Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

220-1002 Questions and Answers

Question # 6

An organization is developing testing schedules to ensure its disaster recovery plans will be effective in case of a disaster. In addition to the generators and UPS systems, which of the following should the technician recommend testing?

A.

Server backups

B.

Fire suppression systems

C.

Emergency lighting

D.

Alarm systems

Full Access
Question # 7

A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?

A.

Remote wipe

B.

Device encryption

C.

Biometric authentication

D.

Enterprise sandbox

Full Access
Question # 8

A user suspects a computer Is infected with malware. A technician identifies the symptoms as being related to a recent spread of malware. Which of the following steps should the technician take NEXT to address the infection?

A.

Educate the end user

B.

Schedule scans and run updates.

C.

Disable System Restore.

D.

Remediate the infected system.

Full Access
Question # 9

A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected. II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?

A.

Update all antivirus definitions and run a full scan on all networked computers.

B.

Make sure the operating systems on all networked computers are fully patched and up to date

C.

Update all software drivers and firmware on all the affected computers.

D.

Enable geofiltering on the network firewall to stop unwanted communications.

Full Access
Question # 10

A customer wants to format a 4TB external drive with a filesystem that is compatible with both Windows and

Linux OSs.

Which of the following should the technician suggest the customer use?

A.

Ext4

B.

exFAT

C.

NFS

D.

FAT32

E.

CDFS

Full Access
Question # 11

A technician Is completing the documentation for a major OS upgrade of a Linux distribution that will impact a company's web services. The technician finishes the risk assessment and documents the change process. Which of the following should the technician complete NEXT?

A.

Scope of the change

B.

Back-out plan

C.

Purpose of the change

D.

Change request

Full Access
Question # 12

A remote user has reported a suspicious pop-up. and a technician is troubleshooting the user's laptop. The technician needs to connect securely to the computer to view the user's screen and investigate the issue Which of the following should the technician use?

A.

SSH

B.

MSTSC

C.

SFTP

D.

MSRA

Full Access
Question # 13

A technician needs to remove malware from a Windows system. The technician has already performed research on the malware and determined it is a memory virus. Which of the following steps should the technician take NEXT?

A.

Disable the restore points.

B.

Remediate the affected system.

C.

Educate the user.

D.

Quarantine the affected system.

Full Access
Question # 14

A folder has the share permissions of everyone - change, while the folder's NTFS permissions are Set to everyone - read. Which of the following would be the MOST effective permissions for someone who is accessing

the folder via the share?

A.

Read

B.

Change

C.

Write

D.

Modify

Full Access
Question # 15

A technician needs to access the user Interface of a server outside the network. The technician added network security with MAC filtering and port forwarding to allow tor the connection Which of the following will the technician MOST likely use to connect to the server?

A.

Remote Assistance

B.

SSH

C.

Telnet

D.

RDP

Full Access
Question # 16

Which of the following OS types provides a lightweight option for workstations that need an easy-to-use browser-based interface?

A.

macOS

B.

Windows

C.

Linux

D.

Chrome

Full Access
Question # 17

A user receives an error message when trying upgrade an application on a work computer. Which of the following is the MOST likely reason the user cannot complete this task?

A.

The computer does not meet the application's minimum requirements.

B.

The program is being deployed via optical media.

C.

The user account lacks administrative rights.

D.

A 32-bit application cannot be installed on a 64-bit system.

Full Access
Question # 18

A technician is installing the Mac OS X operating system. The technician is prompted to select the filesystem. Which of the following filesystems should the technician utilize to install the listed operating system?

A.

EW2

B.

FAT32

C.

HFS

D.

NTFS

Full Access
Question # 19

A technician is configuring a static IP address on a Windows machine. The information is as follows:

Which of the following would be a valid default gateway address?

A.

192.168.0.1

B.

192.168.9.1

C.

192.168.10.254

D.

192.168.15.10

Full Access
Question # 20

Which of the following wireless encryption standards uses 802.1X In its process to secure a wireless network?

A.

WPS

B.

WPA2-PSK

C.

WPA-Enterprise

D.

