Topic 5: Exam Pool E
A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?
A. Delete the browser cookies and history.
B. Reset all browser settings.
C. Change the browser default search engine.
D. Install a trusted browser.
Explanation: The customer’s web browser is likely infected by a browser hijacker, which is a type of malware that changes the browser’s settings and redirects the user to malicious websites. A browser hijacker can also steal the user’s personal data, display unwanted ads, and install more malware on the device. To remove a browser hijacker, the user should first uninstall the browser from the Control Panel, then scan the device with an antivirus or anti- malware program, and finally install a trusted browser from a legitimate source. Deleting the browser cookies and history, resetting the browser settings, or changing the browser default search engine may not be enough to get rid of the browser hijacker, as it may have embedded itself into the system or other browser components.
A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?
A. Run sfc / scannow on the drive as the administrator
B. Run clearnmgr on the drive as the administrator
C. Run chkdsk on the drive as the administrator
D. Run dfrgui on the drive as the administrator.
Explanation:
The technician should verify bad sectors on the user’s computer by running chkdsk on the
drive as the administrator. Chkdsk (check disk) is a command-line utility that detects and
repairs disk errors, including bad sectors. It runs a scan of the disk and displays any errors
that are found.
A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?
A. Isolate the machine from the network.
B. Scan the system for hidden files.
C. Disable unused ports.
D. Install antivirus software.
E. Reconfigure the firewall.
Explanation: Isolating the machine from the network is a good practice when troubleshooting a PC that is suspected of being infected with malware. This can prevent the malware from spreading to other devices on the network or communicating with external servers that may control or exploit the malware. Isolating the machine can be done by disconnecting the network cable, disabling the wireless adapter, or blocking the network traffic with a firewall.
Which of the following operating systems would most likely be used to run the inventory management system at a factory?
A. Windows
B. Chrome OS
C. Android
D. iOS
Applications on a computer are not updating, which is preventing the user from opening certain files. Which of the following MMC snap-ins should the technician launch next to continue troubleshooting the issue?
A. gpedit.msc
B. perfmon.msc
C. devmgmt.msc
Explanation: devmgmt.msc is the MMC snap-in that opens the Device Manager, a tool that allows the technician to view and manage the hardware devices and their drivers on the computer1. If the applications are not updating properly, it could be due to outdated, corrupted, or incompatible drivers that prevent the hardware from functioning normally. The technician can use the Device Manager to update, uninstall, rollback, or disable the drivers, as well as scan for hardware changes, troubleshoot problems, and view device properties2. gpedit.msc is the MMC snap-in that opens the Group Policy Editor, a tool that allows the technician to configure the local or domain group policy settings for the computer or a group of computers3. Group policy settings can affect the security, performance, and functionality of the system, but they are not directly related to the application updates or the hardware drivers. perfmon.msc is the MMC snap-in that opens the Performance Monitor, a tool that allows the technician to monitor and analyze the performance of the system and its components, such as processor, memory, disk, network, etc4. Performance Monitor can display real- time data or collect log data for later analysis, as well as generate reports and alerts based on the performance counters5. Performance Monitor can help the technician identify and diagnose performance issues, but it does not provide a way to manage the hardware drivers.
Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work
the tickets in your helpdesk ticket queue.
Click on individual tickers to see the ticket details. View attachments to determine the
problem.
Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST
efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper
command or verification to remediate or confirm your fix of the issue from the Verify
Resolve drop-down menu.
A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next? Run an antivirus and enable encryption.
A. Restore the defaults and reimage the corporate OS.
B. Back up the files and do a system restore.
C. Undo the jailbreak and enable an antivirus.
Explanation:
The best course of action for the technician is to restore the defaults and reimage the corporate OS on the device. This will remove the jailbreak and any unauthorized or malicious apps that may have been installed on the device, as well as restore the security features and policies that the company has set for its devices. This will also ensure that the device can receive the latest updates and patches from the manufacturer and the company, and prevent any data leakage or compromise from the device.
Jailbreaking is a process of bypassing the built-in security features of a device to install software other than what the manufacturer has made available for that
device1. Jailbreaking allows the device owner to gain full access to the root of the operating system and access all the features1. However, jailbreaking also exposes the device to various risks, such as:
The loss of warranty from the device manufacturers2.
Inability to update software until a jailbroken version becomes available2. Increased security vulnerabilities32.
Decreased battery life2. Increased volatility of the device2.
Some of the signs of a jailbroken device are:
A high number of ads, which may indicate the presence of adware or spyware on the device3.
Receiving data-usage limit notifications, which may indicate the device is sending or receiving data in the background without the user’s knowledge or consent3.
Experiencing slow response, which may indicate the device is running unauthorized or malicious apps that consume resources or interfere with the normal functioning of the device3.
Finding apps or icons that the user did not install or recognize, such as Cydia, which is a storefront for jailbroken iOS devices1.
The other options are not sufficient or appropriate for dealing with a jailbroken device. Running an antivirus and enabling encryption may not detect or remove all the threats or vulnerabilities that the jailbreak has introduced, and may not restore the device to its original state or functionality. Backing up the files and doing a system restore may not erase the jailbreak or the unauthorized apps, and may also backup the infected or compromised files. Undoing the jailbreak and enabling an antivirus may not be possible or effective, as the jailbreak may prevent the device from updating or installing security software, and may also leave traces of the jailbreak or the unauthorized apps on the device.
A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue? msconfig
A. chkdsk
B. sfc
C. diskpart
D. mstsc
A help desk technician needs to remotely access and control a customer's Windows PC by using a secure session that allows the technician the same control as the customer. Which of the following tools provides this type of access?
A. FTP
B. RDP
C. SSH
D. VNC
A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?
A. MSRA
B. VNC
C. VPN
D. SSH
Explanation:
A technician needs to interconnect two offices to the main branch while complying with
good practices and security standards. The technician should implement VPN
Page 5 out of 74 Pages |
Previous |