New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

220-1102 Questions and Answers

Question # 6

A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

A.

Install antispyware

B.

Reimage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

Full Access
Question # 7

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?

A.

SSH

B.

MDM

C.

RDP

D.

SFTP

Full Access
Question # 8

Which of the following operating systems were designed for smartphones? (Select two).

A.

Ubuntu

B.

CentOS

C.

macOS

D.

Chrome OS

E.

iOS

F.

Android

Full Access
Question # 9

Multiple users routinely record log-in information in readily accessible areas. Which of the following is the best way to mitigate this issue?

A.

Trusted sources

B.

Valid certificates

C.

User training

D.

Password manager

Full Access
Question # 10

A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?

A.

Internet connection

B.

Product key

C.

Sufficient storage space

D.

UEFI firmware

E.

Legacy BIOS

Full Access
Question # 11

A company downloads a large number of files over the internet daily. The company needs a way to ensure the files have not been modified or corrupted during the download process. Which of the following should the company do to verify the files?

A.

Clear browsing data

B.

Install SSL certificates

C.

Check the hash value

D.

Use trusted sources

Full Access
Question # 12

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

Full Access
Question # 13

A workstation's hard drive is making loud noises, applications are running slowly, and the workstation is rebooting unexpectedly. Which of the following should the technician do first to begin troubleshooting the issue?

A.

Perform a System Restore.

B.

Open Disk Cleanup.

C.

Replace the hard drive.

D.

Run CHKDSK.

Full Access
Question # 14

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Full Access
Question # 15

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

A.

Avoid distractions

B.

Deal appropriately with customer's confidential material .

C.

Adhere to user privacy policy

D.

Set and meet timelines

Full Access
Question # 16

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

A.

Disable unused ports.

B.

Remove the guest network

C.

Add a password to the guest network

D.

Change the network channel.

Full Access
Question # 17

A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?

A.

Multifactor authentication will be forced for Wi-Fi.

B.

All Wi-Fi traffic will be encrypted in transit.

C.

Eavesdropping attempts will be prevented.

D.

Rogue access points will not connect.

Full Access
Question # 18

A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?

A.

Updating the operating system

B.

Changing proxy settings

C.

Reinstalling the browser

D.

Enabling port forwarding

Full Access
Question # 19

Which of the following should be done NEXT?

A.

Send an email to Telecom to inform them of the issue and prevent reoccurrence.

B.

Close the ticket out.

C.

Tell the user to take time to fix it themselves next time.

D.

Educate the user on the solution that was performed.

Full Access
Question # 20

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

A.

Windows Enterprise Edition

B.

Windows Professional Edition

C.

Windows Server Standard Edition

D.

Windows Home Edition

Full Access
Question # 21

Which of the following command-line tools will delete a directory?

A.

md

B.

del

C.

dir

D.

rd

E.

cd

Full Access
Question # 22

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?

A.

The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozenapplication in the list, and clicks Force Quit.

B.

The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.

C.

The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.

D.

The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in thelist, and clicks Force Quit.

Full Access
Question # 23

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

A.

ipconfig /all

B.

hostname

C.

netstat /?

D.

nslookup localhost

E.

arp —a

F.

ping:: 1

Full Access
Question # 24

A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially

infect the network systems. Which of the following is the MOST effective method for dealing with this Issue?

A.

Adjusting the spam gateway

B.

Updating firmware for the spam appliance

C.

Adjusting AV settings

D.

Providing user training

Full Access
Question # 25

A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?

A.

The GPS application is installing software updates.

B.

The GPS application contains malware.

C.

The GPS application is updating its geospatial map data.

D.

The GPS application is conflicting with the built-in GPS.

Full Access
Question # 26

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Full Access
Question # 27

A user is unable to access a website, which is widely used across the organization, and receives the following error message:

The security certificate presented by this website has expired or is not yet valid.

The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?

A.

Reboot the computer.

B.

Reinstall the OS.

C.

Configure a static 12

D.

Check the computer's date and time.

Full Access
Question # 28

Which of the following is a data security standard for protecting credit cards?

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Full Access
Question # 29

A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?

A.

Guards

B.

Bollards

C.

Motion sensors

D.

Access control vestibule

Full Access
Question # 30

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

A.

Data usage limits

B.

Wi-Fi connection speed

C.

Status of airplane mode

D.

System uptime

Full Access
Question # 31

Which of the following data is MOST likely to be regulated?

A.

Name in a Phone book

B.

Name on a medical diagnosis

C.

Name on a job application

D.

Name on a employer's website

Full Access
Question # 32

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?

A.

Signed system images

B.

Antivirus

C.

SSO

D.

MDM

Full Access
Question # 33

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

A.

UEFI password

B.

Secure boot

C.

Account lockout

D.

Restricted user permissions

Full Access
Question # 34

A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?

A.

The user is not connected to the VPN.

B.

The file server is offline.

C.

A low battery is preventing the connection.

D.

The log-in script failed.

Full Access
Question # 35

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

A.

ipconfig

B.

ifconfig

C.

arpa

D.

ping

Full Access
Question # 36

A user received the following error upon visiting a banking website:

The security presented by website was issued a different website' s address .

A technician should instruct the user to:

A.

clear the browser cache and contact the bank.

B.

close out of the site and contact the bank.

C.

continue to the site and contact the bank.

D.

update the browser and contact the bank.

Full Access
Question # 37

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?

A.

Power user account

B.

Standard account

C.

Guest account

D.

Administrator account

Full Access
Question # 38

A user reports a computer is running slow. Which of the following tools will help a technician identity the issued

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Full Access
Question # 39

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?

A.

Continue researching the issue

B.

Repeat the iterative processes

C.

Inform the CEO the repair will take a couple of weeks

D.

Escalate the ticket

Full Access
Question # 40

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

Full Access
Question # 41

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

A.

MDM

B.

EULA

C.

IRP

D.

AUP

Full Access
Question # 42

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?

A.

Changing channels

B.

Modifying the wireless security

C.