WEP

Full Access
Question # 21

A user's mobile device appears to lose connectivity only in certain areas. The device works normally when II is not in those areas, and the user has determined that a cellular signal is available In the areas where the connectivity is lost Which of the following should be considered?

A.

Unintended W1F1 connection

B.

Unauthorized location tracking

C.

Data transmission over set limit

D.

Unintended Bluetooth pairing

Full Access
Question # 22

A user’s mobile social media application is sending emails on behalf of the user. However, the user has not authorized any new permissions for the social media application. The user only has this application installed on their smart phone and no other devices. Which of the following should a technician perform to resolve the issue?

A.

Run a malware scan on the device.

B.

Instruct the user to change the device’s password.

C.

Disable access to the user’s contacts.

D.

Deny access to text messages.

Full Access
Question # 23

A technician is performing service on a computer and notices it is responding very slowly. The computer has 4GB of RAM. a four-core 3GHz processor, and a SATA I 54O0rpm 300GB HOD. The technician logs the following process information:

Based on this data, which of the following is the MOST likely cause of the performance issues?

A.

The dtfhost.exe is likely a virus, and the computer has slowed down due to an infection

B.

The WSFTPD application is overloading the NIC. causing the computer to freeze periodically.

C.

The chrome application is using loo much memory and causing excessive paging

D.

The operating system is performing an installation that is slowing down the computer.

E.

The Windows Defender application is using too much CPU, causing the slowdown.

Full Access
Question # 24

A company seized an employee's laptop due to illegal activity. The computer has been locked in an office until it can be turned over to authorities. and no one is allowed to log on to it Which of the following policies is this an example of?

A.

PCI compliance

B.

Proper reporting

C.

Data preservation

D.

Chain of custody

Full Access
Question # 25

A technician is reviewing system updates. Some of the updates address vulnerabilities found in mission-critical servers, and they need to be performed immediately. Which of the following should the technician perform FIRST?

A.

Risk analysis

B.

Back-out plan

C.

Change board

D.

Implementation plan

Full Access
Question # 26

A technician logs on to a Linux computer and runs the following command:

ps -aux | grep vi

Which of the following MOST accurately describes the effect of the command?

A.

It kills any running programs starting with the letters vi.

B.

It opens a list of directories that start with the letters vi.

C.

It creates a new file named grep in the current working directory.

D.

If finds a list of processes running a text editor.

Full Access
Question # 27

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.

Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST?

A.

Reinstall the application

B.

Roll back the application to the earlier version

C.

Clear the application cache

D.

Update the OS of the smartphones

Full Access
Question # 28

After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)

A.

Screen locks

B.

Screensaver passwords

C.

UEFI passwords

D.

Login time restrictions

E.

Strong passwords

F.

Multifactor authentication

G.

BitLocker

Full Access
Question # 29

Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server.

Joe has verified he is connected to the Internet.

Which of the following would explain why Joe cannot access his personal shares?

A.

An IP conflict is present

B.

A corporate VPN is enabled

C.

A firewall exception must be set

D.

HomeGroup must be enabled

Full Access
Question # 30

Ann, an employee, has been trying to use a company-issued mobile device to access an internal fileshare while traveling abroad. She restarted the device due to a mobile OS update, but she is now unable to access company information Ann calls the help desk for assistance, and a technician verifies she can make calls and access websites Which of the following should the technician suggest NEXT to try to fix the issue?

A.

Navigate to the VPN profile in the device settings, delete the pre-shared key. and restart the device

B.

Instruct Ann to open the company's MDM application to ensure proper functionality

C.

Navigate to the corporate intranet page and use hyperlinks to access the fileshare.

D.

Instruct Ann to disable TLS 1.0 in the device settings

Full Access
Question # 31

Following a recent password change, a user can log on successfully to an Apple computer but cannot access a web-based service. An error message displays each time the user attempts lo authenticate to the service. Prior to changing the password, the computer had no communication issues. Which of the following should a technician use to continue troubleshooting the issue?

A.

passwd

B.

FileVault

C.

Keychain

D.

