1102

¡Supera tus tareas y exámenes ahora con Quizwiz!

246. A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away? A. Use a key combination to lock the computer when leaving. B. Ensure no unauthorized personnel are in the area. C. Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity. D. Turn off the monitor to prevent unauthorized visibility of information.

A. Use a key combination to lock the computer when leaving.

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install? A. VNC B. RMM C. RDP D. SSH

A. VNC

362. A systems administrator is experiencing Issues connecting from a laptop to the corporate network using PKI. Which to the following tools can the systems administrator use to help remediate the issue? A. certmgr.msc B. msconfig.exe C. lusrmgr.msc D. perfmon.msc

A. certmgr.msc

82. A Linux technician needs a filesystem type that meets the following requirements: . All changes are tracked. . The possibility of file corruption is reduced. · Data recovery is easy. Which of the following filesystem types best meets these requirements? A. ext3 B. FAT32 C. exFAT D. NTFS

A. ext3

!!Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop? A. gpedit B. gpmc C. gpresult D. gpupdate

A. gpedit

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT? A. resmon.exe B. msconfig.exe C. dfrgui.exe D. msinfo32.exe

A. resmon.exe Resource monitor

123. Which of the following Linux commands would be used to install an application? A. yum B. grep C. Is D. sudo

A. yum

336. A developer reports that a workstation's database file extensions have been changed from .db to .enc. The developer is also unable to open the database files manually. Which of the following is the best option for recovering the data? A. Accessing a restore point B. Rebooting into safe mode C. Utilizing the backups D. Using an AV to scan the affected files

C. Utilizing the backups

133. Every time a user tries to open the organization's proprietary application on an Android tablet, the application immediately closes. Other applications are operating normally. Which of the following troubleshooting actions would MOST likely resolve the issue? (Choose two.) A. Uninstalling the application B. Gaining root access to the tablet C. Resetting he web browser cache D. Deleting the application cache E. Clearing the application storage F. Disabling mobile device management

D. Deleting the application cache E. Clearing the application storage

!!364. A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task? A. Network and Sharing Center B. net use C. User Accounts D. regedit E. Group Policy

E. Group Policy

As part of a CYOD policy, a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity.Which of the following paths will lead the administrator to the correct settings? A. Use Settings to access Screensaver settings B. Use Settings to access Screen Time-out settings C. Use Settings to access General D. Use Settings to access Display

A. Use Settings to access Screensaver settings

Which of the following is command options is used to display hidden files and directories? A. -a B. -s C. -lh D. -t

A. -a

225. Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in? A. .bat B. .dll C. .ps1 D. .txt

A. .bat

Which of the following file extensions should a technician use for a PowerShell script? A. .ps1 B. .py C. .sh D. .bat E. .cmd

A. .ps1

392. A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO). A. Device drivers B. Keyboard backlight settings C. Installed application license keys D. Display orientation E. Target device power supply F. Disabling express charging

A. Device drivers C. Installed application license keys

380. A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task? A. Differential backup B. Off-site backup C. Incremental backup D. Full backup

A. Differential backup

33. A system drive is nearly full, and a technician needs lo clean up some space. Which of the following tools should the technician use? A. Disk Cleanup B. Resource Monitor C. Disk Defragment D. Disk Management

A. Disk Cleanup

A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools should the technician use? A. Disk Cleanup B. Resource Monitor C. Disk Defragment D. Disk Management

A. Disk Cleanup

148. A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted? A. Disk Management B. Device Manager C. Disk Cleanup D. Disk Defragmenter

A. Disk Management

126. A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO). A. Encryption B. Antivirus C. AutoRun D. Guest accounts E. Default passwords F. Backups

A. Encryption F. Backups

Which of the following often uses an SMS or third-party application as a secondary method to access a system? A. MFA B. WPA2 C. AES D. RADIUS

A. MFA

A user reported that a laptop's screen turns off very quickly after silting for a few moments and is also very dim when not plugged in to an outlet Everything else seems to be functioning normally. Which of the following Windows settings should be configured? A. Power Plans B. Hibernate C. Sleep/Suspend D. Screensaver

A. Power Plans

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems? A. Power off the machine. B. Run a full antivirus scan. C. Remove the LAN card. D. Install a different endpoint solution.

