Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > A+ > 220-1102

220-1102 CompTIA A+ Certification Core 2 Exam Question and Answers

Question # 4

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Full Access
Question # 5

Which of the following is a data security standard for protecting credit cards?

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Full Access
Question # 6

Which of the following is the MOST basic version of Windows that includes BitLocker?

A.

Home

B.

pro

C.

Enterprise

D.

Pro for Workstations

Full Access
Question # 7

A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?

A.

Updating the operating system

B.

Changing proxy settings

C.

Reinstalling the browser

D.

Enabling port forwarding

Full Access
Question # 8

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

Full Access
Question # 9

A company is looking lot a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select?

A.

Off-site

B.

Synthetic

C.

Full

D.

Differential

Full Access
Question # 10

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

A.

Requiring strong passwords

B.

Disabling cached credentials

C.

Requiring MFA to sign on

D.

Enabling BitLocker on all hard drives

Full Access
Question # 11

A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping, all functioning devices also turned off. In case of a future power failure, the customer wants to have the most time available to save cloud documents and shut down the computer without losing any data.

Full Access
Question # 12

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

A.

Windows Enterprise Edition

B.

Windows Professional Edition

C.

Windows Server Standard Edition

D.

Windows Home Edition

Full Access
Question # 13

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection. Which of the following should the technician check NEXT?

A.

Windows updates

B.

DNS settings

C.

Certificate store

D.

Browser plug-ins

Full Access
Question # 14

A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?

A.

NTFS

B.

APFS

C.

ext4

D.

exFAT

Full Access
Question # 15

A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?

A.

The GPS application is installing software updates.

B.

The GPS application contains malware.

C.

The GPS application is updating its geospatial map data.

D.

The GPS application is conflicting with the built-in GPS.

Full Access
Question # 16

A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?

A.

Keyboard

B.

Touch pad

C.

Ease of Access Center

D.

Display settings

Full Access
Question # 17

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

A.

RDP through RD Gateway

B.

Apple Remote Desktop

C.

SSH access with SSH keys

D.

VNC with username and password

Full Access
Question # 18

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

A.

A new IT policy requires users to set up a lock screen PIN.

B.

A user is overseas and wants to use a compatible international SIM Card.

C.

A user left the phone at home and wants to prevent children from gaining access to the phone.

D.

A user traded in the company phone for a cell carrier upgrade by mistake.

E.

A user cannot locate the phone after attending a play at a theater.

F.

A user forgot the phone in a taxi, and the driver called the company to return the device.

Full Access
Question # 19

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

Full Access
Question # 20

A technician needs to ensure that USB devices are not suspended by the operating system Which of the following Control Panel utilities should the technician use to configure the setting?

A.

System

B.

Power Options

C.

Devices and Printers

D.

Ease of Access

Full Access
Question # 21

A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server Is consistently communicating with an IP address that is traced back to a company that awards digital currency for solving hash algorithms. Which of the following was MOST likely used to compromise the server?

A.

Keylogger

B.

Ransomware

C.

Boot sector virus

D.

Cryptomining malware

Full Access
Question # 22

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

A.

UEFI password

B.

Secure boot

C.

Account lockout

D.

Restricted user permissions

Full Access
Question # 23

A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the Issue?

A.

Screen-sharing software

B.

Secure shell

C.

Virtual private network

D.

File transfer software

Full Access
Question # 24

A technician receives a help desk ticket from a user who is unable to update a phone. The technician investigates the issue and notices the following error message: Insufficient storage space

While analyzing the phone, the technician does not discover any third-party' applications or photos. Which of the following is the best way to resolve the issue?

A.

Exchange the device for a newer one.

B.

Upgrade the onboard storage

C.

Allocate more space by removing factory applications

D.

Move factory applications to external memory.

Full Access
Question # 25

A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive?

A.

gpupdate

B.

net use

C.

hostname

D.

dir

Full Access
Question # 26

A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key. Which of the following is the best way for a technician to return the device to service safely?

A.

Run an AV scan.

B.

Reinstall the operating system

C.

Install a software firewall.

D.

Perform a system restore.

E.

Comply with the on-screen instructions.

Full Access
Question # 27

A technician needs to establish a remote access session with a user who has a Windows workstation. The session must allow for simultaneous viewing of the workstation by both the user and technician. Which of the following remote access technologies should be used?

A.

RDP

B.

VPN

C.

SSH

D.

MSRA

Full Access
Question # 28

A desktop technician has received reports that a user's PC is slow to load programs and saved files. The technician investigates and discovers an older HDD with adequate free space. Which of the following should the technician use to alleviate the issue first?

A.

Disk Management

B.

Disk Defragment

C.

Disk Cleanup

D.

Device Manager

Full Access
Question # 29

A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?

A.

Escalating the issue to Tier 2

B.

Verifying warranty status with the vendor

C.

Replacing the motherboard

D.

Purchasing another PC

Full Access
Question # 30

A large university wants to equip all classrooms with high-definition IP videoconferencing equipment. Which of the following would most likely be impacted in this situation?

A.

SAN

B.

LAN

C.

GPU

D.

PAN

Full Access
Question # 31

A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?

A.

AAA

B.

SSH

C.

RDP

D.

VPN

Full Access
Question # 32

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:

The Audio Driver is not running.

Which of the following will MOST likely resolve the issue?

A.

compmgmt.msc

B.

regedit.exe

C.

explorer.exe

D.

taskmgt.exe

E.

gpmc.msc

F.

services.msc

Full Access
Question # 33

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?

A.

Biometrics

B.

Full disk encryption

C.

Enforced strong system password

D.

Two-factor authentication

Full Access
Question # 34

The battery life on an employee's new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check first to troubleshoot this issue? (Select two).

