ITC FINALS

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the most commonly used file extension for a shell script? .sh .bash .ksh .zsh

.sh

On a Linux system, what is the name of the directory where you will find a text file called devices that contains information about the devices that are configured on the system? /hwinfo /devices /proc /root /sys

/proc

You are currently learning about networking devices and have just learned about MAC addresses. You look up your device's MAC address, and it comes back as 00-B0-D0-06-BC-AC. Which portion of this MAC address can tell you who the manufacturer is? 00-B0 BC-AC 00-B0-D0 06-BC-AC

00-B0-D0

Which of the following IP addresses have a default subnet mask of 255.255.0.0? (Select three.) 129.0.0.1 1.6.45.254 123.254.19.6 228.62.18.6 191.168.2.15 168.16.5.1

129.0.0.1 191.168.2.15 168.16.5.1

Which of the following are valid IPv6 addresses? (Select two.) 343F:1EEE:ACDD:2034:1FF3:5012 A82:5B67:7700:AH0A:446A:779F:FFE3:0091 165.15.78.53.100.1 141:0:0:0:15:0:0:1 6384:1319:7700:7631:446A:5511:8940:2552

141:0:0:0:15:0:0:1 6384:1319:7700:7631:446A:5511:8940:2552

Your Windows workstation has Automatic Private IP Addressing (APIPA) implemented with default settings. Which of the following TCP/IP addresses could you automatically assign to the system, should your DHCP server go down or become inaccessible? 169.198.1.23 168.254.10.25 169.254.1.26 10.0.0.65 172.16.1.26 192.168.1.22

169.254.1.26

You have recently purchased a toll pass for a bridge that you cross each day on your way to work. Which of the following wireless technologies is MOST likely being used for this pass? Near Field Communication (NFC) Passive RFID Bluetooth Active RFID

Active RFID

Used for cooling high-end video cards Has a fan attached to the heat sink Used for cooling CPUs

Active heat sink

Which of the following tasks are part of configuring the user environment after you successfully install a Windows system? (Select two.) Activate your Windows system. Add or remove apps and folders from the Start menu. Configure Windows Update. Configure accessibility options. Install and configure your firewall.

Add or remove apps and folders from the Start menu. Configure accessibility options.

Your computer has a single NTFS partition that is used for the C: drive with the folders below. C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow the Full Control permission for the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions. You: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder? Deny Read for both. Deny Read for Reports.doc and Allow Full Control for Costs.doc. Allow Full Control for Reports.doc and Deny Read for Costs.doc. Allow Full Control for both.

Allow Full Control for both.

Which type of DoS attack exhausts the target's resources by overloading a specific program or service? Amplification Application layer Protocol Distributed

Application layer

Under which Windows 10 Settings app category can you choose battery options when you want to watch movies and videos on battery power? System Gaming Apps Personalization

Apps

Which file attribute identifies the file as having been modified since the last backup? Archive Read-only Encrypted Hidden

Archive

Which of the following processes is used to prove a user's identity? Logical security Authentication Certificate Manager Authorization

Authentication

Which of the following is an example of a soft token? Smart card USB security device Key fob Authentication app

Authentication app

You are in the process of preparing to install Windows 11 Professional on your Windows 10 laptop. You have already verified that your laptop hardware is compatible with a Windows 11 installation. Which of the following pre-installation steps should you perform next? Run Disk Cleanup on the hard drive. Back up existing data. Upgrade your laptop's RAM. Plug your laptop into an uninterruptible power source.

Back up existing data.

Which of the following is designed to provide a Linux command line interface? GCC Bash GIMP GPL

Bash

Where should you apply the thermal paste when installing a processor? Between the heat sink and CPU Between the heat sink and fan Between the CPU and fan Between the motherboard and CPU

Between the heat sink and CPU

Uses blue laser light, which has a short wavelength, allowing data to be packed more tightly onto the disc and is rewritable.

Blu-ray Disc (BD)

Was originally developed for high definition video (and expanded content on movie discs), but can also be used for data storage.

Blu-ray Disc-Recordable (BD-R)

Which of the following forms of shell scripting is most commonly used? Korn shell Bourne Again shell Z shell Bourne shell

Bourne shell

You have installed Windows 11 on your C: drive. What is the path to the directories that hold user profiles in Windows 11? C:\Users\username C:\Users\Documents and Settings\username C:\Users\Profiles\username C:\Documents and Settings\username

C:\Users\username

With a memory module read request, there is a delay between the time of the data request and the time the data is available for output from the memory module. What is this delay called? CAS latency Clock cycle parity Frequency Capacity

CAS latency

Produces better colors than WLED (consumes more energy).

CCFL

A public library has purchased new laptop computers to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should they use to physically secure the new laptops? Cable locks Biometric authentication A multi-factor password policy An external encryption device

Cable locks

Which of the following components allows a tablet to provide a screen interface that recognizes multiple finger touches at the same time? E Ink Capacitive touchscreen Bluetooth OLED display

Capacitive touchscreen

Inkjet printers spray microscopic dots of ink with precise, controlled movement. Which of the following components carries the printhead back and forth during a print job? Stepper motor Duplexing assembly Carriage assembly Rubber rollers

Carriage assembly

What is issued to a website in order for it to be validated as a trusted website? Certificate authority DNS Extension Hash code

Certificate authority

A SOHO customer finds that their VoIP conversations frequently break up and become unintelligible. This happens most often when one person in the office streams video from the internet. Which of the following configuration changes on the SOHO router is MOST likely to improve the VoIP performance? Forward UDP ports 5060 - 5065 to the VoIP phone. Create a screened subnet and add the VoIP phone. Change DHCP to give the VoIP phone a static IP address. Change QoS settings to give VoIP traffic more priority.

Change QoS settings to give VoIP traffic more priority.

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router? Change the router's default password. Press the WPS button. Adjust the radio power levels. Disable SSID broadcast.

Change the router's default password.

Lately, your laptop shuts down before it reaches the 5% set in your Windows Power Scheme. You suspect that the power meter is incorrectly reporting the battery power level. You want to calibrate the battery to synchronize the power meter to the actual battery charge capacity. However, the laptop system does not include a calibration tool. You decide to perform a manual calibration. Which of the following is the first step you need to take when manually calibrating the battery? Change the power settings to prevent an automatic shutdown. Replace the battery with a known good battery. Charge the battery to 100%. Unplug the laptop and run it until it reaches a level below 3%.

Charge the battery to 100%.

A technician receives a notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over routers. The technician verifies the settings outlined in the notification. Which of the following actions should the technician take NEXT? Check for and apply firmware updates. Enable content filtering. Enable MAC filtering. Disable DHCP.

Check for and apply firmware updates.

Which of the following is a troubleshooting step to try when troubleshooting application conflicts? Restart services. Run System File Checker. Check for application driver updates. Rename files in Registry Editor.

Check for application driver updates.

When booting your workstation, you hear a series of audible beeps, and the system locks up. What is the FIRST step you should take when troubleshooting this issue? Check for dust buildup inside the case. Replace the motherboard battery. Disconnect non-essential peripherals and try to reboot. Check the motherboard documentation for POST errors.

Check the motherboard documentation for POST errors.

