Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

220-1002 Questions and Answers

Note! Following 220-1002 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 220-1102

220-1002 Questions and Answers

Question # 6

During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware?

A.

Backout plan

B.

Contingency plan

C.

Alternative plan

D.

Backup plan

Full Access
Question # 7

Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?

A.

Credential Manager

B.

Network and Sharing Center

C.

Security and Maintenance

D.

Troubleshooting

Full Access
Question # 8

A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?

A.

Disable System Restore.

B.

Create a restore point.

C.

Apply system updates.

D.

Restart into safe mode.

Full Access
Question # 9

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.

Which of the following should the technician do?

A.

Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot

B.

Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one

C.

Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time

D.

Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved

Full Access
Question # 10

An administrator created a documents that shows network equipment connections, including endpoints, server, routers, and switches. Which of the following documents did the administrator create?

A.

Incident response plan

B.

Knowledge base

C.

Inventory list

D.

Network topology

Full Access
Question # 11

A user receives the following error message while browsing the Internet on a PC: The connection is not private. Upon inspection, a technician discovers the issue only occurs on the user’s banking website, and the issue can be duplicated on another PC. The function to view the certificate shows it is valid and has yesterday’s date as the expiration. Which of the following should the technician do NEXT?

A.

Ignore the error and accept the certificate.

B.

Report the certificate error to the bank.

C.

Download an updated certificate.

D.

Stop and restart the certificate services.

E.

Reimage the desktop, as it contains malware.

Full Access
Question # 12

Which of the following physical security measures is intended to mitigate tailgating?

A.

Biometrics

B.

Badge reader

C.

Smart card

D.

Mantrap

Full Access
Question # 13

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take?

A.

Update antivirus definitions

B.

Install anti-malware software

C.

Enable the pop-up blocker

D.

Reboot the PC

Full Access
Question # 14

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

A.

Default SSID

B.

MAC filtering

C.

Power levels

D.

Content filtering

E.

Firewall

Full Access
Question # 15

A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.

Which of the following should the technician attempt NEXT?

A.

Reboot into safe mode and roll back the updates

B.

Repair the Windows Registry

C.

Configure boot options in the BIOS

D.

Disable Windows services and applications

Full Access
Question # 16

A technician is troubleshooting a home WiFi router that is used by a small company of 30 employees. The business is experiencing intermittent wireless connectivity issues. Which of the following is the MOST likely cause of the issues'?

A.

Some of the employees are not licensed to use the router

B.

The router has insufficient capabilities

C.

Static DNS has not been set up on the router.

D.

Several of the employees are using an incorrect SSlD

Full Access
Question # 17

Which of the following may include the use of a password and a rotating PIN lo access a wireless network?

A.

RADIUS authentication

B.

TKIP authentication

C.

Multifactor authentication

D.

TACACS authentication

Full Access
Question # 18

A user’s login screen does not look normal when booting the computer. A technician states the computer was showing the company’s workstation imaging system screen, but it has since been fixed. Which of the following did the technician update?

A.

Operating system

B.

Drivers

C.

Boot order

D.

BIOS firmware

Full Access
Question # 19

A technician performs a risk assessment and determines a requested change has low risk and low impact. Which of the following best practices should the technician follow to proceed with implementing the change?

A.

Update the ticket with the results of the risk assessment and implement the change

B.

Reference the business policy and follow all change management procedures

C.

Obtain approval from the department and implement the change

D.

Provide a risk assessment to colleagues for peer review

Full Access
Question # 20

Ann, an employee at a company, calls the help disk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification.

Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

A.

Ask Ann for her credentials to verify and log on to the vendor’s website from Ann’s laptop

B.

Verify Ann’s laptop has the correct browser settings

C.

Check all browser cached files on Ann’s laptop and log on to another vendor’s website

D.

Attempt to log on to another vendor’s website from Ann’s laptop

E.

Ask Ann about the notification and review the installed programs

F.

Reinstall the browser, reboot the laptop, and check the vendor’s website again

Full Access
Question # 21

A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Select two.)

A.

Backup testing

B.

Cloud storage

C.

