A technician has a user that consistently picks up viruses and malware no matter what kind ofsoftware is installed to prevent infection. Which of the following should be a cost-effective logical step in preventing future infections?()A、Place the user behind a high end NIPS device.B、Migrate the user to a Virtual Machine environment.C、Educate the user on browsing habits.D、Install multiple antivirus programs on the machine to decrease the chances for infection.

A technician has a user that consistently picks up viruses and malware no matter what kind ofsoftware is installed to prevent infection. Which of the following should be a cost-effective logical step in preventing future infections?()

  • A、Place the user behind a high end NIPS device.
  • B、Migrate the user to a Virtual Machine environment.
  • C、Educate the user on browsing habits.
  • D、Install multiple antivirus programs on the machine to decrease the chances for infection.

相关考题:

A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()A. Allow the user to continue workingB. Check for virusesC. Re-image the hard driveD. Document time/date for later referenceE. Prevent users from accessing the PCF. Turn off PC

A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?() A. Perform an antivirus program scanB. Boot the machine into Safe ModeC. Remove the machine from the networkD. Check for system security patches

A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?() A. Warn the userB. Report through proper channelsC. Wipe the driveD. Give the computer back to the user

Which of the following reasons indicate why it is important to have the user demonstrate the task they are trying to perform?()A、To help the technician learn how to perform the task B、To determine if the user is performing the task properly C、To determine if the user is authorized to perform the task D、To help the technician determine if there is a better way to perform the task in question

A virus has been removed from the user’s machine, but the user still cannot access the Internet.Which of the following should the technician check NEXT?()A、Disable port forwarding on the router.B、Reboot to Safe Mode and see if the Internet is accessible.C、Format the machine and reinstall the OS.D、Check the web browser’s proxy settings.

Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A、After an unsuccessful rebootB、If a user’s IP address has been spoofedC、After using IPCONFIG /RELEASED、If the computer has an ARP address conflict

A technician just installed an antivirus suite on a workstation. It is kept up-to-date and has recently scanned the system. A day later the user reports slower response times than usual. Which of the following is the user MOST likely experiencing?()A、AdvertisementsB、Resource consumptionC、A trojan infectionD、Unremoved viruses

A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?()A、Record the solution in the appropriate logs for future use.B、Ask the user who reported the issue what past documentation they have.C、Ask the user who reported the issue to explain the symptoms in detail.D、Record what steps should be taken to resolve the issue.

A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()A、Configuring the Windows Firewall exceptions.B、Using Windows Messenger.C、Configuring My Network Places.D、Using Internet Explorer.

A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?()A、Warn the userB、Report through proper channelsC、Wipe the driveD、Give the computer back to the user

A user reports that when trying to print a document nothing comes out of the printer and states that the only printer in the printer dialog box is ’Microsoft Office Document Image Writer.’ The technician should understand that the problem is that the printer: ()A、has not been installed on the user’s computer.B、is not turned on.C、driver is corrupt.D、cable is unplugged.

A user reports that the computer is running slowly. After running the SFC, a technician observes that the dllcache folder has become corrupted. Which of the following utilities can be run to repair the contents of the dllcache directory? ()A、FORMATB、SFCC、HyperTerminalD、DEFRAG

A customer’s computer crashes consistently when a specific application is launched. Thetechnician has looked at the computer and confirmed the cause of the crash. Which of thefollowing is the NEXT troubleshooting step the technician should take?()A、Verify full system functionality.B、Document the findings, actions, and outcomes.C、Establish a plan of action to resolve the problem.D、Question the user and identify changes the user has made to the system.

A user reports that their hard drive has failed and needs to be replaced. Which of the following should the technician do FIRST?()A、Run the hard disk manufacturer’s diagnostic programB、Re-image the driveC、Replace the hard drive and load WindowsD、Ask the user diagnostic questions

An end user reports that their computer is making noise constantly. The technician notes that the hard drive activity light is on frequently. The technician finds plenty of free space on the drive.Which of the following BEST explains why the drive light is continuously active?()A、The system has a fragmented hard drive.B、The drive interface needs to be changed.C、The user has too many documents on the hard drive.D、The system page file has an issue.

A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account

A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()A、Allow the user to continue workingB、Check for virusesC、Re-image the hard driveD、Document time/date for later referenceE、Prevent users from accessing the PCF、Turn off PC

单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A Guest user accountB Limited user accountC Power user accountD Administrator user account

单选题A user is present when a technician is troubleshooting their workstation. They insist on showing the technician, step by step, what occurred. How should the technician deal with this situation? ()AAllow the user to demonstrate expertise.BDo not argue; empathize with the user, and offer to help.CAsk the user to watch as the technician diagnoses and corrects the problem.DDocument each of the steps to replicate at a later time.

单选题A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()ACheck if the user account is lockedBCheck group policyCCheck the drive for fragmentationDCheck NTFS permissions

单选题An end user reports that their computer is making noise constantly. The technician notes that the hard drive activity light is on frequently. The technician finds plenty of free space on the drive.Which of the following BEST explains why the drive light is continuously active?()AThe system has a fragmented hard drive.BThe drive interface needs to be changed.CThe user has too many documents on the hard drive.DThe system page file has an issue.

单选题A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()AAgree with the user’s complaintsBClarify the user’s statementsCMinimize the user’s criticismDShadow the other technician on the next repair

单选题A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()APerform an antivirus program scanBBoot the machine into Safe ModeCRemove the machine from the networkDCheck for system security patches

多选题A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()AAllow the user to continue workingBCheck for virusesCRe-image the hard driveDDocument time/date for later referenceEPrevent users from accessing the PCFTurn off PC

单选题A user reports that their machine seems to be running slower than usual. The user states that the computer has become progressively worse as more applications are installed. Which of the following is the FIRST step the technician should take?()ARun the CHKDSK utilityBRun the disk defragmenter utilityCIncrease the capacity on the system volumeDConvert to a dynamic drive on the system

单选题Under which of the following circumstances would a technician use IPCONFIG /RENEW?()AAfter an unsuccessful rebootBIf a user’s IP address has been spoofedCAfter using IPCONFIG /RELEASEDIf the computer has an ARP address conflict

单选题A technician just installed an antivirus suite on a workstation. It is kept up-to-date and has recently scanned the system. A day later the user reports slower response times than usual. Which of the following is the user MOST likely experiencing?()AAdvertisementsBResource consumptionCA trojan infectionDUnremoved viruses