Jane, a system administrator, is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and that they need to be cleared from the event viewer. She recalls this being a daily occurrence. Which of the following solutions would BEST resolve this problem?
A. Increase the maximum log size B. Log into the DNS server every hour to check if the logs are full C. Install an event management tool D. Delete the logs when full
A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?
A. Social engineering B. Phishing C. Malware D. Virus
A new application is installed which adds three new services to a customers PC. The customer asks for help, because the new application will not start. A technician investigates and finds that one of the services has failed to start. They attempt to manually start the service but it fails. Where should the technician look NEXT for more information? (Select TWO).
A. Task Manager B. System registry C. Log files for the new application D. Event Viewer E. %SystemDir%System32Drivers
When a user tries to print, the OS slows down and appears to lock up. Shutting down the Print Spooler Service restores the computers speed, but leaves the user unable to print. Which of the following should be used FIRST to troubleshoot this problem?
A. Rebuild print spooler files B. Hardware diagnostic software C. Event viewer D. Antivirus software
Emily, a user, states her computer is running very slow. On further investigation, a technician sees several disk errors in the event viewer. Which of the following commands would be used to resolve this issue?