CompTIA A+ 1002 Practice Exams
A user is on a website using an HTTPS URL; the browser displays the information about the certificate in the address bar. What does this certificate validate?
Secure connection
An administrator uses a method that assigns permissions and rights to a collection of user accounts. What is this called?
Security group
Employees are expected to stay updated on skills and knowledge to cope with changing threat types. Which of the following covers this?
Security-awareness training
According to CompTIA's seven-step best practices procedure for malware removal, which of the following correctly lists the first three steps?
1. Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore.
A systems administrator configures a hardware firewall to allow remote desktop connections to various Windows computers. This involves port forwarding. Which port will the administrator need to change so that each system uses a unique port?
3389
A user opens a help desk ticket stating that web content within a particular webpage is not displaying as it should. What does a support technician conclude to be the most likely issue?
A plugin
What uses domain names of components loading on the web page against a vast blacklist?
Ad blocker
A user is conscientious about security after hearing about breaches in the news. The user wants to see if they are up to date on patches for their Apple computer. Where should the user go to check?
App Store
A user notices that their device has a leaking component and needs to take careful measures to minimize any risk and discard the approved component at the proper waste facility. Which of the following disposal is this?
Battery
Medical Facility Which data is at risk?
Billing Address DOB Prescribed Medicines SSN
An iOS user struggles with wirelessly connecting a set of headphones to a phone. What does the user check on the phone while troubleshooting? (Select all that apply.)
Bluetooth connection Pairing mode
A user contacts an IT help desk to report that when trying to browse a web page for office supplies, a completely unrelated webpage about gambling is presented. What does the help desk determine the causes could be? (Select all that apply.)
Browser redirection DNS spoofing
What is referred to as data on persistent storage like HDDs, SSDs, and thumb drives?
Data-at-rest encryption
While browsing the internet, a user receives a pop-up that states, "We have detected a Trojan virus. Click OK to begin the repair process." Out of fright, the user clicks OK. Given the following choices, what is the most likely outcome of the user's response?
Unwanted notifications start popping up in Windows.
A user calls the help desk with issues consistent with a malware infection, although the user received no alert. The technician confirms that there was no malware alert. Which of the following options would be an appropriate next step? (Select all that apply.)
Update the antivirus software. Scan the system using different antivirus software.
A Windows client administrator plans to upgrade their OS in the current environment. What is one of the most important considerations for the upgrade?
User training
An IT manager is setting up an image for dispatching airplanes at a major airport. They are trying to lock down the image to run only the dispatch service. One of the layers of security is to block unneeded service ports from communicating, such as email. Where should the manager start?
Windows Firewall
Which type of malware replicates between processes rather than infecting a file?
Worm
A helpdesk operator looks at build numbers for Windows as they plan upgrade timelines. The operator investigates the significance of the build numbers. Which of the following are the build numbers based on? (Select all that apply.)
Year Time of year
A systems administrator for client machines has managed Windows machines for some time. The company is now adding Apple computers. The security team wants to implement an equivalent to Bitlocker. Which of the following should the administrator enable and configure?
FileVault
Which of the following log-in options require a user to touch a device that takes a digital print?
Fingerprint scanner
A user inspects and learns about the electrical components on the inside of a computer. Which component is measured in ohms?
Resistance
A user boots and installs a Windows operating system on a computer. The user notices that after installation, the system requires many drivers and updates to bring it to a healthy and up-to-date state. The user determines this is due to using which installation type?
Non-Writeable Optical Disk
What is this called when antivirus software scans a file before allowing or preventing it from opening?
On-access scanning
A company is using a credit card transaction that guarantees both customer's card data and the company's system are safe against fraudulent purchases and identity theft. What is this?
PCI DSS
A security analyst notices an unauthorized disclosure of customers' data at the company. What type of data is breached?
PII
Support Ticket #10065 Issue: Screen keepts turning black and workstation must be restarted. What troubleshooting options are applicable to resolving the original issue in ticket #10065?
Run chkdsk Run sfc Update graphics adapter driver Rollback graphics adapter driver
A threat actor uses a technique that instills statements through an unfiltered user response. What is this technique?
SQL injection
Support Ticket #10051 Issue: Powering on the workstation results in a message on-screen stating, "No OS Found." Workstaion boots into the Windows desktop, then the monitor turns black. What would you do next?
Press key sequence START + CTRL + SHIFT + B
A logical security mechanism on an application requires encryption. The encryption takes a data value as input and produces a fixed-length value as output. Which cryptographic technology does the encryption use?
Cryptographic hash
A network administrator troubleshoots domain name system (DNS) issues that a particular user is having. Which of the following utilities will help the administrator troubleshoot DNS specifically?
nslookup
Spyware
often paired with keylogger ?
Trojans
packaged as useful application used by attacker to conceal actions
A server administrator receives a report that the company's external-facing web server is unresponsive. Rebooting the server would take too long, and they are not even completely certain the server would come back up. What utility should the administrator use to restart the website?
services.msc
A remote computer administrator is managing clients in rigorous conditions. The clients keep overheating and often have issues. The administrator wants to run regular checks for damage or corruption. Which of the following will help them accomplish this?
sfc
ADUC/userProperties Object - Users
this item contains user object
ADUC/userProperties Object - Domain Controllers
this item is an OU
Within ADUC, a group can be a member of another group
true
Retail Company Which data is at risk?
Account Number CV2 Number Shipping Address
Ransomware
attempts to encrypt files on drives may block access to the file system
An IPv6 address is made up of bits that identity the network and host of a system. How many bits long is an IPv6 address in total, and how many bits identify the host portion? (Select all that apply.)
128 64
Which proprietary file system does a Mac workstation use?
APFS
A teenager hears from friends about a legitimate website to download games to their Samsung Galaxy phone that is not in the Google Play store. The teenager goes to the site and downloads some games. What best describes the teenager's behavior?
APK sideloading
Which of the following uses the file-copy tool as Windows using "robocopy"?
Automated backups
A vulnerability and risk manager reviews older systems that can only receive critical patches. What are these systems classified as?
Extended support
A user enables privacy settings on a Windows 10 computer. Which settings pertain to app permissions? (Select all that apply.)
Location service Camera and microphone
An attacker can access a computer by executing a lunchtime attack. Which of the following principles were NOT followed that led to this attack?
Log off when not using the computer.