Local storage backups

D.

Data recovery

E.

Hot site

F.

Waterproof devices

Full Access
Question # 22

A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?

A.

Component Services

B.

System Configuration

C.

Security Policy

D.

Local Users and Groups

Full Access
Question # 23

Following instructions from the help desk, a company employee turns off a workstation that has a suspected ransomware infection. A technician is dispatched later to investigate the workstation Which of the following should the technician perform FIRST?

A.

Disconnect the network cable.

B.

Disable System Restore

C.

Boot into safe mode

D.

Update the antivirus software.

E.

Recover from a restore point

Full Access
Question # 24

A user in a SOHO wants to allow Joe, a remote technician, to connect securely to the user's workstation Joe informs the user that the VPN was successful, but he still cannot connect. Which of the following settings in the SOHO router MOST likely need to be adjusted?

A.

Encryption

B.

Firewall

C.

DHCP

D.

DNS

E.

NAT

Full Access
Question # 25

Which of the following is a community supported, open source OS used for both services and workstations?

A.

IOS

B.

Windows 10

C.

Linux

D.

OS X

Full Access
Question # 26

An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

A.

Remove applications from startup

B.

Defragment the hard drive

C.

Install additional RAM

D.

Install a faster hard drive

E.

End the processes in Task Manager

F.

Run the Disk Cleanup utility

Full Access
Question # 27

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

A.

Create a policy to remove Internet access from the server during off hours

B.

Set the local antivirus software on the server to update and scan daily

C.

Ensure the server is patched with the latest security updates

D.

Educate the manager on safe Internet browsing practices

Full Access
Question # 28

A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user’s workstation?

A.

chkdsk

B.

netstat

C.

gpupdate

D.

diskpart

Full Access
Question # 29

A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage.

Which of the following would the project team MOST likely add to the SOW?

A.

Risk analysis

B.

Plan to change

C.

Backout plan

D.

Change board approvals

Full Access
Question # 30

A technician is troubleshooting a computer that may have some corrupt operating system files. Which of the following command line tools should the technician use to check these files?

A.

dism

B.

chkdsk

C.

diskpart

D.

sfc

Full Access
Question # 31

A corporate fileshare holds files for multiple departments. Individual users in each department create reports

that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that

encrypted all of the documents on the fileshare. The software asked for money to be transferred via

cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the

ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?

A.

Enable System Restore on the file server and make frequent restore points.

B.

Disable full disk encryption on the file server.

C.

Install a next-generation firewall at the network edge.

D.

Use a host-based intrusion detection system and continuously monitor filesystem changes.

E.

Use granular file permissions on the share and follow the principle of least privilege.

Full Access
Question # 32

A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT?

A.

Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.

B.

Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed.

C.

Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video card vendor.

D.

Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.

Full Access
Question # 33

A user recently connected a Windows laptop to a free WiFi hot-spot. After returning to the office, the user cannot access network shares. Which of the following is the MOST likely cause?

A.

Remote access has been disabled.

B.

The local firewall settings are incorrect.

C.

Location-based settings are not turned on.

D.

The network shares are hidden.

Full Access
Question # 34

Which of the following operating systems has versions for servers, workstations, and phones?

A.

Android

B.

iOS

C.

Chrome OS

D.

Windows

Full Access
Question # 35

A user's smartphone began experiencing decreased performance after the user watched some videos, browsed the web, and accessed the application store. The user states the phone was.

working fine beforehand. Which of the following should be done FIRST to resolve the issue?

A.

Replace the smartphone with a model that has faster hardware.

B.

‘Check the storage space availability on the smartphone.

C.

Look for OS updates.

D.

Restore the smartphone to the manufacturing image

Full Access
Question # 36

A Microsoft application will not open when a user clicks on it. Instead, the following error message pops up: This application has crashed. Would you like to send an error report to Microsoft? Which of the following should the user try FIRST

A.

Open the application with administrative privileges.

B.

Open a run command and then type the application name.

C.

Reboot the computer into sate mode and try to open the program.

D.

Uninstall the program alter saving any associated data and reinstall the program.

