1.
A user reports unexpected icons appearing on the desktop. The technician identifies that the symptoms point to a malware infection. Which of the following procedures would be performed NEXT?
Correct Answer
A. Quarantine infected system
Explanation
The next step after identifying a malware infection would be to quarantine the infected system. This involves isolating the infected system from the network and other devices to prevent the malware from spreading further. Quarantining the system also allows for further analysis and investigation to determine the extent of the infection and the necessary steps to remove the malware. It is an important step in containing and mitigating the effects of the malware on the network and other systems.
2.
A user updates the video driver on the computer and it requests a restart after installation. The computer never gets past the loading Windows page without rebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs?
Correct Answer
C. System Recovery
Explanation
The technician should use System Recovery to resolve the issue without losing any vital files or programs. System Recovery allows the computer to revert back to a previous state before the video driver update, which may be causing the issue. This will restore the computer's settings and configuration to a working state without affecting any files or programs.
3.
A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT?
Correct Answer
D. Research the DLL file to identify the application it corresponds to before continuing
Explanation
Researching the DLL file to identify the application it corresponds to before continuing is the best course of action because it will help the technician understand which application is causing the issue and find the appropriate solution. Simply copying the DLL file from a working PC and using the regsvr32 command may not solve the underlying problem. Running the Windows Update utility may not reinstall the specific DLL file needed. Running the defrag utility is unlikely to fix the issue related to a missing DLL file. Therefore, researching the DLL file is the most logical next step.
4.
A user, Ann, receives a phone call from the company’s mail administrator who indicates her email account has been disabled due to high volumes of emails being sent in a very short period of time. Which of the following types of attack has the user experienced?
Correct Answer
A. Virus infection
Explanation
The user has experienced a virus infection. This is indicated by the fact that her email account was disabled due to high volumes of emails being sent in a very short period of time. A virus can infect a user's computer and cause it to send out large amounts of spam emails without the user's knowledge or consent. This can result in the user's email account being disabled by the company's mail administrator to prevent further damage or inconvenience.
5.
A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. Which of the following is the BEST step the user can take to fix this problem?
Correct Answer
B. Reset to factory default
Explanation
Performing a soft reset is a basic troubleshooting step to fix minor issues with a mobile phone. However, since the problem still persists after performing a soft reset, the best step the user can take is to reset the phone to factory default. This will restore the phone to its original settings, removing any software glitches or conflicts that may be causing the slow and erratic response. It is important to note that resetting to factory default will erase all data and settings on the phone, so it is advisable to backup important data before proceeding with this step.
6.
A user reports browsing the Internet is slow and an icon with a picture of a person with a headset keeps asking them to “click here for help.” The user has clicked on the icon to try to resolve the slowness but all that happens is the computer redirects them to a website to purchase software. Which of the following should be performed FIRST to resolve the issue?
Correct Answer
D. Identify the type of malware
Explanation
The user's computer is likely infected with malware, which is causing the slow internet browsing and the redirection to a website to purchase software. By identifying the type of malware, the appropriate steps can be taken to remove it from the computer and resolve the issue.
7.
A technician receives a call regarding a PC’s slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT?
Correct Answer
C. Run chkdsk with the /r switch and reboot the PC
Explanation
The technician should run chkdsk with the /r switch and reboot the PC. The error messages in the event viewer indicating a corrupt file system suggest that there may be issues with the hard drive. Running chkdsk with the /r switch will scan for and repair any errors on the hard drive. Rebooting the PC after running chkdsk will ensure that any repaired files are properly loaded. This is the appropriate next step to address the slow performance and file system corruption.
8.
A technician has just fixed a user’s PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do?
Correct Answer
A. Educate the user regarding Internet browsing best practices
Explanation
After successfully removing the virus and malware from the user's PC, the technician should prioritize educating the user regarding Internet browsing best practices. This is important because it will help the user understand how to avoid future infections and maintain a secure browsing experience. By providing the user with knowledge about safe browsing habits, such as avoiding suspicious websites and not clicking on unknown links or attachments, the technician can empower the user to take proactive measures in preventing future virus and malware infections.
9.
Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction. The WiFi icon is displaying that it has connectivity but she is still unable to browse. Which of the following could be the issue?
Correct Answer
A. PRAM needs to be reset
Explanation
The PRAM (Parameter Random Access Memory) stores various settings on a Mac, including network settings. Resetting the PRAM can help resolve issues related to network connectivity. In this case, Ann's iPhone is experiencing WiFi connectivity problems after installing an update. Resetting the PRAM can potentially resolve any network settings conflicts caused by the update, allowing the WiFi to function properly again.
10.
Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device. He now notices the battery is rapidly draining. Which of the following can Joe MOST likely do to resolve the issue without a loss of data?
Correct Answer
D. Readjust the location settings
Explanation
Joe can most likely resolve the issue of rapid battery draining by readjusting the location settings on his mobile device. This is because the GPS function uses a significant amount of battery power, and readjusting the location settings can help optimize the GPS usage and reduce battery consumption. By doing so, Joe can resolve the issue without losing any data.