Disabling the SSIO broadcast

D.

Changing the access point name

Full Access
Question # 43

A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?

A.

Open Settings select Devices, select Display, and change the display resolution to a lower resolution option

B.

Open Settings, select System, select Display, and change the display resolution to a lower resolution option.

C.

Open Settings Select System, select Display, and change the Scale and layout setting to a higher percentage.

D.

Open Settings select Personalization, select Display and change the Scale and layout setting to a higher percentage

Full Access
Question # 44

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

A.

Encryption at rest

B.

Account lockout

C.

Automatic screen lock

D.

Antivirus

Full Access
Question # 45

A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

A.

Data-in-transit encryption

B.

File encryption

C.

USB drive encryption

D.

Disk encryption

Full Access
Question # 46

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

A.

Encrypt the files

B.

Clone any impacted hard drives

C.

Contact the cyber insurance company

D.

Inform law enforcement

Full Access
Question # 47

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?

A.

RDP

B.

VNC

C.

SSH

D.

VPN

Full Access
Question # 48

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

A.

End user acceptance

B.

Perform risk analysis

C.

Communicate to stakeholders

D.

Sandbox testing

Full Access
Question # 49

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

A.

Increase the paging file size

B.

Run the chkdsk command

C.

Rebuild the user's profile

D.

Add more system memory.

E.

Defragment the hard drive.

Full Access
Question # 50

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Full Access
Question # 51

A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).

A.

Utilizing an ESD strap

B.

Disconnecting the computer from the power source

C.

Placing the PSU in an antistatic bag

D.

Ensuring proper ventilation

E.

Removing dust from the ventilation fans

F.

Ensuring equipment is grounded

Full Access
Question # 52

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

A.

Default gateway

B.

Host address

C.

Name server

D.

Subnet mask

Full Access
Question # 53

A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements?

A.

PIN

B.

Username and password

C.

SSO

D.

Fingerprint

Full Access
Question # 54

Which of the following OS types provides a lightweight option for workstations thai need an easy-to-use browser-based interface?

A.

FreeBSD

B.

Chrome OS

C.

macOS

D.

Windows

Full Access
Question # 55

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)

A.

Scan the computer with the company-provided antivirus software

B.

Install a new hard drive and clone the user's drive to it

C.

Deploy an ad-blocking extension to the browser.

D.

Uninstall the company-provided antivirus software

E.

Click the link in the messages to pay for virus removal

F.

Perform a reset on the user's web browser

Full Access
Question # 56

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

Full Access
Question # 57

A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason?

A.

The domain's processor compatibility is not met

B.

The laptop has Windows 10 Home installed

C.

The laptop does not have an onboard Ethernet adapter

D.

The Laptop does not have all current Windows updates installed

Full Access
Question # 58

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

A.

Degaussing

B.

Low-level formatting

C.

Recycling

D.

Shredding

Full Access
Question # 59

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

A.

Install alternate open-source software in place of the applications with issues

B.

Run both CPU and memory tests to ensure that all hardware functionality is normal

C.

Check for any installed patches and roll them back one at a time until the issue is resolved

D.

Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.

Full Access
Question # 60

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

A.

.deb

B.

.vbs

C.

.exe

D.

.app

Full Access
Question # 61

Which of the following is the MOST important environmental concern inside a data center?

A.

Battery disposal

B.

Electrostatic discharge mats

C.

Toner disposal

D.

Humidity levels

Full Access
Question # 62

Which of the following is a proprietary Cisco AAA protocol?

A.

TKIP

B.

AES

C.

RADIUS

D.

TACACS+

Full Access
Question # 63

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

Full Access
Question # 64

Which of the following Linux commands would be used to install an application?

A.

yum

B.

grep

C.

Is

D.

sudo

Full Access
Question # 65

Which of the following Wi-Fi protocols is the MOST secure?

A.

WPA3

B.

WPA-AES

C.

WEP

D.

WPA-TKIP

Full Access
Question # 66

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?

A.

Multifactor authentication will be forced for Wi-Fi

B.

All Wi-Fi traffic will be encrypted in transit

C.

Eavesdropping attempts will be prevented

D.

Rogue access points will not connect

Full Access
Question # 67

A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

Full Access
Question # 68

The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?

A.

The contents of the text comptia.txt will be replaced with a new blank document

B.

The contents of the text comptia. txt would be displayed.

C.

The contents of the text comptia.txt would be categorized in alphabetical order.

D.

The contents of the text comptia. txt would be copied to another comptia. txt file

Full Access
Question # 69

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?

A.

Consoltf

B.

Disk Utility

C.

Time Machine

D.

FileVault

Full Access
Question # 70

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

A.

Uninstall and reinstall the application

B.

Reset the phone to factory settings

C.

Install an alternative application with similar functionality

D.

Clear the application cache.

Full Access
Question # 71

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

A.

Run sfc / scannow on the drive as the administrator.

B.

Run clearnmgr on the drive as the administrator

C.

Run chkdsk on the drive as the administrator.

D.

Run dfrgui on the drive as the administrator.

Full Access
Question # 72

A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

A.

Anti-malware

B.

Remote wipe

C.

Locator applications

D.

Screen lock

Full Access
Question # 73

Which of the following operating systems is most commonly used in embedded systems?

A.

Chrome OS

B.

macOS

C.

Windows

D.

Linux

Full Access
Question # 74

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?

A.

Brute force

B.

Zero day

C.

Denial of service

D.

On-path

Full Access
Question # 75

Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?

A.

Professional

B.

Home

C.

Enterprise

D.

Embedded

Full Access
Question # 76

A user's company phone was stolen. Which of the following should a technician do next?

A.

Perform a low-level format.

B.

Remotely wipe the device.

C.

Degauss the device.

D.

Provide the GPS location of the device.

Full Access
Question # 77

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?

A.

VNC

B.

RMM

C.

RDP

D.