A.

Screen resolution

B.

Screen zoom

C.

Screen timeout

D.

Screen brightness

E.

Screen damage

F.

Screen motion smoothness

Full Access
Question # 35

A technician is installing RAM in a new workstation and needs to protect against electrostatic discharge. Which of the following will best resolve this concern?

A.

Battery backup

B.

Thermal paste

C.

ESD strap

D.

Consistent power

Full Access
Question # 36

A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost. the gateway, and known IP addresses on the interne! and receive a response. Which of the following Is the MOST likely reason tor the Issue?

A.

A firewall is blocking the application.

B.

The wrong VLAN was assigned.

C.

The incorrect DNS address was assigned.

D.

The browser cache needs to be cleared

Full Access
Question # 37

A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor. Which of the following procedures should the technician perform?

A.

Boot into safe mode.

B.

Perform a malware scan.

C.

Restart the machine.

D.

Reinstall the browser

Full Access
Question # 38

A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer's BEST choice for this environment?

A.

Workgroup network

B.

Public network

C.

Wide area network

D.

Domain network

Full Access
Question # 39

A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?

A.

The device does not have enough free space lo download the OS updates.

B.

The device needs domain administrator confirmation to update to a major release.

C.

The device is not compatible with the newest version of the OS.

D.

The device is restricted from updating due to a corporate security policy.

Full Access
Question # 40

Which of the following would most likely be used in a small office environment?

A.

Print server

B.

Virtualization

C.

Domain access

D.

Workgroup

Full Access
Question # 41

A systems administrator is experiencing Issues connecting from a laptop to the corporate network using PKI. Which to the following tools can the systems administrator use to help remediate the issue?

A.

certmgr.msc

B.

msconfig.exe

C.

lusrmgr.msc

D.

perfmon.msc

Full Access
Question # 42

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

Full Access
Question # 43

Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?

A.

A forgotten keychain password

B.

An employee's Apple ID used on the device

C.

An operating system that has been jailbroken

D.

An expired screen unlock code

Full Access
Question # 44

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Full Access
Question # 45

A company is transitioning to a new firewall and discovers that one of the servers is still sending traffic to the old firewall. Which of the following IP address settings should a technician change to resolve this issue?

A.

Dynamic

B.

Gateway

C.

NAT

D.

DNS server

Full Access
Question # 46

Which of the following protects a mobile device against unwanted access when it is left unattended?

A.

PIN code

B.

OS updates

C.

Antivirus software

D.

BYOD policy

Full Access
Question # 47

Windows updates need to be performed on a department's servers. Which of the following methods should be used to connect to the server?

A.

FIP

B.

MSRA

C.

RDP

D.

VPN

Full Access
Question # 48

A Windows administrator is creating user profiles that will include home directories and network printers for several new users. Which of the following is the most efficient way for the technician to complete this task?

A.

Access control

B.

Authentication application

C.

Group Policy

D.

Folder redirection

Full Access
Question # 49

A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to Investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?

A.

Resource Monitor

B.

Performance Monitor

C.

Command Prompt

D.

System Information

Full Access
Question # 50

A remote user is experiencing issues with Outlook settings and asks a technician to review the settings. Which of the following can the technician use to access the user's computer remotely?

A.

VPN

B.

RDP

C.

RMM

D.

SSH

Full Access
Question # 51

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

A.

Quarantine the host in the antivirus system.

B.

Run antivirus scan tor malicious software.

C.

Investigate how malicious software was Installed.

D.

Reimage the computer.

Full Access
Question # 52

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

A.

Cryptominers

B.

Rootkit

C.

Spear phishing

D.

Keylogger

Full Access
Question # 53

A systems administrator needs to access a hypervisor that went offline. After doing a port scan, the administrator notices that company policy is blocking the RDP default port. Which of the following ports should the administrator use to access the machine?

A.

22

B.

23

C.

80

D.

3090

Full Access
Question # 54

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

Full Access
Question # 55

Employees want their Windows 10 laptops to wirelessly connect when they take them home. Which of the following should the employees configure so the laptops can automatically connect wirelessly?

A.

Network and Internet settings

B.

Windows Firewall settings

C.

Devices and Printers

D.

Personalization settings

Full Access
Question # 56

Which of the following methods is a way to superficially delete files on a hard drive?

A.

Drilling

B.

Degaussing

C.

Wiping

D.

Shredding

E.

Low-level formatting

Full Access
Question # 57

Which of the following physical security controls can prevent laptops from being stolen?

A.

Encryption

B.

LoJack

C.

Multifactor authentication

D.

Equipment lock

E.

Bollards

Full Access
Question # 58

Which of the following languages would a technician most likely use to automate the setup of various services on multiple systems?

A.

SQL

B.

HTML

C.

PowerShell

D.

C#

Full Access
Question # 59

A user is attempting to access a shared drive from a company-issued laptop while working from home. The user is unable to access any files and notices a red X next to each shared drive. Which of the following needs to be configured in order to restore the user's access to the shared drives?

A.

IPv6

B.

VPN

C.

IPS

D.

DNS

Full Access
Question # 60

Which of the following file types should be used to install software on a macOS computer? (Select two).

A.

.yum

B.

.pkg

C.

.msi

D.

.ps1

E.

.exe

F.

.dmg

Full Access
Question # 61

A technician runs a command and gets the following output:

Ethernet adapter Ethernet 3:

Connection-specific DNS Suffix . :reddog.microsoft.com

Link-local IPv6 Address .......... :fe80::de3d:9283:4f00:856a%5

IPv4 Address.......................:10.203.10.16

Subnet Mask ...................... :255.255.255.0

Default Gateway .................. :10.203.10.1

Which of the following commands did the technician use?

