnerabilities or unauthorized access through those ports, further enhancing server security.

    Rate this question:

  • 4. 

    A company has hired a new IT firm to manage its network switches and routers. The firm is geographically separated from the company and will need to able to securely access the devices. Which of the following will provide the ability to access these devices?

    • A.

      Telnet

    • B.

      SSH

    • C.

      RDP

    • D.

      VNC

    Correct Answer
    B. SSH
    Explanation
    SSH (Secure Shell) is the correct answer because it is a secure network protocol that allows remote login and command execution over an encrypted connection. It provides a secure way for the IT firm to access the network switches and routers from a remote location. Telnet, RDP, and VNC are not as secure as SSH and do not provide the same level of encryption and security for remote access.

    Rate this question:

  • 5. 

    A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)

    • A.

      Guest network

    • B.

      TKIP

    • C.

      Default login

    • D.

      Outdated firmware

    • E.

      WPS

    • F.

      WEP

    Correct Answer(s)
    C. Default login
    F. WEP
    Explanation
    The default login configuration allowed the attack to take place because the attacker was able to gain access to the router using the default username and password. This highlights the importance of changing default login credentials to prevent unauthorized access. Additionally, the WEP configuration also contributed to the attack as it is a weak encryption protocol that can be easily cracked by attackers. Using stronger encryption protocols such as WPA2 should be implemented to enhance network security.

    Rate this question:

  • 6. 

    A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.Which of the following naming convention formats should the technician follow

    • A.

      Domain name, location, IP address

    • B.

      Domain name, location, asset ID

    • C.

      Asset ID, MAC address

    • D.

      Location, RFID

    Correct Answer
    C. Asset ID, MAC address
    Explanation
    The technician should follow the naming convention format of Asset ID, MAC address. This format allows for easy tracking and identification of the client's PCs. The Asset ID provides a unique identifier for each PC, while the MAC address ensures that there are no duplicates. This naming convention format is effective in keeping track of the client's PCs while they are in use.

    Rate this question:

  • 7. 

    Which of the following provide the BEST security for a server room? (Choose two.)

    • A.

      Badge reader

    • B.

      Bollard

    • C.

      Biometric lock

    • D.

      Cable lock

    • E.

      USB token

    • F.

      Privacy window shades

    Correct Answer(s)
    A. Badge reader
    C. Biometric lock
    Explanation
    A badge reader provides security by requiring individuals to present a valid badge or access card in order to gain entry to the server room. This helps to ensure that only authorized personnel are granted access. A biometric lock provides an additional layer of security by using unique physical characteristics, such as fingerprints or retinal scans, to verify the identity of individuals before granting access to the server room. This helps to prevent unauthorized access even if someone were to possess a stolen or forged access card.

    Rate this question:

  • 8. 

    Which of the following threats uses personalized information in an attempt at obtaining information?

    • A.

      Whaling

    • B.

      Impersonation

    • C.

      Spoofing

    • D.

      Spear phishing

    Correct Answer
    D. Spear phishing
    Explanation
    Spear phishing is the correct answer because it involves the use of personalized information to trick individuals into revealing sensitive information or performing certain actions. Unlike regular phishing attacks, which are more generalized and target a large number of people, spear phishing is highly targeted and tailored to specific individuals or organizations. Attackers gather personal information about their targets to make their messages appear more legitimate, increasing the chances of success in obtaining confidential information.

    Rate this question:

  • 9. 

    A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom. Which of the following needs to be adjusted on the workstation to fix the issue?

    • A.

      Date and time

    • B.

      UEFI boot mode

    • C.

      Logon times

    • D.

      User access control

    Correct Answer
    A. Date and time
    Explanation
    The technician needs to adjust the date and time on the workstation to fix the issue. This is because an invalid certificate error can occur when the date and time on the workstation are not synchronized with the server's date and time. By ensuring that the date and time are correct, the workstation will be able to establish a secure connection with the website using port 443.

    Rate this question:

  • 10. 

    A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

    • A.

      Internet Options – Advanced

    • B.