Joe has been issued a company-owned tablet. He finds that the performance decreases after a few hours of use. After he power-cycles the tablet, performance returns, but the tablet begins to slow again after an hour of use. Which of the following is the BEST action to troubleshoot the problem? Check the number of apps that are running. Reset the tablet to factory defaults. Disable wireless networking. Replace the tablet battery.

Check the number of apps that are running.

Which of the following is a web-browser based operating system? Linux Chrome OS macOS Windows

Chrome OS

Which of the following operating systems was derived from Linux? Windows Unix Chrome OS macOS

Chrome OS

First developed to store digital music. Later, it was adapted to store digital computer data.

Compact Disc (CD)

Can be written, read many times, erased, and rewritten. It has a capacity of about 650 MB.

Compact Disc-ReWritable (CD-RW)

You want to configure your computer so that a password is required before the operating system will load. What should you do? Configure an administrator password in the BIOS/UEFI. Configure chassis instruction detection. Configure a user password in the BIOS/UEFI. Require complex passwords in the Local Security Policy.

Configure a user password in the BIOS/UEFI.

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take as you implement this configuration? (Select two. Each option is part of the complete solution.) Configure the VPN connection to use MS-CHAPv2. Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection. Configure the VPN connection to use IPsec. Configure the VPN connection to use PPTP. Configure the browser to send HTTPS requests through the VPN connection.

Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.

You want to improve the performance of your virtual memory in Windows. Which of the following is a step you can take to do this? Configure the paging file to be divided between two drives. Reboot your system. Configure the paging file to have an initial size of one half the physical RAM. Install a larger CPU.

Configure the paging file to be divided between two drives.

You want to create a software RAID 1 array on your Windows 11 workstation using Disk 1 and Disk 2. What do you need to do with Disk 1 and Disk 2 before configuring them for a RAID 1 array? Convert the disks from dynamic to basic. Verify that both disks are the same size. Convert the disks from basic to dynamic. Format both disks with the same file system.

Convert the disks from basic to dynamic.

A technician has configured a client computer's network interface with server addresses to which the client will send requests for translating fully qualified domain names (FQDNs) to IP addresses and IP addresses to FQDNs. Which of the following TCP/IP suite protocols is used by the client to perform the request and also used by a server to respond to those requests? Server Message Block (SMB) Secure Shell (SSH) Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP)

Domain Name System (DNS)

Support up to 128 volumes. Support volumes that use discontiguous disk space. Store partitioning information in a hidden database on all such disks in the system.

Dynamic disks

A user has a file that contains sensitive data. Which of the following security technologies should he or she use to encrypt the single file? BitLocker Single sign-on EFS Administrative share

EFS

Which of the following security solutions would prevent you from reading a file that you did not create? VPN EFS IPSec BitLocker

EFS

Which type of contract are you typically required to accept when obtaining a proprietary software license? EULA GPL PRD DMCA

EULA

Able to dim specific regions of the screen.

Full-array WLED

Which of the following password manager features converts a password into a jumbled string of symbols and letters before storing it in the account? Hashing Extensions Two-factor authentication Cloud access

Hashing

Which of the following correctly describe the most common format for expressing IPv6 addresses? (Select two.) Hexadecimal numbers Binary numbers Decimal numbers 128 numbers, grouped using colons 32 numbers, grouped using colons

Hexadecimal numbers 32 numbers, grouped using colons

Which of the following terms describes a Windows 11 operating system patch for a desktop that targets a specific problem and is released on a short-term, periodic basis? Service pack Windows as a Service Hotfix Targeted software patch

Hotfix

Which of the following is the ONLY type of printer that can print multi-part forms that use carbon paper? Laser printer Thermal printer Impact printer Inkjet printer

Impact printer

Where in Windows can you allow an application to use the computer's location? In Settings under Update and Security(Windows 10) or Apps and features (Windows 11). In Control Panel under Programs and Features (Windows 10 and 11). In Control Panel under Security and Maintenance (Windows 10 and 11). In Settings under Privacy (Windows 10) or Privacy and security (Windows 11).

In Settings under Privacy (Windows 10) or Privacy and security (Windows 11).

You are currently running the latest version of Windows 10 on your laptop. You want to install Windows 11 to take advantage of several new features. However, you have critical data on the OS hard drive that you want to preserve while installing Windows 11. Which of the following installation methods should you use? Clean install SCCM SetupDiag In-place upgrade

In-place upgrade

Which of the following hard drive destruction methods runs the risk of releasing toxic by-products? Shredding Degaussing Drilling Incineration

Incineration

Which of the following should you do FIRST when you suspect a malware infection? Run a deep malware scan. Disable Windows System Restore. Investigate and verify the malware symptoms. Quarantine the infected system.

Investigate and verify the malware symptoms.

Which of the following is an issue with using an adblocker extension on your web browser? It can cause certain sites and browsers to no longer work on specific web pages. It can prevent you from synchronizing bookmarks from one computer to the next. It can prevent the web browser from retaining password information. It can be a security risk to your stored password information.

It can cause certain sites and browsers to no longer work on specific web pages.

What is an advantage of using scan-to-email over scan-to-folder network document scanning? It can share scanned files to the network. It supports SSL encryption. It is supported by the SMB protocol. It can transmit larger files.

It supports SSL encryption.

Which mobile device vulnerability results in a user unlocking all of a mobile device's features and capabilities? Spoofed application Developer Mode An APK signature Jailbreaking

Jailbreaking

Which scripting language is widely used for website and web page design and is also the most popular programming language in the world? Batch JavaScript Visual Basic Python

JavaScript

Which of the following issues causes variations in the latency of VoIP packets? Port flapping QoS Jitter Half duplex

Jitter

Your company has recently implemented a BYOD policy. To protect the network, users must install an app on their devices that allows the security administrator to enforce the security policies. Which of the following is this an example of? Mobile device management Certificate Manager Access control list Soft token

Mobile device management

Which utility allows you to choose Selective Startup in Windows? Regedit Performance Monitor Msconfig (System Configuration) Event Viewer Msinfo32

Msconfig (System Configuration)

After entering a user ID and password, an online banking user must enter a PIN that was sent as a text message to their mobile phone. Which of the following digital security methods is being used? Multifactor authentication DLP Smart card Firewall

Multifactor authentication

Which of the following is software that allows a user to access a computer's memory, file system, processes, and hardware? CPU RAM Operating system Application software

Operating system

A disk that uses lasers to read and write information stored in the form of pits on its reflective coating. A disk that is ideal for music and video. It is portable and cheap with a long shelf life.

Optical disc

Which of the following BEST describes the Platform as a Service (PaaS) cloud computing service model? PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. PaaS stores and provides data from a centralized location without the need for local collection and storage. PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure. PaaS delivers software applications to the client either over the internet or on a local area network.

PaaS delivers everything a developer needs to build an application on the existing cloud infrastructure.

Which of the following is a type of firewall? Packet rearranging FTP hosting Packet filtering Protocol converting Encrypting

Packet filtering

Which of the following is the Not enough USB controller resources warning most often a result of? Plugging into a USB hub. An overheated hard drive. Plugging into a 3.0 USB port. Plugging into a 2.0 USB port.

Plugging into a 3.0 USB port.