A.

ipconfig

B.

tracert

C.

whoami

D.

net use

Full Access
Question # 62

Which of the following applications allows a user to create backups in macOS?

A.

Time Machine

B.

FileVault

C.

Keychain

D.

Mission Control

Full Access
Question # 63

Which of the following provides disk encryption on computers running a Windows OS?

A.

FileVault

B.

BitLocker

C.

Private Key

D.

PowerShell

Full Access
Question # 64

A Windows 10 computer is not installing updates and continues to receive errors even during manual update installations. Which of the following should a technician do to fix the issues? (Select two).

A.

Ensure that the Windows Update Utility is the latest version.

B.

Refresh local WSUS settings on the computer.

C.

Delete the Windows Update cache.

D.

Run the System check to verify system files.

E.

Reimage the operating system while retaining user files.

F.

Reset WMI and re-register system .dlls.

Full Access
Question # 65

A user in a SOHO asks an off-site, remote technician to connect securely to the user’s laptop. The technician is able to connect to the VPN but is unable to connect to the user’s laptop. Which of the following settings should the technician review?

A.

Wireless protocol

B.

DHCP pool

C.

Content filtering

D.

Firewall

Full Access
Question # 66

Which of the following is the most secure screen lock?

A.

Face

B.

Swipe

C.

Password

D.

Fingerprint

Full Access
Question # 67

Which of the following is the weakest wireless security protocol?

A.

WEP

B.

WPA2

C.

TKIP

D.

AES

Full Access
Question # 68

A Windows user wants a filesystem that protects confidential data from attackers who have physical access to the system. Which of the following should the user choose?

A.

ext

B.

APFS

C.

FAT

D.

EFS

Full Access
Question # 69

A technician is troubleshooting a connectivity issue and wants to verify that traffic is flowing to the correct upstream locations. Which of the following commands should the technician use?

A.

net use

B.

nslookup

C.

traceroute

D.

netstat

Full Access
Question # 70

Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and Its files. Which of the following will MOST likely allow all users to access the new folders?

A.

Assigning share permissions

B.

Enabling inheritance

C.

Requiring multifactor authentication

D.

Removing archive attribute

Full Access
Question # 71

Several computers have been infected with malware, causing the company network to slow down and sensitive company information to be lost. The IT department installs new antivirus software to remove the malware and needs to decide the best method to prevent future malware infections. Which of the following methods would be the most effective?

A.

Encrypting data at rest

B.

Implementing firewalls

C.

Utilizing Intrusion detection systems

D.

Backing up data regularly

Full Access
Question # 72

Which of the following is the most practical method to reduce the number of clicks on phishing emails for a public-facing organization?

A.

Providing user awareness education

B.

Introducing a BYOD policy

C.

Setting up SMTP filtering rules

D.

Restricting emails from personal email addresses

Full Access
Question # 73

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

A.

Make the user a member of Domain Admins.

B.

Add the user to the local Administrators group.

C.

Let the user use credentials from another user who has rights.

D.

Give the user the local, high-privileged account password.

Full Access
Question # 74

An employee utilizes a personal smartphone to work remotely. The employee is unable to reach the portal using the company-provided VPN service. Which of the following describes the cause of the issue?

A.

The application must be purchased by the company.

B.

The smartphone is not on the latest OS version.

C.

The smartphone is not enrolled in MDM service.

D.

The application fails to install and launch.

Full Access
Question # 75

After a user recently installs a new scanner and the associated software on a computer, they notice the computer is now starting up very slowly. Which of the following is the best tool to troubleshoot this issue?

A.

Resource Monitor

B.

Task Manager

C.

Device Manager

D.

Windows Update

E.

Event Viewer

Full Access
Question # 76

A technician is setting up a wireless network in a small, crowded office and wants to minimize Wi-Fi access. Which of the following security settings should the technician enable?

A.

Port forwarding

B.

Unused ports

C.

SSID broadcast

D.

Allow list

Full Access
Question # 77

A user identified that a program installed in a workstation does not have optional features enabled. Which of the following must the technician do to install the optional features?

A.

Goto Programs andFeatures, uninstall the program, and reinstallit.

B.

Goto AdministrativeTools and edit System Configuration.

C.

Goto AdministrativeTools and run Disk Cleanup.

D.

Goto Programs andFeatures, select the program, and click onChange.

Full Access
Question # 78

A technician is updating the OS on a number of Windows workstations. After successfully updating several workstations, the technician receives an error indicating that the upgrade takes more space than is available on one of the PCs. Which of the following should the technician do to proceed with the upgrade? (Select two).

A.

Unplug the extra hardware.

B.

Delete unnecessary files.

C.

Update the driver software.

D.

Restore the system files.

E.

Uninstall unused desktop applications.

F.

Add additional memory.

Full Access
Question # 79

When a user is in the office, web pages are loading slowly on the user's phone. Which of the following best explains this issue?

A.

Exceeded the data usage limit

B.

Sluggish response time

C.

Degraded network service

D.

High network traffic

Full Access
Question # 80

A user calls the help desk to report an issue with their smartphone. After the user returns from a business trip, the user is no longer able to access email or visit websites without a Wi-Fi connection on the smartphone. Which of the following could the user do to most likely resolve the issue?

A.

Enable cellular data.

B.

Increase data limits.

C.

Disconnect the VPN.

D.

Reinstall the SIM card.

Full Access
Question # 81

A technician is manually updating Windows workstations. Each workstation is currently running Windows Pro in a workgroup environment. Which of the following changes can the technician make to create a more manageable environment?

A.

Downgrade all workstations from the Pro version to the Home version of the OS.