11.
Joe, a user, has connected a tablet to his personal mobile hotspot device in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO).
Correct Answer(s)
A. Change the SSID to a different broadcast name
B. Add the intruding device to a blocked access list
Explanation
Joe can prevent unauthorized access to the device immediately by changing the SSID to a different broadcast name. This will make it difficult for the intruder to connect to the device. Additionally, he can add the intruding device to a blocked access list, which will prevent it from connecting to the device in the future. These actions will help ensure the security of Joe's personal mobile hotspot device and prevent unauthorized access.
12.
Ann, a customer, reports that when she occasionally works in the office basement, her smartphone battery drains faster than normal and she has poor cellular reception. Which of the following is the reason for the fast battery drain?
Correct Answer
B. Weak signal
Explanation
The reason for the fast battery drain is a weak signal. When Ann is in the office basement, her smartphone is likely struggling to maintain a strong connection with the cellular network. As a result, the phone has to work harder to search for and maintain a signal, which drains the battery faster. Additionally, the weak signal also affects the cellular reception, resulting in poor network connectivity.
13.
A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take?
Correct Answer
E. Test the theory to determine cause
Explanation
The technician should test the theory to determine the cause. This step involves conducting tests or experiments to confirm whether the failed NIC is indeed the cause of the computer issue. By testing the theory, the technician can gather more evidence and data to support their hypothesis and make an informed decision on how to proceed with resolving the problem.
14.
Which of the following is the BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment?
Correct Answer
B. Enterprise license
Explanation
The BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment is an Enterprise license. This type of license is specifically designed for organizations and allows them to use the software across multiple users and devices within their corporate network. It typically includes additional features and benefits, such as centralized management and support for large-scale deployments, making it the most suitable option for commercial software in a corporate environment.
15.
In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed FIRST?
Correct Answer
D. Disconnect power
Explanation
The first safety step that should be performed when installing additional memory modules in a computer is to disconnect the power. This is important to prevent any electrical shocks or damage to the computer components. By disconnecting the power, the technician ensures that there is no electricity flowing through the system, reducing the risk of accidents or damage. Once the power is disconnected, the technician can safely proceed with the installation process without any potential hazards.
16.
Which of the following explains why it is important to secure Personally Identifiable Information (PII)?
Correct Answer
D. So sensitive information, such as social security numbers, is not stolen.
Explanation
Securing Personally Identifiable Information (PII) is important to prevent sensitive information, such as social security numbers, from being stolen. PII includes any data that can be used to identify an individual, and if it falls into the wrong hands, it can lead to identity theft and financial fraud. Protecting PII ensures the privacy and security of individuals, preventing potential harm and financial loss.
17.
A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician?
Correct Answer
D. Acknowledge the customer’s input, but follow another course of action.
Explanation
The technician should acknowledge the customer's input to show respect and empathy, but should also follow another course of action since they know from the description that the problem is not hardware related. By doing so, the technician can effectively address the issue and provide a solution that is more appropriate and relevant to the actual problem.
18.
A customer has made several trouble calls to the help desk and is very irate. The technician that receives the call has learned that the issue has not yet been resolved. The technician politely asks the customer to explain the issue, and learns that the problem needs to be escalated. Which of the following should the technician do once the problem has been escalated?
Correct Answer
A. Communicate status with customer and ensure successful call transfer
Explanation
Once the problem has been escalated, the technician should communicate the status with the customer and ensure a successful call transfer. This is important to keep the customer updated about the progress of their issue and to ensure that their call is transferred to the appropriate person or department who can resolve the problem. By doing so, the technician is providing good customer service and ensuring that the customer's issue is being addressed effectively.
19.
A customer is reporting a burning smell coming from a CRT monitor. Which of the following should be taken into consideration before attempting to resolve the customer’s issue?
Correct Answer
B. CRT monitors should be serviced by qualified personnel
Explanation
Before attempting to resolve the customer's issue of a burning smell coming from a CRT monitor, it is important to consider that CRT monitors should be serviced by qualified personnel. This implies that the issue may require technical expertise and specialized knowledge to diagnose and fix. It is crucial to avoid attempting any repairs or inspections without the necessary qualifications to ensure the safety of both the customer and the equipment.
20.
A technician has purchased a new surge protector to protect equipment in the production environment. The surge protector’s features safeguard the connected equipment by directing surges to the:
Correct Answer
D. Path of least resistance
Explanation
The surge protector's features are designed to direct surges to the path of least resistance. This means that when a surge occurs, the surge protector will provide a low-resistance pathway for the excess electrical energy to flow, effectively diverting it away from the connected equipment. By doing so, the surge protector helps to protect the equipment from potential damage caused by voltage spikes or surges.
21.