SSH

Full Access
Question # 78

A network technician is deploying a new machine in a small branch office that does not have a DHCP server. The new machine automatically receives the IP address of 169.254.0.2 and is unable to communicate with the rest of the network. Which of the following would restore communication?

    Static entry

A.

ARP table

B.

APIPA address

C.

NTP specification

Full Access
Question # 79

Which of the following should be documented to ensure that the change management plan is followed?

A.

Scope of the change

B.

Purpose of the change

C.

Change rollback plan

D.

Change risk analysis

Full Access
Question # 80

A help desk technician needs to remotely access and control a customer's Windows PC by using a secure session that allows the technician the same control as the customer. Which of the following tools provides this type of access?

A.

FTP

B.

RDP

C.

SSH

D.

VNC

Full Access
Question # 81

A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?

A.

Disable System Restore.

B.

Remediate the system.

C.

Educate the system user.

D.

Quarantine the system.

Full Access
Question # 82

A technician wants to install Developer Mode on a Windows laptop but is receiving a "failed to install package" message. Which of the following should the technician do first?

A.

Ensure internet connectivity.

B.

Check for Windows updates.

C.

Enable SSH.

D.

Reboot computer.

Full Access
Question # 83

A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?

A.

Apps and Features

B.

Personalization

C.

File Explorer

D.

Task Manager

Full Access
Question # 84

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

A.

.bat

B.

.dll

C.

.ps1

D.

.txt

Full Access
Question # 85

Which of the following involves sending arbitrary characters in a web page request?

A.

SMS

B.

SSL

C.

XSS

D.

VPN

Full Access
Question # 86

Which of the following does MFA provide?

A.

Security enhancement

B.

Encryption

C.

Digital signature

D.

Public key infrastructure

Full Access
Question # 87

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

A.

Installing a VPN

B.

Implementing location tracking

C.

Configuring remote wipe

D.

Enabling backups

Full Access
Question # 88

Which of the following items require special e-waste recycling? (Select two).

    Solid-state drive

A.

A/C adapter

B.

Surge protector

C.

Laptop battery

D.

CRT monitor

E.

Power supply

Full Access
Question # 89

Which of the following file extensions should a technician use for a PowerShell script?

A.

.ps1

B.

.py

C.

.sh

D.

.bat

E.

.cmd

Full Access
Question # 90

A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?

A.

Ask the user for the model number of the hardware.

B.

Offer a temporary replacement device to the user.

C.

Submit the issue to the manufacturer.

D.

Remotely install updates to the device driver.

Full Access
Question # 91

An IT technician is attempting to access a user's workstation on the corporate network but needs more information from the user before an invitation can be sent. Which of the following command-line tools should the technician instruct the user to run?

A.

nslookup

B.

tracert

C.

hostname

D.

gpresult

Full Access
Question # 92

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?

    Group Policy

A.

User accounts

B.

Access control lists

C.

Authenticator applications

Full Access
Question # 93

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

A.

Isolate the machine from the network.

B.

Scan the system for hidden files.

C.

Disable unused ports.

D.

Install antivirus software.

E.

Reconfigure the firewall.

Full Access
Question # 94

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

A.

Valid license

B.

Data retention requirements

C.

Material safety data sheet

D.

Chain of custody

Full Access
Question # 95

A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?

A.

c: \minutes

B.

dir

C.

rmdir

D.

md

Full Access
Question # 96

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

Full Access
Question # 97

Which of the following would allow physical access to a restricted area while maintaining a record of events?

A.

Hard token

B.

Access control vestibule

C.

Key fob

D.

Door Lock

Full Access
Question # 98

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

A.

The user is in a poor signal area.

B.

The user has too many processes running.

C.

The smartphone has malware on it.

D.

The smartphone has been jailbroken.

Full Access
Question # 99

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

    Standard operating procedure

A.

Acceptable use policy

B.

Security protocols

C.

Data flow diagram

Full Access
Question # 100

A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).

A.

Examine the event logs.

B.

Connect to the network.

C.

Document the findings.

D.

Update the definitions.

E.

Reimage the computer.

F.

Enable the firewall.

Full Access
Question # 101

A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure what the user means and needs to view the email to assist with troubleshooting. Which of the following should the technician use to assist the user?

A.

VNC

B.

SSH

C.

VPN

D.

RMM

Full Access
Question # 102

A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?

A.

EFS

B.

GPT

C.

MBR

D.

FAT32

Full Access
Question # 103

A technician needs administrator access on a Windows workstation to facilitate system changes without elevating permissions. Which of the following would best accomplish this task?

A.

Group Policy Editor

B.

Local Users and Groups

C.

Device Manager

D.

System Configuration

Full Access
Question # 104

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

D.

Run an antivirus and enable encryption.

Full Access
Question # 105

Which of the following operating systems would most likely be used to run the inventory management system at a factory?

A.

Windows

B.

Chrome OS

C.

Android

D.

iOS

Full Access
Question # 106

Which of the following commands can a technician use to get the MAC address of a Linux distribution?

    net use

A.

ifconfig

B.

netstat

C.

ping

Full Access
Question # 107

Which of the following environments allows for the testing of critical systems without the risk of them being negatively impacted by changes?

A.

Regression

B.

Cloud

C.

Production

D.

Sandbox

Full Access
Question # 108

A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?

    Color Management

A.

System

B.

Troubleshooting

C.

Device Manager

D.

Administrative Tools

Full Access
Question # 109

A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond?

    Place the customer on hold until the customer calms down.

A.

Disconnect the call to avoid a confrontation.

B.

Wait until the customer is done speaking and offer assistance.

C.

Escalate the issue to a supervisor.

Full Access
Question # 110

An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product?

A.

AUP

B.

EULA

C.

EOL

D.

UAC

Full Access
Question # 111

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

A.

Configure the firewall.

B.

Restore the system from backups.

C.

Educate the end user

D.

Update the antivirus program.

Full Access
Question # 112

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Full Access
Question # 113

A user wants to back up a Windows 10 device. Which of the following should the user select?

A.

Devices and Printers

B.

