Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

220-1102 Questions and Answers

Question # 6

A user calls the help desk to report an issue with their smartphone. After the user returns from a business trip, the user is no longer able to access email or visit websites without a Wi-Fi connection on the smartphone. Which of the following could the user do to most likely resolve the issue?

A.

Enable cellular data.

B.

Increase data limits.

C.

Disconnect the VPN.

D.

Reinstall the SIM card.

Full Access
Question # 7

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

A.

Put on an ESD strap

B.

Disconnect the power before servicing the PC.

C.

Place the PC on a grounded workbench.

D.

Place components on an ESD mat.

Full Access
Question # 8

A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with?

A.

Device

B.

Business

C.

Network

D.

Operation

Full Access
Question # 9

Due to special job responsibilities, an end user needs the ability to edit the properties of Windows system files. The user has already been granted local administrator privileges. Which of the following Control Panel utilities should be used to provide easy access to the files?

A.

File Explorer Options

B.

Ease of Access

C.

Indexing Options

D.

Administrative Tools

Full Access
Question # 10

Multiple users routinely record log-in information in readily accessible areas. Which of the following is the best way to mitigate this issue?

A.

Trusted sources

B.

Valid certificates

C.

User training

D.

Password manager

Full Access
Question # 11

Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).

A.

.mac

B.

.Pkg

C.

.deb

D.

.dmg

E.

.msi

F.

.appx

G.

.app

Full Access
Question # 12

A user reports being unable to access a sports team's website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?

A.

NDA

B.

AUP

C.

VPN

D.

SOP

Full Access
Question # 13

An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly?

A.

incineration

B.

Resale

C.

Physical destruction

D.

Dumpster for recycling plastics

Full Access
Question # 14

The audio on a user's mobile device is inconsistent when the user uses wireless headphones and moves around. Which of the following should a technician perform to troubleshoot the issue?

A.

Verify the Wi-Fi connection status.

B.

Enable the NFC setting on the device.

C.

Bring the device within Bluetooth range.

D.

Turn on device tethering.

Full Access
Question # 15

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

A.

Golden image

B.

Remote network install

C.

In-place upgrade

D.

Clean install

Full Access
Question # 16

A change advisory board authorized a setting change so a technician is permitted to Implement the change. The technician successfully implemented the change. Which of the following should be done next?

A.

Document the date and time of change

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document the findings of the sandbox test,

Full Access
Question # 17

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

A.

Installer_x64.exe

B.

Installer_Files.zip

C.

Installer_32.msi

D.

Installer_x86.exe

E.

Installer_Win10Enterprise.dmg

Full Access
Question # 18

Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a secondary feature of Windows Hello that can be used to log in?

A.

Personal identification number

B.

Username/password

C.

One-time-use token

D.

Cryptographic device

Full Access
Question # 19

Which of the following filesystem formats would be the BEST choice to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems?

A.

APFS

B.

ext4

C.

CDFS

D.

FAT32

Full Access
Question # 20

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Full Access
Question # 21

A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?

A.

Guards

B.

Bollards

C.

Motion sensors

D.

Access control vestibule

Full Access
Question # 22

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?

A.

Run the virus scanner in an administrative mode.

B.

Reinstall the operating system.

C.

Reboot the system in safe mode and rescan.

D.

Manually delete the infected files.

Full Access
Question # 23

Which of the following commands lists running processes in Linux?

A.

top

B.

apt-get

C.

Is

D.

cat

Full Access
Question # 24

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

A.

Application permissions

B.

Available storage space

C.

Battery charge level

D.

Wi-Fi connection speed

Full Access
Question # 25

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Full Access
Question # 26

Which of the following operating systems was the app file type designed to run under as an application file bundle?

A.

macOS

B.

Chrome

C.

Windows

D.

Linux

Full Access
Question # 27

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Full Access
Question # 28

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?

A.

netstat

B.

ping

C.

format

D.

tracert

Full Access
Question # 29

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?

A.

SSH

B.

MDM

C.

RDP

D.

SFTP

Full Access
Question # 30

A user is experiencing the following issues with Bluetooth on a smartphone:

•The user cannot hear any sound from a speaker paired with the smartphone.

•The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?

A.

Restart the smartphone.

B.

Reset the network settings.

C.

Unpair the Bluetooth speaker.

D.

Check for system updates.

Full Access
Question # 31

Employees want their Windows 10 laptops to wirelessly connect when they take them home. Which of the following should the employees configure so the laptops can automatically connect wirelessly?

A.

Network and Internet settings

B.

Windows Firewall settings

C.

Devices and Printers

D.

Personalization settings

Full Access
Question # 32

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:

"This site cannot be reached."

A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?

A.

HTTPS

B.

VLAN

C.

DNS

D.

SMTP

Full Access
Question # 33

A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?

A.

Security groups

B.

Folder redirection

C.

Organizational unit structure

D.

Access control list

Full Access
Question # 34

Which of the following is used to generate passcodes necessary to access applications or systems that require an extra layer of security?

A.

Authenticator application

B.

Access control lists

C.

Biometrics

D.

Smart card readers

Full Access
Question # 35

A user reports that a device with a statically defined IP is unable to connect to the internet. The technician runs the ipconfig /all command and sees the following output:

IPv4 Address............ 192.168.0.74

Subnet Mask.............255.255.255.255

Default Gateway......... 192.168.0.1

Which of the following is most likely the reason for the issue?

A.

The default gateway is up.

B.

The user has an APIPA IP address.

C.

The IP address is on the wrong subnet

D.

The subnet mask is incorrect.

Full Access
Question # 36

A technician is troubleshooting a PC that will not run Windows Defender. Windows Defender has been disabled, and no other antivirus is installed on the PC. Which of the following would have caused this issue?

A.

Ransomware

B.

Rootkit

C.

Spyware

D.