B.

Upgrade all workstations from the Pro version to Pro for Workstations.

C.

Create a domain and join the workstations to the domain for management purposes.

D.

Make sure all workstations are operating under the same workgroup name.

Full Access
Question # 82

A company executive is currently attending a major music festival with a large number of attendees and is having trouble accessing a work email account. The email application is not downloading emails and appears to be stuck during connection attempts. Which of the following is most likely causing the disruption?

A.

The phone has no storage space available.

B.

Company firewalls are configured to block remote access to email resources.

C.

Too many devices in the same area are trying to connect to the mobile network.

D.

The festival organizer prohibits internet usage during the event and has blocked the internet signal.

Full Access
Question # 83

A technician, who is completing hardware upgrades at a company, is approached by a user who submitted a computer upgrade request. After checking the list of offices to upgrade, the technician finds that the user's office is not listed for an upgrade. Which of the following actions should the technician take next?

A.

Ask the company's human resources department to address the issue.

B.

Notify the project manager about the user's concern.

C.

Tell the user that this request is not on the list to be upgraded.

D.

Ask the user's supervisor if the technician should upgrade the computer.

Full Access
Question # 84

A technician is trying to perform an in-place upgrade of a Windows OS from a file. When the technician double-clicks the file, the technician receives a prompt to mount a drive. Which of the following file types did the technician download?

A.

msi

B.

iso

C.

zip

D.

exe

Full Access
Question # 85

A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

A.

File Explorer

B.

Startup Folder

C.

System Information

D.

Programs and Features

E.

Task Scheduler

F.

Device Manager

Full Access
Question # 86

After a computer upgrade at an imaging lab. the upgraded computers are not able to obtain an IP address. Which of the following is most likely the issue?

A.

TheswitchIs only providing IPv6 addresses.

B.

TheOS must be updated to be compatible with the imaging software.

C.

Theswitchhas port security enabled.

D.

Theswitchdoes not support multicast traffic.

Full Access
Question # 87

Which of the following types of malware is designed to enable administrative access to a computer?

A.

Rootkit

B.

Trojan

C.

Worm

D.

Ransomware

Full Access
Question # 88

A change management review board denied an administrator's request for change. The administrator had provided the purpose and scope of the change, the date and time, and impacted systems with the risk analysis. Which of the following should be included to approve this change?

A.

End-user acceptance

B.

Cost analysis

C.

Rollback plan

D.

Standard maintenance window

Full Access
Question # 89

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the

available RAM?

A.

The system is missing updates.

B.

The systems utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates.

Full Access
Question # 90

A new employee was hired recently. Which of the following documents will the new employee need to sign before being granted login access to the network?

A.

MSDS

B.

EULA

C.

UAC

D.

AUP

Full Access
Question # 91

Which of the following defines the extent of a change?

A.

Scope

B.

Purpose

C.

Analysis

D.

Impact

Full Access
Question # 92

Which of the following script types is used with the Python language by default?

A.

.ps1

B.

.vbs

C.

.bat

D.

.py

Full Access
Question # 93

After a company installed a new SOHO router customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?

A.

Port forwarding

B.

Firmware updates

C.

IP filtering

D.

Content filtering

Full Access
Question # 94

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

A.

User account status

B.

Mobile OS version

C.

Data plan coverage

D.

Network traffic outages

Full Access
Question # 95

A technician is troubleshooting a mobile device that was dropped. The technician finds that the screen (ails to rotate, even though the settings are correctly applied. Which of the following pieces of hardware should the technician replace to resolve the issue?

A.

LCD

B.

Battery

C.

Accelerometer

D.

Digitizer

Full Access
Question # 96

A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?

A.

Boot order

B.

Malware

C.

Drive failure

D.

Windows updates

Full Access
Question # 97

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

A.

Login times

B.

Screen lock

C.

User permission

D.

Login lockout attempts

Full Access
Question # 98

Which of the following is the default GUI and file manager in macOS?

A.

Disk Utility

B.

Finder

C.

Dock

D.

FileVault

Full Access
Question # 99

A technician needs to provide recommendations about how to upgrade backup solutions for a site in an area that has frequent hurricanes and an unstable power grid. Which of the following should the technician recommend implementing?

A.

High availability

B.

Regionally diverse backups

C.

On-site backups

D.

Incremental backups

Full Access
Question # 100

A user reports that after a recent software deployment to upgrade applications, the user can no longer use the Testing program.

However, other employees can successfully use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve any issues discovered by selecting the:

    Index number of the Event Viewer issue

    First command to resolve the issue

    Second command to resolve the issue

BSOD

Commands:

Event Viewer:

System Error:

Full Access
Question # 101

A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

A.

Convert the PC from a DHCP assignment to a static IP address.

B.

Run a speed test to ensure the advertised speeds are met.

C.

Test all network sharing and printing functionality the customer uses.

D.

Change the default passwords on new network devices.

Full Access
Question # 102

A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock. Which of the following options in the Windows settings should the technician use?

A.

Ease of Access

B.

Privacy

C.

Personalization

D.

Update and Security

Full Access
Question # 103

A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?

A.

Phishing

B.

Smishing

C.

Whaling

D.

Vishing

Full Access
Question # 104

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

A.

A system patch disabled the antivirus protection and host firewall.

B.

The system updates did not include the latest anti-malware definitions.

C.

The system restore process was compromised by the malware.

D.

The malware was installed before the system restore point was created.

Full Access
Question # 105

A Windows user recently replaced a computer The user can access the public internet on the computer; however, an internal site at https7/companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?

A.

Default gateway settings

B.

DHCP settings

C.

IP address settings

D.

