Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

220-1102 Questions and Answers

Question # 6

A macOS user is installing a new application. Which of the following system directories is the software MOST likely to install by default?

A.

/etc/services

B.

/Applications

C.

/usr/bin

D.

C:\Program Files

Full Access
Question # 7

A new employee was hired recently. Which of the following documents will the new employee need to sign before being granted login access to the network?

A.

MSDS

B.

EULA

C.

UAC

D.

AUP

Full Access
Question # 8

A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?

A.

Password-protected Wi-Fi

B.

Port forwarding

C.

Virtual private network

D.

Perimeter network

Full Access
Question # 9

A large company is selecting a new Windows operating system and needs to ensure it has built-in encryption and endpoint protection. Which of the following Windows versions will MOST likely be selected?

A.

Home

B.

Pro

C.

Pro for Workstations

D.

Enterprise

Full Access
Question # 10

A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?

A.

Inform the customer that the issue is not within the scope of this department.

B.

Apologize to the customer and escalate the issue to a manager.

C.

Ask the customer to explain the issue and then try to fix it independently.

D.

Respond that the issue is something the customer should be able to fix.

Full Access
Question # 11

A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the following tools should the technician use to resolve this issue?

A.

taskschd.msc

B.

eventvwr.msc

C.

de vmgmt. msc

D.

diskmgmt.msc

Full Access
Question # 12

Which of the following is used as a password manager in the macOS?

A.

Terminal

B.

FileVault

C.

Privacy

D.

Keychain

Full Access
Question # 13

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Full Access
Question # 14

A customer is explaining issues with a workstation to a technician. While the customer is listing the issues, the technician is browsing social media on a smartphone. Which of the following professionalism and communication techniques should the technician be using in this situation? (Select two).

A.

Follow up with the customer.

B.

Avoid personal interruptions.

C.

Provide proper documentation.

D.

Clarify customer statements.

E.

Actively listen and take notes.

F.

Maintain professional attire.

Full Access
Question # 15

A workstation's hard drive is making loud noises, applications are running slowly, and the workstation is rebooting unexpectedly. Which of the following should the technician do first to begin troubleshooting the issue?

A.

Perform a System Restore.

B.

Open Disk Cleanup.

C.

Replace the hard drive.

D.

Run CHKDSK.

Full Access
Question # 16

An employee of Company X receives an email from ITdepartmint@companyx.com that appears to be from the local IT administrator. This email states that the employee's computer has been infected with a virus and an included link must be clicked to remove the virus. Which of the following actions should the employee take next?

A.

Click the link and follow all included directions to remove the virus.

B.

Contact the IT department to ask for additional direction.

C.

Forward the email to all users who the employee has shared files with.

D.

Delete the email and disregard any requested action.

E.

Reply to the email to ask for confirmation that the email is legitimate.

Full Access
Question # 17

While accessing a website, a user clicks on a menu option and nothing happens. Which of the following actions should the user take to most likely resolve this issue?

A.

Enable TLS 1.0 in the browser.

B.

Enable private-browsing mode.

C.

Disable pop-up blocker.

D.

Clear the cache.

Full Access
Question # 18

Which of the following ensures data is unrecoverable on a lost or stolen mobile device?

A.

Device encryption

B.

Remote wipe

C.

Data backup

D.

Fingerprint reader

Full Access
Question # 19

Which of the following is the most practical method to reduce the number of clicks on phishing emails for a public-facing organization?

A.

Providing user awareness education

B.

Introducing a BYOD policy

C.

Setting up SMTP filtering rules

D.

Restricting emails from personal email addresses

Full Access
Question # 20

A user in a SOHO asks an off-site, remote technician to connect securely to the user’s laptop. The technician is able to connect to the VPN but is unable to connect to the user’s laptop. Which of the following settings should the technician review?

A.

Wireless protocol

B.

DHCP pool

C.

Content filtering

D.

Firewall

Full Access
Question # 21

Which of the following is natively used with Active Directory?

A.

Windows 10

B.

macOS

C.

Linux

D.

Chrome OS

Full Access
Question # 22

A user's computer was infected with a Trojan. The user thinks the Trojan was introduced when clicking on a malicious link in an email. Which of the following actions should the technician take to prevent further damage to the computer?

A.

Ensure anti-malware signatures are up to date.

B.

Enable the firewall.

C.

Scan the system with a rootkit scanner.

D.

Review the proxy settings.

Full Access
Question # 23

A company needs to securely and remotely access network devices. Which of the following will allow the company to access these devices?

A.

Telnet

B.

TKIP

C.

RDP

D.

SSH

Full Access
Question # 24

A user's home system has been infected with malware. A technician has isolated the system from the network and disabled System Restore. Which of the following should the technician do next?

A.

Perform an antivirus scan.

B.

Run Windows updates.

C.

Reimage the system.

D.

Enable System Restore.

Full Access
Question # 25

Several computers have been infected with malware, causing the company network to slow down and sensitive company information to be lost. The IT department installs new antivirus software to remove the malware and needs to decide the best method to prevent future malware infections. Which of the following methods would be the most effective?

A.

Encrypting data at rest

B.

Implementing firewalls

C.

Utilizing Intrusion detection systems

D.

Backing up data regularly

Full Access
Question # 26

A systems administrator finds that a Windows client machine with an address of 169.254.124.24 is unable to access network resources. Which of the following should the administrator do to establish connectivity?

A.

Reinstall the NIC device driver.

B.

Assign a static IP.

C.

Reconfigure DNS settings.

D.

Disable the Windows firewall.

Full Access
Question # 27

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?

A.

Updating the failed software

B.

Registering the smartphone with an MDM solution

C.

Installing a third-party client

D.

Clearing the cache partition

Full Access
Question # 28

A technician is trying to perform an in-place upgrade of a Windows OS from a file. When the technician double-clicks the file, the technician receives a prompt to mount a drive. Which of the following file types did the technician download?

A.

msi

B.

iso

C.

zip

D.

exe

Full Access
Question # 29

A Windows user wants a filesystem that protects confidential data from attackers who have physical access to the system. Which of the following should the user choose?

A.

ext

B.

APFS

C.

FAT

D.