Keylogger

Full Access
Question # 37

A technician downloaded a software program to a network share. When the technician attempts to copy the program to the Windows tablet for installation, the technician receives an error. Which of the following is the best procedure for the technician to use to complete the assignment?

    Copy the program file to a USB drive and install.

A.

Burn the program file to a CD and install.

B.

Format the HDD and then do the installation.

C.

Replace the HDD and then do the installation.

Full Access
Question # 38

A technician is hardening a company file server and needs to prevent unauthorized LAN devices from accessing stored files. Which of the following should the technician use?

A.

Software firewall

B.

Password complexity

C.

Antivirus application

D.

Anti-malware scans

Full Access
Question # 39

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

A.

Installing a VPN

B.

Implementing location tracking

C.

Configuring remote wipe

D.

Enabling backups

Full Access
Question # 40

When a user attempts to open an email using a company-issued smartphone, the user receives a message stating the email is encrypted and cannot be opened. The user forwards the email to a personal account and receives the same message. The user then contacts the IT department for assistance. The technician instructs the user to contact the sender to exchange information in order to decode the message. Which of the following will the user receive from the sender?

A.

Keys

B.

Token

C.

Password

D.

RootCA

Full Access
Question # 41

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

A.

Investigate the firewall logs.

B.

Isolate the machine from the network.

C.

Inspect the Windows Event Viewer.

D.

Take a physical inventory of the device.

Full Access
Question # 42

A user's Windows desktop has low disk space. A technician thinks some upgrade files were never removed. Which of the following tools should the technician use to correct the issue?

A.

devmgmt.msc

B.

cleanmgr.exe

C.

dfrgui.exe

D.

diskmgmt.mac

Full Access
Question # 43

A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on. The technician attempts to boot the computer via the NIC to image the computer, but this method does not work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging system via the network?

A.

The computer's CMOS battery failed.

B.

The computer's NIC is faulty.

C.

The PXE boot option has not been enabled

D.

The Ethernet cable the technician is using to connect the desktop to the network is faulty.

Full Access
Question # 44

A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?

A.

EFS

B.

GPT

C.

MBR

D.

FAT32

Full Access
Question # 45

A company would like to deploy baseline images to new computers as they are started up on the network. Which of the following boot processes should the company use for this task?

A.

ISO

B.

Secure

C.

USB

D.

PXE

Full Access
Question # 46

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?

A.

Educate the end user on best practices for security.

B.

Quarantine the host in the antivirus system.

C.

Investigate how the system was infected with malware.

D.

Create a system restore point.

Full Access
Question # 47

A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next?

    Restart the phone.

A.

Reimage the OS.

B.

Reinstall the application.

C.

Clear the cache.

Full Access
Question # 48

A technician was assigned a help desk ticket and resolved the issue. Which of the following should the technician update to assist other technicians in resolving similar issues?

A.

End user training

B.

Progress notes

C.

Knowledge base

D.

Acceptable use policy document

Full Access
Question # 49

Which of the following are mobile operating systems used on smartphones? (Select two).

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

Full Access
Question # 50

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?

A.

Risk analysis

B.

Sandbox testing

C.

End user acceptance

D.

Lessons learned

Full Access
Question # 51

A user is unable to see the devices that are present on the network after changing some network settings in the Control Panel. Which of the following settings did the user change on the Windows 10 computer?

A.

The network type from private to public

B.

The Windows Firewall from on to off

C.

The UAC level to its highest level

D.

The file-sharing permissions

Full Access
Question # 52

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

A.

Reinstall the application on the smartphone.

B.

Update the smartphone's OS.

C.

Reset the smartphone to factory settings.

D.

Reboot the smartphone.

Full Access
Question # 53

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

Full Access
Question # 54

A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?

A.

Degaussing

B.

Standard formatting

C.

Low-level wiping

D.

Deleting

Full Access
Question # 55

Which of the following operating systems is most commonly used in embedded systems?

A.

Chrome OS

B.

macOS

C.

Windows

D.

Linux

Full Access
Question # 56

A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond?

    Place the customer on hold until the customer calms down.

A.

Disconnect the call to avoid a confrontation.

B.

Wait until the customer is done speaking and offer assistance.

C.

Escalate the issue to a supervisor.

Full Access
Question # 57

A technician is moving a Windows workstation from the accounting department to the sales department and needs to update the IP and gateway settings. Which of the following Control Panel utilities should the technician use?

A.

Programs and Features

B.

Network and Sharing Center

C.

User Accounts

D.

Device Manager

Full Access
Question # 58

Which of the following is used to ensure users have the appropriate level of access to perform their job functions?

A.

Access control list

B.

Multifactor authentication

C.

Least privilege

D.

Mobile device management

Full Access
Question # 59

Which of the following could be used to implement secure physical access to a data center?

A.

Geofence

B.

Alarm system

C.

Badge reader

D.

Motion sensor

Full Access
Question # 60

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

A.

Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

B.

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

C.

Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

D.

Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

Full Access
Question # 61

A salesperson's computer is unable to print any orders on a local printer that is connected to the computer Which of the following tools should the salesperson use to restart the print spooler?

A.

Control Panel

B.

Processes

C.

Startup

D.

Services

Full Access
Question # 62

A user is unable to open personal files on a PC on a home network. An on-screen message indicates the files are encrypted and demands payment to access the files. Which of the following should a technician recommend the user do first?

A.

Reinstall the OS.

B.

Run the System Restore feature.

C.

Disconnect the PC from the network.

D.

Pay the amount demanded.

E.

Scan the PC with an anti-malware program.

Full Access
Question # 63

A client’s device was recently used by multiple other users. The client reports their device is now running slower than usual. Which of the following steps should a technician take first? (Select two.)

A.

Perform a virus scan

B.

Check the startup programs

C.

Back up the data

D.

Disable the guest account

E.

Update the firmware

F.

Reinstall the operating system

Full Access
Question # 64

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

A.

.bat

B.