Which of the following is a common cause for high latency issues on a network? Limited connectivity A bad switch or router Malware Port flapping

Port flapping

Exhausts hot air out of the back of the case

Power supply

Which of the following components converts AC power to DC power? Surge protector Capacitor Power supply Voltage regulator

Power supply

A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him Administrator privileges. Later, Joe discovers that he has access to the salaries in the payroll database. Which of the following security practices was violated? Strong password policy Multi-factor authentication Entry control roster Principle of least privilege

Principle of least privilege

Software that allows the printer to communicate with the print device.

Print driver

Superior accuracy (most expensive type of backlighting technology).

RGB-LED

As a network administrator for your company, you want to set up a network device that manages internal traffic between servers and clients. Which of the following would BEST meet your requirements? Reverse proxy server Content filter Forward proxy server VPN

Reverse proxy server

Usually found only in high-end servers, mainframe computers, and RAID storage devices.

SCSI

Provides access to storage devices through the cloud.

STaaS

What is the role of the CMOS in a modern computer? Loads the operating system into memory. Coordinates the use of system hardware with the operating system. Saves information about system devices. Tests hardware during system startup.

Saves information about system devices.

You are troubleshooting a computer that runs Windows 11. The operating system has halted, and a black screen is displayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue? Remove all memory modules and replace them one at a time until the error reappears. Check the voltage levels on the DC side of the power supply. Uninstall the last application or system update that was installed. Search for the error in Microsoft's knowledge base or by using an internet search engine. Update the BIOS.

Search for the error in Microsoft's knowledge base or by using an internet search engine.

You work for a company that offers their services through the internet. It is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next step you need to perform in response to the security incident? Secure the affected system. Investigate how the attack occurred. Identify the issue further. Eradicate the issue.

Secure the affected system.

Which of the following can you do to disable defragmentation in Windows? Select Optimize from the Optimize Drive dialog. Then clear the Defragment drivesoption. Select Change Settings from the Optimize Drive dialog. Then clear the Run on a scheduleoption. Open Device Manager and right-click the SSD drive. Then select the Defragment driveoption. Open Device Manager, right-click the SSD drive, and select Properties. Then select the Defragment drive option.

Select Change Settings from the Optimize Drive dialog. Then clear the Run on a scheduleoption.

While creating a virtual machine, you decide to set it up to use an external network. What else do you need to do to enable the eternal network configuration? Select a NIC using the virtual switch manager. Set the RAM on the virtual machine to match the host. Configure the virtual machine to use Remote Desktop Protocol (RDP). Make sure that you are using a Type 1 hypervisor.

Select a NIC using the virtual switch manager.

Which of the following does the GPL prevent you from doing with an open-source software program? Sell a license to use the program Access its source code Modify its source code Sell a contract for technical support

Sell a license to use the program

Which of the following is an example of personal, government-issued information? Social security number Healthcare records Student records Credit score

Social security number

This event can require more memory and can cause problems if there is not enough memory when it occurs.

Software installation

An employee calls to complain that their browser keeps opening up to a strange search engine page, and a toolbar has been added to their browser. Which of the following malware issues are MOST likely causing the problem? Software issues Internet connectivity issues Internet setting issues Altered file issues

Software issues

A device that is faster than other comparable devices. It has no moving parts and lasts longer than other storage devices. A flash device with storage capacity similar to that of a small hard drive.

Solid-state drive (SSD)

You are working as a junior network technician at the local hospital. The security administrator has just finished rolling out a new security policy that requires users to log in to workstations using a fingerprint scanner. Which authentication category does this fall under? Something you are Soft token Something you know Something you have

Something you are

Which authentication category does a username and password fall under? Something you are Soft token Something you have Something you know

Something you know

A macOS user has forgotten the location of an important spreadsheet document. Which macOS feature could they use to find the spreadsheet? Spotlight Key Chain Remote Disk Mission Control

Spotlight

You are in the process of installing a motherboard in a system case. Which of the following objects should you place between the motherboard and the system case? Standoffs Passive heat sink Heat spreaders Support manual Fans

Standoffs

On a Windows workstation, you want to use the Storage Spaces feature to create a logical drive. Which of the following components are used to configure Storage Spaces? (Select three.) Storage devices, which are physical drives such as SATA drives or external drives. Mirrored data resiliency, which provides storage redundancy. Thin provisioning, which allows you to allocate more space than is available. Parity, which allows you to reconstruct data if device failure occurs. Storage pools, which are logically created from free space on storage devices. Storage space, which is a logically defined unit created from a storage pool.

Storage devices, which are physical drives such as SATA drives or external drives. Storage pools, which are logically created from free space on storage devices. Storage space, which is a logically defined unit created from a storage pool.

Which of the following defines which network a device is connected to? Host ID Network ID Protocol Subnet mask

Subnet mask

What is a VPN's primary purpose? Support secure communications over an untrusted network. Allow the use of network-attached printers. Support the distribution of public web documents. Allow remote systems to save on long-distance charges.

Support secure communications over an untrusted network.

A technician determines that an older network hub that connects 24 workstations is performing poorly due to excessive network collisions. Which of the following network devices would be the BEST replacement? Switch Bridge Router Patch panel

Switch

A company is considering providing smartphones to their employees and is investigating the interaction of the phones with iTunes, Google Drive, Dropbox, and OneDrive. Which of the following data synchronization methods is the company considering? Mutual authentication for multiple services Synchronization to the cloud Synchronization to the desktop Synchronization connection types

Synchronization to the cloud

You need to download a large file on your computer, but you are concerned about having enough space for the file. In which of the following Windows 10 Settings app categories can you find out exactly how much storage space is currently being used on your local disk? System Devices Apps Network & Internet

System

Sends a user's credentials over TCP

Terminal Access Controller Access-Control System (TACACS+)

Your system volume is running out of disk space. You need to extend the system volume to give it more space. Which of the following conditions MUST be met to extend the system volume? (Select two.) The volume must be spanned to use disk space on a different disk. The system volume must formatted with NTFS. The system volume must be on a basic disk. The disk must have contiguous free space on the same disk. The system volume must be on a dynamic disk.

The system volume must formatted with NTFS. The disk must have contiguous free space on the same disk.

Which of the following is true of Remote Assistance? Only one user is logged in at a time. It is designed to improve user productivity. The user initiates the session. The remote user initiates the session.

The user initiates the session.

In which of the following situations would you use a custom/clean installation? (Select two.) There is no operating system installed on the computer. You want to verify system compatibility. You want to install a new build over the current installation. You want to preserve the existing operating system. You want to repair Registry entries and working files. You want to upgrade while preserving data and settings.

There is no operating system installed on the computer. You want to preserve the existing operating system.

Which of the following is a characteristic of extended partitions? They are subdivided into logical drives. They can be set to active. They are bootable. There can be multiple extended partitions per drive.

They are subdivided into logical drives.

Why should you store backup media offsite? To reduce the possibility of theft. It is required by government regulations in the USA. To improve the efficiency of the restoration process. To prevent the same disaster from affecting both the system and its associated backup media.

To prevent the same disaster from affecting both the system and its associated backup media.