      Internet Options – Connections

    • C.

      Internet Options – Security

    • D.

      Internet Options – Content

    • E.

      Internet Options – Privacy

    Correct Answer
    B. Internet Options – Connections
    Explanation
    The technician should use the "Internet Options - Connections" utility to configure the setting. This utility allows the technician to specify the proxy server settings for the Windows workstations.

    Rate this question:

  • 11. 

    Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

    • A.

      2GB

    • B.

      4GB

    • C.

      8GB

    • D.

      16GB

    Correct Answer
    B. 4GB
    Explanation
    A 32-bit version of Windows has a memory limit of 4GB. This is because a 32-bit operating system can only address a maximum of 4GB of memory. However, due to system requirements and memory mapping, the actual usable memory may be slightly less than 4GB.

    Rate this question:

  • 12. 

    A technician is working at a help desk firm and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the BEST choice for the technician to make?

    • A.

      Politely ask the user to call back

    • B.

      Ask another technician to take the call

    • C.

      Troubleshoot the issue for the user

    • D.

      Input the issue as a ticket and escalate to Tier 2

    Correct Answer
    B. Ask another technician to take the call
    Explanation
    The best choice for the technician to make in this situation is to ask another technician to take the call. Since the technician is about to go on a break, it would not be appropriate to troubleshoot the issue for the user or input it as a ticket and escalate to Tier 2. Politely asking the user to call back would also not be the best choice as it may lead to frustration for the user. Therefore, assigning the call to another technician ensures that the user's issue is addressed promptly and efficiently.

    Rate this question:

  • 13. 

    A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

    • A.

      Fingerprint lock

    • B.

      Passcode lock

    • C.

      Swipe lock

    • D.

      PIN lock

    Correct Answer
    A. Fingerprint lock
    Explanation
    The best method of securing the phone in this scenario would be a fingerprint lock. This is because a fingerprint lock provides a higher level of security compared to other options like passcode, swipe, or PIN locks. Since the phone contains valuable customer PII, a fingerprint lock ensures that only authorized individuals with registered fingerprints can access the data, reducing the risk of unauthorized access or data breaches.

    Rate this question:

  • 14. 

    Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Choose two.)

    • A.

      UPS

    • B.

      Server rack

    • C.

      PoE phone

    • D.

      Desktop printer

    • E.

      Modem

    • F.

      Patch panel

    Correct Answer(s)
    A. UPS
    B. Server rack
    Explanation
    UPS and server racks are most likely to have a grounding wire attached to them based on the manufacturer's design. This is because UPS (Uninterruptible Power Supply) devices are used to provide backup power to critical equipment, and server racks are used to house servers and other networking equipment. Both of these devices are typically connected to electrical systems and have the potential to generate or attract electrical currents, making it important to have a grounding wire to prevent electrical shocks or damage to the equipment.

    Rate this question:

  • 15. 

    A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct. Which of the following is MOST likely causing this error?

    • A.

      The computer has GRUB Legacy installed

    • B.

      Windows Startup services are not running

    • C.

      An incompatible partition is marked as active

    • D.

      An unsupported version of Windows is installed

    Correct Answer
    C. An incompatible partition is marked as active
    Explanation
    An incompatible partition being marked as active could cause the error "No OS found" after installing a secondary OS. When a computer boots up, it looks for the active partition to load the operating system. If an incompatible partition is marked as active, the computer will not be able to find a compatible operating system to boot from, resulting in the error message.

    Rate this question:

  • 16. 

    A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

    • A.

      Remove the guest account from the administrators group

    • B.

      Disable single sign-on

    • C.

      Issue a default strong password for all users

    • D.

      Require authentication on wake-up

    Correct Answer
    D. Require authentication on wake-up
    Explanation
    Requiring authentication on wake-up is a password practice that the technician should implement on the PC to secure network access. This means that whenever the PC wakes up from sleep or hibernation mode, the user will be prompted to enter a password before gaining access to the network. This adds an extra layer of security and helps prevent unauthorized access to the network and sensitive data.

    Rate this question:

  • 17. 

    Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares?

    • A.

      An IP conflict is present

    • B.

      A corporate VPN is enabled

    • C.

      A firewall exception must be set

    • D.

      HomeGroup must be enabled

    Correct Answer
    C. A firewall exception must be set
    Explanation
    Joe is unable to access his personal shares on his home media server because a firewall exception must be set. This means that the firewall on Joe's company-issued Windows laptop is blocking the connection to his personal shares. By setting a firewall exception, Joe will allow the necessary network traffic to pass through the firewall and access his personal shares on the home media server.

    Rate this question:

  • 18. 

    A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

    • A.

      Activate real-time protection on both antivirus software programs

    • B.

      Uninstall one antivirus software program and install a different one

    • C.

      Run OS updates

    • D.

      Enable the quarantine feature on both antivirus software programs

    • E.

      Remove the user-installed antivirus software

    Correct Answer
    E. Remove the user-installed antivirus software
    Explanation
    The user installed additional real-time protection antivirus software, which means there are now two antivirus software programs running simultaneously on the laptop. This can cause conflicts and slow down the performance of the system. To resolve the issue and avoid recurrence, the technician should remove the user-installed antivirus software, leaving only one antivirus software program running on the laptop.

    Rate this question:

  • 19. 

    A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance on this computer?

    • A.

      Windows 7

    • B.

      Windows 8

    • C.

      Windows 8.1

    • D.

      Windows 10

    Correct Answer
    A. Windows 7
    Explanation
    Windows 7 would be the best recommendation for this computer because it has lower system requirements compared to the other options. With only 1GB of RAM and 16GB of hard drive space, the computer may struggle to meet the minimum requirements for Windows 8, 8.1, and 10, which typically require more memory and storage space. Windows 7, on the other hand, can run smoothly on this configuration and provide the best performance.

    Rate this question:

  • 20. 

    Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do?

    • A.

      Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot

    • B.

      Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one

    • C.

      Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time

    • D.

      Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved

    Correct Answer
    C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time
    Explanation
    The technician should ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time. This will allow the technician to gather more information about the problem and potentially discover a solution that hasn't been tried yet. By actively engaging with the customer and asking for more details, the technician can work towards resolving the issue more efficiently.

    Rate this question:

  • 21. 

    Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

    • A.

      SSO

    • B.

      Permission propagation

    • C.

      Inheritance

    • D.

      MFA

    Correct Answer
    A. SSO
    Explanation
    SSO, or Single Sign-On, is the security method that allows a user to enter their username and password once, and then gain access to multiple applications without having to re-enter their credentials. This eliminates the need for multiple login prompts, simplifying the user experience and improving efficiency. SSO achieves this by using a centralized authentication system that securely stores and manages user credentials, allowing for seamless authentication across multiple applications.

    Rate this question:

  • 22. 

    A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs in automatically without a password. Which of the following account types would the technician MOST likely set up on this kiosk machine?

    • A.

      Guest

    • B.

      Administrator

    • C.

      Power User

    • D.

      Remote Desktop User

    Correct Answer
    A. Guest
    Explanation
    The technician would most likely set up a Guest account on the kiosk machine. This is because the Guest account is typically used for temporary or limited access, which is suitable for customer interaction in a kiosk. Additionally, the Guest account does not require a password to log in, fulfilling the requirement of automatic login after reboot or power on.

    Rate this question:

  • 23. 

    A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license. Which of the following license types should the technician recommend?

    • A.

      Open license

    • B.

      Personal license

    • C.

      Corporate license

    • D.

      Enterprise license

    Correct Answer
    A. Open license
    Explanation
    An open license would be the most suitable recommendation in this scenario. An open license allows users to freely use, modify, and distribute the software without any cost. This would fulfill the user's requirement of not wanting to pay for a license while still providing antivirus protection for their home PC.

    Rate this question:

  • 24. 

    Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed?

    • A.

      Frequently restore the servers from backup files and test them

    • B.

      Configure the backups to restore to virtual machines for quick recovery

    • C.

