Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

Cisco 100-140 Dumps

Page: 1 / 4
Total 42 questions

Cisco Certified Support Technician (CCST) IT Support Questions and Answers

Question 1

A customer reports the following problem:

I purchased a 256 GB USB drive to use for transferring files from my personal computer to my work computer. My personal computer runs Sonoma. My work computer runs Windows. I can copy files from my work computer to the USB drive. However, I cannot copy files from my personal computer to the USB drive.

What should the customer do to solve this problem?

Options:

A.

Defragment the USB drive.

B.

Run diagnostics on the USB drive to determine if the file system is corrupt.

C.

Return the USB drive for a replacement.

D.

Formatthe USB drive with exFATfile system.

Question 2

You are a help desk technician at Healthy Eats. The company has 1000 employees in multiple locations. An end user calls you via telephone and states the following:

I am Jane Doe with the Accounting Department. I have forgotten my password, and I have a huge deadline approaching. I need you to reset my password as soon as possible so that payroll checks can be issued.

What should you do?

Options:

A.

Ask Jane Doe for their email address so that you can email them to verity identity.

B.

Reset the password because Jane Doe has to process payroll immediately.

C.

Call Jane Doe's manager using their company number to verity Jane Doe's needs and identity.

D.

Request Jane Doe's call back number so thatyou can reset the password and call Jane Doe back to verify the reset was successful

Question 3

A user reports the following:

I recently got a prompt on my Mac to give an app permissions. I accidentally clicked Deny. Now I can't open the app.

You need to tell the user where to go to grant the necessary permissions to the application.

Which feature should they use?

Options:

A.

Passwords > Security Permissions!

B.

Desktop & Dock

C.

Users & Groups > Add Group

D.

Privacy and Security

Question 4

Match each Windows tool from the list on the left to its appropriate usage scenario on the right.

Note: You will receive partial credit for each correct selection.

as

Options:

Question 5

An employee is having problems reaching URLs on the World Wide Web. You examine the addressing configuration for the employee's PC that is shown as follows:

as

You have verified that you can open a website on the employee's PC by entering the website's IP address in their browser.

Which IP address should you ping to determine what the problem is?

Options:

A.

192.168.1.130

B.

192.168.1.1

C.

192.168.1.253

D.

192.168.1.254

Question 6

John indicates that he cannot edit the file Test.docx, which is stored on a network shared drive. John can access and edit other files on the shared drive. You review permissions for the file and see the permissions shown in the following screenshot.

as

Which change will allow John to access and edit the Test.docx file, while retaining account-level control?

Options:

A.

Move the file to a different folder on the same shared drive.

B.

Modify the NTFS permissions on the file to allow read & execute.

C.

Modify the share permissions on the file to give John full control.

D.

Tell John to modify the NTFS permissions on the file to allow read & execute.

Question 7

A customer purchased a new motherboard for a desktop computer. The customer needs help installing the correct components. The customer sends you a picture of the motherboard, which is shown in the answer area.

You need to assist the customer in identifying the installation location of three components.

To answer, move the appropriate components from the list on the left to the correct locations on the right. You may use each component once more than once, or not at all.

Note: You will receive partial credit for each correct response.

as

Options:

Question 8

You receive an email request for personal information.

You need to make sure you are working with the right individual to avoid a social engineering attempt.

Which step should you take?

Options:

A.

Respond to the email request from the individual to ask them for personal information.

B.

Allow the individual to volunteer to share identity information.

C.

Use company approved methods to confirm the individual's identity.

D.

Share personal account information and ask the individual to confirm it.

Question 9

Which document outlines a commitment between an organization and a customer, including details of the service, the standards the provider must adhere to, and compensation for the successful completion of those milestones?

Options:

A.

Key Performance Indicators

B.

Incident Report

C.

Service Level Indicator

D.

Service Level Agreement

Question 10

Joe calls in to report internet outages. A customer service technician enters the trouble ticket shown below. Review the trouble ticket below and classify which parts of this ticket follow documentation best practices.

as

Move the description to each label to identify whether the part of the documentation referenced by the label meets documentation best practices or does not meet documentation correct practices.

Note: You will receive partial credit for each correct answer.

as

Options:

Question 11

A customer calls the Help Desk and reports the following:

I keep getting an error that my system is low on memory when I run my video editing software.

Which process will allow the customer to locate the available memory of their device?

Options:

A.

Ask the customer to open Event Viewer and select the Applications and Services Log tab.

B.

Ask the customer to open Task Manager and select the Performance tab.

C.

Ask the customer to open Settings and select the Devices tab.

D.

Ask the customer to open Command Prompt and type in ipconfig/all and press Enter.

Question 12

A user needs to reset their password based on feedback after a security concern.

You want to provide an example of a strong password to the user based on the following company guidelines shown:

Must have 8 to 15 characters

Must contain lowercase letters

Must contain at least 2 numbers

Must begin and end with a letter

Only special characters that can be used dash (-), underscore (_), hashtag (#), and at sign (@)

Which password could you use as an example?

Options:

A.

dkku546@

B.

j546h!Gg

C.

ywm546q

D.

mkn546#f

Page: 1 / 4
Total 42 questions