<< Prev Question Next Question >>

Question 96/230

A customer's computer was turned off overnight, When the customer restarts the computer, an advanced startup menu is displayed.
The startup repair option is unsuccessful and causes the computer to reboot repeatly untill the advanced startup screen reappears. Which of the following should a technician attempt FIRST?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (230q)
Question 1: A technician received 300 old desktops following a recent co...
Question 2: A new policy requires all users to log on to their corporate...
Question 3: A customer is having issues with an Android-based smartphone...
Question 4: A network administrator needs to be able to securely connect...
Question 5: Joe, a user who is travelling for business, reports that his...
Question 6: A user who is running Windows 10 logs Into a machine and not...
Question 7: A technician needs to connect to a network switch in a remot...
Question 8: An executive has contacted you through the help-desk chat su...
1 commentQuestion 9: An administrator wants to search a file on a Linux server fo...
Question 10: An end user reports a Windows computer is infected with a vi...
Question 11: A technician is monitoring a network and notices an outage h...
Question 12: A user's computer has been performing sluggishly The user re...
Question 13: A home user reports slow computer performance and applicatio...
Question 14: Which of the following is the maximum amount of RAM a comput...
Question 15: A contract technician is working on a network printer when a...
Question 16: A technician is repairing a computer. Which of the following...
Question 17: A technician is updating a network switch at a location faci...
Question 18: A company is creating a disaster recovery plan. Which of the...
Question 19: A user tries to open a client/server application, but a prom...
Question 20: While preparing a computer that will be issued to a new user...
Question 21: Joe, a user, reports the programs and icons on his Windows d...
Question 22: Which of the following would a technician use to store memor...
Question 23: Which of the following should a technician do to ensure stat...
Question 24: Following a recent password change, a user can log on succes...
Question 25: A user contacts a technician to troubleshoot server errors. ...
Question 26: A user opens a phishing email and types logon credentials in...
Question 27: Which of the following types filesystems is in use when data...
Question 28: A user installs a flashlight application on a phone. The use...
Question 29: A company is implementing a work-from-home policy. As a resu...
Question 30: A remotely managed self-checkout machine in a retail store r...
Question 31: A technician needs to remove malware from a Windows system. ...
Question 32: A network administrator wants to plan a major OS upgrade of ...
Question 33: A customer keeps receiving the following message: Website bl...
Question 34: A technician needs to view hidden files. Which of the follow...
Question 35: Which of the following BEST describes the purpose of an ESD ...
Question 36: Ann, a user, has asked technician for help with her computer...
Question 37: A user has installed two new drives in one of the computers ...
Question 38: Which of the following are method used to prevent an unauthe...
Question 39: Which of the following identifies changes in the environment...
Question 40: A customer's computer is powered on and working, but the cus...
Question 41: A technician is troubleshooting a home WiFi router that is u...
Question 42: company's website is responsible for the theft of customer c...
Question 43: A technician needs to remediate an infected computer. Which ...
Question 44: A technician is working on a computer that has the following...
Question 45: Ann. an external user, has received several calls from a com...
Question 46: A user contains the help desk the restore an application tha...
Question 47: A network administrator recently learned users have been acc...
Question 48: Which of the following attack types exploits vulnerabilities...
Question 49: A technician recently installed a new secondary hard drive i...
Question 50: A user needs to transfer some information from a work comput...
Question 51: Joe. a user, is gelling replies lo an email message he never...
Question 52: A company wants to move the contents of its users' My Docume...
Question 53: A SOHO technician needs to upgrade two computers quickly and...
Question 54: A technician needs to install Windows 10 on a 4TB hard drive...
Question 55: Which of the following operating systems has mandatory updat...
Question 56: A technician is installing Windows 7 64-bit OS on a VM but k...
Question 57: A technician is creating a network topology diagram Which of...
Question 58: Which of the following operating systems utilizes the web br...
Question 59: A technician is running Windows on a company's Mac workstati...
Question 60: Which of the following accurately describes why a file on a ...
Question 61: A technician discovers a user's home computer has Windows Up...
Question 62: A company has just experienced a data breach that affected a...
Question 63: An end user's PC is taking a long time to boot. Which of the...
Question 64: While attempting to install a new program, an end user is no...
1 commentQuestion 65: Which of the following physical security measures is intende...
Question 66: A technician recently updated a printer driver on all the co...
Question 67: An end user's laptop Is not as fast as when it was first pur...
Question 68: Given the following batch file: (Exhibit) Which of the follo...
Question 69: Joe. a technician, imaged a laptop using third-party softwar...
Question 70: A technician is troubleshooting an issue affecting all compa...
Question 71: While installing a hard drive in a server, the administrator...
Question 72: A user can access the company's internal website properly, b...
Question 73: Joe, a user, notices someone use his computer while he was o...
Question 74: A recent ransomware attack caused several datasets to be ina...