      Set up scripts that automatically rerun failed backup jobs

    • D.

      Set up alerts to let administrators know when backups fail

    • E.

      Store copies of the backups off-side in a secure datacenter

    Correct Answer
    D. Set up alerts to let administrators know when backups fail
    Explanation
    Joe can ensure the backups will work if needed by setting up alerts to let administrators know when backups fail. This will allow the IT department to promptly address any issues with the backups and take necessary actions to ensure the data is properly backed up. By being alerted when backups fail, Joe can proactively monitor the backup process and ensure that the data is being successfully backed up on a daily basis.

    Rate this question:

  • 25. 

    A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Choose two.)

    • A.

      Backup testing

    • B.

      Cloud storage

    • C.

      Local storage backups

    • D.

      Data recovery

    • E.

      Hot site

    • F.

      Waterproof devices

    Correct Answer(s)
    B. Cloud storage
    E. Hot site
    Explanation
    The contractor should recommend cloud storage as it provides a secure and off-site location for data storage, ensuring that data is not lost even if the hardware is damaged or destroyed. Additionally, the contractor should suggest a hot site, which is a fully equipped and operational backup facility that can be used in the event of a disaster. This will allow the company to quickly resume operations and minimize downtime.

    Rate this question:

  • 26. 

    A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?

    • A.

      Visit the Microsoft Update website to see if there is an issue with a specific update

    • B.

      Look up the error number associated with the failed update

    • C.

      Look at the system Event Viewer to find more information on the failure

    • D.

      Download the failed update to install manually

    Correct Answer
    B. Look up the error number associated with the failed update
    Explanation
    The technician should first look up the error number associated with the failed update. This will provide more specific information about the cause of the failure and help in troubleshooting the issue. By identifying the error number, the technician can search for solutions or find relevant support articles related to that specific error, which may provide guidance on how to resolve the problem.

    Rate this question:

  • 27. 

    Technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

    • A.

      System

    • B.

      Display

    • C.

      Folder Options

    • D.

      Indexing Options

    Correct Answer
    C. Folder Options
    Explanation
    The technician should use the Folder Options utility to edit a protected .dll file. This utility allows the user to customize how folders are displayed and accessed, including showing hidden files and folders. By enabling the option to show hidden files, the technician will be able to locate and edit the protected .dll file that is not visible in the System32 directory.

    Rate this question:

  • 28. 

    A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?

    • A.

      Enable System Restore and create a restore point so no data is lost

    • B.

      Educate the user about how to avoid malware in the future

    • C.

      Update the antivirus software and run a full system scan

    • D.

      Move the infected system to a lab with no network connectivity

    Correct Answer
    D. Move the infected system to a lab with no network connectivity
  • 29. 

    A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?

    • A.

      Task Manager

    • B.

      MSTSC

    • C.

      MSConfig

    • D.

      PerfMon

    Correct Answer
    A. Task Manager
    Explanation
    The technician can use Task Manager to resolve the issue. Task Manager allows the technician to view and manage the running processes and applications on the laptop. By closing unnecessary applications and processes, the technician can reduce the CPU utilization and improve the laptop's performance.

    Rate this question:

  • 30. 

    A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?

    • A.

      Uninterruptible power supply

    • B.

      Surge protector

    • C.

      Power strip

    • D.

      Power distribution unit

    Correct Answer
    A. Uninterruptible power supply
    Explanation
    An uninterruptible power supply (UPS) is the most suitable solution for preventing file corruption and ensuring a graceful shutdown during extreme weather conditions. A UPS provides battery backup power when the main power source fails, allowing the user to continue working or safely shut down their system. It also protects against power surges and voltage fluctuations, which can cause damage to electronic devices. A surge protector only protects against power surges, while a power strip and power distribution unit do not provide battery backup power.

    Rate this question:

  • 31. 

    A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?

    • A.

      Uninterruptible power supply

    • B.

      Surge protector

    • C.

      Power strip

    • D.