.dll

C.

.ps1

D.

.txt

Full Access
Question # 65

A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?

A.

Respond to calls and text messages while on site but not when working directly with personnel.

B.

Respond to calls and text messages only from family.

C.

Respond to calls and text messages only when an emergency situation requires a response.

D.

Respond to calls and text messages discreetly while on site.

Full Access
Question # 66

During a network outage, a technician discovers a new network switch that was not listed in the support documentation. The switch was installed during a recent change window when a new office was added to the environment. Which of the following would most likely prevent this type of mismatch after next month's change window?

A.

Performing annual network topology reviews

B.

Requiring all network changes include updating the network diagrams

C.

Allowing network changes once per year

D.

Routinely backing up switch configuration files

Full Access
Question # 67

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:

The Audio Driver is not running.

Which of the following will MOST likely resolve the issue?

A.

compmgmt.msc

B.

regedit.exe

C.

explorer.exe

D.

taskmgt.exe

E.

gpmc.msc

F.

services.msc

Full Access
Question # 68

Which of the following environments allows for the testing of critical systems without the risk of them being negatively impacted by changes?

A.

Regression

B.

Cloud

C.

Production

D.

Sandbox

Full Access
Question # 69

A user's antivirus software reports an infection that it is unable to remove. Which of the following is the most appropriate way to remediate the issue?

A.

Disable System Restore.

B.

Utilize a Linux live disc.

C.

Quarantine the infected system.

D.

Update the anti-malware.

Full Access
Question # 70

Which of the following is the best reason for sandbox testing in change management?

    To evaluate the change before deployment

A.

To obtain end-user acceptance

B.

To determine the affected systems

C.

To select a change owner

Full Access
Question # 71

A user's laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?

A.

Scan for malware and ransomware.

B.

Perform a system restore.

C.

Check the network utilization.

D.

Update the antivirus software.

Full Access
Question # 72

Every time a user tries to open the organization's proprietary application on an Android tablet, the application immediately closes. Other applications are operating normally. Which of the following troubleshooting actions would MOST likely resolve the Issue? (Select TWO).

A.

Uninstalling the application

B.

Gaining root access to the tablet

C.

Resetting the web browser cache

D.

Deleting the application cache

E.

Clearing the application storage

F.

Disabling mobile device management

Full Access
Question # 73

When a user is in the office, the user's mobile phone loads applications and web browses very slowly on a cellular connection. Which of the following is the best way to fix this issue?

    Connect to the company's Wi-Fi network.

A.

Change the settings on the phone to connect to a different cellular tower.

B.

Install a cellular repeater at the office for this user.

C.

Update all applications on the phone.

Full Access
Question # 74

A Windows 10 computer is not installing updates and continues to receive errors even during manual update installations. Which of the following should a technician do to fix the issues? (Select two).

A.

Ensure that the Windows Update Utility is the latest version.

B.

Refresh local WSUS settings on the computer.

C.

Delete the Windows Update cache.

D.

Run the System check to verify system files.

E.

Reimage the operating system while retaining user files.

F.

Reset WMI and re-register system .dlls.

Full Access
Question # 75

Which of the following documents in criminal proceedings must be updated every time a piece of evidence is touched or transferred in order for the evidence to be considered valid?

A.

Licensing agreement

B.

Regulatory compliance

C.

Incident documentation

D.

Chain of custody

Full Access
Question # 76

When a user is browsing a website on a smartphone, a pop-up appears. The pop-up states that the system has been breached and directs the user to an application to resolve the breach. Which of the following should the user do?

A.

Close the website and ignore the pop-up

B.

Replace the smartphone

C.

Download and install the application to resolve the issue

D.

Analyze the smartphone to find the source of the breach

Full Access
Question # 77

While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue?

A.

A bad antivirus signature update was installed.

B.

A router was misconfigured and was blocking traffic.

C.

An upstream internet service provider was flapping.

D.

The time or date was not in sync with the website.

Full Access
Question # 78

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?

A.

Changing channels

B.

Modifying the wireless security

C.

Disabling the SSIO broadcast

D.

Changing the access point name

Full Access
Question # 79

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

A.

All updated software must be tested with alt system types and accessories

B.

Extra technician hours must be budgeted during installation of updates

C.

Network utilization will be significantly increased due to the size of CAD files

D.

Large update and installation files will overload the local hard drives.

Full Access
Question # 80

The following error is displayed on a user's computer screen:

No operating system found

Which of the following is the first troubleshooting step a technician should complete?

A.

Disconnect external storage

B.

Flash the BIOS

C.

Replace the SATA cable

D.

Turn on the device in safe mode

Full Access
Question # 81

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

A.

ipconfig /all

B.

hostname

C.

netstat /?

D.

nslookup localhost

E.

arp —a

F.

ping:: 1

Full Access
Question # 82

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:

A.

set AirDrop so that transfers are only accepted from known contacts

B.

completely disable all wireless systems during the flight

C.

discontinue using iMessage and only use secure communication applications

D.

only allow messages and calls from saved contacts

Full Access
Question # 83

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

A.

Lock all devices in a closet.

B.

Ensure all devices are from the same manufacturer.

C.

Change the default administrative password.

D.

Install the latest operating system and patches

Full Access
Question # 84

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

A.

Encryption at rest

B.

Account lockout

C.

Automatic screen lock

D.

Antivirus

Full Access
Question # 85

Which of the following Wi-Fi protocols is the MOST secure?

A.

WPA3

B.

WPA-AES

C.

WEP

D.

WPA-TKIP

Full Access
Question # 86

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

A.

Windows Enterprise Edition

B.

Windows Professional Edition

C.

Windows Server Standard Edition

D.

Windows Home Edition

Full Access
Question # 87

Which of the following is the MOST basic version of Windows that includes BitLocker?

A.

Home

B.

pro

C.

Enterprise

D.