Gatekeeper

Full Access
Question # 32

A user's laptop screen goes black after five minutes of not being used. Which of the following Windows Control Panel utilities should be used to modify the user experience?

A.

Troubleshooting

B.

Internet Options

C.

Power Options

D.

Device Manager

Full Access
Question # 33

Which of the following best practices should a technician observe to reduce the risk of electrical shock?

A.

Keep components in an antistatic bag.

B.

Remove metallic jewelry

C.

Utilize proper cable management

D.

Wear an ESD wrist strap

Full Access
Question # 34

A technician needs to configure network shares on users' computers when they log on. The technician wrote the script with the net use command. Which of the following script file types is the technician writing.

A.

bat

B.

.sh

C.

py

D.

.js

Full Access
Question # 35

A customer contacts an IT technician regarding a PC's performance. The customer explains that the computer struggles to run several applications simultaneously, Which of the following

changes should the technician recommend FIRST to address the customer's concern?

A.

Increase the allocation of virtual memory.

B.

Upgrade the RAM to a larger capacity.

C.

Replace the existing HDD with an SSD.

D.

Enable fastboot in the BIOS

Full Access
Question # 36

A technician is setting up a SOHO wireless router and needs to adhere to the following requirements:

The router should not assign network addresses to any device.

All devices in the office must be able to access network resources and the Internet.

Which of the following should the technician perform to meet these requirements?

A.

Assign static IP addresses on all devices.

B.

Set up MAC filtering for all devices

C.

Place all devices in a DMZ.

D.

Enable port forwarding for all devices

Full Access
Question # 37

A user is having issues with website access. The user is trying to access a site that is used every day by everyone in the company. When the user goes to the site a message appears stating the site is not secure, and the address bar turns red. A technician contains the site is working fine kw everyone else The technician verifies the address was entered correctly but when the message shows up. the address is different than what was typed Which of the following is causing this issue?

A.

Rogue antivirus

B.

Browser redirection

C.

Invalid certificate

D.

Untrusted root CA

Full Access
Question # 38

An end user reports a Windows computer is infected with a virus. Which of the following should be the technician’s FIRST troubleshooting step?

A.

Identify malware symptoms

B.

Disable System Restore

C.

Run Windows Update

D.

Educate the end user

Full Access
Question # 39

A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.)

A.

Reboot into safe mode

B.

Clear the application data

C.

Contact the application’s developer

D.

Reinstall the application

E.

Do a force stop

F.

Clear the application cache

Full Access
Question # 40

An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application?

A.

Network-based

B.

Client/server

C.

Application streaming

D.

Peer-to-peer

Full Access
Question # 41

After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users Which of the following is the BEST way for the technician to perform this security feature?

A.

Push a group policy.

B.

Assign a local security policy.

C.

Create a network login script.

D.

Update the AUP

Full Access
Question # 42

A technician is securing a server room by implementing a two-factor authentication solution Which of the following should the technician implement to provide the BEST security for the server room?

A.

Door lock and mantrap

B.

Server lock and badge reader

C.

Security guard and entry control roster

D.

Biometric lock and hardware token

Full Access
Question # 43

Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)

A.

LCD monitor

B.

Power supply

C.

Laptop screen

D.

CRT monitor

E.

Motherboard

F.

Tablet

Full Access
Question # 44

When users turn on or reboot their machines, many of the computers on the network are non-responsive and unable to access the Internet. The users who left their computers on or have not rebooted are not experiencing this issue A technician confirms all the network switches and routers are working, and no servers are having any issues The network administrator notices abnormally high network utilization Which of the following is the MOST likely issue the company is experiencing?

A.

Malware infection

B.

Rogue antivirus

C.

Browser redirection

D.

OS update failures

Full Access
Question # 45

A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?

A.

Loop

B.

Integer

C.

String

D.

Variable

Full Access
Question # 46

A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?

A.

Download and apply the security patch that addresses the vulnerability that was exploited

B.

Use System Restore to bring the PC back to a previous restore point.

C.

Reimage the computer and update it with all the latest patches

D.

Download another antivirus software that will quarantine the virus.