Email and Accounts

C.

Update and Security

D.

Apps and Features

Full Access
Question # 114

A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company's risk to avoid any issues. Which of the following items should the technician implement?

A.

Screened subnet

B.

Firewall

C.

Anti-phishing training

D.

Antivirus

Full Access
Question # 115

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

A.

Quarantine the computer.

B.

Disable System Restore.

C.

Update the antivirus software definitions.

D.

Boot to safe mode.

Full Access
Question # 116

A technician is investigating options to secure a small office's wireless network. One requirement is to allow automatic log-ins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature?

A.

RADIUS

B.

AES

C.

EAP-EKE

D.

MFA

Full Access
Question # 117

A company's assets are scanned annually. Which of the following will most likely help the company gain a holistic view of asset cost?

A.

Creating a database

B.

Assigning users to assets

C.

Inventorying asset tags

D.

Updating the procurement account owners

Full Access
Question # 118

A technician is trying to encrypt a single folder on a PC. Which of the following should the technician use to accomplish this task?

A.

FAT32

B.

exFAT

C.

BitLocker

D.

EFS

Full Access
Question # 119

A new employee is having difficulties using a laptop with a docking station The laptop is connected to the docking station, and the laptop is closed. The external monitor works for a few seconds, but then the laptop goes to sleep. Which of the following options should the technician configure in order to fix the Issue?

A.

Hibernate

B.

Sleep/suspend

C.

Choose what closing the lid does

D.

Turn on fast startup

Full Access
Question # 120

A company is looking lot a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select?

A.

Off-site

B.

Synthetic

C.

Full

D.

Differential

Full Access
Question # 121

Which of the following is an advantage of using WPA2 instead of WPA3?

A.

Connection security

B.

Encryption key length

C.

Device compatibility

D.

Offline decryption resistance

Full Access
Question # 122

A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools should the technician use?

A.

Disk Cleanup

B.

Resource Monitor

C.

Disk Defragment

D.

Disk Management

Full Access
Question # 123

Which of the following filesystem types does macOS use?

A.

ext4

B.

exFAT

C.

NTFS

D.

APFS

Full Access
Question # 124

Which of the following threats will the use of a privacy screen on a computer help prevent?

A.

Impersonation

B.

Shoulder surfing

C.

Whaling

D.

Tailgating

Full Access
Question # 125

A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key. Which of the following is the best way for a technician to return the device to service safely?

A.

Run an AV scan.

B.

Reinstall the operating system

C.

Install a software firewall.

D.

Perform a system restore.

E.

Comply with the on-screen instructions.

Full Access
Question # 126

A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?

A.

Network and Sharing Center

B.

net use

C.

User Accounts

D.

regedit

E.

Group Policy

Full Access
Question # 127

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

A.

Cryptominers

B.

Rootkit

C.

Spear phishing

D.

Keylogger

Full Access
Question # 128

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?

A.

Preserving chain of custody

B.

Implementing data protection policies

C.

Informing law enforcement

D.

Creating a summary of the incident

Full Access
Question # 129

A technician is working on a Windows 10 PC that has unwanted applications starting on boot. Which of the following tools should the technician use to disable applications on startup?

A.

System Configuration

B.

Task Manager

C.

Performance Monitor

D.

Group Policy Editor

Full Access
Question # 130

Which of the following protects a mobile device against unwanted access when it is left unattended?

A.

PIN code

B.

OS updates

C.

Antivirus software

D.

BYOD policy

Full Access
Question # 131

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

A.

Quarantine the host in the antivirus system.

B.

Run antivirus scan tor malicious software.

C.

Investigate how malicious software was Installed.

D.

Reimage the computer.

Full Access
Question # 132

A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?

A.

Disk Management

B.

Device Manager

C.

Disk Cleanup

D.

Disk Defragmenter

Full Access
Question # 133

A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?

A.

Escalating the issue to Tier 2

B.

Verifying warranty status with the vendor

C.

Replacing the motherboard

D.

Purchasing another PC

Full Access
Question # 134

Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of law?

A.

Data integrity form

B.

Valid operating system license

C.

Documentation of an incident

D.

Chain of custody

Full Access
Question # 135

During a network outage, a technician discovers a new network switch that was not listed in the support documentation. The switch was installed during a recent change window when a new office was added to the environment. Which of the following would most likely prevent this type of mismatch after next month's change window?

A.

Performing annual network topology reviews

B.

Requiring all network changes include updating the network diagrams

C.

Allowing network changes once per year

D.

Routinely backing up switch configuration files

Full Access
Question # 136

Which of the following common security vulnerabilities can be mitigated by using input validation?

A.

Brute-force attack

B.

Cross-site scripting

C.

SQL injection

D.

Cross-site request forgery

Full Access
Question # 137

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Full Access
Question # 138

A company is experiencing a ODDS attack. Several internal workstations are the source of the traffic Which of the following types of infections are the workstations most likely experiencing? (Select two)

A.

Zombies

B.

Keylogger

C.

Adware

D.

Botnet

E.

Ransomvvare

F.

Spyware

Full Access
Question # 139

Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?

A.

A forgotten keychain password

B.

An employee's Apple ID used on the device

C.

An operating system that has been jailbroken

D.

An expired screen unlock code

Full Access
Question # 140

Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and Its files. Which of the following will MOST likely allow all users to access the new folders?

A.

Assigning share permissions

B.

Enabling inheritance

C.

Requiring multifactor authentication

D.

Removing archive attribute

Full Access
Question # 141

A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue?

A.

Add a user account to the local administrator's group.

B.

Configure Windows Defender Firewall to allow access to all networks.

C.

Create a Microsoft account.

D.

Disable the guest account.

Full Access
Question # 142

Which of the following Is used to identify potential issues with a proposed change poor lo implementation?

A.

Request form

B.

Rollback plan

C.

End-user acceptance

D.

Sandbox testing

Full Access
Question # 143

A technician is installing RAM in a new workstation and needs to protect against electrostatic discharge. Which of the following will best resolve this concern?