Firewall settings

E.

Antivirus settings

Full Access
Question # 106

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

A.

Recalibrating the magnetometer

B.

Recalibrating the compass

C.

Recalibrating the digitizer

D.

Recalibrating the accelerometer

Full Access
Question # 107

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

A.

Security groups

B.

Access control list

C.

Group Policy

D.

Login script

Full Access
Question # 108

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

A.

The system is missing updates.

B.

The system is utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates

Full Access
Question # 109

A technician needs to transfer a file to a user's workstation. Which of the following would BEST accomplish this task utilizing the workstation's built-in protocols?

A.

VPN

B.

SMB

C.

RMM

D.

MSRA

Full Access
Question # 110

Which of the following often uses an SMS or third-party application as a secondary method to access a system?

A.

MFA

B.

WPA2

C.

AES

D.

RADIUS

Full Access
Question # 111

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

A.

Requiring employees to enter their usernames and passwords

B.

Setting up facial recognition for each employee

C.

Using a PIN and providing it to employees

D.

Requiring employees to use their fingerprints

Full Access
Question # 112

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

A.

Access control list

B.

Acceptable use policy

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 113

Which of the following only has a web browser interface?

A.

Linux

B.

Microsoft Windows

C.

iOS

D.

Chromium

Full Access
Question # 114

Which of the following editions of Windows 10 requires reactivation every 180 days?

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Full Access
Question # 115

Which of the following filesystem formats would be the BEST choice to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems?

A.

APFS

B.

ext4

C.

CDFS

D.

FAT32

Full Access
Question # 116

A user's corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

A.

Remote wipe

B.

Firewall

C.

Device encryption

D.

Remote backup

E.

Antivirus

F.

Global Positioning System

Full Access
Question # 117

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

A.

Trojan

B.

Rootkit

C.

Cryptominer

D.

Keylogger

Full Access
Question # 118

A BSOD appears on a user's workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?

A.

Stop code

B.

Event Mewer

C.

Services

D.

System Configuration

Full Access
Question # 119

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

A.

gpedit

B.

gpmc

C.

gpresult

D.

gpupdate

Full Access
Question # 120

A user reports that the pages flash on the screen two or three times before finally staying open when attempting to access banking web pages. Which of the following troubleshooting steps should the technician perform NEXT to resolve the issue?

A.

Examine the antivirus logs.

B.

Verify the address bar URL.

C.

Test the internet connection speed.

D.

Check the web service status.

Full Access
Question # 121

A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed:

crypt32.d11 is missing not found

Which of the following should the technician attempt FIRST?

A.

Rebuild Windows profiles.

B.

Reimage the workstation

C.

Roll back updates

D.

Perform a system file check

Full Access
Question # 122

A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?

A.

Multifactor authentication

B.

Encryption

C.

Increased password complexity

D.

Secure password vault

Full Access
Question # 123

A customer who uses a Linux OS called the help desk to request assistance in locating a missing file. The customer does not know the exact name of the file but can provide a partial file name. Which of the following tools should the technician use? (Select two).

A.

cat

B.

df

C.

grep

D.

ps

E.

dig

F.

find

G.

top

Full Access
Question # 124

An employee using an Apple MacBook is receiving frequent, random pop-up requests from other Apple devices wanting to share photos and videos and asking whether the user would like to accept the request Which of the following configurations should the technician advise the user to change first"?

A.

Wi-Fi

B.

iCloud

C.

Antivirus

D.

AirDrop

Full Access
Question # 125

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?

A.

Request physical media

B.

Mount the ISO file.

C.

Install a third-party software.

D.

Download an appropriate 32-bit/64-bit OS file.

Full Access
Question # 126

A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

A.

Install antispyware

B.

Reimage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

Full Access
Question # 127

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Full Access
Question # 128

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

A.

Devices and Printers

B.

Administrative Tools

C.

Network and Sharing Center

D.

Programs and Features

Full Access
Question # 129

A technician wants to improve password security after several users admitted to using very simple passwords. Which of the following is the best way to resolve this issue?

A.

Requiring four character types

B.

Decreasing the password expiration times

C.

Enabling an automatic lock timer

D.

Adding two characters to the minimum password length

Full Access
Question # 130

A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?

A.

Security groups

B.

Folder redirection

C.

Organizational unit structure

D.

Access control list

Full Access
Question # 131

A technician needs to configure a computer for a user to work from home so the user can still securely access the user’s shared files and corporate email. Which of the following tools would best accomplish this task*?

A.

MSRA

B.

FTP

C.

RMM

D.

VPN

Full Access
Question # 132

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?

A.

netstat

B.

ping

C.

format

D.

tracert

Full Access
Question # 133

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?

A.

Thegraphics card driver needs to beupdated

B.

Theapplication installer is 64-bit.

C.

Theinstallation requires administrative rights.

D.

Thedisk space is inadequate.

Full Access
Question # 134

A technician receives a high-priority ticket about sensitive information collected from an end user’s workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

A.

Reimage the workstation.

B.

Inform the user of the investigation.

C.

Recover and secure the workstation.

D.

Back up the workstation

Full Access
Question # 135

A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?

A.

Perform a safe mode boot.

B.

Run the System Restore wizard.

C.

Start the computer in the last known-good configuration.

D.

Reset the BIOS settinqs.

Full Access
Question # 136

A technician is upgrading the Microsoft Windows 10 OS. Which of the following are required for the technician to safely upgrade the OS? (Select two).

A.

Release notes

B.

Antivirus software

C.

Backup of critical data

D.

Device drivers

E.

Word processing software

F.

Safe boot mode

Full Access
Question # 137

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Full Access
Question # 138

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

A.