Full Access
Question # 47

Which of the following must be enabled to configure 20 new machines to be booted over a network?

A.

Multi-boot

B.

Dynamic

C.

PXE

D.

GPT

Full Access
Question # 48

A desktop technician needs to replace a laptop’s SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement?

A.

Antistatic bags

B.

Needle-nose pliers

C.

Safety goggles

D.

ESD straps

Full Access
Question # 49

A corporate fileshare holds files for multiple departments. Individual users in each department create reports

that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that

encrypted all of the documents on the fileshare. The software asked for money to be transferred via

cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the

ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?

A.

Enable System Restore on the file server and make frequent restore points.

B.

Disable full disk encryption on the file server.

C.

Install a next-generation firewall at the network edge.

D.

Use a host-based intrusion detection system and continuously monitor filesystem changes.

E.

Use granular file permissions on the share and follow the principle of least privilege.

Full Access
Question # 50

A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which

of the following should the technician monitor during the installation?

A.

Impact to the workstations

B.

Impact to the users

C.

Impact to the network

D.

Impact to the DHCP pool

Full Access
Question # 51

A user wants to see the workstations present on the LAN in a workgroup environment. Which of the following

settings must be enabled to make this possible?

A.

Turn off public folder sharing

B.

Turn on network discovery

C.

Use 128-bit encryption

D.

Turn on file and folder sharing

Full Access
Question # 52

A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?

A.

exFAT security

B.

Ext3 security

C.

HFS security

D.

EFS security

E.

CDFS security

Full Access
Question # 53

A technician is adding a folder lo a structure that Is several levels down from the top level. The technician wants to make sure the new folder will have the same permissions as the top level Which of the following should the technician configure?

A.

Attributes

B.

Shares

C.

Inheritance

D.

Replication

Full Access
Question # 54

Which of the following Windows versions introduced using applications in the Metro interface?

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Full Access
Question # 55

A home user reports slow computer performance and application crashes after clicking a "repair" button on a pop-up warning while browsing the Internet Which of the following are the FIRST steps a technician should take to identify and resolve the issue? (Select TWO).

A.

Perform a system file check and replace any changed files with their original versions

B.

Enable the pop-up blocker on the Internet browser

C.

Uninstall any recently installed unknown programs and browser extensions,

D.

Perform a hard shutdown and cold boot the computer

E.

Scan the RAM and hard drive using an up-to-date antivirus program.

Full Access
Question # 56

Which of the following key and mouse combinations can be used to run an application as a different user?

A.

FN + Right-click

B.

Shift + Right-click

C.

Alt + Right-click

D.

Ctrl + Right-click

Full Access
Question # 57

Company policy states that users must secure their laptops before leaving the office for the evening Which of the following physical security measures should be used?

A.

Cable lock

B.

Windows key + L

C.

Smart card removal

D.

Key fob

E.

BIOS password

Full Access
Question # 58

A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices such as a mouse or a printer, and a reboot did not fix the problem Which of the following would MOST likely fix the issue?

A.

Roll back updates.

B.

Disable the Windows Update service

C.

Check for updates

D.

Restore hidden updates

Full Access
Question # 59

A user brings in a home desktop computer for cleaning. Upon opening the computer, a technician finds large amounts of dust and dirt inside. Which of the following should the technician use to remove the excess dust and dirt?

A.

A brush

B.

A vacuum

C.

Compressed air

D.

A damp cloth

Full Access
Question # 60

A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer. Which of the following connection protocols should the technician use?

A.

Telnet

B.

SSH

C.

SMB

D.

HTTP

E.

SFTP

Full Access
Question # 61

A company wants to move the contents of its users’ My Documents folders from their local hard drives to a file server so they are backed up every night. Which of the following security concepts does this describe?

A.

Organizational units

B.

Folder redirection

C.

Group Policy

D.

Login script

Full Access
Question # 62

Which of the following Is the MOST cost-effective option to protect computers and peripherals from damage caused by power fluctuations?

A.

Generator

B.

Battery backup

C.

Surge suppressor

D.

