An organization is developing testing schedules to ensure its disaster recovery plans will be effective in case of a disaster. In addition to the generators and UPS systems, which of the following should the technician recommend testing?
A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?
A user suspects a computer Is infected with malware. A technician identifies the symptoms as being related to a recent spread of malware. Which of the following steps should the technician take NEXT to address the infection?
A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected. II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?
A customer wants to format a 4TB external drive with a filesystem that is compatible with both Windows and
Which of the following should the technician suggest the customer use?
A technician Is completing the documentation for a major OS upgrade of a Linux distribution that will impact a company's web services. The technician finishes the risk assessment and documents the change process. Which of the following should the technician complete NEXT?
A remote user has reported a suspicious pop-up. and a technician is troubleshooting the user's laptop. The technician needs to connect securely to the computer to view the user's screen and investigate the issue Which of the following should the technician use?
A technician needs to remove malware from a Windows system. The technician has already performed research on the malware and determined it is a memory virus. Which of the following steps should the technician take NEXT?
A folder has the share permissions of everyone - change, while the folder's NTFS permissions are Set to everyone - read. Which of the following would be the MOST effective permissions for someone who is accessing
the folder via the share?
A technician needs to access the user Interface of a server outside the network. The technician added network security with MAC filtering and port forwarding to allow tor the connection Which of the following will the technician MOST likely use to connect to the server?
Which of the following OS types provides a lightweight option for workstations that need an easy-to-use browser-based interface?
A user receives an error message when trying upgrade an application on a work computer. Which of the following is the MOST likely reason the user cannot complete this task?
A technician is installing the Mac OS X operating system. The technician is prompted to select the filesystem. Which of the following filesystems should the technician utilize to install the listed operating system?
A technician is configuring a static IP address on a Windows machine. The information is as follows:
Which of the following would be a valid default gateway address?
Which of the following wireless encryption standards uses 802.1X In its process to secure a wireless network?
A user's mobile device appears to lose connectivity only in certain areas. The device works normally when II is not in those areas, and the user has determined that a cellular signal is available In the areas where the connectivity is lost Which of the following should be considered?
A user’s mobile social media application is sending emails on behalf of the user. However, the user has not authorized any new permissions for the social media application. The user only has this application installed on their smart phone and no other devices. Which of the following should a technician perform to resolve the issue?
A technician is performing service on a computer and notices it is responding very slowly. The computer has 4GB of RAM. a four-core 3GHz processor, and a SATA I 54O0rpm 300GB HOD. The technician logs the following process information:
Based on this data, which of the following is the MOST likely cause of the performance issues?
A company seized an employee's laptop due to illegal activity. The computer has been locked in an office until it can be turned over to authorities. and no one is allowed to log on to it Which of the following policies is this an example of?
A technician is reviewing system updates. Some of the updates address vulnerabilities found in mission-critical servers, and they need to be performed immediately. Which of the following should the technician perform FIRST?
A technician logs on to a Linux computer and runs the following command:
ps -aux | grep vi
Which of the following MOST accurately describes the effect of the command?
A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.
Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?
After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)
Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server.
Joe has verified he is connected to the Internet.
Which of the following would explain why Joe cannot access his personal shares?
Ann, an employee, has been trying to use a company-issued mobile device to access an internal fileshare while traveling abroad. She restarted the device due to a mobile OS update, but she is now unable to access company information Ann calls the help desk for assistance, and a technician verifies she can make calls and access websites Which of the following should the technician suggest NEXT to try to fix the issue?
Following a recent password change, a user can log on successfully to an Apple computer but cannot access a web-based service. An error message displays each time the user attempts lo authenticate to the service. Prior to changing the password, the computer had no communication issues. Which of the following should a technician use to continue troubleshooting the issue?
A user's laptop screen goes black after five minutes of not being used. Which of the following Windows Control Panel utilities should be used to modify the user experience?
Which of the following best practices should a technician observe to reduce the risk of electrical shock?
A technician needs to configure network shares on users' computers when they log on. The technician wrote the script with the net use command. Which of the following script file types is the technician writing.
A customer contacts an IT technician regarding a PC's performance. The customer explains that the computer struggles to run several applications simultaneously, Which of the following
changes should the technician recommend FIRST to address the customer's concern?
A technician is setting up a SOHO wireless router and needs to adhere to the following requirements:
The router should not assign network addresses to any device.
All devices in the office must be able to access network resources and the Internet.
Which of the following should the technician perform to meet these requirements?
A user is having issues with website access. The user is trying to access a site that is used every day by everyone in the company. When the user goes to the site a message appears stating the site is not secure, and the address bar turns red. A technician contains the site is working fine kw everyone else The technician verifies the address was entered correctly but when the message shows up. the address is different than what was typed Which of the following is causing this issue?