      Power distribution unit

    Correct Answer
    A. Uninterruptible power supply
    Explanation
    An uninterruptible power supply (UPS) is the most suitable solution for preventing file corruption and ensuring a graceful shutdown during extreme weather conditions. A UPS provides backup power in case of a power outage, allowing the user to continue working for a certain period of time, typically at least one hour. It also protects against power surges and fluctuations, which can cause damage to electronic devices. A surge protector only protects against power surges, while a power strip and power distribution unit do not provide any backup power.

    Rate this question:

  • 32. 

    Which of the following installation types would require the use of an answer file to install the OS?

    • A.

      Unattended

    • B.

      Clean

    • C.

      Repair

    • D.

      Upgrade

    Correct Answer
    A. Unattended
    Explanation
    An unattended installation type requires the use of an answer file to install the OS. This file contains pre-defined responses to the installation prompts, allowing the installation process to proceed without user intervention. This type of installation is often used to deploy the OS on multiple computers simultaneously or to automate the installation process, saving time and effort.

    Rate this question:

  • 33. 

    A Mac user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?

    • A.

      Time Machine

    • B.

      Snapshot

    • C.

      System Restore

    • D.

      Boot Camp

    Correct Answer
    A. Time Machine
    Explanation
    Time Machine is a built-in utility on Mac that allows users to back up and restore their data. In this scenario, since the operating system became corrupted and files were deleted due to malware, using Time Machine would be the most appropriate choice. Time Machine creates regular backups of the Mac's files, including the operating system, applications, and user data. By accessing the Time Machine backup, the user can restore their system to a previous state and retrieve the data that was previously stored on the Mac.

    Rate this question:

  • 34. 

    A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

    • A.

      Create a policy to remove Internet access from the server during off hours

    • B.

      Set the local antivirus software on the server to update and scan daily

    • C.

      Ensure the server is patched with the latest security updates

    • D.

      Educate the manager on safe Internet browsing practices

    Correct Answer
    C. Ensure the server is patched with the latest security updates
    Explanation
    The most important step a technician can take to protect against possible infection is to ensure that the server is patched with the latest security updates. Patching the server with the latest security updates helps to address any known vulnerabilities and protect against potential threats and attacks. By keeping the server up to date with the latest patches, the technician can significantly reduce the risk of infection and ensure the server's security.

    Rate this question:

  • 35. 

    A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem. Which of the following should the technician do NEXT?

    • A.

      Reboot the computer

    • B.

      Restart the network services

    • C.

      Roll back the device drivers

    • D.

      Rebuild the Windows profiles

    Correct Answer
    B. Restart the network services
    Explanation
    The technician should restart the network services next. This is because the error message states that Windows Update cannot check for updates because the service is not running, indicating a problem with the network services. Restarting the network services can help resolve the issue and allow the manager to check for updates.

    Rate this question:

  • 36. 

    A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Choose two.)

    • A.

      Administrative share permissions

    • B.

      Mapped drives

    • C.

      Group Policy hours restriction

    • D.

      Denied write/delete permissions

    • E.

      Disabled proxy settings

    Correct Answer(s)
    B. Mapped drives
    D. Denied write/delete permissions
    Explanation
    The most likely reasons for the users being unable to access the shares are mapped drives and denied write/delete permissions. Mapped drives could be causing the issue if the data was moved to a different location and the mapped drive is still pointing to the old location. Denied write/delete permissions could be the cause if the users do not have the necessary permissions to access and modify the shares.

    Rate this question:

  • 37. 

    With which of the following types is a man-in-the-middle attack associated?

    • A.

      Brute force

    • B.

      Spoofing

    • C.

      DDoS

    • D.

      Zero-day

    Correct Answer
    B. Spoofing
    Explanation
    A man-in-the-middle attack is associated with spoofing. In this type of attack, the attacker intercepts communication between two parties and impersonates each party to gain unauthorized access or steal information. The attacker spoofs or impersonates one or both parties involved in the communication, tricking them into believing they are communicating with each other when in fact, the attacker is in control of the communication. This allows the attacker to eavesdrop on the communication, modify the data being transmitted, or even inject malicious code or commands.