A.

Battery backup

B.

Thermal paste

C.

ESD strap

D.

Consistent power

Full Access
Question # 144

A technician needs to ensure that USB devices are not suspended by the operating system Which of the following Control Panel utilities should the technician use to configure the setting?

A.

System

B.

Power Options

C.

Devices and Printers

D.

Ease of Access

Full Access
Question # 145

A hard drive that previously contained PI I needs to be repurposed for a public access workstation. Which of the following data destruction methods should a technician use to ensure data is completely removed from the hard drive?

A.

Shredding

B.

Degaussing

C.

Low-level formatting

D.

Recycling

Full Access
Question # 146

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:

The Audio Driver is not running.

Which of the following will MOST likely resolve the issue?

A.

compmgmt.msc

B.

regedit.exe

C.

explorer.exe

D.

taskmgt.exe

E.

gpmc.msc

F.

services.msc

Full Access
Question # 147

A systems administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. Which of the following should the administrator do to resolve this issue?

A.

Rebuild user profiles.

B.

Roll back the updates.

C.

Restart the services.

D.

Perform a system file check.

Full Access
Question # 148

A user is trying to limit the amount of time their children spend on the internet. Which of the following Windows 10 settings should be enabled to accomplish this objective?

A.

Family Options

B.

Update & Security

C.

Ease of Access

D.

Network & Internet

E.

Privacy

Full Access
Question # 149

A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?

A.

Acceptable use policy

B.

Incident report

C.

End user license agreement

D.

Standard operating procedures

Full Access
Question # 150

A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and has no subnet mask. Which of the following should the technician check next?

A.

Internal antenna connections

B.

Static IP settings

C.

Airplane mode

D.

Digitizer calibration

Full Access
Question # 151

Which of the following languages is used for scripting the creation of Active Directory accounts?

A.

Bash

B.

Structured Query Language

C.

Hypertext Preprocessor

D.

PowerShell

Full Access
Question # 152

An organization wants to deploy a customizable operating system. Which of the following should the organization choose?

A.

Windows 10

B.

macOS

C.

Linux

D.

Chrome OS

E.

iOS

Full Access
Question # 153

Which of the following features can be used to ensure a user can access multiple versions of files?

A.

Multiple desktops

B.

Remote Disc

C.

Time Machine

D.

FileVault

Full Access
Question # 154

Which of the following features can a technician use to ensure users are following password length requirements?

A.

Group Policy

B.

Log-on script

C.

Access controllist

D.

Security groups

Full Access
Question # 155

A customer who uses a Linux OS called the help desk to request assistance in locating a missing file. The customer does not know the exact name of the file but can provide a partial file name. Which of the following tools should the technician use? (Select two).

A.

cat

B.

df

C.

grep

D.

ps

E.

dig

F.

find

G.

top

Full Access
Question # 156

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

A.

Configure MAC filtering.

B.

Disable DHCP.

C.

Configure port forwarding.

D.

Disable guest access.

Full Access
Question # 157

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

A.

Replacing non-mobile users' laptops with wired desktop systems

B.

Increasing the wireless network adapter metric

C.

Adding wireless repeaters throughout the building

D.

Upgrading the current mesh network to support the 802.11 n specification

Full Access
Question # 158

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

A.

Spam filtering

B.

Malware preventionsoftware

C.

End user education

D.

Stateful firewall inspection

Full Access
Question # 159

A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?

A.

Reviewing System Information

B.

Running Disk Cleanup

C.

Editing the Registry

D.

Checking the Performance Monitor

E.

Increasing the memory

Full Access
Question # 160

A technician is troubleshooting a Windows system that is having issues with the OS loading at startup. Which of the following should the technician do to diagnose the issue?

A.

Enable boot logging on the system.

B.

Launch the last known-good configuration.

C.

Check the system resource usage in Task Manager.

D.

Run the sfc /scannow command.

E.

Use the Event Viewer to open the application log

Full Access
Question # 161

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).

A.

NIC

B.

CPU

C.

PSU

D.

KVM

E.

RAM

F.

DVI

Full Access
Question # 162

When a user is in the office, web pages are loading slowly on the user's phone. Which of the following best explains this issue?

A.

Exceeded the data usage limit

B.

Sluggish response time

C.

Degraded network service

D.

High network traffic

Full Access
Question # 163

Which of the following is a preventive physical security control?

A.

Video surveillance system

B.

Bollards

C.

Alarm system

D.

Motion sensors

Full Access
Question # 164

A user in a SOHO asks an off-site, remote technician to connect securely to the user’s laptop. The technician is able to connect to the VPN but is unable to connect to the user’s laptop. Which of the following settings should the technician review?

A.

Wireless protocol

B.

DHCP pool

C.

Content filtering

D.

Firewall

Full Access
Question # 165

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used. Then, click the + sign to place each device

in its appropriate location. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 166

The user often hosts meetings from a Windows desktop, and meeting participants ask the user to make the text larger when the user shares the computer screen. When not in meetings, the user wants the text be smaller for work tasks. Which of the following is the most efficient way to change text font size?

A.

Issuinga laptop to the user with increased font size to be used only for meetings

B.

Using display settings to adjust the text size during meetings

C.

Addinga local user account, which has a larger font size set, for the user to log In toduring meetings

D.

Addinga second monitor to the user's desktop and increase the font size for only that display

Full Access
Question # 167

A technician needs to join a Windows client to a domain. Which of the following is required?

A.

Local access

B.

Internet connection

C.

Enterprise administrative permissions

D.

Computer MAC address

Full Access
Question # 168

A network administrator is showing an email application on a personal cell phone to a coworker. The cell phone is enrolled in the company's MDM program. When launching the application store to download the email application, the coworker receives a security warning stating the device violates company policies due to root-level access. Which of the following should the coworker perform next to resolve the issue?

A.

Download and install a similar application.

B.

Install the latest mobile OS updates.

C.

Reimage the device with the OS from the OEM.

D.