Pro for Workstations

Full Access
Question # 88

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

A.

Educate the user on malware removal.

B.

Educate the user on how to reinstall the laptop OS.

C.

Educate the user on how to access recovery mode.

D.

Educate the user on common threats and how to avoid them.

Full Access
Question # 89

A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?

A.

Bridge the LAN connection between the laptop and the desktop.

B.

Set the laptop configuration to DHCP to prevent conflicts.

C.

Remove the static IP configuration from the desktop.

D.

Replace the network card in the laptop, as it may be defective.

Full Access
Question # 90

Which of the following change management documents includes how to uninstall a patch?

A.

Purpose of change

B.

Rollback plan

C.

Scope of change

D.

Risk analysis

Full Access
Question # 91

An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT?

A.

Perform a risk analysis.

B.

Implement the deployment.

C.

Verify end user acceptance

D.

Document the lessons learned.

Full Access
Question # 92

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

A.

Requiring strong passwords

B.

Disabling cached credentials

C.

Requiring MFA to sign on

D.

Enabling BitLocker on all hard drives

Full Access
Question # 93

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Full Access
Question # 94

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

A.

Configure the network as private

B.

Enable a proxy server

C.

Grant the network administrator role to the user

D.

Create a shortcut to public documents

Full Access
Question # 95

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

A.

Degaussing

B.

Low-level formatting

C.

Recycling

D.

Shredding

Full Access
Question # 96

A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

A.

Anti-malware

B.

Remote wipe

C.

Locator applications

D.

Screen lock

Full Access
Question # 97

A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

Full Access
Question # 98

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

Full Access
Question # 99

The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?

A.

The contents of the text comptia.txt will be replaced with a new blank document

B.

The contents of the text comptia. txt would be displayed.

C.

The contents of the text comptia.txt would be categorized in alphabetical order.

D.

The contents of the text comptia. txt would be copied to another comptia. txt file

Full Access
Question # 100

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

A.

Default gateway

B.

Host address

C.

Name server

D.

Subnet mask

Full Access
Question # 101

As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

A.

Use Settings to access Screensaver settings

B.

Use Settings to access Screen Timeout settings

C.

Use Settings to access General

D.

Use Settings to access Display.

Full Access
Question # 102

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

Full Access
Question # 103

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

A.

Spyware

B.

Cryptominer

C.

Ransormvare

D.

Boot sector virus

Full Access
Question # 104

A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?

A.

Content filter

B.

Screened subnet

C.

Port forwarding

D.

Access control list

Full Access
Question # 105

As a corporate technician, you are asked to evaluate several suspect email messages on

a client's computer. Corporate policy requires he following:

. All phishing attempts must be reported.

. Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the

following within the email:

. Classify the emails

. Identify suspicious items, if applicable, in each email

. Select the appropriate resolution

Full Access
Question # 106

A computer is restarting automatically and displaying the following error message: "Your PC ran into a problem and needs to restart. We're just collecting some error info, and then we'll restart for you. (0% complete)." Which of the following should the technician do first to diagnose the issue?

A.

Check the system event logs.

B.

Verify the hardware driver versions.

C.

Install Windows updates.

D.

Perform a RAM diagnostic.

Full Access
Question # 107

Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in the trash bin?

    .exe

A.

.dmg

B.

. app

C.

. rpm

D.

.pkg

Full Access
Question # 108

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Full Access
Question # 109

Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware?

A.

Run System Restore.

B.

Place in recovery mode.

C.

Schedule a scan.

D.

Restart the PC.

Full Access
Question # 110

A user is unable to access a remote server from a corporate desktop computer using the appropriate terminal emulation program. The user contacts the help desk to report the issue. Which of the following clarifying questions would be most effective for the help desk technician to ask the user in order to understand the issue?

A.

What is the error message?

B.

Does the program work on another computer?

C.

Did the program ever work?

D.

Is anyone else having this issue?

Full Access
Question # 111

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

A.

The user is in a poor signal area.

B.

The user has too many processes running.

C.

The smartphone has malware on it.

D.

The smartphone has been jailbroken.

Full Access
Question # 112

A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to Investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?

A.

Resource Monitor

B.

Performance Monitor

C.

Command Prompt

D.

System Information

Full Access
Question # 113

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

A.

Turn on airplane mode.

B.

Set the connection to be metered.

C.

Configure the device to use a static IP address.

D.

Enable the Windows Defender Firewall.

Full Access
Question # 114

A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

A.

Turn off the monitor.

B.

Remove the power cord.

C.

Remove the PSU.

D.

Remove the RAM modules.

Full Access
Question # 115

A technician is unable to completely start up a system. The OS freezes when the desktop background appears, and the issue persists when the system is restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Disable applicable BIOS options.

B.

Load the system in safe mode.

C.

Start up using a flash drive OS and run System Repair.

D.

Enable Secure Boot and reinstall the system.

Full Access
Question # 116

A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?

A.

msinfo32.exe

B.

dxdiag.exe

C.

msconfig.exe

D.

regedit.exe

Full Access
Question # 117

A technician is replacing the rack mount UPS. Which of the following should the technician consider?

A.

Determining the availability of compressed air

B.

Getting assistance to lift the hardware

C.

Checking local low-voltage regulations

D.

Testing the fire suppression system

Full Access
Question # 118

A technician is configuring a specific NTP server for all company-issued laptops. These Windows 10 machines are not joined to an Active Directory domain. Which of the following setting areas would be used for this adjustment?

A.

System

B.

Update and Security

C.

Network and Internet

D.

Time and Language

Full Access
Question # 119

Users report that a network printer intermittently goes offline during the day. Which of the following commands should the technician use to confirm whether the printer has connectivity issues?

A.

ping

B.

netstat

C.

net

D.

nslookup

Full Access
Question # 120

A proxy server is required for internet access from a corporate network. Which of the following should a technician perform to manually configure a Windows 10 device for internet access?

