Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Cisco > CCST > 100-140

100-140 Cisco Certified Support Technician (CCST) IT Support Question and Answers

Question # 4

Which two of the following are supported operating systems for Remote Desktop client connections? (Choose two.)

Note: You will receive partial credit for each correct selection.

A.

Windows 11 Pro

B.

Windows 10 Enterprise

C.

Windows 11 Home

D.

Windows 10 Home

Full Access
Question # 5

A user calls help desk to report that they cannot connect to the company's internal WiFi network.

The help desk technician is following the problem-solving process to resolve the user's issue. After defining the problem and gathering detailed information, the technician suspects the most probable cause of the issue is a misconfiguration in the user's network settings.

What should the technician do next?

A.

Implement a plan by changing theusers network settings to match the company standard

B.

Resolve the issue by restarting the wireless access point.

C.

Document the problem and solution in the company's IT knowledge base.

D.

Consider the probable cause for the failure by checking whether other users are affected.

Full Access
Question # 6

You are working from home over a weekend to resolve a backlog of employee help desk tickets. A user issue requires you to access their Windows 11 computer in the home office to check its settings. You have verified that the machine is available, but the user is not present.

Which remote access application is best suited for this task?

A.

Virtual Network Computing

B.

Remote Assistance

C.

Remote Desktop

D.

Remote Management

Full Access
Question # 7

A user who has been on vacation for the past 30 days calls the help desk and reaches you. The user reports the following:

Before I left for vacation, I changed my password and made sure it worked. My password is not due to be reset for another 60 days, but I can't log in to the network.

While the user was gone, the company established a requirement for Multi-Factor Authentication (MFA).

Which two actions could you take to resolve the problem? (Choose two.)

Note: Each correct answer presents a complete solution.

A.

Tell the user to install the company's authenticator app.

B.

Set the user's password to never expire.

C.

Tell the user to add a phone number to their account for SMS validation.

D.

Tell the user to change their password to one that meets complexity requirements.

E.

Unlock the user's account.

Full Access
Question # 8

A user reports the following:

I recently got a prompt on my Mac to give an app permissions. I accidentally clicked Deny. Now I can't open the app.

You need to tell the user where to go to grant the necessary permissions to the application.

Which feature should they use?

A.

Passwords > Security Permissions!

B.

Desktop & Dock

C.

Users & Groups > Add Group

D.

Privacy and Security

Full Access
Question # 9

Which type of virtualization allows a user to run one or multiple operating systems that are stored remotely on a central server in a data center?

A.

Data Virealization

B.

Storage Visualization

C.

Network Visualization

D.

Desktop Visualization

Full Access
Question # 10

You resolve a customer's printing issue.

How should you document the incident?

A.

Printing issue is resolved. Reinstalled printer drivers and rebooted computer.

B.

This customer was using the wrong printer and did not know which printer they should use.

C.

Printer is now printing. Issue is resolved and customer is happy.

D.

Ticket Complete.

Full Access
Question # 11

A network technician suspects that a client's Windows computer is not correctly connecting to the office network.

To diagnose the issue, the technician runs the ipconfig command on the client's computer.

Which two pieces of information can the technician expect to obtain by running this command? (Choose two.)

A.

The encryption type used by the Wi-Fi network.

B.

The IP address assigned to the computer.

C.

The wireless network SSID.

D.

The firewall settings currently applied.

E.

The default gateway address configured on the computer.

Full Access
Question # 12

A user needs to reset their password based on feedback after a security concern.

You want to provide an example of a strong password to the user based on the following company guidelines shown:

Must have 8 to 15 characters

Must contain lowercase letters

Must contain at least 2 numbers

Must begin and end with a letter

Only special characters that can be used dash (-), underscore (_), hashtag (#), and at sign (@)

Which password could you use as an example?

A.

dkku546@

B.

j546h!Gg

C.

ywm546q

D.

mkn546#f

Full Access