A. Power off the machine.

!!160. A technician is investigating options to secure a small office wireless network. One requirement is to allow automatic logins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature? A. RADIUS B. AES C. EAP-EKE D. MFA

A. RADIUS

317. All the desktop icons on a user's newly issued PC are very large. The user reports that the PC was working fine until a recent software patch was deployed. Which of the following would BEST resolve the issue? A. Rolling back video card drivers B. Restoring the PC to factory settings C. Repairing the Windows profile D. Reinstalling the Windows OS

A. Rolling back video card drivers

86. A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user most likely be able to make this change? A. System B. Devices C. Personalization D. Accessibility

A. System

437. Which of the following is the best reason for sandbox testing in change management? A. To evaluate the change before deployment B. To obtain end-user acceptance C. To determine the affected systems D. To select a change owner

A. To evaluate the change before deployment

66. A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops? A. UEFI password B. Secure boot C. Account lockout D. Restricted user permissions

A. UEFI password

155. Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO). A. Multifactor authentication B. Badge reader C. Personal identification number D. Firewall E. Motion sensor F. Soft token

B. Badge reader E. Motion sensor

Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE). A. .mac B. .Pkg C. .deb D. .dmg E. .msi F. .appx G. .app H. .apk

B. .Pkg D. .dmg G. .app

101. Which of the following would allow physical access to a restricted area while maintaining a record of events? A. Hard token B. Access control vestibule C. Key fob D. Door Lock

B. Access control vestibule

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the technician should take to resolve the issue? A. Run the antivirus scan. B. Add the required snap-in. C. Restore the system backup D. use the administrator console.

B. Add the required snap-in.

50. A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST? A. Delete the application's cache. B. Check for application updates. C. Roll back the OS update. D. Uninstall and reinstall the application.

B. Check for application updates.

183. An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence? A. Encrypt the files B. Clone any impacted hard drives C. Contact the cyber insurance company D. Inform law enforcement

B. Clone any impacted hard drives

250. An implementation specialist is replacing a legacy system at a vendor site that has only one wireless network available. When the specialist connects to Wi-Fi. the specialist realizes the insecure network has open authentication. The technician needs to secure the vendor's sensitive data. Which of the following should the specialist do FIRST to protect the company's data? A. Manually configure an IP address, a subnet mask, and a default gateway. B. Connect to the vendor's network using a VPN. C. Change the network location to private. D. Configure MFA on the network.

B. Connect to the vendor's network using a VPN.

59. A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department? A. Implementing a support portal B. Creating a ticketing system C. Commissioning an automated callback system D. Submitting tickets through email

B. Creating a ticketing system

192. A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives? A. Drilling B. Degaussing C. Low-level formatting D. Erasing/wiping

B. Degaussing

472. A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Choose two.) A. Standard formatting B. Drilling C. Erasing D. Recycling E. Incinerating F. Low-level formatting

B. Drilling E. Incinerating

6. An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices? A. Devices and Printers B. Ease of Access C. Programs and Features D. Device Manager

B. Ease of Access

An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices? A. Devices and Printers B. Ease of Access C. Programs and Features D. Device Manager

B. Ease of Access

391. Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and Its files. Which of the following will MOST likely allow all users to access the new folders? A. Assigning share permissions B. Enabling inheritance C. Requiring multifactor authentication D. Removing archive attribute

B. Enabling inheritance

30. A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service? A. Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service B. Flashing the BIOS, reformatting the drive, and then reinstalling the OS C. Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS D. Reinstalling the OS, flashing the BIOS, and then scanning with on-premises antivirus

B. Flashing the BIOS, reformatting the drive, and then reinstalling the OS

A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service? A. Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service B. Flashing the BIOS, reformatting the drive, and then reinstalling the OS C. Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS D. Reinstalling the OS, flashing the BIOS, and then scanning with on-premises antivirus

B. Flashing the BIOS, reformatting the drive, and then reinstalling the OS

!!328. A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device? A. EFS B. GPT C. MBR D. FAT32

B. GPT

47. A company is looking for a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select? A. Off-site B. Synthetic C. Full D. Differential

B. Synthetic

Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs? A. TACACS+ B. Kerberos C. Preshared key D. WPA2/AES

B. Kerberos

Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware? A. Run System Restore. B. Place in recovery mode. C. Schedule a scan. D. Restart the PC.