Return the cell phone to the manufacturer.

Full Access
Question # 169

Which of the following filesystems is most likely to be used for the boot volume on a Linux desktop?

A.

ext4

B.

NTFS

C.

HFS

D.

APFS

Full Access
Question # 170

Which of the following types of malware is designed to enable administrative access to a computer?

A.

Rootkit

B.

Trojan

C.

Worm

D.

Ransomware

Full Access
Question # 171

A user's smartphone screen is not rotating. The technician confirms the rotation lock is deactivated. Which of the following steps should the technician perform next?

A.

Remove the screen protector.

B.

Update the smartphone’s software.

C.

Restart the smartphone.

D.

Replace the smartphone.

Full Access
Question # 172

A systems administrator needs to access a hypervisor that went offline. After doing a port scan, the administrator notices that company policy is blocking the RDP default port. Which of the following ports should the administrator use to access the machine?

A.

22

B.

23

C.

80

D.

3090

Full Access
Question # 173

An employee utilizes a personal smartphone to work remotely. The employee is unable to reach the portal using the company-provided VPN service. Which of the following describes the cause of the issue?

A.

The application must be purchased by the company.

B.

The smartphone is not on the latest OS version.

C.

The smartphone is not enrolled in MDM service.

D.

The application fails to install and launch.

Full Access
Question # 174

Which of the following commands should be used to display current processor activity on a Linux workstation?

A.

top

B.

ls

C.

procmon

D.

taskmgr

Full Access
Question # 175

A user reports that a system is performing unusually and is sending requests to an unfamiliar IP address every five minutes. Which of the following should the technician check first to troubleshoot the issue?

A.

Application logs

B.

Running processes

C.

Antivirus scans

D.

Recent system updates

Full Access
Question # 176

Due to special job responsibilities, an end user needs the ability to edit the properties of Windows system files. The user has already been granted local administrator privileges. Which of the following Control Panel utilities should be used to provide easy access to the files?

A.

File Explorer Options

B.

Ease of Access

C.

Indexing Options

D.

Administrative Tools

Full Access
Question # 177

Which of the following languages would a technician most likely use to automate the setup of various services on multiple systems?

A.

SQL

B.

HTML

C.

PowerShell

D.

C#

Full Access
Question # 178

A technician is working at a client office site and the technician's family member repeatedly calls and texts about a non-emergency situation. Which of the following should the technician do?

A.

Step aside and answer.

B.

Put the phone on silent.

C.

Text a reply.

D.

Ignore the phone and continue working.

Full Access
Question # 179

Which of the following is a reason why PII is regulated?

A.

To establish a chain-of-custody

B.

To increase efficiency of databases

C.

To stop information leaks

D.

To protect privacy rights

E.

To discourage anonymity

Full Access
Question # 180

A user is unable to log in to a workstation. The user reports an error message about the date being incorrect. A technician reviews the date and verifies it is correct, but the system clock is an hour behind. The technician also determines this workstation is the only one affected. Which of the following is the most likely issue?

A.

Time drift

B.

NTP failure

C.

Windows Update

D.

CMOS battery

Full Access
Question # 181

Which of the following should be enabled on a mobile device to prevent unauthorized access to data in case the device is lost or stolen? (Select two).

A.

Biometric authentication

B.

Remote wipe

C.

Encryption

D.

Device tracking

E.

Antivirus software

F.

VPN access

Full Access
Question # 182

A user's company phone has several pending software updates. A technician completes the following steps:

•Rebooted the phone

•Connected to Wi-Fi

•Disabled metered data

Which of the following should the technician do next?

A.

Restore the factory settings.

B.

Clean the browser history.

C.

Uninstall and reinstall the applications.

D.

Clear the cache.

Full Access
Question # 183

After a user upgraded the Windows operating system to the latest feature release, the user notices that one of the legacy applications that was running correctly before the upgrade does not open some windows and is only partially functional. Which of the following actions should the user take to troubleshoot the issue?

A.

Run the application as Administrator.

B.

Raise the User Account Control level.

C.

Turn off Windows Defender Firewall.

D.

Disable compatibility mode for the application.

Full Access
Question # 184

A technician is performing hardware maintenance on a desktop PC. Which of the following is the most important safety precaution the technician should take?

A.

Disconnect the power cord from the computer.

B.

Wear a grounding strap to avoid electrostatic discharge.

C.

Ensure the work area is well ventilated.

D.

Wear appropriate safety eyewear.

Full Access
Question # 185

A user calls a technician and asks for help with setting up a connection to a printer application. The technician has never dealt with secure print but has directions that will help guide the user. Which of the following techniques should the technician use?

A.

Express to the user that this is the technician's first experience with the application.

B.

Maintain a positive attitude and project confidence.

C.

Use technical jargon so the user is confident in the technician's skills.

D.

Send the user the directions to connect.

Full Access
Question # 186

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

A.

Trojan

B.

Boot sector virus

C.

Spyware

D.

Rootkit

Full Access
Question # 187

A technician wants to harden Windows workstations after a recent security audit indicated the company is vulnerable to brute-force attacks. Which of the following features should the technician implement to mitigate such attacks?

A.

System screen lock

B.

Failed log-in lockout

C.

Restricted user permissions

D.

Data-at-rest encryption

Full Access
Question # 188

A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?

A.

Multifactor authentication

B.

Encryption

C.

Increased password complexity

D.

Secure password vault

Full Access
Question # 189

While browsing the internet, a customer sees a window stating antivirus protection is no longer functioning Which of the following steps should a technician take next? (Select two).

A.

Isolate the computer from the network

B.

Enable the firewall service.

C.

Update the endpoint protection software

D.

Use System Restore to undo changes.

E.

Delete the browser cookies

F.

Run sfc /scannow.

Full Access
Question # 190

Which of the following will automatically map network drives based on Group Policy configuration?

A.

Log-in scripts

B.

Access controllists

C.

Organizationalunits

D.