Configure MAC filtering.

B.

Disable DHCP.

C.

Configure port forwarding.

D.

Disable guest access.

Full Access
Question # 139

Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a secondary feature of Windows Hello that can be used to log in?

A.

Personal identification number

B.

Username/password

C.

One-time-use token

D.

Cryptographic device

Full Access
Question # 140

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

A.

Application permissions

B.

Available storage space

C.

Battery charge level

D.

Wi-Fi connection speed

Full Access
Question # 141

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

A.

diskpart

B.

chown

C.

gpupdate

D.

netstat

Full Access
Question # 142

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:

"This site cannot be reached."

A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?

A.

HTTPS

B.

VLAN

C.

DNS

D.

SMTP

Full Access
Question # 143

A network administrator is setting up the security for a SOHO wireless network. Which of the following options should the administrator enable to secure the network?

A.

NATBWPA3

B.

802.1X

C.

Static IP

Full Access
Question # 144

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

A.

Replacing non-mobile users' laptops with wired desktop systems

B.

Increasing the wireless network adapter metric

C.

Adding wireless repeaters throughout the building

D.

Upgrading the current mesh network to support the 802.11 n specification

Full Access
Question # 145

A technician is troubleshooting a Windows system that is having issues with the OS loading at startup. Which of the following should the technician do to diagnose the issue?

A.

Enable boot logging on the system.

B.

Launch the last known-good configuration.

C.

Check the system resource usage in Task Manager.

D.

Run the sfc /scannow command.

E.

Use the Event Viewer to open the application log

Full Access
Question # 146

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

A.

Spam filtering

B.

Malware preventionsoftware

C.

End user education

D.

Stateful firewall inspection

Full Access
Question # 147

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).

A.

Degauss

B.

Delete

C.

Incinerate

D.

Recycle

E.

Format

F.

Shred

Full Access
Question # 148

Which of the following language types enables the automation of tasks?

A.

Compiled

B.

Scripting

C.

Web

D.

Database

Full Access
Question # 149

A technician needs to troubleshoot a user's computer while the user is connected to the system. The technician must also connect to the user's system using remote access tools built in to Windows Which of the following is the best option to troubleshoot the user's computer?

A.

Screen share

B.

MSRA

C.

Virtual network computer

D.

RDP

Full Access
Question # 150

A user's computer is running slower than usual and takes a long time to start up. Which of the following tools should the technician use first to investigate the issue?

A.

Action Center

B.

Task Manager

C.

Resource Monitor

D.

Security Configuration Wizard

E.

Event Viewer

Full Access
Question # 151

Which of the following operating systems was the app file type designed to run under as an application file bundle?

A.

macOS

B.

Chrome

C.

Windows

D.

Linux

Full Access
Question # 152

A user's company phone has several pending software updates. A technician completes the following steps:

•Rebooted the phone

•Connected to Wi-Fi

•Disabled metered data

Which of the following should the technician do next?

A.

Restore the factory settings.

B.

Clean the browser history.

C.

Uninstall and reinstall the applications.

D.

Clear the cache.

Full Access
Question # 153

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Full Access
Question # 154

Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware?

A.

Run System Restore.

B.

Place in recovery mode.

C.

Schedule a scan.

D.

Restart the PC.

Full Access
Question # 155

A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further?

A.

ipconfig

B.

arp

C.

nslookup

D.

pathping

Full Access
Question # 156

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

A.

Cross-site scripting

B.

SQL injection

C.

Brute-force attack

D.

DDoS attack

Full Access
Question # 157

A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to make sure the printer stays connected in the future and is available on all the computers in the house. Which of the following should the technician configure on the printer?

A.

DNS settings

B.

Static IP

C.

WWAN

D.

Meteredconnection

Full Access
Question # 158

Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in the trash bin?

    .exe

A.

.dmg

B.

. app

C.

. rpm

D.

.pkg

Full Access
Question # 159

Which of the following is the most likely reason a filtration system is critical for data centers?

A.

Plastics degrade over time.

B.

High humidity levels can rust metal.

C.

Insects can invade the data center.

D.

Dust particles can clog the machines.

Full Access
Question # 160

A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?

A.

Event Viewer

B.

System Configuration

C.

Device Manager

D.

Performance Monitor

Full Access
Question # 161

A technician wants to install Developer Mode on a Windows laptop but is receiving a "failed to install package" message. Which of the following should the technician do first?

A.

Ensure internet connectivity.

B.

Check for Windows updates.

C.

Enable SSH.

D.

Reboot computer.

Full Access
Question # 162

A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

A.

Turn off the monitor.

B.

Remove the power cord.

C.

Remove the PSU.

D.

Remove the RAM modules.

Full Access
Question # 163

Which of the following are mobile operating systems used on smartphones? (Select two).

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

Full Access
Question # 164

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

    Run an antivirus and enable encryption.

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

Full Access
Question # 165

Which of the following is the best reason for sandbox testing in change management?

    To evaluate the change before deployment

A.

To obtain end-user acceptance

B.

To determine the affected systems

C.

To select a change owner

Full Access
Question # 166

A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?

A.

Phishing

B.

Dumpster diving

C.

Tailgating

D.

Evil twin

Full Access
Question # 167

A user is unable to access a remote server from a corporate desktop computer using the appropriate terminal emulation program. The user contacts the help desk to report the issue. Which of the following clarifying questions would be most effective for the help desk technician to ask the user in order to understand the issue?

A.

What is the error message?

B.

Does the program work on another computer?

C.

Did the program ever work?

D.

Is anyone else having this issue?

Full Access
Question # 168

A technician was assigned a help desk ticket and resolved the issue. Which of the following should the technician update to assist other technicians in resolving similar issues?