B. Place in recovery mode.

94. A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should the technician use to configure the setting? A. System B. Power Options C. Devices and Printers D. Ease of Access

B. Power Options

A technician needs to ensure that USB devices are not suspended by the operating system Which of the following Control Panel utilities should the technician use to configure the setting? A. System B. Power Options C. Devices and Printers D. Ease of Access

B. Power Options

!137. An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented? A. TKIP B. RADIUS C. WPA2 D. AES

B. RADIUS

389. A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user? A. Color Management B. System C. Troubleshooting D. Device Manager E. Administrative Tools

B. System

29. A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license? A. Copy the c:\Wlndows\wlndows.lie file over to the machine and restart. B. Redeem the included activation key card for a product key. C. Insert a Windows USB hardware dongle and initiate activation. D. Activate with the digital license included with the device hardware.

B. Redeem the included activation key card for a product key.

211. A PC is taking a long time to boot. Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two). A. Installing additional RAM B. Removing the applications from startup C. Installing a faster SSD D. Running the Disk Cleanup utility E. Defragmenting the hard drive F. Ending the processes in the Task Manager

B. Removing the applications from startup D. Running the Disk Cleanup utility

!!300. A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use? A. Implementing password expiration B. Restricting user permissions C. Using screen locks D. Disabling unnecessary services

B. Restricting user permissions

!!447. A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST? A. Quarantine the host in the antivirus system. B. Run antivirus scan tor malicious software. C. Investigate how malicious software was Installed. D. Reimage the computer.

B. Run antivirus scan tor malicious software.

!!!184. A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively? A. SFTP B. SSH C. VNC D. MSRA

B. SSH

290. A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application? A. Use a network share to share the installation files. B. Save software to an external hard drive to install. C. Create an imaging USB for each PC. D. Install the software from the vendor's website

B. Save software to an external hard drive to install.

23. A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company's requirements? A. Biometrics B. Soft token C. Access control lists D. Smart card

B. Soft token

257. A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure? A. WPA2 with TKIP B. WPA2 with AES C. WPA3withAES-256 D. WPA3 with AES-128

B. WPA2 with AES

5. A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive? A. gpupdate B. net use C. hostname D. dir

B. net use

A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive? A. gpupdate B. net use C. hostname D. dir

B. net use

450. Which of the following Is a package management utility for PCs that are running the Linux operating system? A. chmod B. yum C. man D. grep

B. yum

84. An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product? A. AUP B. EULA C. EOL D. UAC

C. EOL

294. A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor? A. Keyboard B. Touch pad C. Ease of Access Center D. Display settings

C. Ease of Access Center

505. A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file? A. Device Manager B. Indexing Options C. File Explorer D. Administrative Tools

C. File Explorer

369. A user's Windows computer seems to work well at the beginning of the day. However, its performance degrades throughout the day, and the system freezes when several applications are open. Which of the following should a technician do to resolve the issue? (Select two). A. Install the latest GPU drivers. B. Reinstall the OS. C. Increase the RAM. D. Increase the hard drive space. E. Uninstall unnecessary software. F. Disable scheduled tasks.

C. Increase the RAM. E. Uninstall unnecessary software.

!!388. A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement? A. Full B. Mirror C. Incremental D. Differential

C. Incremental

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user's PC is infected with ransomware. Which of the following should the technician do FIRST? A. Scan and remove the malware. B. Schedule automated malware scans. C. Quarantine the system. D. Disable System Restore.