A.

Add the proxy server's URL and IP address to the computer's hosts file under C:\windows\System32\drivers\etc.

B.

Enable the use of a proxy server and enter an address for it under Control Panel > Internet Options > Connections > LAN settings.

C.

Open a command prompt and run ipconfig /release, followed by ipconfig /renew.

D.

Set the proxy server as the default gateway under the computer's network connection IP settings by selecting Manual, then entering the proxy server's IP address under Gateway.

Full Access
Question # 121

A company is transitioning to a new firewall and discovers that one of the servers is still sending traffic to the old firewall. Which of the following IP address settings should a technician change to resolve this issue?

A.

Dynamic

B.

Gateway

C.

NAT

D.

DNS server

Full Access
Question # 122

Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?

A.

Unreachable DNS server

B.

Virtual local area network misconfiguration

C.

Incorrect IP address

D.

Rogue wireless access point

Full Access
Question # 123

A technician is an administrator on a messaging application for a private work group of mixed departments. One of the technician’s colleagues discloses to the group that their employer recently suffered a major security breach and shared details about the breach to the group Which of the following should the technician do first7

A.

Ignore the messages as all of the group members work for the same employer.

B.

Remove the colleague from the group and ask members to delete the messages.

C.

Message the colleague privately and ask the colleague to delete the messages immediately.

D.

Contact the supervisor and report the colleague with screen shots of the messages

Full Access
Question # 124

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

A.

Make the user a member of Domain Admins.

B.

Add the user to the local Administrators group.

C.

Let the user use credentials from another user who has rights.

D.

Give the user the local, high-privileged account password.

Full Access
Question # 125

A company wants to reduce the negative ecological impacts of its business and has decided to hire an e-waste company to dispose of equipment. Which of the following should the e-waste company provide the business7

A.

Non-disclosure agreement

B.

Certification of destruction

C.

Low-level formatting

D.

Shredding/drilling

Full Access
Question # 126

A user downloads an application with a plug-in that is designed to automatically prompt for an OTP when the user browses to a specific website. The plug-in installs without any warnings or errors. The first time the user goes to the site, the prompt does not open, and the user cannot access the site. Which of the following browser settings should the user configure?

A.

Extensions/add-ins

B.

Certificate validity

C.

Proxy settings

D.

Trusted sources

Full Access
Question # 127

A technician thinks that a computer on the network has been infected with malware. The technician attempts several times to use a malware removal tool, but the issue persists. Which of the following should the technician do next?

A.

Restore the computer from the last known-good backup

B.

Reboot the computer into safe mode

C.

Purchase a new endpoint protection tool

D.

Use system recovery to prevent further infection

Full Access
Question # 128

Which of the following is a preventive physical security control?

A.

Video surveillance system

B.

Bollards

C.

Alarm system

D.

Motion sensors

Full Access
Question # 129

A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?

A.

Escalating the issue to Tier 2

B.

Verifying warranty status with the vendor

C.

Replacing the motherboard

D.

Purchasing another PC

Full Access
Question # 130

A network technician is deploying a new machine in a small branch office that does not have a DHCP server. The new machine automatically receives the IP address of 169.254.0.2 and is unable to communicate with the rest of the network. Which of the following would restore communication?

    Static entry

A.

ARP table

B.

APIPA address

C.

NTP specification

Full Access
Question # 131

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

A.

Recalibrating the magnetometer

B.

Recalibrating the compass

C.

Recalibrating the digitizer

D.

Recalibrating the accelerometer

Full Access
Question # 132

A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the following tools should the technician use to resolve this issue?

A.

taskschd.msc

B.

eventvwr.msc

C.

de vmgmt. msc

D.

diskmgmt.msc

Full Access
Question # 133

Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and Its files. Which of the following will MOST likely allow all users to access the new folders?

A.

Assigning share permissions

B.

Enabling inheritance

C.

Requiring multifactor authentication

D.

Removing archive attribute

Full Access
Question # 134

A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?

A.

Settings > Personalization

B.

Control Panel > Credential Manager

C.

Settings > Accounts > Family and Other Users

D.

Control Panel > Network and Sharing Center

Full Access
Question # 135

A user calls the help desk to report that mapped drives are no longer accessible. The technician verifies that clicking on any of the drives on the user's machine results in an error message. Other users in the office are not having any issues. As a first step, the technician would like to remove and attempt to reconnect the drives. Which of the following command-line tools should the technician use?

A.

net use

B.

set

C.

mkdir

D.

rename

Full Access
Question # 136

A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the following Windows 10 settings should the technician recommend?

A.

Personalization

B.

Apps

C.

Updates

D.

Display

Full Access
Question # 137

A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?

A.

Disable System Restore.

B.

Educate the end user.

C.

Install the latest OS patches.

D.

Clean the environment reinstallation.

Full Access
Question # 138

A systems administrator is experiencing Issues connecting from a laptop to the corporate network using PKI. Which to the following tools can the systems administrator use to help remediate the issue?

A.

certmgr.msc

B.

msconfig.exe

C.

lusrmgr.msc

D.

perfmon.msc

Full Access
Question # 139

A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive?

A.

gpupdate

B.

net use

C.

hostname

D.

dir

Full Access
Question # 140

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

A.

Devices and Printers

B.

Administrative Tools

C.

Network and Sharing Center

D.

Programs and Features

Full Access
Question # 141

A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?

A.

Multifactor authentication

B.

Encryption

C.

Increased password complexity

D.

Secure password vault

Full Access
Question # 142

An employee using an Apple MacBook is receiving frequent, random pop-up requests from other Apple devices wanting to share photos and videos and asking whether the user would like to accept the request Which of the following configurations should the technician advise the user to change first"?

A.

Wi-Fi

B.

iCloud

C.

Antivirus

D.