EFS

Full Access
Question # 30

A user's Android phone has been randomly restarting. A technician investigates and finds several applications have been installed that are not available within the standard marketplace. Which of the following is most likely the cause of the issue?

A.

The OS update failed.

B.

The user downloaded malware.

C.

The device is In developer mode.

D.

The over-the-air carrier update failed.

Full Access
Question # 31

The Chief Executive Officer at a bank recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated attackers were able to brute force passwords to access systems. Which of the following would best limit the bank’s risk? (Select two).

A.

Enable multifactor authentication for each support account

B.

Limit remote access to destinations inside the corporate network

C.

Block all support accounts from logging in from foreign countries

D.

Configure a replacement remote-access tool for support cases

E.

Purchase a password manager for remote-access tool users

F.

Enforce account lockouts after five bad password attempts

Full Access
Question # 32

A user's corporate iPhone had issues and was repaired while the user was on vacation. The mobile phone has compared to an identical phone. Which of the following best describes what is happening to the phone?

A.

APK Source

B.

Connectivity issues

C.

Developer Mode

D.

Jailbreak

Full Access
Question # 33

A company executive is currently attending a major music festival with a large number of attendees and is having trouble accessing a work email account. The email application is not downloading emails and appears to be stuck during connection attempts. Which of the following is most likely causing the disruption?

A.

The phone has no storage space available.

B.

Company firewalls are configured to block remote access to email resources.

C.

Too many devices in the same area are trying to connect to the mobile network.

D.

The festival organizer prohibits internet usage during the event and has blocked the internet signal.

Full Access
Question # 34

A user is unable to access the internet but can still print to network printers. Other users are not experiencing this issue. Which of the following steps should the technician take first to diagnose the issue?

A.

Validate physical connectivity.

B.

Reboot the router.

C.

Disable IPv6.

D.

Check the DNS settings.

Full Access
Question # 35

A user is unable to log in to a workstation. The user reports an error message about the date being incorrect. A technician reviews the date and verifies it is correct, but the system clock is an hour behind. The technician also determines this workstation is the only one affected. Which of the following is the most likely issue?

A.

Time drift

B.

NTP failure

C.

Windows Update

D.

CMOS battery

Full Access
Question # 36

A customer is configuring on an old desktop an inexpensive file server to share photos and videos and wants to avoid complicated licensing. Which of the following operating systems should the technician most likely recommend?

A.

Chrome OS

B.

Linux

C.

macOS

D.

Windows

Full Access
Question # 37

A technician installs a Bluetooth headset for a user. During testing, the sound is still coming from the speaker on the computer. The technician verifies the headset shows up in Device Manager. Which of the following would the technician most likely do to fix this issue?

A.

Update the drivers for the wireless headset.

B.

Replace the battery on the headset, and try again later.

C.

Verify that the sound is not muted in the control panel.

D.

Change the headset as the default device in sound settings.

Full Access
Question # 38

Employees want their Windows 10 laptops to wirelessly connect when they take them home. Which of the following should the employees configure so the laptops can automatically connect wirelessly?

A.

Network and Internet settings

B.

Windows Firewall settings

C.

Devices and Printers

D.

Personalization settings

Full Access
Question # 39

A technician needs to create a security and compliance policy for backup requirements. The backups are required to:

    Have the least possible impact on users.

    Minimize additional expenses.Which of the following are the best options for the technician to include? (Select two).

A.

Configuring the backup to run when the user logs in

B.

Configuring the backup to run after peak hours

C.

Installing the backup software on the servers

D.

Installing the backup software on the workstations

E.

Using the built-in Windows backup utility

F.

Configuring the backup job to run every hour

Full Access
Question # 40

A technician is setting up a wireless network in a small, crowded office and wants to minimize Wi-Fi access. Which of the following security settings should the technician enable?

A.

Port forwarding

B.

Unused ports

C.

SSID broadcast

D.

Allow list

Full Access
Question # 41

An organization has a goal to perform daily backups of a particular workstation and save them locally to the NAS. The organization needs to ensure these backup jobs are successful. Which of the following should the IT department do?

A.

Write scripts to rerun backups that fail.

B.

Store copies of the backups off site.

C.

Perform incremental backups instead.

D.

Set up alerts to be notified when backups fail.

Full Access
Question # 42

A technician is dispatched to a user's office to connect a PC to an office printer. The technician notices several documents on the user's desk that display other technicians' PII. Which of the following should the technician do to maintain proper professionalism?

A.

Disclose the experience with other coworkers.

B.

Educate the user about safeguarding documents.

C.

Report the incident to a supervisor.

D.

Make a copy of the document to share with the legal team.

Full Access
Question # 43

Which of the following script file types is typically used to install Windows packages?

A.

.js

B.

.py

C.

.ps1

D.

.sh

Full Access
Question # 44

Which of the following types of malicious software is most likely to demand payments in cryptocurrency?

A.

Ransomware

B.

Keylogger

C.

Cryptomining

D.

Rootkit

Full Access
Question # 45

During a routine check, a systems administrator discovers that a user's PC is running slowly and CPU utilization is at 100%. Further investigation shows a large amount of resource usage. Which of the following is the most likely cause of the high resource usage?

A.

Firewall activities

B.

Botnet attack

C.

DDoS attack

D.

Keylogger attack

Full Access
Question # 46

A technician needs to override DNS and map IP addresses and URLs to different locations. Which of the following should the technician do?

A.

Install signal repeaters.

B.

Edit the hosts file.

C.

Configure the firewall.

D.

Enable port forwarding.

Full Access
Question # 47

A user with a disability needs to be able to press the Ctrl+Alt+Del keyboard sequence one key at a time. Which of the following turns on this Ease of Access feature?

A.

Press the Shift key five times in a row.

B.

Press Ctrl+Alt+Esc simultaneously.

C.

Press Ctrl+Alt+Tab simultaneously.

D.

Press the Windows key+Tab.

Full Access
Question # 48

A technician runs a command and gets the following output:

Ethernet adapter Ethernet 3:

Connection-specific DNS Suffix . :reddog.microsoft.com

Link-local IPv6 Address .......... :fe80::de3d:9283:4f00:856a%5

IPv4 Address.......................:10.203.10.16

Subnet Mask ...................... :255.255.255.0

Default Gateway .................. :10.203.10.1

Which of the following commands did the technician use?