Line conditioner

Full Access
Question # 63

A new user has joined a company, and human resources has given the user several documents to sign

regarding compliance and regulations for company computers. The user has also received web links to

documentation for applications, as well as processes and procedures to do jobs in accordance with those

programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

A.

Inventory management policy

B.

Knowledge base articles

C.

End-user acceptance document

D.

Acceptable use policy

E.

Incident documentation

F.

Network diagrams

Full Access
Question # 64

Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.

Which of the following would be the BEST resolution to Ann’s issue?

A.

Restart the tablet.

B.

Disable and then reenable Bluetooth.

C.

Calibrate the touchscreen sensor.

D.

Disconnect and then reconnect the stylus.

Full Access
Question # 65

A desktop technician is responsible for the OS migration of 300 end users. As part of the migration, the technician must save the end users* data to a temporary shared drive. The data must include any hidden files to ensure 100% of the data is retained. Which of the following commands will achieve this result by default?

A.

robocopy

B.

copy

C.

xcopy

D.

cp

Full Access
Question # 66

Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features?

A.

Install the third-party driver from the manufacturer's website.

B.

Update the included Windows driver from Windows Update

C.

Flash the firmware on the BIOS to the latest version.

D.

Replace the video card with one that is supported by Windows natively.

Full Access
Question # 67

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

A.

Inventory management policy

B.

Knowledge base articles

C.

End-user acceptance document

D.

Acceptable use policy

E.

Incident documentation

F.

Network diagrams

Full Access
Question # 68

Which of the following standards controls the processing of credit cards?

A.

PCI

B.

PHI

C.

PGP

D.

PII

Full Access
Question # 69

A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use?

A.

apt-get

B.

iwconfig

C.

sudo

D.

ifconfig

Full Access
Question # 70

A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take?

A.

Continue to work on the assigned task

B.

Take the print job to the office manager

C.

Remove the print job from the output tray

D.

Disconnect the printer from the network to prevent further print jobs

Full Access
Question # 71

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check?

A.

Visit the Microsoft Update website to see if there is an issue with a specific update

B.

Look up the error number associated with the failed update

C.

Look at the system Event Viewer to find more information on the failure

D.

Download the failed update to install manually

Full Access
Question # 72

Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?

A.

Unattended installation

B.

Remote installation

C.

Repair installation

D.

Image deployment installation

Full Access
Question # 73

A user who is running Windows 10 logs Into a machine and notices that shared drives are missing, the "My Documents* folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?

A.

Remove the registry entry and rename the local account folder.

B.

Delete or rename the local user folder.

C.

Run DISM and re-add the local power user account.

D.

Remove the user account In Credential Manager and restart the PC.

Full Access
Question # 74

A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers.

Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

A.

Degaussing

B.

Standard format

C.

Overwrite

D.

Low-level format

Full Access
Question # 75

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

A.

Reduce the transmit power

B.

Reduce the channel availably

C.

Disable the DHCP server

D.

Enable QoS management

E.

Disable the SSID broadcast

F.

Implement WPA encryption

Full Access
Question # 76

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take?

A.

Update antivirus definitions

B.

Install anti-malware software

C.

Enable the pop-up blocker

D.

Reboot the PC

Full Access
Question # 77

Which of the following technologies is used by malicious employees to obtain user passwords?

A.

Main-in-the-middle

B.

Phishing

C.

Tailgating

D.

Shoulder surfing

Full Access
Question # 78

A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses Which of the following is MOST likely the problem?

A.

Rootkit

B.

Zero-day malware

C.

Rogue antivirus

D.

Old virus definitions

Full Access
Question # 79

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network Which of the following best practices could have prevented the attack?

A.

Implementing strong passwords

B.

Changing default credentials

C.

Disabling AutoRun

D.

Removing Guest account

E.

Encrypting data

Full Access
Question # 80

Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a "click here" button to resolve it. There is a timer in the pop-up. counting down the time until the computer is no longer usable. Which of the following should the technician do NEXT?

A.

Research the pop-up to see if it is a legitimate malware solution.

B.

Click on the pop-up window to resolve the issue before the time runs out.