AirDrop

Full Access
Question # 143

A user clicked a link in an email, and now the cursor is moving around on its own. A technician notices that File Explorer is open and data is being copied from the local drive to an unknown cloud storage location. Which of the following should the technician do first?

A.

Investigate the reported symptoms.

B.

Run anti-malware software.

C.

Educate the user about dangerous links.

D.

Quarantine the workstation.

Full Access
Question # 144

A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?

A.

Internet connection

B.

Product key

C.

Sufficient storage space

D.

UEFI firmware

E.

Legacy BIOS

Full Access
Question # 145

A user reports receiving constant, unwanted pop-ups and being unable to close the browser window. These issues have impacted the user's productivity and may have caused the user's files to be altered. Which of the following should a technician do to address these issues with minimal impact to the user?

A.

Use System Restore to recover the OS files.

B.

Wipe the computer and install a new copy of the OS.

C.

Identify whether the disk partition table has been reduced in size.

D.

Perform a full-system, antivirus scan and check browser notifications.

Full Access
Question # 146

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Full Access
Question # 147

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

A.

Spam filtering

B.

Malware preventionsoftware

C.

End user education

D.

Stateful firewall inspection

Full Access
Question # 148

A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?

A.

Expired certificate

B.

False alert

C.

Missing system files

D.

OS update failure

Full Access
Question # 149

A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?

A.

Degaussing

B.

Shredding

C.

Erasing

D.

Drilling

Full Access
Question # 150

Which of the following Linux commands would help to identify which directory the user is currently operating in?

A.

pwd

B.

dig

C.

find

D.

cat

Full Access
Question # 151

Which of the following languages is used for scripting the creation of Active Directory accounts?

A.

Bash

B.

Structured Query Language

C.

Hypertext Preprocessor

D.

PowerShell

Full Access
Question # 152

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

A.

A system patch disabled the antivirus protection and host firewall.

B.

The system updates did not include the latest anti-malware definitions.

C.

The system restore process was compromised by the malware.

D.

The malware was installed before the system restore point was created.

Full Access
Question # 153

An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of the following should the

technician perform to fix the issue?

A.

Disable the Windows Update service.

B.

Check for updates.

C.

Restore hidden updates.

D.

Rollback updates.

Full Access
Question # 154

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

A.

System

B.

Network and Sharing Center

C.

User Accounts

D.

Security and Maintenance

Full Access
Question # 155

The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Calibrate the phone sensors.

B.

Enable the touch screen.

C.

Reinstall the operating system.

D.

Replace the screen.

Full Access
Question # 156

A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Select two).

A.

Implementing data-at-rest encryption

B.

Disabling AutoRun

C.

Restricting user permissions

D.

Restricting log-in times

E.

Enabling a screen lock

F.

Disabling local administrator accounts

Full Access
Question # 157

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

A.

User account status

B.

Mobile OS version

C.

Data plan coverage

D.

Network traffic outages

Full Access
Question # 158

After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?

A.

Device Manager

B.

Administrator Tools

C.

Programs and Features

D.

Recovery

Full Access
Question # 159

Which of the following is an advantage of using WPA2 instead of WPA3?

A.

Connection security

B.

Encryption key length

C.

Device compatibility

D.

Offline decryption resistance

Full Access
Question # 160

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Full Access
Question # 161

A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?

A.

Phishing

B.

Smishing

C.

Whaling

D.

Vishing

Full Access
Question # 162

A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue?

A.

Add a user account to the local administrator's group.

B.

Configure Windows Defender Firewall to allow access to all networks.

C.

Create a Microsoft account.

D.

Disable the guest account.

Full Access
Question # 163

A user's permissions are limited to read on a shared network folder using NTFS security settings. Which of the following describes this type of security control?

A.

SMS

B.

MFA

C.

ACL

D.

MDM

Full Access
Question # 164

A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed:

crypt32.d11 is missing not found

Which of the following should the technician attempt FIRST?

A.

Rebuild Windows profiles.

B.

Reimage the workstation

C.

Roll back updates

D.

Perform a system file check

Full Access
Question # 165

A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?

A.

Adjust the content filtering.

B.

Unmap port forwarding.

C.

Disable unused ports.

D.

Reduce the encryption strength

Full Access
Question # 166

A macOS user is installing a new application. Which of the following system directories is the software MOST likely to install by default?

A.

/etc/services

B.

/Applications

C.

/usr/bin

D.

C:\Program Files

Full Access
Question # 167

A technician needs to transfer a file to a user's workstation. Which of the following would BEST accomplish this task utilizing the workstation's built-in protocols?

A.

VPN

B.

SMB

C.

RMM

D.

MSRA

Full Access
Question # 168

A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

A.

Repair Windows.

B.

Partition the hard disk.

C.

Reimage the workstation.

D.

Roll back the updates.

Full Access
Question # 169

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to ‘mirror the source data for the backup?

A.

copy

B.

xcopy

C.

robocopy

D.

Copy-Item

Full Access
Question # 170

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

A.

Device drivers

B.

Keyboard backlight settings

C.

Installed application license keys

D.

Display orientation

E.

Target device power supply

F.

Disabling express charging

Full Access
Question # 171

A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock. Which of the following options in the Windows settings should the technician use?

A.

Ease of Access

B.

Privacy

C.

Personalization

D.

Update and Security

Full Access
Question # 172

A user visits a game vendor's website to view the latest patch notes, but this information is not available on the page. Which of the following should the user perform before reloading the page?

A.

Synchronize the browser data.

B.

Enable private browsing mode.

C.

Mark the site as trusted.

D.

Clear the cached file.

Full Access
Question # 173

Which of the following editions of Windows 10 requires reactivation every 180 days?

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Full Access
Question # 174

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Full Access
Question # 175

Which of the following is used as a password manager in the macOS?

A.

Terminal

B.

FileVault

C.

Privacy

D.

Keychain

Full Access
Question # 176

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

A.

Implementing password expiration

B.

