暗記メーカー
ログイン
Test 2
  • Tom Morgan

  • 問題数 48 • 4/18/2024

    記憶度

    完璧

    7

    覚えた

    18

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    You are troubleshooting audio problems on Windows 10. The user is in a conference call using a third-party VoIP application. Other users on that call cannot hear them. The USB microphone is connected to a powered hub. You used a different app to verify that the mic is working. What should you do to resolve the problem?

    Enable the microphone under Windows Privacy settings to allow desktop apps to use it.

  • 2

    You are troubleshooting a Windows 10 machine. It loads certain programs during startup that cause the boot time to be excessive. What can you do to selectively prevent certain programs from loading?

    Open the Startup tab and methodically disable items one by one. Reboot after each to see if the problem has been resolved

  • 3

    You connect a Windows 10 laptop to a docking station with external monitors. You would like to close the laptop when it is docked but it goes to sleep when it is closed. How can you fix this?

    In Control Panel Power Options, click Choose what closing the lid does, select When I close the lid, under Plugged in, select Do nothing.

  • 4

    You are trying to format a USB drive so you can transfer 20 GB of data from a Linux computer to a Windows computer. Which file system are you most likely to use?

    NTFS

  • 5

    True or False? A standard user account can install applications in Windows.

    False

  • 6

    Which Linux command is used to install an application?

    yum

  • 7

    How do you force quit an application in macOS?

    Open the Apple icon menu, select Force Quit, select the frozen application in the list, and click Force Quit.

  • 8

    Which of the following file extensions are commonly used to install applications on a macOS machine? (Choose three.)

    .dmg, .app, .pkg

  • 9

    You are preparing an existing Windows 10 laptop for a new employee to use. What can you do to refresh the laptop?

    a clean install

  • 10

    As part of your company’s Choose-Your-Own-Device (CYOD) policy, you need to configure each user’s Windows device to require a password when resuming from sleep or inactivity. Where can you find the settings?

    setting screensaver

  • 11

    You just installed Windows 10 on a PC that has 16 GB of RAM. You notice that Windows is only using 4 GB of that RAM. What is the problem?

    The newly installed OS is x86.

  • 12

    Which of the following operating systems provides a lightweight option for workstations that need an easy-to-use browser-based interface?

    ChromeOS

  • 13

    You have a new application you need to install. The app requires a quad-core processor, 250 GB of hard drive space, 6 GB of RAM, and touchscreens. You want to upgrade from 32-bit Windows to a 64-bit OS. After the upgrade, which of the following will you be able to fully take advantage of?

    RAM

  • 14

    You need to transfer a large number of files over an unreliable connection. You want to be able to resume the process if the connection is interrupted. Which tool should you use?

    robocopy

  • 15

    You trying to set up a fingerprint reader on a Windows 10 laptop. The laptop has the necessary hardware and is joined to a domain. Group policy requires Windows Hello on all computers in the environment. How do you set up Windows Hello fingerprint on this laptop?

    in Windows 10 Settings, select Accounts Sign in options. Select Windows Hello fingerprint. Have the user place their fingerprint on the reader repeatedly until Windows indicates setup is complete.

  • 16

    What should you implement to prevent users from enabling virtual technology on their laptops?

    UEFI PASSWORD

  • 17

    You are trying to run a script named inventory.py. You get an error message saying "how do you want to open this file?". What is the most likely reason the script is not running?

    The runtime environment is not installed.

  • 18

    You are installing new network equipment in a small office. You want to make sure the equipment is secured against external Internet threats. What should you do first?

    Change the default administrator password.

  • 19

    You're unable to access a website. You have confirmed that the website is online. Which of the following would most likely resolve the problem?

    Clearing the cache.

  • 20

    Your client has a 10-year-old SOHO wireless router. You want to configure it for the most secure wireless network possible. What would you choose?

    WPA2 with AES

  • 21

    You are unable to join a Windows 10 laptop to a domain. What is the most likely reason for this problem?

    The laptop has Windows 10 Home installed.

  • 22

    You are deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in addition to the user's existing username and password. How does this improve network security?

    Wi-Fi will be forced to use MFA.

  • 23

    What will a EULA most likely address?

    Restrictions of use

  • 24

    You apply a Group Policy setting to all of the workstations in your network. The setting forces the workstations to use a specific SNTP server. Now users are unable to log in. What is the most likely cause of this problem?

    The workstations and the authentication server have a system clock difference.

  • 25

    After installing a new SOHO router, customers are unable to access the company-hosted public website what can you implement to allow customers to access the website?