Full Access
Question # 37

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.

Which of the following should the technician have covered previously as part of the original repair?

A.

End-user education

B.

Pre-installation environment cleaning

C.

Disabling of System Restore

D.

Infected system quarantine

Full Access
Question # 38

Ann, a user, has purchased a new Android phone and is attempting to access a public hot-spot. When she gets a message indicating the page cannot be displayed. She notices there is a “?” in the radio icon in the toolbar.

She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance. Which of the following is the MOST likely issue Ann is experiencing?

A.

There is unauthenticated wireless connectivity

B.

She has exceeded the data allowance

C.

The phone is only 3G capable

D.

It is an unrooted phone

E.

The SIM card was not activated

F.

A data plan was not purchased

Full Access
Question # 39

A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue?

A.

The Internet security options have changed

B.

The operating system updates have changed

C.

The network directory permissions have changed

D.

The user account permissions have changed

Full Access
Question # 40

A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the

BEST choice for the technician to make?

A.

Politely ask the user to call back

B.

Ask another technician to take the call

C.

Troubleshoot the issue for the user

D.

Input the issue as a ticket and escalate to Tier 2

E.

Put the user on hold and troubleshoot after the scheduled break

Full Access
Question # 41

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10.

Which of the following installation methods would the technician MOST likely use to accomplish this quickly?

A.

Unattended installation

B.

Remote network installation

C.

In-place upgrade

D.

Clean installation

Full Access
Question # 42

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.

The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.

The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.

Make sure to maintain a consistent file system.

INSTRUCTIONS:

Conduct the necessary steps within the Disk Manager to accomplish these tasks.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 43

A user tries to open a client/server application, but a prompt appears for the username and password The user is able to open and use the email client with no issues. The user's workstation is a loaner laptop Everyone at the company is given administrator rights on their individual workstations. Which of the following is MOST likely preventing the user from running this program?

A.

EFS

B.

NTFS

C.

UTP

D.

UAC

Full Access
Question # 44

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.

Which of the following security measures should be used?

A.

Biometric device

B.

Common access card

C.

Cable lock

D.

Privacy screen

E.

Mantrap

Full Access
Question # 45

A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

A.

Domain name, location, IP address

B.

Domain name, location, asset ID

C.

Asset ID, MAC address

D.

Location, RFID

Full Access
Question # 46

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?

A.

Check the contents of the hosts file

B.

Do a System Restore to a date before the infection

C.

Rerun the antivirus scan with higher sensitivity

D.

Rebuild the OS on the machine

Full Access
Question # 47

Which of the following is the maximum RAM limit of a Windows 32-bit version?

A.

no limit

B.

4GB

C.

8GB

D.

32GB

Full Access
Question # 48

A technician is repairing a computer. Which of the following should the technician do to protect the computer from accidental voltage spikes?

A.

Practice electrical fire safety.

B.

Clean tools properly before use.

C.

Remove any jewelry.

D.

Connect a proper ESD strap.

Full Access
Question # 49

An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO).

A.

Close applications when tasks are completed.

B.

Increase the time to dim the screen automatically.

C.

Increase the frequency for syncing corporate email.

D.

Set the smartphone display to maximum brightness.

E.

Connect to the office WiFi network automatically.

F.

Disable 802.11ac and use mobile data exclusively.

Full Access
Question # 50

Joe. a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action?

A.

Acceptable use policy

B.

Inventory management

C.

EULA

D.

MDM policy

Full Access
Question # 51

A large corporation wants to secure its wireless network so only employees can connect. Which of the following technologies should be used to control access by user account?

A.

RADIUS

B.

WPA2

C.

TKIP

D.

AES

Full Access
Question # 52

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.

Which of the following protocols and authentication methods should the technician implement? (Select two.)

A.

WPA

B.

WPA2

C.

WEP

D.

TKIP

E.

RADIUS

F.

Multifactor

G.

TACACS

Full Access
Question # 53

A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?

A.

Loop

B.

Integer

C.

String

D.

Variable

Full Access
Question # 54

A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which

of the following should the technician monitor during the installation?

A.