Restricting user permissions

C.

Using screen locks

D.

Disabling unnecessary services

Full Access
Question # 177

Windows updates need to be performed on a department's servers. Which of the following methods should be used to connect to the server?

A.

FIP

B.

MSRA

C.

RDP

D.

VPN

Full Access
Question # 178

A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the technician use to make adjustments?

A.

eventvwr.msc

B.

perfmon.msc

C.

gpedic.msc

D.

devmgmt.msc

Full Access
Question # 179

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?

A.

USB drive

B.

DVD Installation media

C.

PXE boot

D.

Recovery partition

Full Access
Question # 180

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?

A.

Remote wipe

B.

Mandatory screen locks

C.

Location applications

D.

Device data encryption

Full Access
Question # 181

Which of the following often uses an SMS or third-party application as a secondary method to access a system?

A.

MFA

B.

WPA2

C.

AES

D.

RADIUS

Full Access
Question # 182

Which of the following is MOST likely used to run .vbs files on Windows devices?

A.

winmgmt.exe

B.

powershell.exe

C.

cscript.exe

D.

explorer.exe

Full Access
Question # 183

Which of the following best describes when to use the YUM command in Linux?

A.

To add functionality

B.

To change folder permissions

C.

To show documentation

D.

To list file contents

Full Access
Question # 184

A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server Is consistently communicating with an IP address that is traced back to a company that awards digital currency for solving hash algorithms. Which of the following was MOST likely used to compromise the server?

A.

Keylogger

B.

Ransomware

C.

Boot sector virus

D.

Cryptomining malware

Full Access
Question # 185

A technician is working on a way to register all employee badges and associated computer IDs. Which of the following options should the technician use in order to achieve this objective?

A.

Database system

B.

Software management

C.

Active Directory description

D.

Infrastructure as a Service

Full Access
Question # 186

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

A.

apt-get

B.

CIFS

C.

Samba

D.

greP

Full Access
Question # 187

Which of the following Is used to identify potential issues with a proposed change poor lo implementation?

A.

Request form

B.

Rollback plan

C.

End-user acceptance

D.

Sandbox testing

Full Access
Question # 188

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

A.

System

B.

Devices

C.

Personalization

D.

Accessibility

Full Access
Question # 189

A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?

A.

Keylogger

B.

Cryptominers

C.

Virus

D.

Malware

Full Access
Question # 190

A company is experiencing a ODDS attack. Several internal workstations are the source of the traffic Which of the following types of infections are the workstations most likely experiencing? (Select two)

A.

Zombies

B.

Keylogger

C.

Adware

D.

Botnet

E.

Ransomvvare

F.

Spyware

Full Access
Question # 191

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the technician should take to resolve the issue?

A.

Run the antivirus scan.

B.

Add the required snap-in.

C.

Restore the system backup

D.

use the administrator console.

Full Access
Question # 192

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

Full Access
Question # 193

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

A.

Cryptominers

B.

Rootkit

C.

Spear phishing

D.

Keylogger

Full Access
Question # 194

A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?

A.

Keyboard

B.

Touch pad

C.

Ease of Access Center

D.

Display settings

Full Access
Question # 195

A technician wants to harden Windows workstations after a recent security audit indicated the company is vulnerable to brute-force attacks. Which of the following features should the technician implement to mitigate such attacks?

A.

System screen lock

B.

Failed log-in lockout

C.

Restricted user permissions

D.

Data-at-rest encryption

Full Access
Question # 196

A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?

A.

Perform a safe mode boot.

B.

Run the System Restore wizard.

C.

Start the computer in the last known-good configuration.

D.

Reset the BIOS settinqs.

Full Access
Question # 197

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Full Access
Question # 198

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the

computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?

A.

Services in Control Panel to check for overutilization

B.

Performance Monitor to check for resource utilization

C.

System File Checker to check for modified Windows files

D.

Event Viewer to identify errors

Full Access
Question # 199

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?

A.

Request physical media

B.

Mount the ISO file.

C.

Install a third-party software.

D.

Download an appropriate 32-bit/64-bit OS file.

Full Access
Question # 200

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

A.

Drilling

B.

Degaussing

C.

Low-level formatting

D.

Erasing/wiping

Full Access
Question # 201

A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?

A.

Surge suppressor

B.

Battery backup

C.

CMOS battery

D.

Generator backup

Full Access
Question # 202

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?

A.

WPS

B.

TKIP

C.

WPA3

D.

WEP

Full Access
Question # 203

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

A.

VPN

B.

MSRA

C.

SSH

D.

RDP

Full Access
Question # 204

Which of the following defines the extent of a change?

A.

Scope

B.

Purpose

C.

Analysis

D.

Impact

Full Access
Question # 205

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

A.

Zero day

B.

Vishing

C.

DDoS

D.

Evil twin

Full Access
Question # 206

A developer installed a new software package that has stopped all file server access. Which of the following change management practices should have been followed?

A.

End-user acceptance

B.

Staff delegation

C.

Appropriate scoping

D.

Sandbox testing

Full Access
Question # 207

A technician needs to configure a backup solution that will have the least additional expenses and impact on users. Which of the following steps should the technician complete? (Select two.)

A.

Configure the backup to run when the user logs in

B.

Configure the backup to run after peak hours

C.

Use third-party licensed backup software

D.

Use the built-in OS backup utility

E.

Configure the backup job to run every hour

F.

Use an external storage device for the backup

Full Access
Question # 208

Which of the following types of malicious software is most likely to demand payments in cryptocurrency?

A.

Ransomware

B.

Keylogger

C.

Cryptomining

D.

Rootkit

Full Access
Question # 209

A company’s help desk receives numerous calls from employees reporting issues related to a current security breach. Which of the following steps should the help desk team take to document the breach?

A.

Record the details in the ticketing system.

B.

Take screenshots and attach them to the root cause analysis.

C.

