Topic 5: Exam Pool E
A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?
A. Delete the browser cookies and history.
B. Reset all browser settings.
C. Change the browser default search engine.
D. Install a trusted browser.
Explanation: The customer’s web browser is likely infected by a browser hijacker, which is a type of malware that changes the browser’s settings and redirects the user to malicious websites. A browser hijacker can also steal the user’s personal data, display unwanted ads, and install more malware on the device. To remove a browser hijacker, the user should first uninstall the browser from the Control Panel, then scan the device with an antivirus or anti- malware program, and finally install a trusted browser from a legitimate source. Deleting the browser cookies and history, resetting the browser settings, or changing the browser default search engine may not be enough to get rid of the browser hijacker, as it may have embedded itself into the system or other browser components.
A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?
A. Run sfc / scannow on the drive as the administrator
B. Run clearnmgr on the drive as the administrator
C. Run chkdsk on the drive as the administrator
D. Run dfrgui on the drive as the administrator.
Explanation:
The technician should verify bad sectors on the user’s computer by running chkdsk on the
drive as the administrator. Chkdsk (check disk) is a command-line utility that detects and
repairs disk errors, including bad sectors. It runs a scan of the disk and displays any errors
that are found.
A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?
A. Isolate the machine from the network.
B. Scan the system for hidden files.
C. Disable unused ports.
D. Install antivirus software.
E. Reconfigure the firewall.
Explanation: Isolating the machine from the network is a good practice when troubleshooting a PC that is suspected of being infected with malware. This can prevent the malware from spreading to other devices on the network or communicating with external servers that may control or exploit the malware. Isolating the machine can be done by disconnecting the network cable, disabling the wireless adapter, or blocking the network traffic with a firewall.
Which of the following operating systems would most likely be used to run the inventory management system at a factory?
A. Windows
B. Chrome OS
C. Android
D. iOS
Applications on a computer are not updating, which is preventing the user from opening certain files. Which of the following MMC snap-ins should the technician launch next to continue troubleshooting the issue?
A. gpedit.msc
B. perfmon.msc
C. devmgmt.msc
Explanation: devmgmt.msc is the MMC snap-in that opens the Device Manager, a tool that allows the technician to view and manage the hardware devices and their drivers on the computer1. If the applications are not updating properly, it could be due to outdated, corrupted, or incompatible drivers that prevent the hardware from functioning normally. The technician can use the Device Manager to update, uninstall, rollback, or disable the drivers, as well as scan for hardware changes, troubleshoot problems, and view device properties2. gpedit.msc is the MMC snap-in that opens the Group Policy Editor, a tool that allows the technician to configure the local or domain group policy settings for the computer or a group of computers3. Group policy settings can affect the security, performance, and functionality of the system, but they are not directly related to the application updates or the hardware drivers. perfmon.msc is the MMC snap-in that opens the Performance Monitor, a tool that allows the technician to monitor and analyze the performance of the system and its components, such as processor, memory, disk, network, etc4. Performance Monitor can display real- time data or collect log data for later analysis, as well as generate reports and alerts based on the performance counters5. Performance Monitor can help the technician identify and diagnose performance issues, but it does not provide a way to manage the hardware drivers.
Page 9 out of 148 Pages |
Previous |