C. Quarantine the system.

233. A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%. Which of the following types of malware is the system MOST likely infected with? A. Keylogger B. Rootkit C. Ransomware D. Trojan

C. Ransomware

414. A hard drive that previously contained PI I needs to be repurposed for a public access workstation. Which of the following data destruction methods should a technician use to ensure data is completely removed from the hard drive? A. Shredding B. Degaussing C. Low-level formatting D. Recycling

C. Low-level formatting

125. A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use? A. Degaussing B. Standard formatting C. Low-level wiping D. Deleting

C. Low-level wiping

374. Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS? A. APFS B. FAT32 C. NTFS D. ext4

C. NTFS

A technician receives a ticket indicating the user cannot resolve external web pages. However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue? A. Default gateway B. Host address C. Name server D. Subnet mask

C. Name server

462. Which of the following is a data security standard for protecting credit cards? A. PHI B. NIST C. PCI D. GDPR

C. PCI Payment Card Industry Data Security Standard (PCI DSS)

!!399. A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock. Which of the following options in the Windows settings should the technician use? A. Ease of Access B. Privacy C. Personalization D. Update and Security

C. Personalization

!!513. A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files? A. Run the virus scanner in an administrative mode. B. Reinstall the operating system. C. Reboot the system in safe mode and rescan. D. Manually delete the infected files.

C. Reboot the system in safe mode and rescan.

87. A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue? A. Reimage the computer. B. Replace the system RAM. C. Reinstall and update the failing software. D. Decrease the page file size.

C. Reinstall and update the failing software.

143. A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software.Which of the following should the technician do to MOST likely resolve the issue? A. Bridge the LAN connection between the laptop and the desktop. B. Set the laptop configuration to DHCP to prevent conflicts. C. Remove the static IP configuration from the desktop. D. Replace the network card in the laptop, as it may be defective.

C. Remove the static IP configuration from the desktop.

11. Which of the following common security vulnerabilities can be mitigated by using input validation? A. Brute-force attack B. Cross-site scripting C. SQL injection D. Cross-site request forgery

C. SQL injection

308. Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments? A. apt-get B. CIFS C. Samba D. greP

C. Samba

154. Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user? A. Remote Assistance B. Remote Desktop Protocol C. Screen Sharing D. Virtual Network Computing

C. Screen Sharing

344. A user wants to back up a Windows 10 device. Which of the following should the user select? A. Devices and Printers B. Email and Accounts C. Update and Security D. Apps and Features

C. Update and Security

64. A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk? A. Requiring employees to enter their usernames and passwords B. Setting up facial recognition for each employee C. Using a PIN and providing it to employees D. Requiring employees to use their fingerprints

C. Using a PIN and providing it to employees

!!475. Which of the following is MOST likely used to run .vbs files on Windows devices? A. winmgmt.exe B. powershell.exe C. cscript.exe D. explorer.exe

C. cscript.exe

A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver? A. msinfo32.exe B. dxdiag.exe C. msconfig.exe D. regedit.exe

C. msconfig.exe

493. A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop? A. nslookup B. net use C. netstat D. net user

C. netstat

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to 'mirror the source data for the backup? A. copy B. xcopy C. robocopy D. Copy-Item

C. robocopy

!!422. A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue? A. msconfig B. chkdsk C. sfc D. diskpart E. mstsc

C. sfc

315. A new employee was hired recently. Which of the following documents will the new employee need to sign before being granted login access to the network? A. MSDS B. EULA C. UAC D. AUP

D. AUP

A network technician installed a SOHO router for a home office user. The user has read reports about home routers being targeted by malicious actors and then used in DDoS attacks. Which of the following can the technician MOST likely do to defend against this threat? A. Add network content filtering. B. Disable the SSID broadcast. C. Configure port forwarding. D. Change the default credentials.