The operating system update on a user's phone fails. The user verifies the phone's connection to a wall outlet that leads to the office Wi-Fi. Which of the following could be responsible for the update failure?
Metered network
A malicious email is sent to all employees in an attempt to gain information about their system
Phishing Message Filtering
What might a security engineer suggest as a solution to deter lunchtime attacks?
Policies
Before an IT team can submit an application for change, it must include a document that includes an analysis of risks associated with performing the change and risks that might be incurred through not performing the requested change. What type of document is this?
Purpose of the change
A server administrator wants to run the latest technologies. What technology should the administrator start using which will replace the New Technology File System (NTFS)?
ReFS
A user needs to restore a problematic Windows system to its original factory state. What approach does the user utilize to achieve the restoration?
Recovery partition
A network engineer implements a proxy at a small company. To avoid management overhead, the configuration does not require settings on every client machine. What type of proxy does the engineer deploy? (Select all that apply.)
Transparent Intercepting
A forensic investigator is told that a server's processor that does not normally run high has been over-utilized lately, and they suspect possible malware. The investigator wants to start by investigating processes. Which command can they use to start the investigation? (Select all that apply.)
ps top
A vulnerability manager is brainstorming different ways to enhance security for their cell phone devices. The company only uses Apple, and so one of the ideas the manager comes up with is to look for anomalistic files that do not belong with Apple for signs of possible malware which did not profile the device and instead just blasted malware out, hoping the operating system would be right. Which of the following would be anomalistic?
.apk
A user installs an application on a macOS device. The user determines that installation will require running an additional service. What installer format does the application use?
.pkg
When used with the dir command, what switch(es) can be used to list files in order of name?
/o:n
A user receives an unsolicited call from a Microsoft support technician during a normal workday. The technician says the antivirus software on the user's computer alerted Microsoft of a new malware infection. The technician needs to remote into the user's computer to fix the problem. What is the technician trying to do?
Circumvent security software.
Over the day, a user's computer becomes slow. Then pop-ups start to appear randomly. Later on, the pop-ups become more frequent, and the user notices that internet searchers are using Google when their default search provider is in Firefox. Once the computer starts crashing repeatedly, the user calls for help. Considering all of these data points, what is the best diagnosis of the problem?
Adware or spyware infection
An employee is working with a substance that can potentially harm them. Which of the following should they use? (Select all that apply.)
Air filter mask Safety goggles
A user experiences difficulty paying a retailer with a touchless near-field supported phone. What does the user check while troubleshooting?
Airplane mode
Worried about a crash, a user creates a complete backup of the system configuration and data files on their computer. Identify what the user has created.
An image
A user would like to install an updated Windows operating system (OS) on a computer. There are no files that need to be saved. What options does the user have to accomplish this? (Select all that apply.)
Clean install In-place upgrade
A user wants to maximize resource dedication to 3D performance and frame rate. Where should the user go to do this?
Gaming
A company disposes of old computer systems. While doing so, all hard drives are removed and scheduled for physical destruction. Which method will NOT work with a solid state disk drive (SSD)?
Degaussing
A new support technician works on entry-level trouble tickets. Which question does the technician use as a closed type of question?
What did the message say?
A problematic Windows system with multiple operating systems installed does not boot properly. A support technician tries to diagnose by outlining the boot process. The technician determines that the system uses an Extensible Firmware Interface (EFI) system partition. Which file does the technician inspect for problems related to a specific operating system boot problem?
BOOTMGFW
A company looks to dispose of old computer equipment. Which items require special care? (Select all that apply.)
Batteries Toner Motherboard
A computer security team investigates a high-level computer breach at a large company. While investigating the computer, the team learns that a USB drive is missing from the computer. A user states that the drive is now safe with the receptionist of the company. What concerns the team from this action? (Select all that apply.)
Chain of custody Data integrity
When making major adjustments to a project, a security technician will have to assess the business and technical merits as well as the risks of the adjustment plan. What documentation will need to be submitted?
Change board approval
A user contacts an IT helpdesk. The complaint is that the computer is very sluggish. Support personnel notices high graphics processing unit (GPU) use. What does the helpdesk determine to be the issue?
Cryptominer
A security awareness trainer spends a good portion of the training class talking about phishing, given its popularity as an attack vector. Phishing campaigns are getting more sophisticated, so the trainer is helping the class learn how to identify a phishing email. Which of the following is an indicator of phishing? (Select all that apply.)
Disguised links Urgency Inconsistent sender and reply to addresses
A user has a Mac computer but likes Windows better for functionality and compatibility purposes. The user wants to sell their computer on an online marketplace and wipe their presence from the computer. Which of the following will help them accomplish this?
Disk Utility
What technique is often used to exhibit fake antivirus and security warnings or other malicious advertising?
Pop-ups
A user suspects that a USB drive on their system has been tampered with. The user begins using the drive by saving a few reports while waiting for an IT technician to investigate. What does the user compromise?
Data integrity
An attacker is trying multiple times to login into a user's phone, but the phone ends up being disabled. What is this called?
Failed attempts lockout
A user experiences significant system instability on their computer. It frequently shuts down, freezes, reboots, and powers off with no accompanying error messages. Which of the following problems would cause this instability? (Select all that apply.)
Failing CPU Overheating Misconfigured firewall
A digital forensics expert investigates a laptop that was not completely powered down. They are looking for a hibernation file on the local hard drive. Which power mode would perform this?
Hibernate
A local jewelry maker sets up a booth at a craft fair. When the first customer makes a purchase, the vendor's contactless card reader will not recognize the customer's wallet app. Which of the following could solve the problem?
Hold the mobile device closer to the reader and wait.
A technician is working with a customer who is being unreasonable. Which of the following skills should the technician use? (Select all that apply.)
Identify early that the customer is angry. Hang up. Do not take complaints personally.
An engineer configures numerous firewall rules on a system. The system processes the rules in order and then reaches the last default rule which blocks access. Which security principle is in place?
Implicit deny
A manager received a document identifying underlying causes and recommended remediation steps to mitigate the risk of repeating an issue. What is this document called?
Incident report
A user would like to use a browser without having to automatically or manually clear the cache after every use. Which feature fulfills this need?
Incognito mode
A technician implements a type of authentication method used on Windows machines that once users are authenticated, they are trusted by the system. What is this method?
Kerberos
Which of the following contains information about ingredients, health hazards, precautions, and first aid information and what to do if the material is spilled or leaks?