You are a junior network technician for a small consulting firm. Your team recently split the network into smaller subnets, one for each department. One of your users, Jaclyn in HR, is trying to access shared files from Tom's computer in the sales department. Jaclyn states she was able to previously access these files. As part of your troubleshooting, you verify that both Tom and Jaclyn can access the network printer in their departments. Which of the following would be the MOST likely reason Jaclyn is unable to access files on Tom's computer? Tom has an invalid IP address. Jaclyn has an invalid IP address. Tom and Jaclyn are no longer on the same subnet. The subnet mask has been misconfigured.

Tom and Jaclyn are no longer on the same subnet.

What type of peripheral device is typically found on a laptop computer and allows the user to control the cursor with a finger? Gamepad Scanner Mouse Touch pad Motion sensor

Touch pad

Which of the following is considered a computer input device? Hard disk Touchscreen RAM Projector

Touchscreen

Which database encryption method can you use to encrypt data at rest? Column-level encryption Trusted Platform Module Application-level encryption Transparent data encryption

Transparent data encryption

You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 11 PC to the device. Which of the following can you use to connect the device to your PC? (Select two.) Ethernet wired connection FireWire cable USB cable Wi-Fi wireless connection Serial cable

USB cable Wi-Fi wireless connection

Which type of device do you typically install a driver for before you connect the device to your system? Firewire devices Hot swappable devices USB devices Plug-and-play devices

USB devices

You've just purchased an Ethernet adapter for your Android tablet. Which of the following USB connector types would you MOST likely use to plug in to the adapter? USB-C connector Serial connector USB-B connector USB-A connector

USB-C connector

You have just finished installing Windows on a system that contains four physical hard disks. The installation process has created a system volume and a C: volume on the first disk (Disk 0). The installation process also initialized the second disk (Disk 1) and the third disk (Disk 2), but did not create any volumes on these disks. Which of the following would you expect to see as the status of Disk 1 and Disk 2? Formatting Unreadable Healthy Unavailable Unallocated Initializing

Unallocated

Indicates that errors have occurred on physical or dynamic disks.

Unavailable

Which of the following is an inherent vulnerability of embedded devices? Known environments Open systems Unknown environments Vulnerable to malware

Unknown environments

What do you call a system that has no anti-malware or firewall installed? Unpatched Compliant Unprotected End-of-life

Unprotected

What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

Untrusted

In which of the following Windows 10 Settings app categories can you find reports on your device's health? System Update & Security Devices Network & Internet

Update & Security

You are the system administrator for several Windows servers in your company. Instead of scheduling the same updates for all the Windows servers, your systems engineer would like to begin approving the updates based on specific groups of servers. In addition, the systems engineer would like you to begin checking the update logs on the servers on a regular basis to determine if and how the updates were applied. Which of the following tools would BEST help you meet the new requirements requested by the systems engineer? (Select two.) Windows Update for Business Windows Insider Program Update History Advanced Options WSUS

Update History WSUS

While browsing the internet, a pop-up browser window comes up, warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the BEST next actions to take? (Select two.) Update the virus definitions for your locally installed anti-malware software. Use an online search engine to learn how to manually remove the virus. Run a full system scan using the anti-malware software installed on your system. Click on the link provided to scan for and remove the virus. Close the pop-up window and ignore the warning.

Update the virus definitions for your locally installed anti-malware software. Run a full system scan using the anti-malware software installed on your system.

Your computer currently uses a 5,400 RPM hard disk. You want to improve your computer's overall performance by optimizing your hard disk performance. Which of the following would be the MOST effective means to optimize your hard disk performance? (Select two.) Upgrade your hard disk interface to SATA 3. Upgrade to a 10,000 RPM hard disk. Implement RAID 0 on the current hard disk. Upgrade your hard disk interface to eSATAp. Upgrade to a 7,200 RPM hard disk. Upgrade your hard disk interface to SATA 2.

Upgrade your hard disk interface to SATA 3. Upgrade to a 10,000 RPM hard disk.

Your computer has a quad-core processor installed that supports multithreading. Given that the system is running Windows, how can you BEST use Task Manager to verify whether multithreading has been enabled? Use Task Manager to report CPU utilization values up to 800%. Use Task Manager to show each application running with two processes. Use Task Manager to display CPU utilization graphs for eight processors. Use Task Manager to show a single process running on multiple processors simultaneously.

Use Task Manager to display CPU utilization graphs for eight processors.

An employee in the sales department cannot get his laptop to display through a projector. He sees the screen output on the built-in laptop display, but the video is not being displayed through the projector. Which of the following steps would be BEST to try first? Add video RAM. Replace the display. Use the fn key to redirect display to the external video port. Replace the video card. Check the backlight setting.

Use the fn key to redirect display to the external video port.

Which of the following actions should you take to BEST secure your video conferencing software? (Select two.) Use recording. Use waiting room features. Use two-factor authentication. Apply spam filters. Disable the software when not in use. Use strong passwords.

Use waiting room features. Use strong passwords.

Which of the following proxy server roles allows users to connect to the internet anonymously with their data encrypted during transmission? Caching VPN Sharing Internet Connections Firewall

VPN

While on a business trip, an employee accesses the company's internal network and transfers files using an encrypted connection. Which of the following digital security methods is the employee MOST likely using? DLP Firewall Access control list VPN

VPN

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement? Site-to-site VPN Host-to-host VPN Screened subnet VPN concentrator

VPN concentrator

A user has called to complain that her computer won't boot. It stops on the system startup screen right after the memory has been tested and displays a 301 keyboard error. Which of the following troubleshooting steps is the BEST to try first? Download and install the latest keyboard driver from the manufacturer's website. Install a new keyboard on the computer. Verify that the latest UEFI firmware updates have been applied. Verify that no keys are being pressed down during POST.

Verify that no keys are being pressed down during POST.

Your Windows 11 system powers on, but there is no image on your display. You have already checked to make sure that the monitor is connected properly to the computer, is plugged in, and is turned on. Which of the following is the BEST next step you should take to try to resolve the issue? Check the motherboard documentation for information on beeps. Verify that the BIOS/UEFI is configured to use the correct video adapter. Boot the system from the installation disc and repair the system. Use System Restore from Safe Mode to select a working restore point.

Verify that the BIOS/UEFI is configured to use the correct video adapter.

A single accessible storage area within a file system.

Volume

Which of the following tasks does Windows Storage Spaces eliminate the need for? (Select two.) Volume resizing Drive repartitioning RAID array creation Hard drive formatting Defragmentation Disk cleanup

Volume resizing Drive repartitioning

The least expensive, thinnest, and most widely used type of LCD.

WLED

Which of the following are common digital audio file types? (Select three.) AIFF PNG MOV MP4 WMA WAV JPEG

WMA WAV AIFF

Which of the following authentication methods allows you to securely connect a printer to the wireless network with the least amount of effort? WPS Open Network PSK Captive Portal

WPS

Annette has purchased a new external DVD drive to use with her PC. She inserts a DVD into the drive and, after several seconds, she receives an error message indicating that the drive is not accessible. What is the FIRST thing Annette should do to try to resolve the issue? Eject the DVD from the drive and then re-insert the DVD. Check Device Manager to make sure that the DVD drive is listed. Wait a few seconds and try accessing the DVD again. Unplug the drive from the PC and then plug the drive back in again.