Folder redirection

Full Access
Question # 191

A Windows 10 computer is not installing updates and continues to receive errors even during manual update installations. Which of the following should a technician do to fix the issues? (Select two).

A.

Ensure that the Windows Update Utility is the latest version.

B.

Refresh local WSUS settings on the computer.

C.

Delete the Windows Update cache.

D.

Run the System check to verify system files.

E.

Reimage the operating system while retaining user files.

F.

Reset WMI and re-register system .dlls.

Full Access
Question # 192

A technician is configuring a specific NTP server for all company-issued laptops. These Windows 10 machines are not joined to an Active Directory domain. Which of the following setting areas would be used for this adjustment?

A.

System

B.

Update and Security

C.

Network and Internet

D.

Time and Language

Full Access
Question # 193

While testing a new computer, a technician hears a loud buzzing sound, smells smoke, and sees a flame inside the power supply. Which of the following actions should the technician take first?

A.

Extinguish the fire with water.

B.

Smother the fire by replacing the system case.

C.

Turn off the power supply switch.

D.

Disconnect the power cord from the wall outlet.

Full Access
Question # 194

A technician receives a help desk ticket regarding a software issue on a workstation. The workstation provides the only access to a corporate database, and the technician needs to recover the workstation quickly. Which of the following actions should the technician take?

A.

Restore the workstation from the last backup.

B.

Reinstall the operating system.

C.

Run the System File Checker.

D.

Run the Hardware Diagnostics tool.

Full Access
Question # 195

A technician is assisting a customer who is having difficulty accessing the company’s website. Which of the following should the technician do first?

A.

Ask the customer for their log-in credentials.

B.

Check the company's internal knowledge base for solutions.

C.

Refer the customer to a more experienced technician.

D.

Record the details of the issue in the company’s ticketing system.

Full Access
Question # 196

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Full Access
Question # 197

Which of the following environmental controls is most important to maintain the safety of a data center?

A.

Temperature control

B.

Humidity control

C.

Fire suppression control

D.

Power managementcontrol

Full Access
Question # 198

A network administrator is setting up the security for a SOHO wireless network. Which of the following options should the administrator enable to secure the network?

A.

NAT

B.

WPA3

C.

802.1X

D.

Static IP

Full Access
Question # 199

A technician wants to improve password security after several users admitted to using very simple passwords. Which of the following is the best way to resolve this issue?

A.

Requiring four character types

B.

Decreasing the password expiration times

C.

Enabling an automatic lock timer

D.

Adding two characters to the minimum password length

Full Access
Question # 200

Which of the following language types enables the automation of tasks?

A.

Compiled

B.

Scripting

C.

Web

D.

Database

Full Access
Question # 201

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).

A.

Degauss

B.

Delete

C.

Incinerate

D.

Recycle

E.

Format

F.

Shred

Full Access
Question # 202

A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Select two).

A.

Uninstall the game application.

B.

Perform a factory reset of the device.

C.

Connect the device to an external charger.

D.

Install the latest security patches.

E.

Clear the application's cache.

F.

Enable the device's built-in anti-malware protection.

Full Access
Question # 203

A user accidentally deleted an important presentation from the desktop of a workstation. The presentation was created after the most recent daily corporate backup. As a result, the technician is unable to restore the presentation. Which of the following should the technician enable to prevent this issue from occurring in the future?

A.

Incremental backup

B.

File History

C.

System Restore

D.

BitLocker

Full Access
Question # 204

An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable?

A.

Smart card

B.

Biometrics

C.

Hard token

D.

One-time password

Full Access
Question # 205

Which of the following macOS file types requires mounting before installation?

A.

.pkg

B.

.zip

C.

.app

D.

.dmg

Full Access
Question # 206

A systems administrator at a small company wants to discretely access user machines and verify patch levels without users noticing. Which of the following remote access technologies should the administrator use?

A.

RDP

B.

MSRA

C.

SSH

D.

VNC

Full Access
Question # 207

Which of the following security threats requires a phone call to launch the attack?

A.

Vishing

B.

XSS

C.

Spoofing

D.

DDoS

Full Access
Question # 208

A technician is an administrator on a messaging application for a private work group of mixed departments. One of the technician’s colleagues discloses to the group that their employer recently suffered a major security breach and shared details about the breach to the group Which of the following should the technician do first7

A.

Ignore the messages as all of the group members work for the same employer.

B.

Remove the colleague from the group and ask members to delete the messages.

C.

Message the colleague privately and ask the colleague to delete the messages immediately.

D.

Contact the supervisor and report the colleague with screen shots of the messages

Full Access
Question # 209

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Full Access
Question # 210

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

A.

gpedit

B.

gpmc

C.

gpresult

D.

gpupdate

Full Access
Question # 211

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Full Access
Question # 212

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

A.

Login times

B.

Screen lock

C.

User permission

D.

Login lockout attempts

Full Access
Question # 213

A technician is troubleshooting a mobile device that was dropped. The technician finds that the screen (ails to rotate, even though the settings are correctly applied. Which of the following pieces of hardware should the technician replace to resolve the issue?

A.

LCD

B.

Battery

C.

Accelerometer

D.

Digitizer

Full Access
Question # 214

A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

A.

Repair Windows.

B.

Partition the hard disk.

C.

Reimage the workstation.

D.

Roll back the updates.

Full Access
Question # 215

An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented?

A.

TKIP

B.

RADIUS

C.

WPA2

D.

AES

Full Access
Question # 216

A customer called the help desk to report that a machine that was recently updated is no longer working. The support technician checks the latest logs to see what updates were deployed, but nothing was

deployed in more than three weeks. Which of the following should the support technician do to BEST resolve the situation?

A.

Offer to wipe and reset the device for the customer.

B.

Advise that the help desk will investigate and follow up at a later date.

C.

Put the customer on hold and escalate the call to a manager.

D.

Use open-ended questions to further diagnose the issue.

Full Access
Question # 217

A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?

A.

Enable promiscuous mode.

B.

Clear the browser cache.

C.

Add a new network adapter.