MSDS
An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?
MSRA
Microsoft provides a repository of information about threats that Windows Defender discovers. What is the name of the repository?
Microsoft Knowledge Base
What will block third-party cookies and enable strict tracking protection?
Private browsing mode
A manager for a large corporation is in charge of client machines and is currently undergoing a lifecycle hardware refresh. They want to optimize the machines to be powerful enough to run applications. The manager also wants to be sure that they are not underpowered either. What can the manager use to determine CPU optimization?
Privileged time
A technician helps a customer with a ticket request and needs to record that the customer has accepted that the ticket can be closed. Which of the following fields reflect this part of the ticket life cycle?
Problem resolution
A tech has an Android tablet that no longer receives updates due to its age. Learning that a custom firmware with new features is available, what does the tech require to install the image?
Root access
An attacker uses a set of tools designed to gain control of a computer and can create a backdoor with system-level privileges without the user noticing. What is this called?
Rootkit
A user wants to connect to multiple systems after a single login at only one of the devices. What is this called?
SSO
A security analyst notices a critical incident that has a widespread effect on customers that can eventually involve a potential data breach. The analyst creates a ticket with the vendor and sets the importance in order to trigger a faster response time. What describes what attribute of the ticket the analyst set?
Severity levels
A user wishes to use an iOS smartphone with a carrier other than the one the phone was originally meant for. What requirement does the user complete to accomplish this?
Sim unlock
A tech firm deploys wireless installations at client sites. As the firm uses Wi-Fi Protected Access (WPA) version 3, which security technology does the deployment utilize? (Select all that apply.)
Simultaneous Authentication of Equals mechanism AES Galois Counter Mode Protocol mode
A user implements a method that requires a one-time code within a given time frame to get access to their email account. What is this method?
Soft token
Online Tutoring Service Which data is at risk?
Software License
A company uses an element that reminds users when logging in to the company's device of the current software version. What is this called?
Splash screen
A technician is tasked to figure out why a user's Gmail app will not update on their mobile phone. The technician knows several reasons that would cause this to occur. Which of the following would be one of the reasons for this problem?
Storage
Windows allows for several types of installable software. Which type may be transferred between computers when a user utilizes a Microsoft account?
Store apps
An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to enable the built-in Microsoft solution?
System Settings
The Snapchat app on an iOS phone will not close. The user rebooted the device, but that was unsuccessful. Which of the following options would be the best for the user to try to fix the problem?
Uninstall then reinstall
A company is conducting live meetings between two or more applicants at different sites. What is this called?
Videoconferencing
What uses a 4-way handshake to allow a station to associate with an access point, authenticate its credential, and exchange a key to use for data encryption?
WPA2
An administrator uses a method that uses simultaneous authentication of equals (SAE) instead of the 4-way handshake. What is this method?
WPA3
A malware infection can manifest in many ways, often making it difficult to diagnose. Malware may cause which of the following computer issues? (Select all that apply.)
Windows update fails Redirection
A software development team is unaware of a developing vulnerability in the system. What is this type of vulnerability?
Zero-day attack
A technician troubleshoots a Windows system by using the command prompt. If the technician is currently in the directory named C:\Backup and wishes to enter the directory C:\Backup\02102022, what command does the technician use?
cd 02102022
A user downloads a dating app from the Apple store and then gets requests for permission to access their camera; which of the following is the most likely cause of the permission requests?
Spoofed app
A technician creates full backups by having the chain start with an initial full backup as normal and afterward makes a series of incremental backups. Which of the following backups is this?
Synthetic
A security analyst conducts an incident response investigation against suspected malware on a userbox. The analyst suspects a certain variant of malware known to beacon out to a command and control server. What command will help them investigate this?
netstat
A Linux administrator sets up a development environment where they can install and test new packages. Which of the following commands will help the administrator accomplish this? (Select all that apply.)
pt-get yum
A technician needs this skill to give full attention to the customer, so there is no disagreement or misinterpretation of what was said. What is this skill?
Active listening
A user requests a site's certificate, but an evil twin intercepts the request and presents a spoofed certificate, which the user's browser accepts. What has just happened? (Select all that apply.)
An on-path attack Malware is in the middle of the session. The user thinks they have a secure connection.
A new employee calls the help desk because their phone will not connect to the office Wi-Fi. When the technician asks about the phone model, the employee says it is an iPhone 5. The technician immediately knows the problem. Which of the following could be the problem?
Configuration
A company has hundreds of employees who use the same software on their computers, so they offer a company product key to access the software. What is this product?
Corporate-use license
After starting the computer and signing in, a user notices the desktop takes a long time to load. Evaluate the following Windows operating system problems to determine the one that best diagnoses what could be causing the slowness.
Corrupted user profile
A 3D animations expert is searching for a new computer. What should they ensure it has to handle their demanding software?
Dedicated graphics card
A software company hires a new app developer. The corporate network denies access when the developer tries to connect their phone. Why would the network deny access from the developer's mobile phone?
Developer mode
A helpdesk technician is helping a user experiencing printer problems. After several troubleshooting steps, the technician thinks the user may have installed the wrong driver. Where can they go to install a different one?
Device Manager
To ensure the authenticity and authorization of a mobile app, a service provider issues a certificate to valid developers. Developers can use this certificate to sign their app, and to establish trust. Which of the following attributes of an app would likely disqualify as trustworthy?
Duplicates the function of core OS apps.
A technician uses filesystem-level encryption on some files that need to be encrypted on their device. What is this called?
EFS
A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files? (Select all that apply.)
Files that are missing or renamed Files with date stamps and file sizes that are different from known-good versions
A user just installed a new application on their workstation, but the application has issues even starting up. The user has been working on the machine regularly up to this point without any prior issues. Which of the following is most likely the issue?
Firewall
Rooting is typically an action related to Android, while jailbreaking is associated with iOS. They are both trying to do the same thing. What is that?
Gain unrestricted access.
Which of the following accounts can users set up profile settings to synchronize between devices via the online portal?
Microsoft account
A user finds that their iPhone 5 starts to run slowly, and a reboot does not solve the slow performance. Which of the following issues could be causing the problem? (Select all that apply.)
OS update Too many apps open Low battery charge
If an individual is creating an account and unable to think of a strong key code word, the browser can suggest strong keycodes to use. What is this called?