C.

Send an email to all staff members warning them of malware on their system.

D.

Disconnect the Ethernet cable from the workstation and disable WiFi.

Full Access
Question # 81

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?

A.

Install to a network drive

B.

Install to a USB drive

C.

Install to a DVD-RW

D.

Install to a security internal_HDD

Full Access
Question # 82

A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on ot the device and opens terminal. Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?

A.

Pad and chmod

B.

Node and vi

C.

Is an chown

D.

Ps and kill

E.

Op and rm

Full Access
Question # 83

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

A.

SSO

B.

Permission propagation

C.

Inheritance

D.

MFA

Full Access
Question # 84

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

A.

Driver detection

B.

Metro interface

C.

Account control

D.

PXE installation

Full Access
Question # 85

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO).

A.

System files have been deleted

B.

Proxy settings are configured improperly

C.

The OS has been updated recently.

D.

There are disabled services on the vendor website.

E.

Program file permissions have changed recently.

F.

There is a rogue anti-malware program.

Full Access
Question # 86

A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue?

A.

Resolution

B.

Refresh rate

C.

Extended monitor

D.

Color depth

Full Access
Question # 87

A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:

There are 1033 infected files on this computer. Click here to disinfect.

The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

A.

Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan.

B.

Validate that the alerts are false positives, and disable security software on the workstation to prevent further false notifications.

C.

Back up the user’s files. Restore the system to the original system image designated by corporate IT policies. Restore the user’s files.

D.

Request a content filter exception to allow access to the link from the notification. Once available, follow the instructions on the linked site.

Full Access
Question # 88

A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used?

A.

Degauss

B.

Drive wipe

C.

Standard format

D.

Low-level format

Full Access
Question # 89

An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

A.

Remove applications from startup

B.

Defragment the hard drive

C.

Install additional RAM

D.

Install a faster hard drive

E.

End the processes in Task Manager

F.

Run the Disk Cleanup utility

Full Access
Question # 90

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hot-spot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hot-spot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hot-spot on her phone, and the speed test result on that hot-spot is 15Mbps. The technician checks the hot-spot settings on Joe’s phone and sees the following:

Which of the following is the MOST likely cause of the problem?

A.

Joe should be using WEP security on his hot-spot for faster throughput

B.

Someone else is using Joe’s hot-spot due to weak password

C.

Joe’s hot-spot gave him an invalid IP address

D.

Joe is likely in a poor signal area and should try another area

Full Access
Question # 91

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.

Which of the following account types would the technician MOST likely set up on this kiosk machine?

A.

Guest

B.

Administrator

C.

Power User

D.

Remote Desktop User

Full Access
Question # 92

A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away.

The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following:

Which of the following should be changed to resolve this issue?

A.

Privacy – Maps

B.

Display – Brightness

C.

Storage – Photos

D.

Mail – Work

Full Access
Question # 93

Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?

A.

Credential Manager

B.

Network and Sharing Center

C.

Security and Maintenance

D.

Troubleshooting

Full Access
Question # 94

A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.

Which of the following would MOST likely fix the issue?

A.

Roll back updates

B.

Disable the Windows Update service

C.

Check for updates

D.

Restore hidden updates

Full Access
Question # 95

Which of the following is the maximum RAM limit of a Windows 32-bit version?

A.

no limit

B.

4GB

C.

8GB

D.

32GB

Full Access
Question # 96

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

A.

WPA2

B.

AES

C.

MAC filtering

D.

RADIUS

E.

WPS

Full Access
Question # 97

A technician is working on a Windows 10 PC that is running slowly.

Which of the following commands should the technician use to correct this issue? (Select two.)

A.

dir

B.

chdsk

C.

dism

D.

ipconfig

E.

format

F.

diskpart

Full Access
Question # 98

Which of the following types of scripts would be seen on the user end of a web page?

A.

.bat

B.

.js

C.

.sh

D.

.vbs

Full Access
Question # 99

Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?

A.

Acceptable use policy

B.

Incident documentation policy

C.

Password compliance policy

D.

Change control policy

Full Access