A.

ipconfig

B.

tracert

C.

whoami

D.

net use

Full Access
Question # 49

Which of the following macOS file types requires mounting before installation?

A.

.pkg

B.

.zip

C.

.app

D.

.dmg

Full Access
Question # 50

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

A.

Educate the user on malware removal.

B.

Educate the user on how to reinstall the laptop OS.

C.

Educate the user on how to access recovery mode.

D.

Educate the user on common threats and how to avoid them.

Full Access
Question # 51

An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly?

A.

incineration

B.

Resale

C.

Physical destruction

D.

Dumpster for recycling plastics

Full Access
Question # 52

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

A.

ipconfig

B.

ifconfig

C.

arpa

D.

ping

Full Access
Question # 53

A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?

A.

NTFS

B.

APFS

C.

ext4

D.

exFAT

Full Access
Question # 54

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

A.

Put on an ESD strap

B.

Disconnect the power before servicing the PC.

C.

Place the PC on a grounded workbench.

D.

Place components on an ESD mat.

Full Access
Question # 55

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

A.

Device Manager

B.

Indexing Options

C.

File Explorer

D.

Administrative Tools

Full Access
Question # 56

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

A.

The UEFI settings need to be changed.

B.

The RAM has compatibility issues with Windows 10.

C.

Some of the RAM is defective.

D.

The newly installed OS is x86.

Full Access
Question # 57

Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).

A.

.mac

B.

.Pkg

C.

.deb

D.

.dmg

E.

.msi

F.

.appx

G.

.app

Full Access
Question # 58

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Full Access
Question # 59

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

A.

Drilling

B.

Degaussing

C.

Low-level formatting

D.

Erasing/wiping

Full Access
Question # 60

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

A.

DRM

B.

NDA

C.

EULA

D.

MOU

Full Access
Question # 61

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?

A.

Rebuild the Windows profiles.

B.

Restore the computers from backup.

C.

Reimage the computers.

D.

Run the System File Checker.

Full Access
Question # 62

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Full Access
Question # 63

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

Full Access
Question # 64

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

Full Access
Question # 65

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

A.

Avoid distractions

B.

Deal appropriately with customer's confidential material .

C.

Adhere to user privacy policy

D.

Set and meet timelines

Full Access
Question # 66

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the

users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

A.

acceptable use policy.

B.

regulatory compliance requirements.

C.

non-disclosure agreement

D.

incident response procedures

Full Access
Question # 67

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

A.

File Explorer

B.

User Account Control

C.

Windows Backup and Restore

D.

Windows Firewall

E.

Windows Defender

F.

Network Packet Analyzer

Full Access
Question # 68

A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default?

A.

.py

B.

.js

C.

.vbs

D.

.sh

Full Access
Question # 69

A help desk technician runs the following script: Inventory.py. The technician receives the following error message:

How do you want to Open this file?

Which of the following is the MOST likely reason this script is unable to run?

A.

Scripts are not permitted to run.

B.

The script was not built for Windows.

C.

The script requires administrator privileges,

D.

The runtime environment is not installed.

Full Access
Question # 70

A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?

A.

Remove the microphone from the USB hub and plug it directly into a USB port on the PC.

B.

Enable the microphone under Windows Privacy settings to allow desktop applications to access it.

C.

Delete the microphone from Device Manager and scan for new hardware,

D.

Replace the USB microphone with one that uses a traditional 3.5mm plug.

Full Access
Question # 71

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

A.

Golden image

B.

Remote network install

C.

In-place upgrade

D.

Clean install

Full Access
Question # 72

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

A.

Requiring strong passwords

B.

Disabling cached credentials

C.

Requiring MFA to sign on

D.

Enabling BitLocker on all hard drives

Full Access
Question # 73

A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?

A.

Updating the operating system

B.

Changing proxy settings

C.

Reinstalling the browser

D.

Enabling port forwarding

Full Access
Question # 74

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

A.

RDP through RD Gateway

B.

Apple Remote Desktop

C.

SSH access with SSH keys

D.

VNC with username and password

Full Access
Question # 75

A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially

infect the network systems. Which of the following is the MOST effective method for dealing with this Issue?

A.

Adjusting the spam gateway

B.

Updating firmware for the spam appliance

C.

Adjusting AV settings

D.

Providing user training

Full Access
Question # 76

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

A.

Installer_x64.exe

B.

Installer_Files.zip

C.

Installer_32.msi

D.

Installer_x86.exe

E.

Installer_Win10Enterprise.dmg

Full Access
Question # 77

A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?

A.

The user is not connected to the VPN.

B.

The file server is offline.

C.

A low battery is preventing the connection.

D.

The log-in script failed.

Full Access
Question # 78

A user is unable to access a website, which is widely used across the organization, and receives the following error message:

The security certificate presented by this website has expired or is not yet valid.

The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?

A.

Reboot the computer.

B.

Reinstall the OS.

C.

Configure a static 12

D.

Check the computer's date and time.

Full Access
Question # 79

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

A.

Escalate the ticket to Tier 2.

B.

Run a virus scan.

C.

Utilize a Windows restore point.

D.

Reimage the computer.

Full Access
Question # 80

A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?

A.

Bridge the LAN connection between the laptop and the desktop.

B.

Set the laptop configuration to DHCP to prevent conflicts.

C.

Remove the static IP configuration from the desktop.

D.

Replace the network card in the laptop, as it may be defective.

Full Access
Question # 81

A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?

A.

Multifactor authentication will be forced for Wi-Fi.

B.

All Wi-Fi traffic will be encrypted in transit.

C.

Eavesdropping attempts will be prevented.

D.

Rogue access points will not connect.

Full Access
Question # 82

Which of the following is MOST likely contained in an EULA?

A.

Chain of custody

B.

Backup of software code

C.

Personally identifiable information

D.

Restrictions of use

Full Access
Question # 83

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?

A.

The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozenapplication in the list, and clicks Force Quit.

B.

The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.

C.

The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.

D.

The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in thelist, and clicks Force Quit.