Password manager
A threat actor poses as a hiring manager for a company and asks a user for their personal credentials and to log in to a spoofed website that looks genuine. When the user confirms log-in with the spoofed website, their information is obtained. Which of the following is this attack?
Phishing
During the IT team's weekly meeting, the topic of improving the overall cyber hygiene of the company turns into a discussion about the employee's lack of security awareness. Why would the IT team members focus on employee behavior? (Select all that apply.)
Phishing Social engineering
A technician configures a method to run some server application from a network and make it accessible to the internet. What is this method?
Port forwarding
The IT department determines that the phone belonging to the company's vice president suffers a compromise and that the personal and corporate data contained on the phone has leaked. Which of the following should the IT team do next?
Quarantine all devices that could be connected to the leak.
An analyst is a method that calculates a product of the likelihood and impact of the potential threat category. What is this method?
Risk levels
A marketing professional normally sends large files to other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, so the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only 20 people at a time seemed to be able to access it. What is causing the issue?
The share was created on a Windows desktop.
A user disables some of the laptops' services, thinking it would speed up performance. After restarting the laptop, "One or more services failed to start" appears. When the IT specialist opens the Services snap-in, they identify the failed service and restart it, but that does not fix it. Which of the following scenarios best explains why the restart did not work?
The user disabled a dependent service.
A user needs to install a desktop application and use an application store that is reputable. What type of vendor is this store?
Trusted source
A transportation company wants to set up software that gathers statistics from the controller area network for trailers hauling loads, enabling them to adjust processes to optimize cost savings. What type of adapter will the company need to send the statistics back to their cloud network?
WWAN
A low battery charge can cause several different problems to occur on a mobile device. Which of the following issues could stem from a low battery? (Select all that apply.)
Weak Bluetooth signal Weak Wi-Fi signal
A helpdesk manager assesses older Windows 7 computers their company owns and tries to determine available upgrade paths. Which of the following can NOT be upgraded?
Windows 7 Home to Windows 10 Enterprise
Rootkits
infects firmware code uses an exploit to escalate privileges
A penetration tester targeted top-level executives during a test by sending out phishing emails. They received their first shell when the first executive opened the attachment in the phishing email. Once the penetration tester connects to the executive's computer, what command will tell them the location of where their shell landed?
pwd
Support Ticket #10065 Issue: Screen keepts turning black and workstation must be restarted. Workstation boots into the windows desktop, then the monitor turns black. What would you do next?
Press key sequence START + CTRL + SHIFT + B
A Windows user runs the Performance Monitor tool to check disk activity. What counter is the best option the user can evaluate to understand how busy the disk is at any given time?
% disk time
What wildcard character can be used to indicate a string of characters?
*
An administrator reviews a series of instructions that the workstation follows every time a user logs on. What is this called?
Login script
A technician is using a tool with a secure erase function that performs a zero-filling on HDDs and marks all blocks as empty on SSDs. The SSD firmware's automatic garbage collectors then perform the actual erase of each block over time. What is this tool?
Low-level formatting
What technique is used on hard drives that reset them to factory condition and the hard drives only contain the information necessary to interact with a file system?
Low-level formatting
What wildcard character would allows you to substitute for a single unspecified character in a command?
?
A client uses this software that allows access to a given computer. What is this software?
Screen-sharing
A technician suspects a computer system is infected with malware. Which of the following activities is the correct next step?
Sandboxing
Commercial Bank Which data is at risk?
DOB Email Address Home Address
A Windows user needs to transfer and retain an entire directory structure from one disk to another. There is also a need to retain New Technology File System (NTFS) attributes. Which command does the user determine will fulfill the need?
robocopy
A server administrator sets up jobs that will copy over files on various servers. They want it to detect if the file was transferred successfully and, if not, resend the file. Which command is optimal for server administrators to perform this task?
robocopy
ADUC/userProperties Object - MyTestForest.local
specifies domain/forest
A user is only able to read data on the file. What account management policy is this?
Restrict user permission.
An engineer surveys a computer room for environmental impacts. What does the engineer focus on? (Select all that apply.)
Temperature Humidity Ventilation
A progressive healthcare provider sets up color-filter modes on client machines and tailors them to specific users who are color blind. Where can the healthcare administrator configure this?
Accessibility
A server administrator locks down security on their golden client image but is concerned about potentially breaking things in the environment. They decided to set up a test image for test users in various departments before full implementation. What should the administrator use to make individual configuration changes to the image?
regedit.exe
33 of 87 Question A user interacts with a Linux distribution that has no desktop graphical user interface (GUI). As the user types, which stream handles the interaction?
stdin
Which of the following extensions combines a scripting language with hundreds of prebuilt modules called cmdlets that can access and change most components and features of Windows and Active Directory components and features?
.ps1
A technician is implementing a Linux shell script that each statement comprising the actions that the script will perform is then typically added on separate lines. Which of the following is this?
.sh
A server administrator has not used the command line in quite some time and is trying to remember what will help them with commands and how to use them. Which of the following should the administrator use?
/?
When used with dir command, what switch(es) can be used to list files using a wide format with no details?
/w
An endpoint machine administrator configures specific Apple computers designated for users with disability. Where should the administrator look to configure these settings?
Accessibility
A company has employees sign a document that enforces the importance of protecting the organization from the security and legal implications of employees misusing its equipment. What is this document?
Acceptable use policy
A company needs to set up perimeter security to control and monitor who can approach the building. Which of the following should the company use? (Select all that apply.)
Access control vestibule Guard Fencing
A computer administrator sets up a client workstation to join a centrally managed network. What options should the administrator configure to do this?
Access work or school
Which of the following will block untrusted application sources from running?
Anti-malware
What component storage prevents static electricity from discharging?
Antistatic bags
A company's IT support specialist is ready to start recommissioning a system as part of the malware removal process. What is the last step before removing the computer from quarantine?
Antivirus scan
What is a type of employee device that must meet the profile that the company requires, and the employee will have to agree on the installation of corporate apps and to some level of oversight and auditing?
BYOD
A user has owned the same personal computer for a while and thinks it might be time for an upgrade. Which of the following are upgrade considerations? (Select all that apply.)
Backup files Application support Hardware compatibility
What can use a trusted platform module chip in the computer to tie the use of a fixed disk to a particular motherboard?
BitLocker
An iOS smart device user notices that AirDrop is not working properly as files are not being received. What should the user check while troubleshooting? (Select all that apply.)