An end user reports a Windows computer is infected with a virus. Which of the following should be the technician’s FIRST troubleshooting step?
A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.)
An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application?
After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users Which of the following is the BEST way for the technician to perform this security feature?
A technician is securing a server room by implementing a two-factor authentication solution Which of the following should the technician implement to provide the BEST security for the server room?
Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)
When users turn on or reboot their machines, many of the computers on the network are non-responsive and unable to access the Internet. The users who left their computers on or have not rebooted are not experiencing this issue A technician confirms all the network switches and routers are working, and no servers are having any issues The network administrator notices abnormally high network utilization Which of the following is the MOST likely issue the company is experiencing?
A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?
A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?
Which of the following must be enabled to configure 20 new machines to be booted over a network?
A desktop technician needs to replace a laptop’s SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement?
A corporate fileshare holds files for multiple departments. Individual users in each department create reports
that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that
encrypted all of the documents on the fileshare. The software asked for money to be transferred via
cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the
ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?
A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which
of the following should the technician monitor during the installation?
A user wants to see the workstations present on the LAN in a workgroup environment. Which of the following
settings must be enabled to make this possible?
A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?
A technician is adding a folder lo a structure that Is several levels down from the top level. The technician wants to make sure the new folder will have the same permissions as the top level Which of the following should the technician configure?
Which of the following Windows versions introduced using applications in the Metro interface?
A home user reports slow computer performance and application crashes after clicking a "repair" button on a pop-up warning while browsing the Internet Which of the following are the FIRST steps a technician should take to identify and resolve the issue? (Select TWO).
Which of the following key and mouse combinations can be used to run an application as a different user?
Company policy states that users must secure their laptops before leaving the office for the evening Which of the following physical security measures should be used?
A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices such as a mouse or a printer, and a reboot did not fix the problem Which of the following would MOST likely fix the issue?
A user brings in a home desktop computer for cleaning. Upon opening the computer, a technician finds large amounts of dust and dirt inside. Which of the following should the technician use to remove the excess dust and dirt?
A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer. Which of the following connection protocols should the technician use?
A company wants to move the contents of its users’ My Documents folders from their local hard drives to a file server so they are backed up every night. Which of the following security concepts does this describe?
Which of the following Is the MOST cost-effective option to protect computers and peripherals from damage caused by power fluctuations?
A new user has joined a company, and human resources has given the user several documents to sign
regarding compliance and regulations for company computers. The user has also received web links to
documentation for applications, as well as processes and procedures to do jobs in accordance with those
programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)
Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.
Which of the following would be the BEST resolution to Ann’s issue?
A desktop technician is responsible for the OS migration of 300 end users. As part of the migration, the technician must save the end users* data to a temporary shared drive. The data must include any hidden files to ensure 100% of the data is retained. Which of the following commands will achieve this result by default?
Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features?
A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)
Which of the following standards controls the processing of credit cards?
A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use?
A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take?
A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?
Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?
A user who is running Windows 10 logs Into a machine and notices that shared drives are missing, the "My Documents* folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?
A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers.
Which of the following data destruction methods should the technician perform to ensure the data is removed completely?
A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)
An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take?
Which of the following technologies is used by malicious employees to obtain user passwords?
A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses Which of the following is MOST likely the problem?
A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network Which of the following best practices could have prevented the attack?
Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a "click here" button to resolve it. There is a timer in the pop-up. counting down the time until the computer is no longer usable. Which of the following should the technician do NEXT?
While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?
A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on ot the device and opens terminal. Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?
Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?
A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO).
A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue?
A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:
There are 1033 infected files on this computer. Click here to disinfect.
The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?
A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?
A drive wipe utility can truly overwrite data. A “Department of Defense” wipe will perform this overwrite operation at least seven times to truly obliterate the data on the drive, making it unrecoverable.
An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hot-spot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hot-spot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hot-spot on her phone, and the speed test result on that hot-spot is 15Mbps. The technician checks the hot-spot settings on Joe’s phone and sees the following:
Which of the following is the MOST likely cause of the problem?
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.
Which of the following account types would the technician MOST likely set up on this kiosk machine?
A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away.
The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following:
Which of the following should be changed to resolve this issue?
Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?
A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.
Which of the following would MOST likely fix the issue?
Which of the following is the maximum RAM limit of a Windows 32-bit version?
Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?
A technician is working on a Windows 10 PC that is running slowly.
Which of the following commands should the technician use to correct this issue? (Select two.)
Which of the following types of scripts would be seen on the user end of a web page?
Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?