Impact to the workstations

B.

Impact to the users

C.

Impact to the network

D.

Impact to the DHCP pool

Full Access
Question # 55

A company needs to destroy several SSDs that contain sensitive information. Which of the following methods

is BEST suited for the total destruction of the SSDs?

A.

Overwriting

B.

Formatting

C.

Incinerating

D.

Degaussing

Full Access
Question # 56

A user wants to see the workstations present on the LAN in a workgroup environment. Which of the following

settings must be enabled to make this possible?

A.

Turn off public folder sharing

B.

Turn on network discovery

C.

Use 128-bit encryption

D.

Turn on file and folder sharing

Full Access
Question # 57

A technician wants to deploy a solution to manage a computer remotely. The technician is not allowed to modify any network configuration and is not able to forward any ports on the router to internal devices. Which of the following remote access technologies would be BEST suited for this situation?

A.

Remote desktop protocol

B.

Telnet client

C.

Virtual network computer

D.

Third-party tools

E.

Secure shell

Full Access
Question # 58

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

INSTRUCTIONS

Select the MOST appropriate statement for each response.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Let’s take a look at your phone settings.

Please change the port number on your mail settings to 993.

Which of the following should be done NEXT?

A.

Close the ticket out

B.

Educate the user on the solution that was performed

C.

Tell the user to take time to fix it themselves next time

D.

Send an email to Telecom to inform them of the issue and prevent reoccurrence

Full Access
Question # 59

A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help desk team recommend the user do in this situation?

A.

After granting these permissions, disable the camera and GPS

B.

Install the application and change the permissions later

C.

Cancel installation of the application and report it to the application source

D.

Accept these permission requests and install the application

Full Access
Question # 60

A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible Which of the following technologies should the technician use to manage this system?

A.

Telnet

B.

HTTPS

C.

SSH

D.

RDP

E.

SFTP

Full Access
Question # 61

A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use?

A.

apt-get

B.

iwconfig

C.

sudo

D.

ifconfig

Full Access
Question # 62

Which of the following key and mouse combinations can be used to run an application as a different user?

A.

FN + Right-click

B.

Shift + Right-click

C.

Alt + Right-click

D.

Ctrl + Right-click

Full Access
Question # 63

Company policy states that users must secure their laptops before leaving the office for the evening Which of the following physical security measures should be used?

A.

Cable lock

B.

Windows key + L

C.

Smart card removal

D.

Key fob

E.

BIOS password

Full Access
Question # 64

A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.)

A.

Reboot into safe mode

B.

Clear the application data

C.

Contact the application’s developer

D.

Reinstall the application

E.

Do a force stop

F.

Clear the application cache

Full Access
Question # 65

A user has changed the MAC address of a laptop to gain access to a network. This is an instance of:

A.

spoofing

B.

brute force

C.

man-in-the-middle

D.

a botnet

Full Access
Question # 66

Several mobile users are reporting issues connecting to the WLAN within a warehouse. A technician tests wireless connectivity in the lobby and is able to connect successfully. Mobile users can connect to the Internet using cellular service, but they cannot access any internal resources on the WLAN The technician received alerts of devices failing throughout the network due to a power outage Which of the following is MOST likely causing the wireless issues?

A.

SSID is configured to not broadcast.

B.

The system locked out for all wireless users.

C.

The DHCP scope for WLAN is full

D.

The WAP in the warehouse is down

Full Access
Question # 67

A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory." Which of the following commands would BEST accomplish this?

A.

grep -d mandatory *

B.

grep -i mandatory *

C.

grep mandatory file

D.

grep mandatory *

Full Access
Question # 68

A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?

A.

netstat

B.

net use

C.

nslookup

D.

ping

Full Access
Question # 69

Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Full Access
Question # 70

After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users Which of the following is the BEST way for the technician to perform this security feature?

A.

Push a group policy.

B.

Assign a local security policy.

C.

Create a network login script.

D.

Update the AUP

Full Access
Question # 71

A user brings in a home desktop computer for cleaning. Upon opening the computer, a technician finds large amounts of dust and dirt inside. Which of the following should the technician use to remove the excess dust and dirt?