Full Access
Question # 84

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

A.

Rearranging the monitor's position in display settings

B.

Swapping the cables for the monitors

C.

Using the Ctrl+AIt+> to correct the display orientation

D.

Updating the display drivers for the video card

Full Access
Question # 85

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

A.

Windows Enterprise Edition

B.

Windows Professional Edition

C.

Windows Server Standard Edition

D.

Windows Home Edition

Full Access
Question # 86

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Full Access
Question # 87

A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools should the technician use?

A.

Disk Cleanup

B.

Resource Monitor

C.

Disk Defragment

D.

Disk Management

Full Access
Question # 88

Which of the following protects a mobile device against unwanted access when it is left unattended?

A.

PIN code

B.

OS updates

C.

Antivirus software

D.

BYOD policy

Full Access
Question # 89

A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost. the gateway, and known IP addresses on the interne! and receive a response. Which of the following Is the MOST likely reason tor the Issue?

A.

A firewall is blocking the application.

B.

The wrong VLAN was assigned.

C.

The incorrect DNS address was assigned.

D.

The browser cache needs to be cleared

Full Access
Question # 90

A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software, and the PC begins performing extremely slow. Which of the following steps should the technician take to resolve the issue?

A.

Uninstall one antivirus software program and install a different one.

B.

Launch Windows Update, and then download and install OS updates

C.

Activate real-time protection on both antivirus software programs

D.

Enable the quarantine feature on both antivirus software programs.

E.

Remove the user-installed antivirus software program.

Full Access
Question # 91

A technician is working on a Windows 10 PC that has unwanted applications starting on boot. Which of the following tools should the technician use to disable applications on startup?

A.

System Configuration

B.

Task Manager

C.

Performance Monitor

D.

Group Policy Editor

Full Access
Question # 92

Which of the following allows access to the command line in macOS?

A.

PsExec

B.

command.com

C.

Terminal

D.

CMD

Full Access
Question # 93

Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs?

A.

TACACS+

B.

Kerberos

C.

Preshared key

D.

WPA2/AES

Full Access
Question # 94

A user wants to back up a Windows 10 device. Which of the following should the user select?

A.

Devices and Printers

B.

Email and Accounts

C.

Update and Security

D.

Apps and Features

Full Access
Question # 95

A company is looking lot a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select?

A.

Off-site

B.

Synthetic

C.

Full

D.

Differential

Full Access
Question # 96

A technician is trying to encrypt a single folder on a PC. Which of the following should the technician use to accomplish this task?

A.

FAT32

B.

exFAT

C.

BitLocker

D.

EFS

Full Access
Question # 97

Which of the following Is used to identify potential issues with a proposed change poor lo implementation?

A.

Request form

B.

Rollback plan

C.

End-user acceptance

D.

Sandbox testing

Full Access
Question # 98

Which of the following macOS utilities uses AES-128 to encrypt the startup disk?

A.

fdisk

B.

Diskpart

C.

Disk Utility

D.

FileVault

Full Access
Question # 99

A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?

A.

Disk Management

B.

Device Manager

C.

Disk Cleanup

D.

Disk Defragmenter

Full Access
Question # 100

A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to most likely resolve the issue?

A.

Install the software in safe mode.

B.

Attach the external hardware token.

C.

Install OS updates.

D.

Restart the workstation after installation.

Full Access
Question # 101

A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the following Windows 10 settings should the technician recommend?

A.

Personalization

B.

Apps

C.

Updates

D.

Display

Full Access
Question # 102

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

A.

Cryptominers

B.

Rootkit

C.

Spear phishing

D.

Keylogger

Full Access
Question # 103

A technician is installing RAM in a new workstation and needs to protect against electrostatic discharge. Which of the following will best resolve this concern?

A.

Battery backup

B.

Thermal paste

C.

ESD strap

D.

Consistent power

Full Access
Question # 104

A Windows administrator is creating user profiles that will include home directories and network printers for several new users. Which of the following is the most efficient way for the technician to complete this task?

A.

Access control

B.

Authentication application

C.

Group Policy

D.

Folder redirection

Full Access
Question # 105

A user reported that a laptop's screen turns off very quickly after silting for a few moments and is also very dim when not plugged in to an outlet Everything else seems to be functioning normally. Which of the following Windows settings should be configured?

A.

Power Plans

B.

Hibernate

C.

Sleep/Suspend

D.

Screensaver

Full Access
Question # 106

The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Calibrate the phone sensors.

B.

Enable the touch screen.

C.

Reinstall the operating system.

D.

Replace the screen.

Full Access
Question # 107

Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?

A.

A forgotten keychain password

B.

An employee's Apple ID used on the device

C.

An operating system that has been jailbroken

D.

An expired screen unlock code

Full Access
Question # 108

Which of the following macOS features can help a user close an application that has stopped responding?

A.

Finder

B.

Mission Control

C.

System Preferences

D.

Force Quit

Full Access
Question # 109

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

A.

Quarantine the host in the antivirus system.

B.

Run antivirus scan tor malicious software.

C.

Investigate how malicious software was Installed.

D.

Reimage the computer.

Full Access
Question # 110

Every time a user tries to open the organization's proprietary application on an Android tablet, the application immediately closes. Other applications are operating normally. Which of the following troubleshooting actions would MOST likely resolve the Issue? (Select TWO).

A.

Uninstalling the application

B.

Gaining root access to the tablet

C.

Resetting the web browser cache

D.

Deleting the application cache

E.

Clearing the application storage

F.

Disabling mobile device management

Full Access
Question # 111

A technician receives a help desk ticket from a user who is unable to update a phone. The technician investigates the issue and notices the following error message: Insufficient storage space

While analyzing the phone, the technician does not discover any third-party' applications or photos. Which of the following is the best way to resolve the issue?

A.

Exchange the device for a newer one.

B.

Upgrade the onboard storage

C.

Allocate more space by removing factory applications

D.

Move factory applications to external memory.

Full Access
Question # 112

A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?

A.

Escalating the issue to Tier 2

B.

Verifying warranty status with the vendor

C.

Replacing the motherboard

D.

Purchasing another PC

Full Access
Question # 113

A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to Investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?