Bluetooth Contacts
A security engineer researches how to make backup and antivirus apps available to their iOS mobile devices. Where should the apps be pushed?
Business Manager
A customer has opened a ticket for a problem to be fixed, and when the customer opens the ticket, there will be a record that shows what?
Proper documentation
A systems engineer would like to keep a company's wireless network a secret. How can the engineer accomplish this?
Disable service set ID broadcast.
A company establishes a mobile device deployment model. The policy states that a corporate-owned phone may be used for personal reasons. Which deployment is in use?
COPE
A technician detected and reported an incident, resulting in the appropriate unit being notified and tasked with acting as first responders, taking charge of the situation, and formulating the appropriate response. What is this unit called?
CSIRT
An employee enters the web address of their local newspaper to check for news on the company, and a site pops up with many click-bait celebrity stories. The employee re-enters the address assuming a misspelling but returns to the same page. When the help desk technician arrives, which of the following troubleshooting steps would be appropriate?
Check HOSTS files for malicious entries.
A technician needs to set up a method that blocks URLs or search terms using keywords and phrases. What is this method?
Content filtering
A technician would like to set every Windows computer at an organization to have a company logo as a desktop wallpaper. What does the technician determine as the best method for deploying the setting?
Domain group policy
A technician destroys disks by putting holes through them and smashing them with a hammer. What is this method?
Drilling
A server administrator tests connectivity between two statically assigned servers in a forest with different domains. What should they check first in this case?
DNS settings
A user builds a new computer for gaming purposes. The ability to upgrade the performance graphics processing unit (GPU) over time is desired. What GPU type does the user invest in?
Dedicated graphics
A new help desk technician fields a support call from a user. What pertinent information does the technician ask the user to provide? (Select all that apply.)
Description of the issue Contact details
A developer, working at Microsoft, is helping to develop the latest and greatest user interface for Windows. The developer is assigned to the team that works on the user interface's top level. What will the developer be working on?
Desktop
A company implements several types of security mechanisms around a high-risk data center. One of the mechanisms allows for a panic button to be pressed. Which security type does this button represent?
Duress
Online Tutoring Service Regulated data type or standard to comply with:
EULA
A technician makes sure that there is no faulty electrical equipment that can pose a risk and places extinguishers nearby. What is this called?
Electrical fire safety
Support Ticket #10065 Issue: Screen keepts turning black and workstation must be restarted. Select a taks to begin troubleshooting ticket #10065:
Enter bootrec /rebuildbcd at a command prompt
A company has several offices within the United States. Engineers look to configure Microsoft DirectAccess virtual private networking technology for remote connections. Engineers instruct IT to deploy which operating system to Windows desktops?
Enterprise
A user loses their company smartphone while traveling. The IT department initiates the securest measure possible to impact work-related data only. What action does the IT department take?
Enterprise wipe
An SSID similar to the company-managed SSID is being broadcast as an open wireless networ.
Evil Twin 802.1X Authentication
A threat actor uses a technique that allows devices to connect to an open authentication and then redirect the user's browser to a fake captive portal that encourages the user to enter their network password. What is this technique?
Evil twin
A server administrator looks at which Linux supports file systems to show all available options. Which of the following are supported by Linux? (Select all that apply.)
FAT32 ext4
A user logs into a computer and uses a camera that records a 3-D image with its infrared sensor to mitigate attempts to use a photo to spoof the authentication mechanism. What is this called?
Facial recognition
Password settings for the user displayed are in the General tab
False
A user downloaded a script, but the file was in a text file format. The user needs to change the extension to a PowerShell script to run it, but they do not see the extension. Where can the user configure this setting?
File Explorer View tab
A lawyer opens an email attachment that appears to be a court summons, but it is malware. The law firm's IT consultant quarantines the lawyer's system and then disables System Restore. Which of the following should IT disable?
File History
An IT technician is installing software on a device that inspects network traffic and accepts or blocks traffic based on a set of rules. What is this called?
Firewall
What allows a user to download from a vendor's website and select the correct patch for their device's make and model?
Firmware updates
A systems administrator looks to implement a server backup plan. Which two factors govern backup operations? (Select all that apply.)
Frequency Retention
A client administrator for a video game development company wants to upgrade machines to support five primary partitions. The developers work with a lot of large files and might even need partitions larger than 2 TB. Which of the following should the administrator use?
GPT
A vulnerability management lead wants to set up the company using a more secure authentication method than a simple password. What hardware aspect should the management lead consider?
Hardware token
What type of data breach can be associated with a specific person or use an anonymized or de-identified data set for analysis and research?
Healthcare data
A Windows user runs the Defragment and Optimize Drives tool (dfrgui.exe) on a solid state disk (SSD). What action will the tool take on the drive? (Select all that apply.)
Identifying blocks that are deletable Tagging blocks as writable
A user experiences issues searching their local computer for files. What is a common issue that the user should check?
Indexing options
The System Restore tool in Windows is used to roll back configuration changes to an earlier date or restore point. One option for creating restore points is to use Task Scheduler. What other actions will create a restore point? (Select all that apply.)
Installing a program Updating an application
While implementing security on a small network, an administrator ensures that any data modification is legitimate. What security property pertains to this principle?
Integrity
A user modifies a Windows 10 computer's ease of access settings. Which settings group configures Keyboard usability?
Interaction
A Windows computer user requires help from the IT department. A technician instructs the user to create an invitation file. What type of Windows help session does the user create?
Microsoft Remote Assistance
A user claims that they cannot browse the internet but can access a local shared network server by name with no issue. After evaluating the computer's IP settings and pinging an internet host by IP address with no problem, what does a support technician determine as the cause?
Missing DNS address
A new support technician interfaces with a user that has a computer problem. While discussing the problem, the technician gives undivided attention to the user and asks questions where the person creates their own response. When discussing the problem, what does the technician practice? (Select all that apply.)
Open-ended questions Active listening
An attacker uses a script to create fileless malware that requires no compilation. What scripting environment does the attacker utilize?
PowerShell
An organization executes a project to replace all of its servers. A change that is requested by management goes through a risk analysis exercise before moving to approval. What will a qualitative approach use for metrics? (Select all that apply.)
Previous experience Opinions
A spouse plans a surprise birthday party for their significant other. The spouse wants to turn off activity history on their browser to make sure their significant other does not find out the surprise. Where can the spouse do this?