    End user training

A.

Progress notes

B.

Knowledge base

C.

Acceptable use policy document

Full Access
Question # 169

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?

    Group Policy

A.

User accounts

B.

Access control lists

C.

Authenticator applications

Full Access
Question # 170

A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?

A.

cat

B.

chmod

C.

pwd

D.

cacls

Full Access
Question # 171

A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?

A.

Delete the browser cookies and history.

B.

Reset all browser settings.

C.

Change the browser default search engine.

D.

Install a trusted browser.

Full Access
Question # 172

Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?

A.

APFS

B.

FAT32

C.

NTFS

D.

ext4

Full Access
Question # 173

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

A.

Isolate the machine from the network.

B.

Scan the system for hidden files.

C.

Disable unused ports.

D.

Install antivirus software.

E.

Reconfigure the firewall.

Full Access
Question # 174

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

A.

Turn on airplane mode.

B.

Set the connection to be metered.

C.

Configure the device to use a static IP address.

D.

Enable the Windows Defender Firewall.

Full Access
Question # 175

Which of the following operating systems would most likely be used to run the inventory management system at a factory?

A.

Windows

B.

Chrome OS

C.

Android

D.

iOS

Full Access
Question # 176

Which of the following items require special e-waste recycling? (Select two).

    Solid-state drive

A.

A/C adapter

B.

Surge protector

C.

Laptop battery

D.

CRT monitor

E.

Power supply

Full Access
Question # 177

A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?

A.

EFS

B.

GPT

C.

MBR

D.

FAT32

Full Access
Question # 178

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?

A.

Run one scan and schedule future scans.

B.

Back up the uninfected files and reimage the computer.

C.

Restore the clean backup copies of the infected files.

D.

Run repeated remediation scans until the malware is removed.

Full Access
Question # 179

An engineer is configuring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site?

A.

Image deployment

B.

Recovery partition installation

C.

Remote network installation

D.

Repair installation

Full Access
Question # 180

A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?

    Color Management

A.

System

B.

Troubleshooting

C.

Device Manager

D.

Administrative Tools

Full Access
Question # 181

Which of the following commands can a technician use to get the MAC address of a Linux distribution?

    net use

A.

ifconfig

B.

netstat

C.

ping

Full Access
Question # 182

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?

A.

Disable the browser from sending notifications to the Action Center.

B.

Run a full antivirus scan on the computer.

C.

Disable all Action Center notifications.

D.

Move specific site notifications from Allowed to Block.

Full Access
Question # 183

Which of the following protocols supports fast roaming between networks?

A.

WEP

B.

WPA

C.

WPA2

D.

LEAP

E.

PEAP

Full Access
Question # 184

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

A.

Installing a VPN

B.

Implementing location tracking

C.

Configuring remote wipe

D.

Enabling backups

Full Access
Question # 185

When visiting a particular website, a user receives a message stating, "Your connection is not private." Which of the following describes this issue?

A.

Certificate warning

B.

Malware

C.

JavaScript error

D.

Missing OS update

Full Access
Question # 186

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.

Which of the following security measures should the user take to ensure security and privacy?

A.

Only accept calls from known people.

B.

Disregard any suspicious emails.

C.

Update the antivirus software.

D.

Enable two-factor authentication.

E.

Install a malware scanner.

Full Access
Question # 187

When trying to access a secure internal network, the user receives an error messaging stating, "There is a problem with this website's security certificate." The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring?

A.

Reimage the system and install SSL.

B.

Install Trusted Root Certificate.

C.

Select View Certificates and then Install Certificate.

D.

Continue to access the website.

Full Access
Question # 188

A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond?

    Place the customer on hold until the customer calms down.

A.

Disconnect the call to avoid a confrontation.

B.

Wait until the customer is done speaking and offer assistance.

C.

Escalate the issue to a supervisor.

Full Access
Question # 189

A technician is moving a Windows workstation from the accounting department to the sales department and needs to update the IP and gateway settings. Which of the following Control Panel utilities should the technician use?

A.

Programs and Features

B.

Network and Sharing Center

C.

User Accounts

D.

Device Manager

Full Access
Question # 190

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

A.

Advise the user to run a complete system scan using the OS anti-malware application

B.

Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present

C.

Have the user check for recently installed applications and outline those installed since the link in the email was clicked

D.

Instruct the user to disconnect the Ethernet connection to the corporate network.

Full Access
Question # 191

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

Full Access
Question # 192

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?

A.

Encrypting File System

B.

FileVault

C.

BitLocker

D.

Encrypted LVM

Full Access
Question # 193

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

A.

Configure the network as private

B.

Enable a proxy server

C.

Grant the network administrator role to the user

D.

Create a shortcut to public documents

Full Access
Question # 194

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)

A.

Scan the computer with the company-provided antivirus software

B.

Install a new hard drive and clone the user's drive to it

C.

Deploy an ad-blocking extension to the browser.

D.

Uninstall the company-provided antivirus software

E.

Click the link in the messages to pay for virus removal

F.

Perform a reset on the user's web browser

Full Access
Question # 195

A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel. Which of the following explains why the technician unable to find this menu item?

A.

The hardware does not meet BitLocker's minimum system requirements.

B.

BitLocker was renamed for Windows 10.

C.

BitLocker is not included on Windows 10 Home.

D.

BitLocker was disabled in the registry of the laptop

Full Access
Question # 196

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO)

A.

Enable multifactor authentication for each support account

B.

Limit remote access to destinations inside the corporate network

C.

Block all support accounts from logging in from foreign countries

D.

Configure a replacement remote-access tool for support cases.

E.

Purchase a password manager for remote-access tool users

F.