    Port forwarding

  • 26

    You have a small office. A user on one computer needs to be able to access files on another computer. How can you enable this?

    Configure the network as private.

  • 27

    A user reports seeing random, seemingly non-malicious advertisements popping up in Windows. The Windows Action Center notifications indicate that the ads are coming from a web browser. What is the best way to eliminate this problem?

    Disable the browser from sending notifications to the Action Center.

  • 28

    You have a call center that handles inquiries into billing issues for multiple medical facilities. You notice the call center agents often walk away from their workstations, leaving patient data visible for anyone to see. What can you do to prevent data theft within the call center?

    Lock the workstations after five minutes of inactivity.

  • 29

    You have a user who wants to upgrade their computer aided design (CAD) software to the newest version. This version forces storage of backups of all files to the software's cloud server. What would most likely concern you as an IT manager?

    Extra technician hours must be budgeted during installation of updates.

  • 30

    You just moved into a new building. Your new ISP requires a new router to be installed. Internet service has been set up and confirmed to be functional. What is the first thing you should do after installing all relevant cabling and hardware?

    Change the default passwords on new network devices.

  • 31

    You have a user in a corporate office who cannot seem to connect to any network drives. No one else has this problem. What is the most likely cause?

    A login script failed.

  • 32

    A company has a regulatory requirement to retain PII for many years. What backup method would best meet this requirement?

    A full backup of the data that is stored off-site in cold storage.

  • 33

    You have a user that often needs to leave their workstation for several minutes at a time. How can you secure that workstation quickly when they walk away?

    Configure a screensaver lock to lock the computer automatically after approximately 30 minutes of inactivity.

  • 34

    You want to minimize the risk of data theft from stolen laptops. You also want to allow users to use their laptops when not on the network. What should you implement?

    BitLocker

  • 35

    You are trying to help a client find a way to securely transfer sensitive personal information between offices. They currently use USB drives. The users are resistant to change. Their compliance officer states that all media at rest must be encrypted. What is the best way to help them secure their data?

    Enable BitLocker To Go with a password that meets corporate requirements.

  • 36

    You have just upgraded several desktop PCs. The old hard drives originally contained PII. What is the best method to dispose of the old drives?

    degaussing

  • 37

    A user just called to say all the files in their documents folder seem to have been changed. They now all have a .lock file extension. What is the first thing you should do?

    Disconnect the affected machine from the network.

  • 38

    You have a workstation in a SOHO environment that is running above normal performance baselines. You discover an unknown executable with a strange name composed of a string of random characters running on the system. You terminate the process, and the system returns to normal operation. You think the problem was caused by an infected file, but antivirus does not detect any threats. You are concerned that other machines may be infected with the same virus. What is the most effective way to check the other machines on the network for this unknown threat?

    Manually check each machine.

  • 39

    You need to remove a root kit from a PC. What would work best to resolve this problem?

    file restore

  • 40

    You have a PC that seems to be running more slowly than usual. You check system resources, but CPU, disk and memory usage seem to be fine. You see that the GPU temperature is extremely high. What type of malware is most likely to blame?

    crypto miner

  • 41

    You have a Windows workstation that frequently experiences malware symptoms. You have tried to roll back the System State several times but the malware persists. What can you do to resolve the issue?

    Re-image the workstation.

  • 42

    A user clicked a link for a free gift card and now their computer is acting strange. What do you tell them to do first?

    Unplug the computer's Ethernet cable.

  • 43

    An Android user reports that when they try to open the company’s proprietary mobile app, it immediately closes. They still have the problem even after rebooting the phone. The app contains critical information that cannot be lost. What should you try first to resolve the problem?

    Clear the application cache.

  • 44

    A user rotates their cell phone horizontally to try to read emails but the display remains vertical, even though the settings indicate auto rotate is on. What can you do to resolve the issue?

    Recalibrate the accelerometer.

  • 45

    You have an Android phone that failed to complete a tethered OS update. There don't seem to be any error messages on the device. What should you do next?

    Determine if the device has adequate storage available.

  • 46

    The help desk is having a difficult time managing the volume of requests. What is the best solution for addressing this problem?

    Implement a support portal.

  • 47

    You have a situation in which security software was accidentally uninstalled from all servers in your data center. You have found out that you will need to fill out a change request to have the same version software be reinstalled. Why would you want to follow the change management process in this scenario?

    A rollback plan can be implemented in case the software breaks and application.

  • 48

    Which of the following is the most important environmental concern inside a data center?

    humidity levels