Wait a few seconds and try accessing the DVD again.

Displays active sessions, ports, sockets, and the local routing table. Displays current connections and incoming and outgoing connections.

netstat

Examine the following output: 4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [205.171.205.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1] Which command produced this output? netstat tracert ping nslookup

tracert

Tests connectivity between devices and shows the routers in the path between the two devices.

tracert

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories? copy /n copy /v xcopy /e xcopy /s

xcopy /e

Which of the following Windows 11 Enterprise edition versions is specifically intended for organizations that want to use cloud-delivered endpoint security? Enterprise E3 in Microsoft 365 E3 Enterprise Enterprise E3 Enterprise E5

Enterprise E5

Which of the following is a software license that allows 100 or more activations? Public domain license General Public License Personal license Enterprise license

Enterprise license

You are sitting in a coffee shop with your laptop computer and have connected to the internet through an unrestricted Wi-Fi connection. What is this type of Wi-Fi connection called? Hotspot 802.11 standard Wireless fidelity Bluetooth

Hotspot

Which of the following hardware devices regenerates a signal out to all connected ports without examining the frame or packet contents? Hub Bridge Gateway Router Switch

Hub

Your company currently has an on-premises cloud solution that provides services to its employees. However, the company would like to begin offering some services to the public from the cloud. Which of the following cloud computing solutions would BEST meet your company's new cloud computing requirements? Community cloud Hybrid cloud Public cloud Private cloud

Hybrid cloud

Which of the following is the feed assembly on a thermal printer that is used to move the paper through the printer? Unwind spindle Paper feeder Stepper motor Rubber platen

Rubber platen

Dual-channel memory systems only theoretically double memory bandwidth. What is the bandwidth increase in actual terms? 35-50% 10-25% 5-15% 25-40%

5-15%

Which of the following BEST describes the theoretical capacity of a DDR4 standard system memory module? 512 GB 128 MB 256 GB 512 MB

512 GB

You are a junior network technician for a small consulting firm. You have recently learned about IP addressing and run the ipconfig command on your local computer. The output from the command is: IPv4 Address..... 192.168.0.52 Subnet Mask..255.255.255.0 Default Gateway..192.168.0.1 Which of the following is the host ID? 192.168.0.1 52 255.255.255 192.168.0

52

You are currently using a cellular network plan that provides maximum speeds of up to 10 Gbps for your smart phone. Which of the following cellular network types are you using? 5G 3G 4G 2G

5G

You want to build a new system that supports 16 GB of memory. Which of the following is the MOST important consideration when building the computer? 64-bit processor CAS latency ECC memory DDR3 memory

64-bit processor

You are installing a new SATA hard drive in your Windows workstation. Which of the following connectors should you use to connect your hard drive to the motherboard? 80-pin connector 40-pin connector 50-pin connector 7-pin connector

7-pin connector

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased. Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs? 802.11ac 802.11a 802.11b 802.11g

802.11ac

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions should you recommend? 802.11ac 802.11a 802.11b 802.11g

802.11g

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard works BEST in this situation? 802.11b 802.11g 802.11a 802.11n

802.11n

You want to keep an existing operating system installed on a system and deploy Windows as a separate instance on the same device, creating a multiple-boot configuration. Which installation type should you use? Clean installation Repair installation In-place installation Upgrade installation

Clean installation

Which of the following disk maintenance utilities optimizes the performance of your hard drive by joining parts of files that are in different locations into a single location? Check Disk Disk Cleanup Disk Management Disk Defragmenter

Disk Defragmenter

You have used your computer for several years, resulting in a lot of data stored on your hard disk. Lately, your computer's functions have slowed. Which of the following tools is LIKELY to help speed up your computer? chkdsk DiskPart Copy Disk Defragmenter

Disk Defragmenter

Which Windows tool can you use to determine the amount of space available to shrink a volume? Computer Management chkdsk /r chkdsk /f Disk Management

Disk Management

Which Windows tool do you use to create and delete partitions on hard drives? Device Manager Disk Management Explorer Services

Disk Management

Which of the following utilities would you use to correct cross-linked clusters within the file system on a Windows workstation? fdisk attrib DiskScan chkdsk

DiskScan

Which of the following Mac features is used to launch apps, switch between running apps, access the Trash, and access specific folders? Terminal Mission Control Spotlight Dock

Dock

Which component is designed to let you use a notebook system as a desktop system by making it possible to connect a normal-sized external mouse, keyboard, monitor, and speakers? USB ports Built-in Bluetooth Infrared wireless Docking station FireWire ports

Docking station

As the principal of a private school, you have discovered that an office assistant has shared a student's home address with an unauthorized individual. Which of the following regulations is your school in violation of? CCPA SOX HIPAA FERPA

FERPA

You want to allow your users to download files from a server running the IP protocol. You also want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability? SMTP FTP LDAP SSH TFTP SNMP

FTP

Lately, you hear a clicking noise when reading or writing data from the hard disk. What is the MOST likely cause of the clicking? Failing hard drive Failed UPS Bad memory Overheated CPU

Failing hard drive

You are using the vi editor to manage a text file on a Linux system. You want to type new text into the file. When you type, you want the existing text that comes after the cursor to be pushed down. Which mode provides this function? Text Mode Insert Mode Replace Mode Command Line Mode Command Mode

Insert Mode

Which of the following all-in-one security appliance (UTM) functions detects intrusions and alerts the network but does not block traffic? VPN Intrusion protection Intrusion detection Anti-spam

Intrusion detection

Which of the following BEST describes the purpose of a CPU socket? A CPU socket is a single connector between a microprocessor and the motherboard. A CPU socket allows the connection of external devices, such as the monitor, speakers, keyboard, and mouse. A CPU socket expands a computer's functionality, much like a video card, network card, or sound card. A CPU socket allows computer memory (RAM) to be inserted in the computer.

A CPU socket is a single connector between a microprocessor and the motherboard.

What is a disadvantage of using a DVD-R DL (Dual Layer) disc over an ordinary DVD? A DVD-R DL has to skip across the disc to find the next track. A DVD-R DL stores less data. A DVD-R DL is not backwards-compatible with a regular DVD player. A DVD-R DL has slower write speeds.

A DVD-R DL has slower write speeds.

Which of the following BEST describes the Blue Screen of Death (BSoD)? A Windows stop error. A time drift error. A No operating system found error. A Not enough USB controller resourceswarning.

A Windows stop error.

Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two.) Greater cable distances without a repeater Faster installation Immunity to EMI Increased flexibility Lower installation cost

Greater cable distances without a repeater Immunity to EMI

What is a major benefit STP provides that UTP does not? Greater resistance to interference Ability to install longer cable lengths Lower cost Safer for installations in overhead ceiling spaces

Greater resistance to interference

Which of the following is true of groups on a Windows system? Group members have the access rights that are assigned to the group. A group allows multiple users to share a single logon. Users and local resources, such as printers and shared folders, can be made members of a group. Users can log on as the group and have all the assigned access rights.

Group members have the access rights that are assigned to the group.