    Rate this question:

  • 38. 

    An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

    • A.

      Phishing

    • B.

      Spear phishing

    • C.

      Dumpster diving

    • D.

      Impersonation

    Correct Answer
    C. Dumpster diving
    Explanation
    Dumpster diving refers to the act of searching through trash or recycling bins to obtain sensitive or valuable information. In this scenario, the employee reported a suspicious individual looking through the recycle bin, indicating that someone may be attempting to gather information or assets by physically searching through discarded materials. Therefore, the correct answer is dumpster diving.

    Rate this question:

  • 39. 

    A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem?

    • A.

      Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS

    • B.

      Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings

    • C.

      Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode

    • D.

      Send a test email, open a command prompt to check the file system, and empty the browser cache

    Correct Answer
    B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
    Explanation
    The technician should update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings. This is the next step to resolve the problem because the symptoms described by the SOHO user suggest a potential malware infection. Updating the antivirus software and running a scan will help detect and remove any malware that might be causing the slow performance and internet connectivity issues. Verifying the browser and email settings will ensure that there are no configuration issues contributing to the problem.

    Rate this question:

  • 40. 

    An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

    • A.

      Untrusted software

    • B.

      Outdated antivirus

    • C.

      MDM policies

    • D.

      Inactive VPN

    Correct Answer
    D. Inactive VPN
    Explanation
    The most likely cause of the employee being unable to view in-office network folders while working at home is an inactive VPN. A VPN (Virtual Private Network) is a secure connection that allows remote access to the office network. If the VPN is not active or not properly configured, the employee will not be able to connect to the office network and access the network folders.

    Rate this question:

  • 41. 

    A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician?

    • A.

      Process diagram

    • B.

      Physical network diagram

    • C.

      Fiber backbone diagram

    • D.

      Logical topology diagram

    Correct Answer
    B. Physical network diagram
    Explanation
    The network administrator most likely gave the technician a physical network diagram. This document would provide a visual representation of the physical layout of the network, including the switchports that need to be patched in for the upgrade. It would show the connections between devices, such as switches, routers, and servers, and provide information on the physical location of each device. This diagram would be essential for the technician to accurately and efficiently complete the network upgrade.

    Rate this question:

  • 42. 

    After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

    • A.

      Grupdate

    • B.

      Diskpart

    • C.

      Gpresult

    • D.

      Net use

    Correct Answer
    A. Grupdate
    Explanation
    The technician should use the "grupdate" command-line tool to apply the new policy. This tool is commonly used to update Group Policy settings on a Windows computer. By running the "grupdate" command, the technician can ensure that the new policy denying access to removable hard drives is applied to the network users.

    Rate this question:

  • 43. 

    A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Choose two.)

    • A.

      Spyware

    • B.

      Zombies

    • C.

      Virus

    • D.

      Ransomware

    • E.

      Worm

    • F.

      Botnet

    Correct Answer(s)
    B. Zombies
    E. Worm
    Explanation
    The PCs are most likely infected with Zombies and Worms. A Zombie is a type of malware that allows an attacker to remotely control an infected computer. In this case, the PCs are sending out traffic as part of a DDoS attack, indicating that they are being controlled by an external source. A Worm is a self-replicating malware that spreads across a network, infecting other computers. Since multiple internal PCs are involved in the attack, it suggests that a worm has infected these machines and is using them to propagate the attack.

    Rate this question:

  • 44. 

    Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client. Which of the following settings or features is responsible for the problems Ann is experiencing?

    • A.

      Full device encryption

    • B.

      Account lock

    • C.

      Multifactor authentication

    • D.

      Strong password requirements

    Correct Answer
    C. Multifactor authentication
    Explanation
    The reason for Ann's problem is multifactor authentication. Multifactor authentication adds an extra layer of security by requiring users to provide multiple forms of identification, such as a password and a verification code sent to their phone. In this case, when Ann reset her email password, she only changed the password and did not update the authentication method in the third-party email client. Therefore, the client still expects the old authentication method and rejects the new credentials, causing the error message.