A.

A brush

B.

A vacuum

C.

Compressed air

D.

A damp cloth

Full Access
Question # 72

A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:

A.

keys

B.

passwords

C.

root CA

D.

tokens

Full Access
Question # 73

During a network server outage, the administrators computer received an IP address of 169.254.0.10 and had no access to internal or external resources. Which of the following should be configured to ensure the administrator's computer retains network access?

A.

Alternative IP address

B.

Wake-on-LAN

C.

APIPA

D.

Proxy setting

Full Access
Question # 74

A network support technician takes a call from an office manager who wants to change the wireless security

key on the access point in that particular office. The office manager explains that a label on the access point

indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect

securely to the access point to make the change?

A.

RDP to 10.0.100.2

B.

SSH to 10.0.100.2

C.

HTTP to 10.0.100.2

D.

Telnet to 10.0.100.2

Full Access
Question # 75

Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some

websites, and web services are not responding from any of the web browsers, although Joe can access these

services from his smartphone without issue. The computer’s malware scanner has the latest definitions

installed. Which of the following would BEST explain why the computer is functioning this way?

A.

Expired root certificate

B.

OS update failures

C.

Pop-up blocker

D.

Hijacked email

Full Access
Question # 76

A Mac user needs to configure a network device using a serial connection to enable a remote network connection. Which of the following utilities would MOST likely be used to make the necessary changes?

A.

Terminal

B.

Disk maintenance

C.

iCloud

D.

Image recovery

Full Access
Question # 77

While installing a hard drive in a server, the administrator installs an extra physical hard disk Which of the following technologies will allow the administrator to extend an existing volume onto the extra disk?

A.

Dynamic partitioning

B.

Disk defragmenter

C.

RAID Level 5

D.

Swap partition

Full Access
Question # 78

An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue?

A.

Increase the amount of RAM

B.

Reboot the server

C.

Check the system logs

D.

Perform disk defragmentation

Full Access
Question # 79

A home user reports slow computer performance and application crashes after clicking a "repair" button on a pop-up warning while browsing the Internet Which of the following are the FIRST steps a technician should take to identify and resolve the issue? (Select TWO).

A.

Perform a system file check and replace any changed files with their original versions

B.

Enable the pop-up blocker on the Internet browser

C.

Uninstall any recently installed unknown programs and browser extensions,

D.

Perform a hard shutdown and cold boot the computer

E.

Scan the RAM and hard drive using an up-to-date antivirus program.

Full Access
Question # 80

Which of the following would BEST support an 8TB hard drive with one partition?

A.

GPT

B.

FAT16

C.

FAT32

D.

EFS

Full Access
Question # 81

A user is trying to access a popular email website but is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue. Which of the following should the technician do to remove the threat from the system?

A.

Remove all parameters after the FQDN website address.

B.

Remove all files from the temporary folder and restart the computer.

C.

Remove and reinstall the web browser in safe mode.

D.

Remove all lines that are not comments from the hosts file.

Full Access
Question # 82

A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected. II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?

A.

Update all antivirus definitions and run a full scan on all networked computers.

B.

Make sure the operating systems on all networked computers are fully patched and up to date

C.

Update all software drivers and firmware on all the affected computers.

D.

Enable geofiltering on the network firewall to stop unwanted communications.

Full Access
Question # 83

Which of the following would MOST likely be used by an attacker to identify the hash value of a strong password quickly?

A.

Brute force

B.

Key stretching

C.

Rainbow table

D.

Dictionary attack

Full Access
Question # 84

Which of the following wireless encryption standards uses 802.1X In its process to secure a wireless network?

A.

WPS

B.

WPA2-PSK

C.

WPA-Enterprise

D.

WEP

Full Access
Question # 85

A user downloaded a program from a website. After saving the file, the user cannot find the executable. Which of the following is MOST likely the cause?

A.

The file was quarantined by an anti-malware software.

B.

The host-based firewall blocked the download.

C.

The file is incompatible with the operating system.

D.

File permissions do not allow the user to access the file.