Privacy
An administrator uses a document list that identifies the discrete stages in the use of hardware and software. What is this document called?
Procurement life cycle
An engineer configures an Authentication, Authorization, and Accounting (AAA) server to authenticate credentials for remote users. Credentials are forwarded to the AAA server from a firewall. Which AAA method does the engineer utilize?
RADIUS
An organization looks to make a server available to internet traffic without bringing harm to its private network. An onsite engineer configures a separate network for the server. Which approach does the engineer utilize?
Screened subnet
A security administrator for a defense contracting company wants to disable external devices. The administrator pushes out a group policy setting to disable such devices but worries that attackers might elevate privileges and reenable them. What other setting will help the administrator accomplish the objective?
Selective suspend
Which of the following malware tries to extort money from the victim?
Spyware
A systems administrator looks to have a daily backup of a server located across a wide area network (WAN) link. As the link is not fast, the administrator creates a backup scheme that uses little to no bandwidth and acquires an entire backup of the system. Which scheme does the administrator implement?
Synthetic
What type of encryption does WPA2 use? (Select all that apply.)
TKIP AES
Which of the following scenarios would result in a website having an untrusted or invalid certificate? (Select all that apply.)
The certificate has expired. The certificate is revoked. The certificate is self-signed.
While conducting an online search for cleaning services, a homeowner clicks on the link for one of the results. When the website loads, the page says, "Warning: Potential Security Risk Ahead." What would cause this message to appear? (Select all that apply.)
The certificate is issued by an untrusted CA. Malware is trying to redirect the browser to a spoofed page. The certificate has expired.
A tech savvy user browses the network to identify any available shares on all servers. Common knowledge in the company is that there is a share with payroll information. While browsing the servers, the share was found but the user was unable to access the information. Why is the user not able to view the information within the share?
The user does not have permissions to access the share.
Support Ticket #10051 Issue: Powering on the workstation results in a message on-screen stating, "No OS Found." How can you permanently resolve the original issue in the ticket #10051?
There are no other applicable actions
A user attempts to authenticate from one Windows system to another in a domain but fails with no error message. The user verifies the username and password as correct. What does the user determine the issue to be?
Time drift
An IT specialist found a damaging package on a client's computer disguised as something else. What did the specialist find?
Trojan
Which of the following uses a security shield icon for tasks that are protected under them?
UAC
A security administrator moves their proxy from on-premise to the cloud and wants to establish a client tunnel to the cloud proxy tunnel for web traffic. This way, the users are protected even while out in public and not connected to the domain. What should the administrator set up?
VPN
Which of the following avoids opening remote desktop ports on the network's firewall?
VPN
A helpdesk professional assists a user with issues booting up their Mac computer. The user reports that there is no drive to boot from. Where will the computer boot from?
Web
Which root-level file allows for the automatic execution of commands in a legacy version of Windows?
autorun.inf
A systems administrator wants to create a scheduled task throughout the environment, which does a basic health check at night when users are not working. Which command should the administrator use in their scheduled task?
chkdsk
ADUC/userProperties Object - Home Folder: Connect
configures the mapping of a private drive to a network share
After a recent driver update on a Windows system, the display adapter does not function properly. A technician tries to roll back the driver by using which management console?
devmgmt.msc
Support Ticket #10051 Issue: Powering on the workstation results in a message on-screen stating, "No OS Found." Select a task to beging troubleshooting ticket #10051:
enter bootrec /fixboot at command prompt to repair boot sector
A user would like to delete a mapped drive labeled as "X" on a Windows system. Which command will the user issue at the command prompt?
net use X: /delete
A server administrator experiences performance issues on a server and needs to narrow down the source of the problem. The server is an externally facing website with high visibility for the company. The longer the site is having issues, the more customers might notice and possibly damage the company's reputation. What can the administrator use to view and log performance statistics? (Select all that apply.)
resmon.exe perfmon.msc
A Linux server administrator meets with their Windows server administrator counterparts. A certain grouping of Linux and Windows servers is designated to run services that share files. What will the administrators need to enable sharing between the disparate systems?
samba
A security administrator for Linux systems in their demilitarized zone wants to ensure only some administrators can perform certain commands. Which of the following is best used to lock down certain commands?
sudo
A user on a Linux system would like to run all commands at an administrative level while maintaining a login in their own account. What command does the user issue to accomplish this?
sudo
A security engineer runs a long tail analysis to determine the frequency of services and processes communicating to the internet. After baselining a large amount of normal traffic such as updates, they encounter a suspicious communication frequency every five minutes from a particular box. They have done a thorough job investigating running processes, memory analysis, and file integrity checks but find nothing. What else could the engineer check for persistence mechanisms that could send the communications?
taskschd.msc
An IT professional helps to fix their friend's computer. The computer is running extremely slow. The IT professional notices the operating system is running Home edition. Which of the following is the only service available for the Home edition?
RDP
After installing Windows 10 on an old computer, a computer technician is stumped when the computer continues to boot to a blank screen. Determine which ones could conceivably fix the blank screen from the available solutions. (Select all that apply.)
Repair Windows. Update the graphics adapter driver.
A pet store owner receives an email from their bank with a special financing offer. The owner clicks on the attachment, but it does not open. Later that day, when the owner returns to their computer, it is running very slowly and will not connect to the internet. By the time the IT consultant arrives, the computer has locked up. Which of the following is the best action for the IT consultant given the existing conditions?
Run an antivirus scan.
A technician sets up a company's network and uses a method that lets employees know which network is the company's network. What is this called?
SSID
A technician runs an isolated test that allows them to run the program without impacting the system. What is this called?
Sandbox
When a project team is constructing a change request document, a part that needs to be included is the number of devices, users, or customers that will be affected by the change. What is this part of the document?
Scope of the change
Many mobile apps collect location data. Rogue apps could use location data for criminal purposes, such as burglary. However, many legitimate apps also track a mobile user's location. Why would a legitimate shopping app have an interest in a user's location?
