A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician
finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 is very high, while inbound
network traffic is low. Which of the following tasks should be done FIRST?
A
Which of the following would MOST likely be used by an attacker to identify the hash value of a strong password quickly?
C
A vendor requires remote access to a specific server to maintain proprietary software system. Security policy restricts the
use of port 3389 to employees but does allow command-line access to nonemployees. Which of the following would MOST
likely need to be enabled?
A
Explanation:
Reference: https://www.cisecurity.org/white-papers/security-primer-remote-desktop-protocol/
A user recently downloaded a JPEG attachment from an email. When the user clicks on the attachment, instead of opening
a picture, a small command prompt window appears for several seconds and then disappears. A technician views the file
and sees the following:
Which of the following Windows Control Panel utilities should the technician use to resolve this issue?
A
An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on
the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the
issue?
C
A customer built a computer with the following specifications:
Single hexa-core processor
8GB DDR4 memory
256GB SSD drive
Built-in graphics card
32-bit Windows OS
Audio editing software
The computer seems to be working, but the OS reports only 3.5GB of RAM is available. Which of the following would correct
the issue?
B
A user is having trouble accessing websites on a computer. A technician troubleshoots and tries to access a site the user
typically visits but is instead presented with a completely different site. Which of the following should the technician do
NEXT?
A
A folder has the share permissions of everyone change, while the folders NTFS permissions are set to everyone read.
Which of the following would be the MOST effective permissions for someone who is accessing the folder via the share?
A
Explanation:
Reference: https://www.dnsstuff.com/ntfs-vs-share-permissions
Joe, an end user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his
password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box
appears again, asking him to enter his network password.
Which of the following Control Panel utilities can Joe use to help with this situation?
A
Ann, an employee at a company, calls the help desk to report issues logging on to a vendors website. Joe, the technician, is
able to log in successfully with his credentials before going to Anns office. However, when he attempts to log in from Anns
office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-
up notification.
Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.)
C E