D.

Reset the network adapter.

Full Access
Question # 218

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

A.

Remote Assistance

B.

Remote Desktop Protocol

C.

Screen Sharing

D.

Virtual Network Computing

Full Access
Question # 219

A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?

A.

Boot order

B.

Malware

C.

Drive failure

D.

Windows updates

Full Access
Question # 220

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

A.

UAC

B.

MDM

C.

LDAP

D.

SSO

Full Access
Question # 221

A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?

A.

Settings > Personalization

B.

Control Panel > Credential Manager

C.

Settings > Accounts > Family and Other Users

D.

Control Panel > Network and Sharing Center

Full Access
Question # 222

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

A.

Trojan

B.

Rootkit

C.

Cryptominer

D.

Keylogger

Full Access
Question # 223

A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock. Which of the following options in the Windows settings should the technician use?

A.

Ease of Access

B.

Privacy

C.

Personalization

D.

Update and Security

Full Access
Question # 224

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

A.

Recalibrating the magnetometer

B.

Recalibrating the compass

C.

Recalibrating the digitizer

D.

Recalibrating the accelerometer

Full Access
Question # 225

A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?

A.

Enable firewall ACLs.

B.

Examine the localhost file entries.

C.

Verify the routing tables.

D.

Update the antivirus definitions.

Full Access
Question # 226

A large company is selecting a new Windows operating system and needs to ensure it has built-in encryption and endpoint protection. Which of the following Windows versions will MOST likely be selected?

A.

Home

B.

Pro

C.

Pro for Workstations

D.

Enterprise

Full Access
Question # 227

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

A.

Spam filter installation

B.

Invalid registry settings

C.

Malware infection

D.

Operating system update

Full Access
Question # 228

A technician receives a call (rom a user who is having issues with an application. To best understand the issue, the technician simultaneously views the user's screen with the user. Which of the following would BEST accomplish this task?

A.

SSH

B.

VPN

C.

VNC

D.

RDP

Full Access
Question # 229

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Full Access
Question # 230

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

A.

The Windows 10 desktop has Windows 10 Home installed.

B.

The Windows 10 desktop does not have DHCP configured.

C.

The Windows 10 desktop is connected via Wi-Fi.

D.

The Windows 10 desktop is hibernating.

Full Access
Question # 231

A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

A.

System

B.

Indexing Options

C.

Device Manager

D.

Programs and Features

Full Access
Question # 232

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

A.

Security groups

B.

Access control list

C.

Group Policy

D.

Login script

Full Access
Question # 233

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

A.

Access control list

B.

Acceptable use policy

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 234

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

A.

A system patch disabled the antivirus protection and host firewall.

B.

The system updates did not include the latest anti-malware definitions.

C.

The system restore process was compromised by the malware.

D.

The malware was installed before the system restore point was created.

Full Access
Question # 235

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

A.

System

B.

Devices

C.

Personalization

D.

Accessibility

Full Access
Question # 236

A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

A.

Convert the PC from a DHCP assignment to a static IP address.

B.

Run a speed test to ensure the advertised speeds are met.

C.

Test all network sharing and printing functionality the customer uses.

D.

Change the default passwords on new network devices.

Full Access
Question # 237

A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?

A.

Keylogger

B.

Cryptominers

C.

Virus

D.

Malware

Full Access
Question # 238

A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?

A.

Inform the customer that the issue is not within the scope of this department.

B.

Apologize to the customer and escalate the issue to a manager.

C.

Ask the customer to explain the issue and then try to fix it independently.

D.

Respond that the issue is something the customer should be able to fix.

Full Access
Question # 239

A user reports that after a recent software deployment to upgrade applications, the user can no longer use the Testing program.

However, other employees can successfully use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve any issues discovered by selecting the:

    Index number of the Event Viewer issue

    First command to resolve the issue

    Second command to resolve the issue

BSOD

Commands:

Event Viewer:

System Error:

Full Access
Question # 240

Which of the following is MOST likely used to run .vbs files on Windows devices?

A.

winmgmt.exe

B.

powershell.exe

C.

cscript.exe

D.

explorer.exe

Full Access
Question # 241

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?

A.

Disable System Restore.

B.

Schedule a malware scan.

C.

Educate the end user.

D.

Run Windows Update.

Full Access
Question # 242

A technician is working on a way to register all employee badges and associated computer IDs. Which of the following options should the technician use in order to achieve this objective?

A.

Database system

B.

Software management

C.

Active Directory description

D.

Infrastructure as a Service

Full Access
Question # 243

A technician, who is working at a local office, has found multiple copies of home edition software installed on computers. Which of the following does this MOST likely violate?

A.

EULA

B.

Pll

C.

DRM

D.

Open-source agreement

Full Access
Question # 244

Which of the following is the default GUI and file manager in macOS?

A.

Disk Utility

B.

Finder

C.

Dock

D.

FileVault

Full Access
Question # 245

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

A.

Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.

B.

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.

C.

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.

D.

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Full Access
Question # 246

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?

A.

WPS

B.

TKIP

C.

WPA3

D.

WEP

Full Access
Question # 247

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

Full Access
Question # 248

A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.

Which of the following should a technician do to remediate the issue?

A.

Roll back the updates.

B.

Increase the page file.

C.

Update the drivers.

D.

Rebuild the profile.

Full Access
Question # 249

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

A.

Use a key combination to lock the computer when leaving.

B.

Ensure no unauthorized personnel are in the area.

C.

Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D.

Turn off the monitor to prevent unauthorized visibility of information.

Full Access
Question # 250

A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?

A.

Dock

B.

Spotlight

C.

Mission Control

D.

Launchpad

Full Access
Question # 251

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?

A.

resmon_exe

B.

dfrgui_exe

C.

msinf032exe

D.

msconfig_exe

Full Access
Question # 252

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

Full Access
Question # 253

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

A.

RDP through RD Gateway

B.

Apple Remote Desktop

C.

SSH access with SSH keys

D.

VNC with username and password

Full Access