D. Change the default credentials.

51. An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT? A. Verify all third-party applications are disabled B. Determine if the device has adequate storage available. C. Check if the battery is sufficiently charged D. Confirm a strong internet connection is available using Wi-Fi or cellular data

D. Confirm a strong internet connection is available using Wi-Fi or cellular data

!!111. A technician is trying to encrypt a single folder on a PC. Which of the following should the technician use to accomplish this task? A. FAT32 B. exFAT C. BitLocker D. EFS

D. EFS

79. The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users? A. Requiring strong passwords B. Disabling cached credentials C. Requiring MFA to sign on D. Enabling BitLocker on all hard drives

D. Enabling BitLocker on all hard drives

!!39. Which of the following filesystem formats would be the BEST choice to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems? A. APFS B. ext4 C. CDFS D. FAT32

D. FAT32

134. A Windows user recently replaced a computer. The user can access the public internet on the computer; however, an internal site at https://companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue? A. Default gateway settings B. DHCP settings C. IP address settings D. Firewall settings E. Antivirus settings

D. Firewall settings

!!128. An administrator is designing and implementing a server backup system that minimizes the capacity of storage used. Which of the following is the BEST backup approach to use in conjunction with synthetic full backups? A. Differential B. Open file C. Archive D. Incremental

D. Incremental

121. A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the BEST choice for accessing the necessary configuration to complete this goal? A. Security and Maintenance B. Network and Sharing Center C. Windows Defender Firewall D. Internet Options

D. Internet Options

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user? A. Have the user provide a callback phone number to be added to the ticket B. Assign the ticket to the department's power user C. Register the ticket with a unique user identifier D. Provide the user with a unique ticket number that can be referenced on subsequent calls.

D. Provide the user with a unique ticket number that can be referenced on subsequent calls.

!!320. A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software? A. VPN B. MSRA C. SSH D. RDP

D. RDP

!!!216. A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure what the user means and needs to view the email to assist with troubleshooting. Which of the following should the technician use to assist the user? A. VNC B. SSH C. VPN D. RMM

D. RMM

444. Which of the following Is used to identify potential issues with a proposed change poor lo implementation? A. Request form B. Rollback plan C. End-user acceptance D. Sandbox testing

D. Sandbox testing

337. Which of the following is a proprietary Cisco AAA protocol? A. TKIP B. AES C. RADIUS D. TACACS+

D. TACACS+

370. A help desk technician runs the following script: Inventory.py. The technician receives the following error message: How do you want to Open this file? Which of the following is the MOST likely reason this script is unable to run? A. Scripts are not permitted to run. B. The script was not built for Windows. C. The script requires administrator privileges, D. The runtime environment is not installed.

D. The runtime environment is not installed.

15. A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS? A. The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit. B. The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds which causes the application to force quit. C. The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option. D. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.

D. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue? A. The SNTP server is offline. B. A user changed the time zone on a local machine. C. The Group Policy setting has disrupted domain authentication on the system, D. The workstations and the authentication server have a system clock difference.

D. The workstations and the authentication server have a system clock difference.

96. A customer called the help desk to report that a machine that was recently updated is no longer working. The support technician checks the latest logs to see what updates were deployed, but nothing was deployed in more than three weeks. Which of the following should the support technician do to BEST resolve the situation? A. Offer to wipe and reset the device for the customer. B. Advise that the help desk will investigate and follow up at a later date. C. Put the customer on hold and escalate the call to a manager. D. Use open-ended questions to further diagnose the issue.

D. Use open-ended questions to further diagnose the issue.

114. A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing? A. Phishing B. Smishing C. Whaling D. Vishing

D. Vishing Note: Vishing is for phone call and Phishing is email

93. A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further? A. ipconfig B. arp C. nslookup D. pathping

D. pathping

342. A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:The Audio Driver is not running.Which of the following will MOST likely resolve the issue? A. compmgmt.msc B. regedit.exe C. explorer.exe D. taskmgr.exe E. gpmc.msc F. services.msc

F. services.msc


Conjuntos de estudio relacionados

ECPI 2020: NUR 164 CHAPTER 3 HEALTH WELLNESS AND HEALTH DISPARITIES

View Set

Chapter 8: Everyday Memory and Memory Errors

View Set

Chapter 11 Security and Personnel - Study Material

View Set