A.

Resource Monitor

B.

Performance Monitor

C.

Command Prompt

D.

System Information

Full Access
Question # 114

A user installed a new computer game. Upon starting the game, the user notices the frame rates are low. Which of the following should the user upgrade to resolve the issue?

A.

Hard drive

B.

Graphics card

C.

Random-access memory

D.

Monitor

Full Access
Question # 115

A systems administrator is experiencing Issues connecting from a laptop to the corporate network using PKI. Which to the following tools can the systems administrator use to help remediate the issue?

A.

certmgr.msc

B.

msconfig.exe

C.

lusrmgr.msc

D.

perfmon.msc

Full Access
Question # 116

While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?

A.

SSL key

B.

Preshared key

C.

WPA2 key

D.

Recovery key

Full Access
Question # 117

A user visits a game vendor's website to view the latest patch notes, but this information is not available on the page. Which of the following should the user perform before reloading the page?

A.

Synchronize the browser data.

B.

Enable private browsing mode.

C.

Mark the site as trusted.

D.

Clear the cached file.

Full Access
Question # 118

A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive?

A.

gpupdate

B.

net use

C.

hostname

D.

dir

Full Access
Question # 119

Which of the following security methods supports the majority of current Wi-Fi-capable devices without sacrificing security?

A.

WPA3

B.

MAC filleting

C.

RADIUS

D.

TACACS+

Full Access
Question # 120

A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the Issue?

A.

Screen-sharing software

B.

Secure shell

C.

Virtual private network

D.

File transfer software

Full Access
Question # 121

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?

A.

Biometrics

B.

Full disk encryption

C.

Enforced strong system password

D.

Two-factor authentication

Full Access
Question # 122

Which of the following could be used to implement secure physical access to a data center?

A.

Geofence

B.

Alarm system

C.

Badge reader

D.

Motion sensor

Full Access
Question # 123

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

A.

Privacy

B.

Indexing Options

C.

System

D.

Device Manager

Full Access
Question # 124

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

A.

Install alternate open-source software in place of the applications with issues

B.

Run both CPU and memory tests to ensure that all hardware functionality is normal

C.

Check for any installed patches and roll them back one at a time until the issue is resolved

D.

Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.

Full Access
Question # 125

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

A.

Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never

B.

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never

C.

Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never

D.

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Full Access
Question # 126

A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method

A.

Reinstalling Windows

B.

Performing a quick format

C.

Using disk-wiping software

D.

Deleting all files from command-line interface

Full Access
Question # 127

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

A.

Ransomware

B.

Failed OS updates

C.

Adware

D.

Missing system files

Full Access
Question # 128

A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?

A.

Internet-based upgrade

B.

Repair installation

C.

Clean install

D.

USB repair

E.

In place upgrade

Full Access
Question # 129

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?

A.

RDP

B.

VNC

C.

SSH

D.

VPN

Full Access
Question # 130

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

A.

Full

B.

Non-parity

C.

Differential

D.

Incremental

Full Access
Question # 131

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?

A.

WPA2 with TKIP

B.

WPA2 with AES

C.

WPA3withAES-256

D.

WPA3 with AES-128

Full Access
Question # 132

A technician is investigating an employee's smartphone that has the following symptoms

• The device is hot even when it is not in use.

•Applications crash, especially when others are launched.

• Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.

Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Select TWO).

A.

Turn on autorotation

B.

Activate airplane mode.

C.

Close unnecessary applications

D.

Perform a factory reset

E.

Update the device's operating system

F.

Reinstall the applications that have crashed.

Full Access
Question # 133

A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform?

A.

Change the DNS address to 1.1.1.1

B.

Update Group Policy

C.

Add the site to the client's exceptions list

D.

Verity the software license is current.

Full Access
Question # 134

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO)

A.

Enable multifactor authentication for each support account

B.

Limit remote access to destinations inside the corporate network

C.

Block all support accounts from logging in from foreign countries

D.

Configure a replacement remote-access tool for support cases.

E.

Purchase a password manager for remote-access tool users

F.

Enforce account lockouts after five bad password attempts

Full Access
Question # 135

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

A.

Home

B.

Pro for Workstations

C.

Enterprise

D.

Pro

Full Access
Question # 136

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

A.

Configure the network as private

B.

Enable a proxy server

C.

Grant the network administrator role to the user

D.

Create a shortcut to public documents

Full Access
Question # 137

A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook?

A.

macOS

B.

Linux

C.

Chrome OS

D.

Windows

Full Access
Question # 138

A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

A.

Data-in-transit encryption

B.

File encryption

C.

USB drive encryption

D.

Disk encryption

Full Access
Question # 139

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

A.

Deploy a secondary hard drive with encryption on the appropriate workstation

B.

Configure a hardened SFTP portal for file transfers between file servers

C.

Require files to be individually password protected with unique passwords

D.

Enable BitLocker To Go with a password that meets corporate requirements

Full Access
Question # 140

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?

A.

Brute force

B.

Zero day

C.

Denial of service

D.

On-path

Full Access
Question # 141

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

A.

resmon exe

B.

msconfig.extf

C.

dfrgui exe

D.

msmfo32.exe

Full Access
Question # 142

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?

A.

Continue researching the issue

B.

Repeat the iterative processes

C.

Inform the CEO the repair will take a couple of weeks

D.

Escalate the ticket

Full Access
Question # 143

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

Full Access
Question # 144

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

A.

.deb

B.

.vbs

C.

.exe

D.

.app

Full Access
Question # 145

After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:

The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?

A.

Update the browser's CRLs

B.

File a trouble ticket with the bank.

C.

Contact the ISP to report the CFCs concern

D.

Instruct the CFO to exit the browser

Full Access
Question # 146

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)

A.

Scan the computer with the company-provided antivirus software

B.

Install a new hard drive and clone the user's drive to it

C.

Deploy an ad-blocking extension to the browser.

D.

Uninstall the company-provided antivirus software

E.

Click the link in the messages to pay for virus removal

F.

Perform a reset on the user's web browser

Full Access
Question # 147

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

A.

Run sfc / scannow on the drive as the administrator.

B.

Run clearnmgr on the drive as the administrator

C.