Targeted advertising
An administrator assists the human resources department in testing access to their new cloud-based training site. Unfortunately, the site cannot be accessed due to the organizational security policy. Which of the following should the administrator use to assist them?
certmgr.msc
A server administrator notices a file server starting to run low on space. The administrator wants to create extra space before all space is used up and even worse issues arise. What should the administrator use?
cleanmgr.exe
A penetration tester conducts the initial reconnaissance phase and is currently targeting externally facing servers for a certain company. Currently, they are trying to enumerate the domain name system (DNS) servers. Which built-in tool will help them perform this?
dig
A Linux server administrator notices a service they do not recognize, although the environment is quite big. They look at the help file for the ksh process, but the documentation seems poor. It does seem to indicate that it provides interactivity, however. What type of program is this?
Terminal
Two friends want to share photos with each other from their iPhones. The first friend selects their photos and uses AirDrop to share with the second friend. However, the first friend gets a message that there is no one nearby to share with. Why would that message appear?
The second friend has Bluetooth disabled.
An administrator for Apple endpoints has heard about roaming profiles on Windows where users can sync certain settings from different devices. Which of the following offers a similar functionality?
iCloud keychain
While researching and writing a paper on their home computer, a student notices an alert in the notification area that Windows Defender has expired and needs to be updated. The student is annoyed by the interruption but clicks on the alert and follows the update instructions. Later, the student told their parents that Defender expired, and they installed the update. The student's parents are panic-stricken. Determine the best reason for the parents' reaction from the information provided.
A malicious browser push notification tricked the student into downloading malware
Which of the following can prevent, detect, and remove software threats that consist of ransomware, Trojans, spyware, and rootkits?
Anti-malware
An attacker uses a technique against a wireless network that allows them to flood access points with too many packets. What is this called?
DoS
A server administrator migrates their environment from physical servers to a virtualized environment. The administrator wants to install new virtual machine operating systems. What is the best approach to use regarding deploying virtualized OSs?
ISOs
An installer is implemented using. EXE file. What is this technique performing?
Installation of applications
Users are curious about what is run on startup, so they dig into the startup script. The users find the command "net use M: \\sharedrive\data /persistent:yes". What is the startup script invoking?
Mapped drive
Viruses
Replication requires user interaction concealed in code of an executable process
A user calls the help desk complaining that Windows freezes to a blue screen every time it tries to boot. When the technician arrives, they boot the computer in Safe Mode. After evaluating this situation, what is the BEST reason the technician wants to enter Safe Mode to begin troubleshooting?
Safe Mode loads only the minimum amount of drivers and services to start the system.
Malware encyclopedias are a resource that antivirus vendors often make available to IT professionals. What is their value for IT practitioners? (Select all that apply.)
They are documentation of known malware They provide information about the type, symptoms, purpose, and removal of malware.
Which of the following backup procedures state that users should have three copies of their data across two media types, with one copy held off-line and off-site?
3-2-1 backup rule
A company has experienced a power outage, but activation of an alternative source has kicked in. What is this alternative source called?
UPS
A user uses a scripting language based on Microsoft's Visual Basic programming language. Which of the following extensions is used?
.vbs
A user looks to implement virtual network computing (VNC) access to a Windows computer while traveling. Which port does the user open on a hardware firewall to allow access?
5900
A user upgrades the memory in a Windows corporate workstation from 4 GB to 8 GB. After the upgrade, the user notices that only 4 GB is recognized by the system. What does the user conclude the problem to be?
A 32-bit version of Windows
A user wants to share their printer with other teams, but not all teams use the same operating system. What can the user do to configure functionality with the other teams?
Additional drivers
What group has complete privilege control over a system?
Administrator
What are their options when a company wants to create and deliver a custom app for their employees without using a public store? (Select all that apply.)
Apple Business Manager Managed Google Play
A recent software installation on a Windows desktop fails. Which internal log file does a technician review to see what may have gone wrong?
Application
A server administrator hears weekly about companies breached by malware. What is the most significant impact the server administrator is likely worried about?
Applications
An employee needs to ensure that the customer receives a professional support delivery. Which of the following does this include? (Select all that apply.
Avoid distractions. Deal appropriately with confidential and private materials. Be on time.
ADUC/userProperties Object - Member of
views/modifies group membership
An employee uses a cryptographic contactless technique that allows access to a building. What is this technique?
Badge reader
A computer user looks to map a network drive using the most basic scripting language possible. Which language does the user implement for a Windows system?
Batch script
What type of malware attack designates the victim's computer to mine digital currency?
Cryptominer
An accountant has an unlimited data plan and has set data usage limit triggers for their mobile phone. What concern does the accountant have with high data usage with an unlimited data plan? (Select all that apply.)
Cryptomining DDoS
An Internet-facing web application is bombared with request and is rendered unsusable
DoS Traffic Analysis
An IT specialist removes malware from a computer system and then re-enables System Restore. Then a new restore point is created, all security-critical services and settings are validated, and the DNS configuration is verified. However, when the specialist runs a final antivirus scan, it detects malware. Considering all the steps taken, which would explain why there was still malware on the system?
C&C network connection was detected.
Which of the following should generate an alert when the account is disabled or altered?
Change default administrator account.
A user has just set up their network and needs to make sure that their network is secure, and no one can log in to the network. Which of the following should the user do?
Change default passwords.
A technician configures a legacy computer for a user. Which account authentication policies does the technician implement? (Select all that apply.)
Change the default admin password. Disable the guest account.
A technician configures a backup routine on an important workstation. Which type does the routine use when only backing changes since the last full backup?
Differential
What method uses the process of immersing the device into a high-intensity magnetic field that leaves the object magnetically impartial?
Degaussing
An administrator wants to listen to music through headphones to help with productivity during work. However, the administrator is having issues connecting the headphones via Bluetooth. Where should they go first to look?
Devices
A Windows security log shows numerous login attempts with passwords containing baskerball lingo
Dictionary Attack Account Lockout
The Instagram app on an Android phone will not launch. Which of the following options could fix the problem?
Force Stop
A technician uses a backup method that reflects how much lost work can be tolerated. What is this method?
Frequency
An administrator is backup chaining a database with the type of backup that utilizes a moderate time and storage requirement. What type of backup is this?
Full with differential
An administrator uses a backup rotations scheme that labels the backup tapes in generations. What is this called?
GFS
An attacker imitates an IT support technician for a company. The attacker asks for a user's password to gain access to the user's system remotely. What is this called?
Impersonation
An intern for a Windows server team is watching a server administrator verify the authenticity and integrity of an installer. Where did the administrator most likely get it from?
Internet download
A user wishes to enable multiple desktops within macOS for different work environments. What feature makes this possible?