A new help desk technician receives a trouble call from a user. The issue is something the technician has never encountered before, and does not know where to begin troubleshooting. The FIRST course of action is for the technician to:
Correct Answer
B. Ask the customer if they would mind holding for no more than two minutes to check resources.
Explanation
The first course of action for the technician should be to ask the customer if they would mind holding for no more than two minutes to check resources. This is because the technician is unfamiliar with the issue and needs time to gather information and resources to effectively troubleshoot the problem. By asking the customer to hold, the technician can ensure that they have the necessary tools and knowledge to address the issue properly.
22.
A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the following should the computer technician do before connecting a cable TV line to a TV tuner card?
Correct Answer
B. Unplug the computer power cable
Explanation
The technician should unplug the computer power cable before connecting a cable TV line to a TV tuner card in order to prevent any potential damage or electrical shock. This is because a properly grounded electrical system is essential for the safe operation of electronic devices, and if the electrical system is not properly grounded, there is a risk of electrical surges or other issues that could harm the computer or the technician. By unplugging the power cable, the technician ensures that there is no power flowing through the computer and eliminates the risk of electrical damage.
23.
When dealing with a difficult customer, which of the following is the BEST way to handle the situation?
Correct Answer
A. Do not argue with the customer and/or be defensive
Explanation
When dealing with a difficult customer, it is important to avoid arguing or being defensive. Engaging in an argument or becoming defensive can escalate the situation further and worsen the customer's experience. Instead, it is best to remain calm and composed, listen attentively to the customer's concerns, and demonstrate empathy towards their issue. This approach can help in de-escalating the situation and finding a resolution that satisfies the customer.
24.
A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part?
Correct Answer
B. Self ground and handle the new card by the edges.
Explanation
To prevent damaging the new video card, the technician should self ground and handle the new card by the edges. This is because static electricity can easily damage sensitive electronic components, such as the video card. By self grounding, the technician ensures that any static electricity is discharged from their body before handling the card. Handling the card by the edges further minimizes the risk of static electricity transfer to the card. Grounding the computer, placing it on an ESD mat, or attaching an ESD strap to the new card are also good safety procedures, but they are not specifically mentioned in the given explanation.
25.
A technician opens a customer’s computer and sees large amounts of accumulated dust. Which of the following is the BEST method of removing the dust from the computer?
Correct Answer
A. Use compressed air to free the dust from the components and remove it with an ESD vacuum
Explanation
The best method of removing dust from a computer is to use compressed air to free the dust from the components and then remove it with an ESD vacuum. This method ensures that the dust is effectively removed without causing any damage to the sensitive electronic components. Using an ESD vacuum also helps to prevent any static electricity buildup, which can be harmful to the computer.
26.
A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair?
Correct Answer
D. The technician should remove jewelry
Explanation
The technician should remove jewelry because working on electronic devices, especially when replacing components like a power supply, can pose a risk of electrical shock. Removing jewelry reduces the chances of accidental contact with electrical components and helps ensure the technician's safety while performing the repair.
27.
A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the user has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform?
Correct Answer
A. Secure the workstation in a limited access facility
Explanation
The next best step for the incident response technician would be to secure the workstation in a limited access facility. This step is important to prevent further unauthorized access or tampering with the evidence. By securing the workstation in a limited access facility, the technician can ensure that only authorized personnel can access the workstation and investigate the incident further, preserving the integrity of the evidence. This step also helps to protect any sensitive information or data on the workstation from being compromised.
28.
A customer is experiencing issues with email and calls the help desk. The technician determines it would help clarify the issue if the customer agrees to share their desktop. Prior to establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to:
Correct Answer
A. Close any items of a personal nature
Explanation
Before establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to close any items of a personal nature. This is important to ensure the privacy and security of the customer's personal information. By closing any personal items, the customer can prevent the technician from accessing or viewing any sensitive or confidential data on their desktop during the remote session.
29.
A user calls the help desk because a folder containing critical business files is missing from the local drive. The user is adamant that the folder was there the previous day, and cannot understand why it is gone. The technician views the properties of the parent folder and sees a back up listed on the “Prior Versions” tab. According to the theory of troubleshooting, which of the following is the technician’s NEXT step?
Correct Answer
A. Establish a theory of probable cause
Explanation
The technician's next step would be to establish a theory of probable cause. This means that they need to analyze the situation and come up with a hypothesis or a possible explanation for why the folder is missing. By considering factors such as recent changes to the system, potential user error, or technical issues, the technician can narrow down the possible causes and determine the most likely explanation for the problem. This will help guide their subsequent actions in resolving the issue.
30.
A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue?
Correct Answer
A. The PC’s Windows firewall is misconfigured
Explanation
The most likely cause of the issue is that the PC's Windows firewall is misconfigured. The firewall may be blocking the connection to the antivirus server, while still allowing connections to other file servers and printers. By adjusting the firewall settings to allow connections to the antivirus server, the issue should be resolved.