Run chkdsk on the drive as the administrator.

D.

Run dfrgui on the drive as the administrator.

Full Access
Question # 148

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

Full Access
Question # 149

Which of the following is a proprietary Cisco AAA protocol?

A.

TKIP

B.

AES

C.

RADIUS

D.

TACACS+

Full Access
Question # 150

A user reports a computer is running slow. Which of the following tools will help a technician identity the issued

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Full Access
Question # 151

A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason?

A.

The domain's processor compatibility is not met

B.

The laptop has Windows 10 Home installed

C.

The laptop does not have an onboard Ethernet adapter

D.

The Laptop does not have all current Windows updates installed

Full Access
Question # 152

A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?

A.

Removed all jewelry

B.

Completed an inventory of tools before use

C.

Practiced electrical fire safety

D.

Connected a proper ESD strap

Full Access
Question # 153

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).

A.

Prevent a device root

B.

Disable biometric authentication

C.

Require a PIN on the unlock screen

D.

Enable developer mode

E.

Block a third-party application installation

F.

Prevent GPS spoofing

Full Access
Question # 154

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

A.

Degaussing

B.

Low-level formatting

C.

Recycling

D.

Shredding

Full Access
Question # 155

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

A.

Operating system updates

B.

Remote wipe

C.

Antivirus

D.

Firewall

Full Access
Question # 156

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

A.

Have the user provide a callback phone number to be added to the ticket

B.

Assign the ticket to the department's power user

C.

Register the ticket with a unique user identifier

D.

Provide the user with a unique ticket number that can be referenced on subsequent calls.

Full Access
Question # 157

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?

A.

Scan and remove the malware

B.

Schedule automated malware scans

C.

Quarantine the system

D.

Disable System Restore

Full Access
Question # 158

In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it. The developer states that the management team approved the business use of this software. Which of the following is the best action for the technician to take?

A.

Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased.

B.

Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process.

C.

Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.

D.

Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software.

Full Access
Question # 159

A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Recovery contact and recovery key

Full Access
Question # 160

Which of the following combinations meets the requirements for mobile device multifactor authentication?

A.

Password and PIN

B.

Password and swipe

C.

Fingerprint and password

D.

Swipe and PIN

Full Access
Question # 161

A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue?

A.

Reimage the computer.

B.

Replace the system RAM.

C.

Reinstall and update the failing software.

D.

Decrease the page file size.

Full Access
Question # 162

Which of the following protocols supports fast roaming between networks?

A.

WEP

B.

WPA

C.

WPA2

D.

LEAP

E.

PEAP

Full Access
Question # 163

A technician is hardening a company file server and needs to prevent unauthorized LAN devices from accessing stored files. Which of the following should the technician use?

A.

Software firewall

B.

Password complexity

C.

Antivirus application

D.

Anti-malware scans

Full Access
Question # 164

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

Full Access
Question # 165

A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?

A.

Event Viewer

B.

System Configuration

C.

Device Manager

D.

Performance Monitor

Full Access
Question # 166

Which of the following is the best reason for sandbox testing in change management?

    To evaluate the change before deployment

A.

To obtain end-user acceptance

B.

To determine the affected systems

C.

To select a change owner

Full Access
Question # 167

A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20 minutes late. The customer will also be late. Which of the following should the technician do considering proper communication techniques and professionalism?

    Do not notify the customer if arriving before the customer.

A.

Dismiss the customer and proceed with the after-hours work.

B.

Contact the customer if the technician is arriving late.

C.

Disclose the experience via social media.

Full Access
Question # 168

Which of the following would typically require the most computing resources from the host computer?

    Chrome OS

A.

Windows

B.

Android

C.

macOS

D.

Linux

Full Access
Question # 169

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?

A.

VNC

B.

RMM

C.

RDP

D.

SSH

Full Access
Question # 170

Which of the following statements describes the purpose of scripting languages?

    To access the hardware of the computer it is running on

A.

To automate tasks and reduce the amount of manual labor

B.

To abstract the complexity of the computer system

C.

To compile the program into an executable file

Full Access
Question # 171

When trying to access a secure internal network, the user receives an error messaging stating, "There is a problem with this website's security certificate." The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring?

A.

Reimage the system and install SSL.

B.

Install Trusted Root Certificate.

C.

Select View Certificates and then Install Certificate.

D.

Continue to access the website.

Full Access
Question # 172

A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?

A.

Ask the user for the model number of the hardware.

B.

Offer a temporary replacement device to the user.

C.

Submit the issue to the manufacturer.

D.

Remotely install updates to the device driver.

Full Access
Question # 173

Which of the following is command options is used to display hidden files and directories?

A.

-a

B.

-s

C.

-lh

D.

-t

Full Access
Question # 174

A technician needs administrator access on a Windows workstation to facilitate system changes without elevating permissions. Which of the following would best accomplish this task?

A.

Group Policy Editor

B.

Local Users and Groups

C.

Device Manager

D.

System Configuration

Full Access
Question # 175

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

D.

Run an antivirus and enable encryption.

Full Access
Question # 176

Which of the following commands can a technician use to get the MAC address of a Linux distribution?

    net use

A.

ifconfig

B.

netstat

C.

ping

Full Access
Question # 177

A user's laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?

A.

Scan for malware and ransomware.

B.

Perform a system restore.

C.

Check the network utilization.

D.

Update the antivirus software.

Full Access
Question # 178

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?

A.

To determine which party had the machine and when.

B.

To remotely wipe sensitive data from the machine.

C.

To gather the information needed to replace the machine.

D.

To alert the owner that the password needs to be changed.

Full Access
Question # 179

A technician has verified that a user's computer has a virus and the antivirus software is out of date. Which of the following steps should the technician take next?

A.

Quarantine the computer.

B.

Use a previous restore point.

C.

Educate the end user about viruses.

D.

Download the latest virus definitions.

Full Access
Question # 180

A technician is trying to connect to a user's laptop in order to securely install updates. Given the following information about the laptop:

Which of the following should the technician do to connect via RDP?

A.

Confirm the user can ping the default gateway.

B.

Change the IP address on the user's laptop.

C.

Change the subnet mask on the user's laptop.