Discuss the incident with the company’s legal team.

D.

List the details in the company’s knowledge base.

Full Access
Question # 210

A technician ran the following command on a user's workstation:

net use G: \\server1\team\documents /persistent:yes

Which of the following did the technician set up by running this command?

A.

Mapped drive

B.

File server

C.

Shared folder

D.

Shared resource

Full Access
Question # 211

An administrator's change was approved by the change management review board. Which of the following should the administrator do next?

A.

Perform risk analysis.

B.

Assign a change coordinator.

C.

Implement the change.

D.

Verify testing results.

Full Access
Question # 212

Several computers have been infected with malware, causing the company network to slow down and sensitive company information to be lost. The IT department installs new antivirus software to remove the malware and needs to decide the best method to prevent future malware infections. Which of the following methods would be the most effective?

A.

Encrypting data at rest

B.

Implementing firewalls

C.

Utilizing Intrusion detection systems

D.

Backing up data regularly

Full Access
Question # 213

Which of the following is the most secure screen lock?

A.

Face

B.

Swipe

C.

Password

D.

Fingerprint

Full Access
Question # 214

A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed optional Windows updates. Which of the following is best way to resolve the issue?

A.

Enable System Restore.

B.

Roll back the device drivers.

C.

Reinstall the OS.

D.

Update the BIOS.

Full Access
Question # 215

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?

A.

Thegraphics card driver needs to beupdated

B.

Theapplication installer is 64-bit.

C.

Theinstallation requires administrative rights.

D.

Thedisk space is inadequate.

Full Access
Question # 216

A technician needs to recommend a way to keep company devices for field and home-based staff up to date. The users live in various places across the country and the company has several national offices that staff can go to for technical support Which of the following methods is most appropriate for the users?

A.

Make office attendance mandatory for one day per week so that updates can be installed.

B.

Ask users to ensure that they run updates on devices and reboot computers on a regular basis.

C.

Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.

D.

Configure cloud-based endpoint management software to automatically manage computer updates.

Full Access
Question # 217

A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings should the user utilize to create the secondary login?

A.

Privacy

B.

Accounts

C.

Personalization

D.

Shared resources

Full Access
Question # 218

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?

A.

Have the user consider using an iPad if the user is unable to complete updates

B.

Have the user text the user's password to the technician.

C.

Ask the user to click in the Search field, type Check for Updates, and then press the Enter key

D.

Advise the user to wait for an upcoming, automatic patch

Full Access
Question # 219

A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?

A.

Expired certificate

B.

OS update failure

C.

Service not started

D.

Application crash

E.

Profile rebuild needed

Full Access
Question # 220

Which of the following is a data security standard for protecting credit cards?

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Full Access
Question # 221

A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?

A.

The instructions from the software company are not being followed.

B.

Security controls will treat automated deployments as malware.

C.

The deployment script is performing unknown actions.

D.

Copying scripts off the internet is considered plagiarism.

Full Access
Question # 222

A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account Which of the following should the systems administrator do?

A.

Require the user to change the password at the next log-in.

B.

Disallow tie user from changing the password.

C.

Disable the account

D.

Choose a password that never expires.

Full Access
Question # 223

An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT?

A.

Verify all third-party applications are disabled

B.

Determine if the device has adequate storage available.

C.

Check if the battery is sufficiently charged

D.

Confirm a strong internet connection is available using Wi-Fi or cellular data

Full Access
Question # 224

A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements?

A.

PIN

B.

Username and password

C.

SSO

D.

Fingerprint

Full Access
Question # 225

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Full Access
Question # 226

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

A.

.deb

B.

.vbs

C.

.exe

D.

.app

Full Access
Question # 227

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

A.

Operating system updates

B.

Remote wipe

C.

Antivirus

D.

Firewall

Full Access
Question # 228

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

A.

Acceptable use

B.

Chain of custody

C.

Security policy

D.

Information management

Full Access
Question # 229

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

A.

Uninstall and reinstall the application

B.

Reset the phone to factory settings

C.

Install an alternative application with similar functionality

D.

Clear the application cache.

Full Access
Question # 230

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

A.

Privacy

B.

Indexing Options

C.

System

D.

Device Manager

Full Access
Question # 231

A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel. Which of the following explains why the technician unable to find this menu item?

A.

The hardware does not meet BitLocker's minimum system requirements.

B.

BitLocker was renamed for Windows 10.

C.

BitLocker is not included on Windows 10 Home.

D.

BitLocker was disabled in the registry of the laptop

Full Access
Question # 232

Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).

A.

Biometric lock

B.

Badge reader

C.

USB token

D.

Video surveillance

E.

Locking rack

F.

Access control vestibule

Full Access
Question # 233

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

A.

MDM

B.

EULA

C.

IRP

D.

AUP

Full Access
Question # 234

A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?

A.

Shut down the infected computer and swap it with another computer

B.

Investigate what the interface is and what triggered it to pop up

C.

Proceed with initiating a full scan and removal of the viruses using the presented interface

D.

Call the phone number displayed in the interface of the antivirus removal tool

Full Access
Question # 235

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?

A.

Continue researching the issue

B.

Repeat the iterative processes

C.

Inform the CEO the repair will take a couple of weeks

D.

Escalate the ticket

Full Access
Question # 236

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

Full Access
Question # 237

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)

A.

Scan the computer with the company-provided antivirus software

B.

Install a new hard drive and clone the user's drive to it

C.

Deploy an ad-blocking extension to the browser.

D.

Uninstall the company-provided antivirus software

E.

Click the link in the messages to pay for virus removal

F.

Perform a reset on the user's web browser

Full Access
Question # 238

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

A.

DRM

B.

NDA

C.

EULA

D.

MOU

Full Access
Question # 239

A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?

A.

The user is not connected to the VPN.

B.

The file server is offline.

C.

A low battery is preventing the connection.

D.

The log-in script failed.

Full Access