What is another name for virtual machines? Sandbox Guest operating systems Hypervisors Host machines

Guest operating systems

The CEO of your small company has asked you to connect a laptop computer to the small conference room LED TV. The CEO will be showing a promotional video that demonstrates the new company strategy through images and sound. Which of the following cable types would work BEST for connecting the laptop to the display? Composite VGA DVI HDMI

HDMI

A technician wants to connect a computer to a high-definition television (HDTV). The technician has attached an HDMI cable from the video card to the television. However, the video card is only sending a video signal over the cable. The technician decides to use the audio pass-through technique to deliver audio to the television. An audio output cable is connected to the video card and television. Which of the following options was used for the audio pass-through? HDCP DirectX/OpenGL HDMI output Multi-GPU

HDMI output

You have accepted a position working in a local hospital's IT department. Which of the following government regulations would be the most important for the hospital to be in compliance with? PCI DSS GDPR FERPA HIPAA

HIPAA

Which of the following is a magnetic storage device? DVD Flash device Hard disk Solid-state drive

Hard disk

Which storage device uses aluminum platters for storing data? SD card DLT tape Hard disk DVD disc CD-ROM disc

Hard disk

You need a storage device that has a very large storage capacity, is fast, and is relatively inexpensive. Which storage device would BEST suit your needs? Hard disk Optical USB flash drive SSD

Hard disk

A thick magnetic disk made of aluminum platters. Uses read/write heads to access data stored on the platters. A device that provides up to several terabytes of storage capacity and whose cost per megabyte is very low.

Hard disk drive (HDD)

Which of the following statements is true regarding hard tokens? Hard tokens are easy to replace if they are lost or stolen. Hard tokens are inexpensive to implement. Hard tokens provide a higher level of security. Hard tokens provide protection even if they are lost or stolen.

Hard tokens provide a higher level of security.

What is the correct order for installing a processor for proper cooling? CPU, heat sink, thermal paste, fan Thermal paste, CPU, heat sink, fan CPU, thermal paste, heat sink, fan Heat sink, CPU, thermal paste, fan

CPU, thermal paste, heat sink, fan

Which of the following functions are performed by proxy servers? (Select two.) Block unwanted packets from entering your private network. Cache web pages. Filter unwanted email. Block employees from accessing certain websites. Store client files.

Cache web pages. Block employees from accessing certain websites.

Which of the following proxy server roles stores frequently accesses data so that a user's request never has to leave the network for retrieval? Sharing Internet Connections Caching Firewall VPN

Caching

You are configuring a new system, and you want to use a RAID 0 array for the operating system using SATA disks and a special controller card that includes a RAID processor. Which RAID method should you use? Software Operating system JBOD Hardware

Hardware

Incompletely or improperly doing this can cause errors that appear to be memory-related.

Hardware installation or removal

Which of the following locations will contribute the greatest amount of interference to a wireless access point? (Select two.) The top floor of a two-story building Near backup generators Near cordless phones Near exterior walls Near DCHP servers

Near backup generators Near cordless phones

Google Cloud, Amazon Web Services, and Microsoft Azure are some of the most widely used cloud storage solutions for enterprises. Which of the following factors prompt companies to take advantage of cloud storage? (Select two.) Need for a storage provider to manage access control Need for a platform to develop applications Need for software to manage enterprise applications Need to bring costs down Growing demand for storage

Need to bring costs down Growing demand for storage

You are setting up a network for your company and need to know the MAC address and IP address for a Windows computer. Under which of the following categories in the Windows 10 Settings app can you find both the MAC address and the IP address? Accounts System Network & Internet Devices

Network & Internet

Jessica is concerned about losing data due to a hard disk failure. Her computer will only support a maximum of three disks. To protect her data, she has decided to use RAID (Redundant Array of Independent Disks). Which of the following RAID types would give Jessica the BEST mirrored data protection? RAID 0 RAID 1 RAID 5 RAID 10

RAID 1

One of your customers wants you to build a personal server that he can use in his home. One of his concerns is making sure that he has at least one data backup stored on the server in the event that a disk fails. You have decided to back up his data using RAID. Since this server is for personal use only, the customer wants to keep costs down. Therefore, he would like to keep the number of drives to a minimum. Which of the following RAID systems would BEST meet the customer's specifications? RAID 0 RAID 1 RAID 5 RAID 10

RAID 1

Which of the following is the most common disk interface used for optical drives on home and office computers? SCSI IDE/EIDE (ATAPI) SATA Sound card (proprietary) Parallel port

SATA

Which generation of SATA storage devices supports up to 6-Gbps data transfer rates and addresses solid-state drives? SATA1 SATA2 eSATA SATA3 eSATAp

SATA3

Windows features a storage solution called Storage Spaces. What is the name of the Storage Spaces feature that allows you to allocate space for redundant information using options that include two-way mirroring, three-way mirroring, and parity?

data resiliency

Which of the following Windows command line utilities would you use to realign the file structure on a disk to optimize performance? defrag Disk Management fdisk chkdsk

defrag

Which of the following commands would you run on a Linux system to find out how much disk space is being used on each of the file systems? umount fsck df -h ls -R

df -h

You want a storage device that has the ability to: Integrate data and device power into a single cable. Use a connector and port that is neither L-shaped nor rectangular. Which of the following SATA devices is the BEST for these conditions? SATA3 SATA2 eSATAp eSATA SATA1

eSATAp

After installing a new SSD drive on your Windows 11 system, you determine that the TRIM functionality has not been automatically enabled on the drive by the Windows operating system. You need to manually turn on TRIM from a Command Prompt. The drive's volume has been assigned a drive letter of E:. Which of the following commands MUST you use to enable this feature? fsutil behavior set DisableDeleteNotify 0 bootrec /rebuildbcd fsutil behavior set DisableDeleteNotify 0 E: fsutil behavior set DisableDeleteNotify chkdsk E: /R

fsutil behavior set DisableDeleteNotify 0

A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process? ls sudo cd grep

grep

You are the IT technician for your company. Which of the following mechanisms would BEST allow you to resolve a hostname to its associated IP address? (Select two.) FTP hosts file DNS DHCP BOOTP

hosts file DNS

What would you enter at the Command Prompt on a Linux system to display the IP addresses and subnet masks that are assigned to each network interface?

ip

You are troubleshooting network connectivity issues on a Windows workstation. Which command would you use to view the network adapter's MAC address? nslookup ipconfig /all netstat ping ipconfig

ipconfig /all

While working on a Linux system that has been underperforming, you notice that there is one process that is utilizing a significant amount of CPU time. The name of the process is "hidden.sh". Which of the following ps commands would you use to ensure that you can see who owns that process? ps -ef ps aux ps -el ps ax

ps aux

What would you enter at the shell prompt on a Linux system to display the present working directory?

pwd

You need to duplicate a large number of files from your PC to a network server. Due to the number of files, you start the process and go home for the evening. When you return the next day, you find that only part of the files were duplicated to the server due to the router being temporarily unplugged by the janitor while cleaning. Which of the following Windows command line tools would BEST prevent this type of glitch from happening again? robocopy xcopy copy teracopy

robocopy

You would like to completely shut down a system 10 minutes after notifying all users of your intent. Which of the following commands should you enter at the shell prompt? shutdown -r +10 message shutdown 10 -h message shutdown -p 10 message shutdown -h +10 message

shutdown -h +10 message

You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the Command Prompt that will, by default, switch you to the root user and require you to enter the root password?

su -

Frank is running a program called FrameMaker on his Windows computer. While trying to import graphics into this program, he sees a spinning wheel for a long time. When Frank clicks on the application, a message is displayed that indicates that the application is not responding. Which of the following Microsoft command line tools can BEST shut down the application? shutdown exit del taskkill

taskkill

Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does not go away. What is the MOST likely problem? The photosensitive drum is wearing out. The corona wire is dirty. The fuser assembly is damaged. The paper is poor quality.