D.

Open port 3389 on the Windows firewall.

Full Access
Question # 181

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

A.

.bat

B.

.dll

C.

.ps1

D.

.txt

Full Access
Question # 182

An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices?

    Devices and Printers

A.

Ease of Access

B.

Programs and Features

C.

Device Manager

Full Access
Question # 183

A Linux technician needs a filesystem type that meets the following requirements:

. All changes are tracked.

. The possibility of file corruption is reduced.

· Data recovery is easy.

Which of the following filesystem types best meets these requirements?

    ext3

A.

FAT32

B.

exFAT

C.

NTFS

Full Access
Question # 184

Which of the following would allow physical access to a restricted area while maintaining a record of events?

A.

Hard token

B.

Access control vestibule

C.

Key fob

D.

Door Lock

Full Access
Question # 185

A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?

A.

Disable System Restore.

B.

Remediate the system.

C.

Educate the system user.

D.

Quarantine the system.

Full Access
Question # 186

A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?

A.

c: \minutes

B.

dir

C.

rmdir

D.

md

Full Access
Question # 187

Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware?

A.

Run System Restore.

B.

Place in recovery mode.

C.

Schedule a scan.

D.

Restart the PC.

Full Access
Question # 188

A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?

A.

Content filter

B.

Screened subnet

C.

Port forwarding

D.

Access control list

Full Access
Question # 189

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

A.

Temperature levels

B.

Location of the servers

C.

Humidity levels

D.

Noise levels

E.

Lighting levels

F.

Cable management

Full Access
Question # 190

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems?

    Turn off the machine.

A.

Run a full antivirus scan.

B.

Remove the LAN card.

C.

Install a different endpoint solution.

Full Access
Question # 191

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

A.

To maintain an information security policy

B.

To properly identify the issue

C.

To control evidence and maintain integrity

D.

To gather as much information as possible

Full Access
Question # 192

Which of the following operating systems was the app file type designed to run under as an application file bundle?

A.

macOS

B.

Chrome

C.

Windows

D.

Linux

Full Access
Question # 193

A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?

A.

Apps and Features

B.

Personalization

C.

File Explorer

D.

Task Manager

Full Access
Question # 194

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

A.

Reinstall the application on the smartphone.

B.

Update the smartphone's OS.

C.

Reset the smartphone to factory settings.

D.

Reboot the smartphone.

Full Access
Question # 195

Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a secondary feature of Windows Hello that can be used to log in?

A.

Personal identification number

B.

Username/password

C.

One-time-use token

D.

Cryptographic device

Full Access
Question # 196

An organization wants to deploy a customizable operating system. Which of the following should the organization choose?

A.

Windows 10

B.

macOS

C.

Linux

D.

Chrome OS

E.

iOS

Full Access
Question # 197

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).

A.

NIC

B.

CPU

C.

PSU

D.

KVM

E.

RAM

F.

DVI

Full Access
Question # 198

A technician needs to recommend a way to keep company devices for field and home-based staff up to date. The users live in various places across the country and the company has several national offices that staff can go to for technical support Which of the following methods is most appropriate for the users?

A.

Make office attendance mandatory for one day per week so that updates can be installed.

B.

Ask users to ensure that they run updates on devices and reboot computers on a regular basis.

C.

Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.

D.

Configure cloud-based endpoint management software to automatically manage computer updates.

Full Access
Question # 199

A network administrator is setting up the security for a SOHO wireless network. Which of the following options should the administrator enable to secure the network?

A.

NAT

B.

WPA3

C.

802.1X

D.

Static IP

Full Access
Question # 200

A technician wants to improve password security after several users admitted to using very simple passwords. Which of the following is the best way to resolve this issue?

A.

Requiring four character types

B.

Decreasing the password expiration times

C.

Enabling an automatic lock timer

D.

Adding two characters to the minimum password length

Full Access
Question # 201

A user is trying to limit the amount of time their children spend on the internet. Which of the following Windows 10 settings should be enabled to accomplish this objective?

A.

Family Options

B.

Update & Security

C.

Ease of Access

D.

Network & Internet

E.

Privacy

Full Access
Question # 202

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Full Access
Question # 203

A technician is following the ticketing system’s best practices when handling user support requests. Which of the following should the technician do first when responding to a user support request that contains insufficient information?

A.

Ask the user for clarification.

B.

Keep the user updated on the progress.

C.

Document the root cause.

D.

Follow the system’s escalation process.

Full Access
Question # 204

A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

A.

Install antispyware

B.

Reimage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

Full Access
Question # 205

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

A.

Cross-site scripting

B.

SQL injection

C.

Brute-force attack

D.

DDoS attack

Full Access
Question # 206

While browsing the internet, a customer sees a window stating antivirus protection is no longer functioning Which of the following steps should a technician take next? (Select two).

A.

Isolate the computer from the network

B.

Enable the firewall service.

C.

Update the endpoint protection software

D.

Use System Restore to undo changes.

E.

Delete the browser cookies

F.

Run sfc /scannow.

Full Access
Question # 207

A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?

A.

Multifactor authentication

B.

Encryption

C.

Increased password complexity

D.

Secure password vault

Full Access
Question # 208

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

A.

Spam filtering

B.

Malware preventionsoftware

C.

End user education

D.

Stateful firewall inspection

Full Access
Question # 209

Which of the following commands lists running processes in Linux?

A.

top

B.

apt-get

C.

Is

D.

cat

Full Access
Question # 210

A technician is upgrading the Microsoft Windows 10 OS. Which of the following are required for the technician to safely upgrade the OS? (Select two).

A.

Release notes

B.

Antivirus software

C.

Backup of critical data

D.

Device drivers

E.

Word processing software

F.

Safe boot mode

Full Access
Question # 211

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

A.

diskpart

B.

chown

C.

gpupdate

D.

netstat

Full Access
Question # 212

Which of the following operating systems were designed for smartphones? (Select two).

A.

Ubuntu

B.

CentOS

C.

macOS

D.

Chrome OS

E.

iOS

F.

Android

Full Access
Question # 213

Which of the following is used to generate passcodes necessary to access applications or systems that require an extra layer of security?

A.

Authenticator application

B.