    Rate this question:

  • 45. 

    Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair?

    • A.

      End-user education

    • B.

      Pre-installation environment cleaning

    • C.

      Disabling of System Restore

    • D.

      Infected system quarantine

    Correct Answer
    A. End-user education
    Explanation
    The technician should have covered end-user education as part of the original repair. End-user education involves providing the user with information and guidance on how to prevent future virus infections, how to identify potential threats, and how to safely use the computer to avoid malware. By educating the user, the technician can help them understand the importance of practicing safe browsing habits, regularly updating antivirus software, and avoiding suspicious downloads or email attachments. This knowledge would have helped Joe prevent the recurrence of symptoms and protect his computer from further infections.

    Rate this question:

  • 46. 

    In which of the following file extension types would a user expect to see the command. “net use T:\\server\files”?

    • A.

      .bat

    • B.

      Vbs

    • C.

      .js

    • D.

      .py

    Correct Answer
    A. .bat
    Explanation
    The correct answer is .bat. A .bat file is a batch file that contains a series of commands that are executed in sequence when the file is run. In this case, the command "net use T:\\server\files" is a command to map a network drive to the letter T, connecting to a server and accessing the files. Therefore, a user would expect to see this command in a .bat file.

    Rate this question:

  • 47. 

    A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future?

    • A.

      System memory

    • B.

      Surge protector

    • C.

      Hard drives

    • D.

      Battery backup

    Correct Answer
    D. Battery backup
    Explanation
    Based on the given information, the technician notices missing time slots in the event log, which suggests that there may have been power outages or interruptions. Since the server is experiencing errors and some files are not opening, it is likely that these issues are caused by power fluctuations. Therefore, the technician should replace the battery backup to prevent these issues in the future. The battery backup provides uninterrupted power supply during power outages, ensuring that the server continues to operate smoothly and preventing data loss or corruption.

    Rate this question:

  • 48. 

    Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

    • A.

      Put on an ESD strap

    • B.

      Place components on an ESD mat

    • C.

      Disconnect the power before servicing the PC

    • D.

      Place the PC on a grounded work bench

    Correct Answer
    C. Disconnect the power before servicing the PC
    Explanation
    To prevent an electrical hazard when repairing a PC, the technician should first disconnect the power before servicing the PC. This is crucial to ensure that there is no electrical current flowing through the components, reducing the risk of electric shock or damage to the equipment. By disconnecting the power, the technician can safely work on the PC without the danger of electrical hazards. Once the power is disconnected, the technician can then proceed with other safety measures such as putting on an ESD strap, placing components on an ESD mat, or placing the PC on a grounded workbench.

    Rate this question:

  • 49. 

    Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed?

    • A.

      NTLDR not found

    • B.

      No boot device available

    • C.

      Operating system not found

    • D.

      BIOS ROM checksum error

    Correct Answer
    B. No boot device available
    Explanation
    The message "No boot device available" will be displayed. This indicates that the computer is unable to find a device from which to boot the operating system. Since the technician has confirmed that the memory, power supply, and monitor are working, and the hard drive is not recognized during the internal diagnostics, it suggests that there may be an issue with the hard drive or its connection to the computer.

    Rate this question:

  • 50. 

    Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure. Which of the following should the help desk perform to fix the issue?

    • A.

      Remote into Ann’s system and restart the wireless adapter

    • B.

      Ask Ann to open a browser and watch for a redirect page

    • C.

      Advice Ann to plug an Ethernet cable into her laptop

    • D.

      Direct Ann to run an antivirus program on her laptop

    Correct Answer
    B. Ask Ann to open a browser and watch for a redirect page
    Explanation
    The help desk should ask Ann to open a browser and watch for a redirect page. This is because the wireless network she is connecting to appears as unsecure, which suggests that it may require a redirect page to authenticate or accept terms and conditions before accessing the internet. By asking Ann to open a browser and watch for a redirect page, the help desk can ensure that she successfully connects to the network and is able to retrieve her corporate email.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 20, 2021
    Quiz Created by
    Alfredhook3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.