Enforce account lockouts after five bad password attempts

Full Access
Question # 197

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

A.

Spyware

B.

Cryptominer

C.

Ransormvare

D.

Boot sector virus

Full Access
Question # 198

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

Which of the following should be done NEXT?

A.

Educate the user on the solution that was performed.

B.

Tell the user to take time to fix it themselves next time.

C.

Close the ticket out.

D.

Send an email to Telecom to inform them of the Issue and prevent reoccurrence.

Full Access
Question # 199

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

A.

Language

B.

System

C.

Personalization

D.

Ease of Access

Full Access
Question # 200

Which of the following is a proprietary Cisco AAA protocol?

A.

TKIP

B.

AES

C.

RADIUS

D.

TACACS+

Full Access
Question # 201

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

Full Access
Question # 202

After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:

The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?

A.

Update the browser's CRLs

B.

File a trouble ticket with the bank.

C.

Contact the ISP to report the CFCs concern

D.

Instruct the CFO to exit the browser

Full Access
Question # 203

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

A.

MSRA

B.

VNC

C.

VPN

D.

SSH

Full Access
Question # 204

A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

Full Access
Question # 205

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

A.

Encryption at rest

B.

Account lockout

C.

Automatic screen lock

D.

Antivirus

Full Access
Question # 206

A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?

A.

Open Settings select Devices, select Display, and change the display resolution to a lower resolution option

B.

Open Settings, select System, select Display, and change the display resolution to a lower resolution option.

C.

Open Settings Select System, select Display, and change the Scale and layout setting to a higher percentage.

D.

Open Settings select Personalization, select Display and change the Scale and layout setting to a higher percentage

Full Access
Question # 207

As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

A.

Use Settings to access Screensaver settings

B.

Use Settings to access Screen Timeout settings

C.

Use Settings to access General

D.

Use Settings to access Display.

Full Access
Question # 208

A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).

A.

Utilizing an ESD strap

B.

Disconnecting the computer from the power source

C.

Placing the PSU in an antistatic bag

D.

Ensuring proper ventilation

E.

Removing dust from the ventilation fans

F.

Ensuring equipment is grounded

Full Access
Question # 209

A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?

A.

The smartphone's line was not provisioned with a data plan

B.

The smartphone's SIM card has failed

C.

The smartphone's Bluetooth radio is disabled.

D.

The smartphone has too many applications open

Full Access
Question # 210

A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

A.

Repair Windows.

B.

Partition the hard disk.

C.

Reimage the workstation.

D.

Roll back the updates.

Full Access
Question # 211

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

A.

Acceptable use

B.

Chain of custody

C.

Security policy

D.

Information management

Full Access
Question # 212

A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?

A.

Services

B.

Processes

C.

Performance

D.

Startup

Full Access
Question # 213

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

A.

resmon exe

B.

msconfig.extf

C.

dfrgui exe

D.

msmfo32.exe

Full Access
Question # 214

A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?

A.

Internet-based upgrade

B.

Repair installation

C.

Clean install

D.

USB repair

E.

In place upgrade

Full Access
Question # 215

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

Full Access
Question # 216

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

A.

Encrypt the files

B.

Clone any impacted hard drives

C.

Contact the cyber insurance company

D.

Inform law enforcement

Full Access
Question # 217

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

A.

Pretexting

B.

Spoofing

C.

Vishing

D.

Scareware

Full Access
Question # 218

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

A.

Ransomware

B.

Failed OS updates

C.

Adware

D.

Missing system files

Full Access
Question # 219

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

A.

Increase the paging file size

B.

Run the chkdsk command

C.

Rebuild the user's profile

D.

Add more system memory.

E.

Defragment the hard drive.

Full Access
Question # 220

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

A.

Default gateway

B.

Host address

C.

Name server

D.

Subnet mask

Full Access
Question # 221

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

A.

MDM

B.

EULA

C.

IRP

D.

AUP

Full Access
Question # 222

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

A.

Have the user provide a callback phone number to be added to the ticket

B.

Assign the ticket to the department's power user

C.

Register the ticket with a unique user identifier

D.

Provide the user with a unique ticket number that can be referenced on subsequent calls.

Full Access
Question # 223

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?

A.

Consoltf

B.

Disk Utility

C.

Time Machine

D.

FileVault

Full Access
Question # 224

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

A.

Lock all devices in a closet.

B.

Ensure all devices are from the same manufacturer.

C.

Change the default administrative password.

D.

Install the latest operating system and patches

Full Access
Question # 225

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Full Access
Question # 226

Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?

A.

System time

B.

IP address

C.

DNS servers

D.

Windows updates

Full Access
Question # 227

An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT?

A.

Perform a risk analysis.

B.

Implement the deployment.

C.

Verify end user acceptance

D.

Document the lessons learned.

Full Access
Question # 228

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

A.

Rearranging the monitor's position in display settings

B.

Swapping the cables for the monitors

C.

Using the Ctrl+AIt+> to correct the display orientation

D.

Updating the display drivers for the video card

Full Access
Question # 229

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

A.

Escalate the ticket to Tier 2.

B.

Run a virus scan.

C.

Utilize a Windows restore point.

D.

Reimage the computer.

Full Access
Question # 230

Which of the following is an example of MFA?

A.

Fingerprint scan and retina scan

B.

Password and PIN

C.

Username and password

D.

Smart card and password

Full Access
Question # 231

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

A.

DRM

B.

NDA

C.

EULA

D.

MOU

Full Access
Question # 232

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

A.

Installer_x64.exe

B.

Installer_Files.zip

C.

Installer_32.msi

D.

Installer_x86.exe

E.

Installer_Win10Enterprise.dmg

Full Access