The corona wire is dirty.

Your company's graphic designers were given laptop computers several months ago. The laptops have a 500-GB SSD drive for the operating system and applications and a 1-TB hard drive for storing media files. Now, a few of the graphic designers are complaining about slow performance on their SSD drives. What is the MOST likely cause of the slow performance? The file system is not optimized for SSD. The SSD's firmware needs to be updated. The SATA connection is older and has a slower transfer speed. The designers are storing media files on the SSD drive.

The designers are storing media files on the SSD drive.

You are installing an updated driver for a hardware device on your system. A dialog box pops up, indicating that Microsoft has digitally signed the driver. What does a digitally signed driver indicate? (Select two.) The driver has been tested by Microsoft. The driver being installed is compatible with 32- and 64-bit versions of Windows. The driver will not interfere with other devices on the system. The driver file has not been altered. The driver being installed is the most recent driver available.

The driver has been tested by Microsoft. The driver file has not been altered.

Which aspects of virtual memory can you configure on a Windows workstation? (Select two.) The paging file's location The minimum time between memory swap operations The paging file's maximum size The maximum time between memory swap operations The paging file's recommended size

The paging file's location The paging file's maximum size

For several years, your laptop's monitor has worked perfectly. However, shortly after turning on your laptop today, you notice that the dimness has increased on the screen. Which of the following is the MOST likely cause? (Select two.) The monitor's resolution was automatically reset to the default settings. The power adapter was accidently unplugged. The monitor's hertz rate is set too high. The brightness level was automatically reset to the default settings. The monitor's inverter has gone bad.

The power adapter was accidently unplugged. The monitor's inverter has gone bad.

Which command would you enter at the shell prompt to start a new Bourne-Again Shell (Bash) session?

bash

You are troubleshooting a Windows 11 system that won't boot. The system appears to initialize just fine, and POST completes correctly. However, Windows does not load, and an error message is displayed on the screen, indicating that the operating system is not found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you perform the following steps: Boot the system from the Windows 11 installation DVD. Access the Recovery Environment. Open a Command Prompt window. Enter the command that you should run at the Command Prompt to address this issue.

bootrec /fixmbr

You need to view detailed IP configuration information on your Windows workstation. In addition to the IP address, subnet mask, and default gateway configuration, you need to see the network card's MAC address and the addresses of the DHCP and DNS servers the workstation is communicating with. Which command would you enter at the command line to see this detailed information?

ipconfig /all

Which of the following IP addresses are Class B addresses? (Select three.) 115.33.0.0 224.15.55.2 190.65.2.0 64.2.2.64 195.155.0.0 129.0.0.0 132.12.0.0

190.65.2.0 129.0.0.0 132.12.0.0

A portion of the hard disk that cannot be used.

Bad sector

Which of the following are examples of a strong password? (Select two.) Morganstern I love the Linux P3ngu!n Tux skippy NewYorkCity il0ve2EatIceCr3am!

I love the Linux P3ngu!n Tux il0ve2EatIceCr3am!

An older technology where the cable connects to the motherboard and two devices.

IDE

The memory is incompatible and was not installed and configured properly.

Memory upgrade

Which printer management feature would you use to view the drivers that a printer uses? Print Server Properties Print spooling service Printer Properties Print queue

Printer Properties

Which operating system uses the Time Machine backup program? Android Linux macOS Windows

macOS

Provides network connectivity through the cloud.

NaaS

You need to install a 32-bit application on a 64-bit version of Windows 11. In which default directory will the application be installed? %systemdrive%\Program Files (x86) %systemdrive%\Applications (32-bit) %systemdrive%\Applications %systemdrive%\Program Files

%systemdrive%\Program Files (x86)

You have a small home network that uses 192.168.1.0 with the default subnet mask for the network address. The default gateway address is 192.168.1.254, and the router is providing DHCP on the network. The Wrk2 computer has been assigned the IP address of 192.168.1.55. Which of the following is considered the loopback address for the Wrk2 computer? 192.168.1.254 127.0.0.1 192.168.1.255 192.168.1.55 192.168.1.0

127.0.0.1

You have an older computer that has four DDR2 memory slots. Currently, there are two 512-MB memory modules installed. You check the motherboard documentation and find that the system has a 4-GB memory limitation. You want to add more memory to this system. What is the maximum total amount of usable RAM you can have in this system by adding new memory modules (and without replacing the existing memory modules)? 4 GB 3.5 GB 1.5 GB 3 GB 2 GB 4.5 GB

3 GB

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol? 80 143 443 3389

3389

The contrast on your projector's output is not displaying properly. In addition, the images continually flicker. What is the MOST likely cause of the projector's display problems? The high-definition files are not in sync with the audio files. A bulb is close to burning out. The wrong cable is connected to the HDMI port. An outdated projector driver is in operation.

A bulb is close to burning out.

A computer's power supply converts main AC to low-voltage regulated DC power for the internal components. You are building a new computer, and you are deciding which type of power supply to install. Which of the following definitions BEST describes a valid type of power supply? A single-rail power supply provides one rail (PCB trace) to provide the best safety mechanism for the computer by having a single point of shutdown in the event of a short circuit. A single-rail power supply provides one rail (PCB trace) to always provide equal wattage to all the devices attached to the power supply. A dual-rail power supply provides separate rails (PCB traces) to provide equal wattage to the devices attached to each rail. A dual-rail power supply provides separate rails (PCB traces) to balance the power load between multiple circuits (this prevents any one circuit from becoming overloaded).

A dual-rail power supply provides separate rails (PCB traces) to balance the power load between multiple circuits (this prevents any one circuit from becoming overloaded).

A clicking noise in your computer has now evolved into a grinding noise. In addition, you are beginning to see frequent error messages while running software, and your computer occasionally freezes. What is the MOST likely cause of these issues? A failing RAM card A failing hard drive A failing video card A failing internal fan

A failing hard drive

Which of the following describes the grandfather backup in a grandfather-father-son (GFS) rotation scheme? A full backup that is stored onsite. A full backup that is stored offsite. An incremental backup that is stored offsite. An incremental backup that is stored onsite.

A full backup that is stored offsite.

Ida, one of the employees in the sales department, needs a way to display her PowerPoint sales presentation to a large group of potential customers. She has asked you to set up the conference room in preparation for her presentation. You will need to purchase a display system for the conference room. Which of the following display systems would be the BEST to purchase? A large LCD monitor A large plasma monitor A large OLED monitor A large screen and a projector

A large screen and a projector

You have connected your printer directly to your Windows workstation with a USB cable. Which type of printer have you set up? A web-enabled printer A local printer A network printer A shared printer

A local printer

You connect your computer to a wireless network available at the local library. You find that you cannot access several websites on the internet. Which of the following is the MOST likely cause of this problem? A proxy server is filtering access to websites. A firewall is blocking ports 80 and 443. The router has not been configured to perform port forwarding. Port triggering is redirecting traffic to the wrong IP address.