Mission Control
A user looks to reconfigure an IP address for a network adapter. Which Control Panel applet does it use?
Network Connections
Management provides employees with written policies and procedures to help them fulfill their tasks. Which of the following procedures requires employees to enroll and identify themselves using secure credentials?
New-user setup checklist
A company has backup storage located at a different location, which lowers the risk of losing both productions and backup copies of data. Which of the following is this backup storage?
Off-site backup storage
A curious user looks through their local logs and sees errors in region-coding copy-protection mechanisms. What type of device is generating these logs?
Optical media
A security researcher wants to install an older operating system for research and testing. What is the most common medium that comes with a disk that the researcher should use?
Optical media
A technician is cleaning a computer and notices dust forming over the fan blades and ventilation slots. What can the technician use to perform dust cleanup? (Select all that apply.)
PC vacuum cleaner Natural bristle brush Compressed air blaster
Retail Company Regulated data type or standard to comply with:
PCI DSS
Medical Facility Regulated data type or standard to comply with:
PHI
Commercial Bank Regulated data type or standard to comply with:
PII
A systems administrator configures a new Windows workstation. The system uses the New Technology File System (NTFS). The system requires interaction with a Linux system and supports case sensitive file naming by utilizing which feature?
POSIX
A user installs an application on a Linux system by using which method in the operating system?
Package manager
Users perform a technique that tends to select C, M, N, O, and S shapes. Which of the following is this?
Pattern
A user finds their Android smartphone to be unresponsive when trying to use an app. How might the user resolve the problem so that they may use the phone?
Perform a soft reset.
A video game development company is purchasing upgraded laptops to develop cutting-edge graphics for a new story they have been marketing. They want to be able to integrate persistent system RAM. What type of operating system should they use for support?
Pro for Workstations
What tool will distinguish client accounts and provide support for recording and reporting billable support activity?
RMM
A security engineer suggests the use of proximity technology to track the movement of portable equipment. What solution does the engineer recommend?
Radio frequency
A user at an organization calls the IT help desk in a panic. The user exclaims that according to a message on the computer, someone is trying to extort them. What type of malware does the user experience?
Ransomware
A server administrator was called in to help a VIP whose computer was accidentally infected with a virus. The administrator wants to revert the computer but still preserve user personalization settings. What should the administrator use?
Refresh
A user experiences a blue screen of death (BSoD) while using a Windows computer. What does a support technician determine to be a good first troubleshooting step?
Remove any newly installed hardware.
A user with a problematic Windows system tries to use a previously created system image. How does the user access the image? (Select all that apply.)
Repair disk Advanced boot
Which of the following alternatives can a customer select from when an issue cannot be resolved remotely? (Select all that apply.)
Replace Repair
An administrator reviews an audit log and notices strange logins when the business is closed. Which policy does the administrator use to deter this activity?
Restrict login times
A user receives a Windows dialog box pop-up that states 163 viruses were detected by antivirus software. When the user clicks on the pop-up, it states that to get rid of the viruses the user needs to purchase the software's full version. What type of antivirus does the user have in this scenario?
Rogue
What method gets a system back up and running before the recommended amount of time elapses?
Rollback plan
Malware infects a user's computer. A support technician determines that the malware is executed without requiring any authorization using system privileges. What type of malware currently infects the system?
Rootkit
A user likes to watch Netflix on their phone while on the treadmill. The user turns the phone sideways for better viewing, but this time, the picture did not orient to landscape as it always has. Which of the following could cause this issue?
Rotation lock is enabled.
A technician uses a method where each server is configured with a public/private encryption key pair and identified by a host key fingerprint. What is this method?
SSH
An employee disposes of a disk by grounding it into little pieces. What is this called?
Shredding
A user installs an app on a smart device. The device's official app store does not list the app as it is a proprietary app for an organization. What type of installation does the user complete?
Sideload
A user is attempting to gain confidential information by talking to the receptionist.
Social Engineering User Education
An IT administrator creates a repository for standard operating procedures (SOPs). What documents does the administrator upload to the repository? (Select all that apply.)
Software installation instructions New-user setup checklist Server decommissioning checklist
A manager for a Linux server team recently purchased new software which will help to streamline operations, but they are worried that in IT, there is a high turnover of personnel. The manager wants to ensure they can obtain updates, monitor and fix security issues, and are provided technical assistance. What impact is the manager trying to mitigate?
Support
A company tightens system security in several ways. One approach implements on-access scanning of files for malware. Shortly after implementation, users complain to the help desk. What is the complaint?
Systems are slow.
An administrator uses an access control system to shuttle authentication and authorization traffic between the supplicant and the AAA that encrypts an entire authentication rather than just the password. What is this method?
TACACS+
How might a mobile-device management suite of software detect that a user has rooted an Android device?
There is no valid developer code signature.
A client administrator sets up a new system for GUID partition table (GPT) partitioning. What dependency will the administrator need to set?
UEFI
The electronic health records software application crashes during a busy day at a doctor's office. The IT consultant for the practice knows that the application backs up data in real-time and has the latest update. Which of the following options is the only one that could potentially fix the crashing issue?
Uninstall and reinstall the application.
What is also known as a potentially unwanted application (PUA) and should be removed from the computer?
Untrusted source
A Windows user is not able to resolve server names on a local network. After updating the system's hosts file, which command does the user issue?
ipconfig /flushdns
Advanced malware infection may require manual removal. Which of the following tools assists in manual malware removal? (Select all that apply.)
msconfig WinPE regedit
An IT manager is in charge of client machine administration. The manager wants to test various boot settings before applying them to the environment. Which tool can the manager use to accomplish this best?
msconfig.exe
A vulnerability manager investigates their mobile environment for overall risk posture and starts with identifying legacy systems. Who determines when an Android version is at the end of life?
Vendor
Most vendors have recycling systems for what types of products? (Select all that apply.)
Battery Device Toner
A new employee is going over the site safety handbook about correct ways of carrying objects, so they do not damage the object or get injured. What is this called?
Lifting techniques
A user's phone begins to act strangely, with apps responding slowly and pop-up ads appearing frequently. When the user calls the help desk and explains the issues, the technician says it sounds like malware. What other symptoms would be common to a malware infection on a mobile phone? (Select all that apply.)
Redirection Fake security warnings
A user performs a technique that allows them to connect their PlayStation to their network. What is this technique?
UPnP