Question 75: Which of the following is the maximum RAM limit of a Windows...
Question 76: A technician has been asked to recommend antivirus software ...
Question 77: A user is attempting to open Outlook, Outlook seems to have ...
Question 78: A technician was alerted by IT security of a potentially inf...
Question 79: A company needs to destroy several SSDs that contain sensiti...
Question 80: A wireless access point is going to be configured in a small...
Question 81: Which of the following threats commonly relies on DNS poison...
Question 82: A technician is decommissioning a workstation that contains ...
Question 83: Which of the following filesystem types has native read/writ...
Question 84: Which of the following encryption methods is used by WPA2 to...
Question 85: A technician has identified malware on a user's system. Whic...
Question 86: The medical records department of a local hospital recently ...
Question 87: The default Windows 7 web browser will not display most webs...
Question 88: A user calls the help desk regarding a new Windows issues th...
Question 89: A user is trying to install a very large .dmg file on a Wind...
Question 90: An IT professional recently assisted Ann, a customer, with u...
1 commentQuestion 91: A technician is troubleshooting a PC and identifies the issu...
Question 92: A desktop technician needs to replace a laptop's SSD. Which ...
Question 93: A user suspects a computer Is infected with malware. A techn...
Question 94: A user's desktop will not run an accounting program. The pro...
Question 95: A technician is having issues with the WiFi connection while...
Question 96: A customer's computer was turned off overnight, When the cus...
Question 97: A desktop technician is attempting to upgrade several machin...
Question 98: An issue with a user's computer was addressed several times ...
Question 99: Which of the following OS types provides a lightweight optio...
Question 100: A user reports unwanted pop-ups are appearing on a computer'...
Question 101: Joe, a user, calls the help desk from a coffee shop while on...
Question 102: An end user submits a request for the IT specialist to insta...
Question 103: An employee contacts the help desk because the battery in a ...
Question 104: Which of the following threats uses personalized information...
Question 105: A technician is trying to repair a computer that was infecte...
Question 106: A technician needs to edit a protected .dll file but cannot ...
Question 107: A user reports slow performance on a computer. A technician ...
2 commentQuestion 108: A technician performed some maintenance on a server via remo...
Question 109: A technician has been asked to review the configuration of a...
Question 110: A technician is troubleshooting a print issue on a Windows c...
Question 111: A user is having trouble accessing websites on a computer. A...
Question 112: Which of the following physical security measures can be com...
Question 113: Joe, a technician, has his daily plans forwarded to him by h...
Question 114: A technician is installing new software on an older laptop t...
Question 115: Which of the following can be applied directly to an organiz...
Question 116: A technician is attempting to repair a Windows computer that...
Question 117: A technician has installed a second monitor for a customer, ...
Question 118: An administrator wants to deploy updates during the company'...
Question 119: A user often loses connectivity while in the back offices of...
Question 120: A Chief Information Officer (CIO) recently learned a critica...
Question 121: Accompany is concerned about the amount of time employees sp...
Question 122: A user wants a phone with an operating system that is highly...
Question 123: A technician is implementing multifactor authentication for ...
Question 124: Which of the following Windows technologies can render a Me ...
Question 125: A technician is removing a virus from a user's Windows works...
Question 126: A technician is setting up a kiosk. The technician needs to ...
Question 127: A technician is setting up network adapter settings on Windo...
Question 128: A user is staying at a hotel that only offers Fast Ethernet ...
Question 129: A user's PC has been running slowly. The user says there hav...
Question 130: Which of the following operating systems has versions for se...
Question 131: A folder on an NTFS volume has the following permissions ena...
Question 132: A technician is in the process of removing a recently discov...
Question 133: A small business has an open wireless network so vendors can...
Question 134: Which of the following would MOST likely be used by an attac...
Question 135: A small business has an open WiFi network for employees but ...
2 commentQuestion 136: A junior technician needs to obtain a list of all the proces...
Question 137: A user is working with the command line interface on a Linux...
Question 138: Which of the following is a reason to use WEP over WPA?...
1 commentQuestion 139: A technician needs to allow RDP access for a user. Port forw...
Question 140: A technician is scheduled to upgrade a grocery store's netwo...
Question 141: Which of the following is used with WPA2 to authenticate wir...
Question 142: Which of the following extensions identify files that are ty...
Question 143: Which of the following wireless security protocols supports ...
Question 144: A user calls the corporate help desk to report a malware det...
Question 145: After a virus outbreak due to USB usage, a technician must d...
Question 146: A network administrator audited applications on a user's des...
Question 147: A customer has a Linux desktop and is installing a 3TB HDD. ...
Question 148: A SOHO user reports desktop applications are performing slow...
Question 149: A user's computer was infected with malware, and a technicia...
Question 150: A technician is installing an application on a Linux system ...
