Topic 5: Exam Pool E
A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?
A. Ask the user for the model number of the hardware.
B. Offer a temporary replacement device to the user.
C. Submit the issue to the manufacturer.
D. Remotely install updates to the device driver.
Explanation: The first step in troubleshooting a hardware issue is to identify the hardware device that is causing the problem. Asking the user for the model number of the hardware can help the help desk technician to find the specifications, manuals, drivers, and other relevant information for the device. This can also help the technician to determine if the device is compatible with the user’s system, if it has any known issues or defects, and if it is covered by warranty or support contract. Asking the user for the model number of the hardware is a help desk best practice that can save time and effort in resolving the issue
Upon downloading a new ISO, an administrator is presented with the following string:
59d15a16ce90cBcc97fa7c211b767aB
Which of the following BEST describes the purpose of this string?
A. XSS verification
B. AES-256 verification
C. Hash verification
D. Digital signature verification
Explanation:
Hash verification is a process that verifies the integrity of a file by comparing the hash value
of the downloaded file to the hash value provided by the source1.
Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware?
A. Run System Restore.
B. Place in recovery mode.
C. Schedule a scan.
D. Restart the PC.
Explanation: Recovery mode is a special boot option that allows the user to access advanced tools and features to troubleshoot and remove malware from the device. Recovery mode can also restore the system to a previous state or reset the device to factory settings. Running System Restore, scheduling a scan, or restarting the PC may not be effective in removing the malware, as it may still be active or hidden in the system files.
A user reports a computer is running slow. Which of the following tools will help a technician identity the issued.
A. Disk Cleanup
B. Group Policy Editor
C. Disk Management
D. Resource Monitor
Explanation:
Resource Monitor will help a technician identify the issue when a user reports a computer
is running slow1.
Which of the following operating systems is most commonly used in embedded systems?
A. Chrome OS
B. macOS
C. Windows
D. Linux
Explanation: Linux is the most commonly used operating system in embedded systems because it is open source, free, customizable, and supports a wide range of architectures and devices. Linux also offers many advantages for embedded development, such as real-time capabilities, modularity, security, scalability, and reliability. Linux can run on embedded systems with limited resources, such as memory, storage, or power, and can be tailored to the specific needs of the application. Linux also has a large and active community of developers and users who contribute to its improvement and innovation. Some examples of embedded systems that use Linux are smart TVs, routers, drones, robots, smart watches, and IoT devices
A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure what the user means and needs to view the email to assist with troubleshooting. Which of the following should the technician use to assist the user?
A. VNC
B. SSH
C. VPN
D. RMM
A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?
A. Internet-based upgrade
B. Repair installation
C. Clean install
D. USB repair
E. In place upgrade
Explanation:
The desktop specialist should use a clean install to refresh the laptop. A clean install will
remove all data and applications from the laptop and install a fresh copy of Windows 10,
ensuring that the laptop is ready for the newly hired employee.
Which of the following commands can a technician use to get the MAC address of a Linux distribution? net use
A. ifconfig
B. netstat
C. ping
Explanation: The ifconfig command is a tool for configuring network interfaces that any Linux system administrator should know. It is used to bring interfaces up or down, assign and remove addresses and routes, manage ARP cache, and much more1. One of the information that ifconfig can display is the MAC address of each network interface, which is a unique identifier of the physical layer of the network device. The MAC address is usually shown as a hexadecimal string separated by colons, such as 00:0c:29:3f:5c:1f. To get the MAC address of a Linux distribution, a technician can use the ifconfig command without any arguments, which will show the details of all the active network interfaces, or specify the name of a particular interface, such as eth0 or wlan0, to show only the details of that interface.
The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?
A. The contents of the text comptia.txt will be replaced with a new blank document
B. The contents of the text comptia. txt would be displayed
C. The contents of the text comptia.txt would be categorized in alphabetical order.
D. The contents of the text comptia. txt would be copied to another comptia. txt file
Explanation:
The command cac cor.ptia. txt was issued on a Linux terminal. This command would
display the contents of the text comptia.txt.
A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?
A. Network & Internet
B. System
C. Personalization
D. Accounts
A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?
A. Default gateway
B. Host address
C. Name server
D. Subnet mask
Explanation:
The technician most likely needs to change the default gateway on the workstation to
resolve the issue. The default gateway is the IP address of the router that connects the
workstation to the internet, and it is responsible for routing traffic between the workstation
and the internet. If the default gateway is incorrect, the workstation will not be able to
access external web pages.
Which of the following are mobile operating systems used on smartphones? (Select two).
A. macOS
B. Windows
C. Chrome OS
D. Linux
E. iOS
F. Android
Explanation: iOS and Android are the two most popular and widely used mobile operating systems for smartphones. They are both based on Unix-like kernels and provide a variety of features and applications for users and developers. iOS is developed by Apple and runs exclusively on Apple devices, such as iPhones and iPads. Android is developed by Google and runs on a range of devices from different manufacturers, such as Samsung, Huawei, and Motorola. The other options are not mobile operating systems for smartphones, but rather for other types of devices or platforms. macOS is a desktop operating system for Apple computers, such as MacBooks and iMacs. Windows is a desktop operating system for Microsoft computers, such as Surface and Dell. Chrome OS is a web-based operating system for Google devices, such as Chromebooks and Chromecast. Linux is a family of open-source operating systems for various devices and platforms, such as Ubuntu, Fedora, and Raspberry Pi.
Page 13 out of 62 Pages |
Previous |