Full Access
Question # 86

A new security policy stores all remote access to network devices must be performed using secure connections whenever possible. Which of the following remote access technologies would a technician MOST likely use to manage a Windows-based device remote without using a CLI?

A.

RDP

B.

SSH

C.

Telnet

D.

RADIUS

E.

SSO

Full Access
Question # 87

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid.

Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.

Which of the following settings or features is responsible for the problems Ann is experiencing?

A.

Full device encryption

B.

Account lock

C.

Multifactor authentication

D.

Strong password requirements

Full Access
Question # 88

Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS.

Which of the following can Joe do to ensure the backups will work if needed?

A.

Frequently restore the servers from backup files and test them

B.

Configure the backups to restore to virtual machines for quick recovery

C.

Set up scripts that automatically rerun failed backup jobs

D.

Set up alerts to let administrators know when backups fail

E.

Store copies of the backups off-side in a secure datacenter

Full Access
Question # 89

A folder has the share permissions of everyone - change, while the folder's NTFS permissions are Set to everyone - read. Which of the following would be the MOST effective permissions for someone who is accessing

the folder via the share?

A.

Read

B.

Change

C.

Write

D.

Modify

Full Access
Question # 90

A technician is implementing a change to a piece of production environment. The change is causing other several other problem to occur. Which of the following should the technician do NEXT?

A.

Complete the change to the production environment within the allotted time frame.

B.

Attempt to recreate the issues in the QA environment troubleshoot them quickly.

C.

Begin following the back-out plan that was outlined in the planning meeting.

D.

Complete a risk analysis of the new changes and their potential impact on other systems.

Full Access
Question # 91

A user is working with the command line interface on a Linux computer To show the contents of the current directory, which of the following commands should be used'

A.

Is

B.

dir

C.

-get

D.

mv

Full Access
Question # 92

A technician is updating a network switch at a location facility. The technician needs to ensure the data is not sent in plaintext over untrusted networks. Which of the following should the technician use? (Choose two.)

A.

SSH

B.

SCP

C.

TFTP

D.

FTP

E.

RDP

F.

VNC

Full Access
Question # 93

A user's PC has become infected with malware that has a known remediation, Which of the fallowing would MOST likely prevent this from happening again?

A.

Create a restore point.

B.

Utilize a preinstallation environment.

C.

Disable System Restore.

D.

Keep software up to date.

Full Access
Question # 94

A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?

A.

Remote wipe

B.

Device encryption

C.

Biometric authentication

D.

Enterprise sandbox

Full Access
Question # 95

A security learn recommends a disaster recovery plan with the following requirements:

* Recent backups should be readily available.

* Only long-term backups should be stored off premises

* There should be minimum expenditure on hardware.

Which of the following satisfies all of these requirements?

A.

Store 30 days of backups on premises and then age the backups to the public cloud

B.

Store backups on premises and burst to the public cloud if needed.

C.

Store backups both on premises and in a public cloud infrastructure

D.

Store all the backups in a public cloud with no on-premises backup storage

Full Access
Question # 96

After purchasing an Ultrabook. Ann. a home user, has a technician come to her home and install an operating system. Which of the following OS retaliation methods will the technician MOST likely use?

A.

Flash drive

B.

PXE

C.

Optical disc

D.

Cloned drive

Full Access
Question # 97

After installing an application on a smartphone, a user starts receiving pop-up ads for recently visited physical stores. The user also receives prompts to install other applications. Which of the following permissions should be revoked to disable the unwanted notifications?

A.

Account access

B.

Mobile data

C.

Location access

D.

Contacts access

Full Access
Question # 98

Which of the following filesystem types has native read/write support on all desktop operating systems?

A.

FAT32

B.

ReFS

C.

NTFS

D.

EM4

Full Access
Question # 99

A user opens a phishing email and types logon credentials into a fake banking website. The computer's antivirus software then reports it has several

from the network. Which of the following should the technician perform NEXT?

A Have the user change the password.

B. Update the antivirus software and run scans.

C. Disable the user's local computer account.

D. Quarantine the phishing email.

Full Access