Question 151: Which of the following security methods BEST describes when ...
Question 152: A user's mobile device has slow data speeds. The user first ...
Question 153: A department in an organization set up a proxy server to man...
Question 154: Which of the following security tools can leverage the onboa...
Question 155: A technician recently built a gaming PC with a multicode CPU...
Question 156: When a user browses to a favorite website on a Windows lapto...
Question 157: A computer becomes infected with malware, which manages to s...
Question 158: A corporate fileshare holds files for multiple departments. ...
Question 159: A customer brings an old PC to a computer repair shop and as...
1 commentQuestion 160: Which of the following is MOST likely to be specified as a s...
Question 161: A user's PC has become infected with malware that has a know...
Question 162: A systems administrator is configuring a new workstation. Wh...
Question 163: Which of the following would MOST likely be used in secure c...
Question 164: An end user contacts the help desk to report a browser issue...
Question 165: After a successful phishing attempt on a corporate workstati...
Question 166: A user recently browsed several online shopping sites on a c...
Question 167: Which of the following file types uses the net use command....
Question 168: A technician plugs a 16GB jump drive into a Windows PC, and ...
Question 169: A user's personal settings are not saving, and a technician ...
Question 170: A user's computer is suspected of hosting illegal files. The...
Question 171: A technician is cleaning malware on a Windows workstation. W...
Question 172: Ann, a user, calls the help desk regarding an issue on her l...
Question 173: A company recently implemented a new Linux server. Remote ac...
Question 174: A new security policy stores all remote access to network de...
Question 175: A technician needs to update the network firewall, which wil...
Question 176: A SOHO user calls a technician and wants to secure a home ne...
Question 177: Every time a user manually runs an antivirus scan, the works...
Question 178: A technician has set up a new computer for a customer and ne...
Question 179: Which of the following types of social engineering attacks c...
Question 180: Ann, a user, is setting up a new mobile phone, and the phone...
Question 181: Corporate management is concerned about the security of the ...
Question 182: Which of the following is used for building entry and comput...
Question 183: A user's mobile device is losing its battery change very qui...
Question 184: A technician is removing malware from a workstation. The mal...
Question 185: Ann, a customer, calls a technician and states that she is v...
Question 186: The Chief Executive Officer (CEO) of an organization frequen...
Question 187: Which of the following security settings can be changed on a...
Question 188: In which of the following operating systems has the publishe...
Question 189: A technician needs to configure network shares on users' com...
Question 190: A user calls a technician to report issues when logging in t...
Question 191: A technician is working on an infected computer After runnin...
Question 192: A systems administrator created a policy that should create ...
Question 193: A technician is disposing of computer hardware that contains...
Question 194: A network administrator has noticed unusual activity with a ...
Question 195: A network administrator has given a technician documentation...
Question 196: A technician needs to ensure users are prompted or warned wh...
Question 197: Which of the following is the MOST secure wireless security ...
Question 198: A network support technician takes a call from an office man...
Question 199: Joe, an employee, took a company-issues Windows laptop home,...
Question 200: A technician notices a Windows computer is running slowly. T...
Question 201: A user's login screen does not look normal when booting the ...
Question 202: A technician scans a computer for malware, and it comes back...
Question 203: After a security audit, a technician is tasked with implemen...
Question 204: A technician needs to access the user Interface of a server ...
Question 205: A new business will be using credit cards in a physical loca...
Question 206: A user updated an iOS smartphone and is now having issues co...
Question 207: Users notify the help desk of an email that was just receive...
Question 208: A user is having network printing issues. The user indicates...
Question 209: Some of a company's computers were manually configured to by...
Question 210: Joe, a mobile device user, reached his monthly quota of data...
Question 211: A Microsoft application will not open when a user clicks on ...
Question 212: In which of the following file extension types would a user ...
1 commentQuestion 213: A system administrator needs to submit a change request to t...
Question 214: A technician is troubleshooting a printer issue on a Windows...
Question 215: A company's computers have continuously been infected with m...
Question 216: A technician is installing the latest OS on a user's system....
Question 217: A user has changed the MAC address of a laptop to gain acces...
Question 218: An employee reported that a suspicious individual was lookin...
Question 219: A user Is unable to access a network share out can access em...
Question 220: Which of the following Is the MOST cost-effective option to ...
Question 221: A recent outbreak of a virus has uncovered that a company mu...
Question 222: Which of the following may include the use of a password and...
Question 223: A customer's smartphone has been overheating frequently and ...
Question 224: A technology team is creating limits and guidelines for the ...
Question 225: Which of the following allows for per-command authentication...
Question 226: A customer built a computer with the following specification...
Question 227: A customer recently upgraded from Windows 7 to Windows 10. T...
Question 228: A user's computer reports it has many virus infections and d...
Question 229: Which of the following installation types would require the ...
Question 230: A company is implementing multifactor authentication and req...