Topic 5: Exam Pool E
A Windows computer is experiencing slow performance when the user tries to open programs and files. The user recently installed a new software program from an external website. Various websites are being redirected to an unauthorized site, and Task Manager shows the CPU usage is consistently at 100%. Which of the following should the technician do first?
A. Uninstall the new program.
B. Check the HOSTS file.
C. Restore from a previous backup.
D. Clear the web browser cache.
An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT?
A. Verify all third-party applications are disabled
B. Determine if the device has adequate storage available.
C. Check if the battery is sufficiently charged
D. Confirm a strong internet connection is available using Wi-Fi or cellular data
Explanation:
Since there are no error messages on the device, the technician should check if the battery
is sufficiently charged1
If the battery is low, the device may not have enough power to complete the update2
In this scenario, the technician has already determined that there are no error messages on
the device. The next best step would be to check if the battery is sufficiently charged. If the
battery is low, it could be preventing the device from completing the update process.
Verifying that third-party applications are disabled, determining if the device has adequate
storage available, and confirming a strong internet connection are all important steps in
troubleshooting issues with mobile devices. However, since the problem in this scenario is
related to a failed OS update, it is important to first check the battery level before
proceeding with further troubleshooting steps.
Which of the following would typically require the most computing resources from the host computer? Chrome OS
A. Windows
B. Android
C. macOS
D. Linux
Explanation: Windows is the operating system that typically requires the most computing resources from the host computer, compared to the other options. Computing resources include hardware components such as CPU, RAM, disk space, graphics card, and network adapter. The minimum system requirements for an operating system indicate the minimum amount of computing resources needed to install and run the operating system on a computer. The higher the minimum system requirements, the more computing resources the operating system consumes. According to the web search results, the minimum system requirements for Windows 10 and Windows 11 are as follows12: CPU: 1 GHz or faster with two or more cores (Windows 10); 1 GHz or faster with two or more cores on a compatible 64-bit processor (Windows 11) RAM: 1 GB for 32-bit or 2 GB for 64-bit (Windows 10); 4 GB (Windows 11) Disk space: 16 GB for 32-bit or 32 GB for 64-bit (Windows 10); 64 GB (Windows 11) Graphics card: DirectX 9 or later with WDDM 1.0 driver (Windows 10); DirectX 12 compatible with WDDM 2.0 driver (Windows 11)
An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?
A. All updated software must be tested with alt system types and accessories
B. Extra technician hours must be budgeted during installation of updates
C. Network utilization will be significantly increased due to the size of CAD files
D. Large update and installation files will overload the local hard drives.
Explanation:
The IT manager is most likely to be concerned about network utilization being significantly
increased due to the size of CAD files. Backing up all CAD files to the software’s cloud server can result in a large amount of data being transferred over the network, which can
cause network congestion and slow down other network traffic.
The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO)
A. Enable multifactor authentication for each support account
B. Limit remote access to destinations inside the corporate network
C. Block all support accounts from logging in from foreign countries
D. Configure a replacement remote-access tool for support cases.
E. Purchase a password manager for remote-access tool users
F. Enforce account lockouts after five bad password attempts
Explanation:
The best ways to limit the bank’s risk are to enable multifactor authentication for each
support account and enforce account lockouts after five bad password attempts. Multifactor
authentication adds an extra layer of security to the login process, making it more difficult
for attackers to gain access to systems. Account lockouts after five bad password attempts
can help to prevent brute force attacks by locking out accounts after a certain number of
failed login attempts.
Page 16 out of 148 Pages |
Previous |