Access control lists

C.

Biometrics

D.

Smart card readers

Full Access
Question # 214

A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?

A.

Perform a safe mode boot.

B.

Run the System Restore wizard.

C.

Start the computer in the last known-good configuration.

D.

Reset the BIOS settinqs.

Full Access
Question # 215

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

Full Access
Question # 216

Which of the following language types enables the automation of tasks?

A.

Compiled

B.

Scripting

C.

Web

D.

Database

Full Access
Question # 217

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

A.

Configure MAC filtering.

B.

Disable DHCP.

C.

Configure port forwarding.

D.

Disable guest access.

Full Access
Question # 218

A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with?

A.

Device

B.

Business

C.

Network

D.

Operation

Full Access
Question # 219

A user clicked a link in an email, and now the cursor is moving around on its own. A technician notices that File Explorer is open and data is being copied from the local drive to an unknown cloud storage location. Which of the following should the technician do first?

A.

Investigate the reported symptoms.

B.

Run anti-malware software.

C.

Educate the user about dangerous links.

D.

Quarantine the workstation.

Full Access
Question # 220

Which of the following features can be used to ensure a user can access multiple versions of files?

A.

Multiple desktops

B.

Remote Disc

C.

Time Machine

D.

FileVault

Full Access
Question # 221

A technician is setting up a new PC in a SOHO. Which of the following should the technician most likely configure on the PC?

A.

VDI

B.

Mapped drives

C.

Wireless WAN

D.

Domain

Full Access
Question # 222

A user reports receiving constant, unwanted pop-ups and being unable to close the browser window. These issues have impacted the user's productivity and may have caused the user's files to be altered. Which of the following should a technician do to address these issues with minimal impact to the user?

A.

Use System Restore to recover the OS files.

B.

Wipe the computer and install a new copy of the OS.

C.

Identify whether the disk partition table has been reduced in size.

D.

Perform a full-system, antivirus scan and check browser notifications.

Full Access
Question # 223

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?

A.

Move the application to the desktop and press delete

B.

Identify the application in Finder and drag it to the trash can.

C.

Use Spotlight to search for the application, and then run the application.

D.

Use Time Machine to go back to the date before the installation.

Full Access
Question # 224

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

A.

Trojan

B.

Boot sector virus

C.

Spyware

D.

Rootkit

Full Access
Question # 225

A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?

A.

Security groups

B.

Folder redirection

C.

Organizational unit structure

D.

Access control list

Full Access
Question # 226

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

A.

Devices and Printers

B.

Administrative Tools

C.

Network and Sharing Center

D.

Programs and Features

Full Access
Question # 227

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

A.

Application permissions

B.

Available storage space

C.

Battery charge level

D.

Wi-Fi connection speed

Full Access
Question # 228

Which of the following best describes a rollback plan?

A.

A developer configures a process to return to the starting state upon completion.

B.

A user asks to remove an unneeded fileshare.

C.

An administrator applies new settings to a computer after the previous settings failed.

D.

A technician reverts the system to a previous state following a failed upgrade.

Full Access
Question # 229

A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?

A.

Degaussing

B.

Shredding

C.

Erasing

D.

Drilling

Full Access
Question # 230

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

A.

Access control list

B.

Acceptable use policy

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 231

Which of the following is MOST likely used to run .vbs files on Windows devices?

A.

winmgmt.exe

B.

powershell.exe

C.

cscript.exe

D.

explorer.exe

Full Access
Question # 232

An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented?

A.

TKIP

B.

RADIUS

C.

WPA2

D.

AES

Full Access
Question # 233

A user's corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

A.

Remote wipe

B.

Firewall

C.

Device encryption

D.

Remote backup

E.

Antivirus

F.

Global Positioning System

Full Access
Question # 234

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

A.

UAC

B.

MDM

C.

LDAP

D.

SSO

Full Access
Question # 235

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

A.

Device drivers

B.

Keyboard backlight settings

C.

Installed application license keys

D.

Display orientation

E.

Target device power supply

F.

Disabling express charging

Full Access
Question # 236

Which of the following script types is used with the Python language by default?

A.

.ps1

B.

.vbs

C.

.bat

D.

.py

Full Access
Question # 237

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

A.

VPN

B.

MSRA

C.

SSH

D.

RDP

Full Access
Question # 238

A BSOD appears on a user's workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?

A.

Stop code

B.

Event Mewer

C.

Services

D.

System Configuration

Full Access
Question # 239

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

A.

System

B.

Devices

C.

Personalization

D.

Accessibility

Full Access
Question # 240

Which of the following should be used to secure a device from known exploits?

A.

Encryption

B.

Remote wipe

C.

Operating system updates

D.

Cross-site scripting

Full Access
Question # 241

A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

A.

System

B.

Indexing Options

C.

Device Manager

D.

Programs and Features

Full Access
Question # 242

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

A.

The Windows 10 desktop has Windows 10 Home installed.

B.

The Windows 10 desktop does not have DHCP configured.

C.

The Windows 10 desktop is connected via Wi-Fi.

D.

The Windows 10 desktop is hibernating.

Full Access
Question # 243

A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items?

A.

msinfo32

B.

perfmon

C.

regedit

D.

taskmgr

Full Access
Question # 244

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?

A.

Private-browsing mode

B.

Invalid certificate

C.

Modified file

D.

Browser cache

Full Access
Question # 245

A neighbor successfully connected to a user's Wi-Fi network. Which of the following should the user do after changing the network configuration to prevent the neighbor from being able to connect again?

A.

Disable the SSID broadcast.

B.

Disable encryption settings.

C.

Disable DHCP reservations.

D.

Disable logging.

Full Access
Question # 246

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Full Access
Question # 247

A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service?

A.

Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service

B.

Flashing the BIOS, reformatting the drive, and then reinstalling the OS

C.

Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS

D.

Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus

Full Access
Question # 248

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

A.

gpedit

B.

gpmc

C.

gpresult

D.

gpupdate

Full Access
Question # 249

A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?

A.

Settings > Personalization

B.

Control Panel > Credential Manager

C.

Settings > Accounts > Family and Other Users

D.

Control Panel > Network and Sharing Center

Full Access