A proxy server is filtering access to websites.

A manufacturing company has customized a computer application that supervisors use to track line worker efficiency. Supervisors will interact with the application while walking within and between work areas and will also use the laptop while sitting at their desks. Which of the following laptop features will BEST minimize the awkward movement of carrying a bulky laptop with a hinged display while providing the flexibility to use the device at a desk? A touchscreen display A laptop docking station Special function keys A rotating or removable screen

A rotating or removable screen

When assisting users, a technician often uses the macOS Force Quit function and the Linux kill command. Which of the following situations would require their use? A runaway application does not respond to user input. A remote desktop connection needs to be closed. The operating system needs to be rebooted. A user accidently sends a large job to a printer.

A runaway application does not respond to user input.

Most operating systems have a GUI as part of their system. Which of the following BEST describes an operating system's GUI? A user-friendly interface that uses icons and visual components to interact with the system. An important component of a computer that is used to store data and machine code while in use. The microprocessor's program that starts the system up after the computer is powered on. The primary component of a computer that retrieves, processes, and executes instructions.

A user-friendly interface that uses icons and visual components to interact with the system.

You are the owner of a small startup company that consists of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing and internet, printer, and local network resource access. Which of the following would be the BEST implementation for your business? A workgroup A domain A tree A forest

A workgroup

Which Blu-ray standard defines rewritable discs? BD-RE BD-ROM BD-R/RW BD-R

BD-RE

Which of the following provides a set of rules that specify which types of network traffic are allowed through a firewall? Packet filtering Circuit-layer gateway ACL Application-level gateway

ACL

What does Windows 11 do when you log in with an administrator account with elevated privileges? Assign you a unique administrator token. Notify you that you have administrative privileges. Use your credentials to assign you administrative privileges. Assign you a user and an administrator token.

Assign you a user and an administrator token.

A dedicated bus type used by dedicated video cards.

AGP

Attaches to the motherboard to allow additional cards to be installed.

AMR

Which type of file is commonly used by trusted websites to create installation software for mobile devices? APK file SYS file BAT file EXE file

APK file

You are working as a junior technician for a small consulting firm. You have been tasked with installing a new computer on the network. You have performed this task and connected the computer to the network. To verify network connectivity, you decide to ping the network server. Before this can happen, the new device needs to know the MAC address of the network server so it can match it to the IP address. The computer sends a broadcast message, asking who has the IP address. The network server responds with its MAC address, and now the computer can communicate with the server. Which protocol is being used when sending the broadcast message to match the MAC address to the IP address? ICMP IP ARP HTTP

ARP

When a user rotates a mobile device, the operating system changes the screen orientation so that the display remains upright for the user. Which of the following technologies detects this movement on a mobile device? (Select two.) Wi-Fi GPS Accelerometer Gyroscope Geotracking

Accelerometer Gyroscope

Which of the following does Windows use to manage and enforce what a user is authorized to access? Soft token Certificate Manager Multi-factor authentication Access control list

Access control list

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge. Which of the following security measures would you MOST likely implement to keep this from happening in the future? Access control vestibule Cable locks Door locks with card readers Lo-jack recovery service

Access control vestibule

As with other programming languages, improper structure, syntax, or systems testing can cause scripts to negatively impact a machine. Which of the following are common problems that can be introduced into a system or network with a script? (Select two.) Beeps upon startup Strange characters on a printed page Accidentally changed system settings Black (or Blue) Screen of Death Unintentional introduction of malware

Accidentally changed system settings Unintentional introduction of malware

You want to upgrade your Windows 10 Professional computer to Windows 11 Professional. You begin by checking the hardware and discover that it has 2 GB of RAM, a 2.0 GHz dual-core processor, a 256 GB solid-state drive, and a video adapter with 128 MB of RAM and DirectX 12 support. You want to install the 64-bit version of Windows 11. What should you do? Upgrade the video adapter. Install a larger solid-state drive or hard drive. Upgrade to a faster processor. Upgrade to a processor with at least four cores. Add more memory.

Add more memory.

Which tool would you use to configure the paging file location and size on a Windows system? Administrative Tools in Control Panel Hardware and Sound in Control Panel Clock, Language, and Region in Control Panel Advanced System Settings in Control Panel

Advanced System Settings in Control Panel

While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches that you have performed. Which of the following is this an example of? Grayware Worm Adware Trojan

Adware

Joe, a frequent visitor to a branch office, attempts to connect his tablet to the office wireless network, but is unable to connect to the internet, even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot, but is still unable to connect to the internet. Which of the following is the MOST likely cause of this issue? Airplane Mode has been set on his tablet. MAC filtering has been enabled on the branch office wireless access point. Joe's tablet has been configured with full device encryption. The connection between the branch office router and internet service provider is down.

Airplane Mode has been set on his tablet.

Which of the following accurately describes a hypervisor? (Select two.) Allows virtual machines to interact directly with the hardware. Manages access to software programs on the host. Controls the number of virtual machines a host can accommodate. Allocates the storage space for a virtual machine. A layer of software that resides between the virtual operating system and the hardware.

Allows virtual machines to interact directly with the hardware. A layer of software that resides between the virtual operating system and the hardware.

As the director of procurement for your company's Sales department, you are working with the IT manager and CIO to determine the technical requirements for purchasing new laptops for your sales representatives. The sales representatives often store a significant number of multimedia files (such as videos) on their laptops, which they use for customer education and demonstration purposes. They also want to boot their Windows operating system quickly. What would be the BEST price-performance purchasing decision when it comes to providing storage media for the new laptops for the sales representatives (based on their requests)? An SSD for both the operating system and the multimedia files. An HDD for both the operating system and multimedia files. An SSD for the operating system and an HDD for storing multimedia files. An HDD for the operating system with an external SSD for the multimedia files.

An SSD for the operating system and an HDD for storing multimedia files.

You are in the process of purchasing several new Windows-based computers to replace broken or outdated computers. You have heard that solid-state drives (SSDs) can significantly increase systems' overall performance. Which of the following BEST describe the features of solid-state drives (SSDs) compared to hard disk drives (HDDs)? (Select two.) SSD spindles move at a faster rate than those of an HDD. An SSD cheaply stores a large amount of data. An SSD opens files faster than an HDD. An SSD uses flash technology to store data. An SSD can be adversely affected by magnetism.

An SSD opens files faster than an HDD. An SSD uses flash technology to store data.

After working without problems for a couple of years, your computer has begun to lock up. You suspect that it is a thermal issue, but you can't find any component that is not functioning correctly. You have not replaced the CPU or installed any new devices. The CPU cooling fan and the power supply fan are working properly. The lock-ups are happening with increasing frequency. Which of the following is the MOST common condition that explains these symptoms? An accumulation of dust has gradually built up. The BIOS has never been flashed and has gotten more and more out of date. The internal temperature sensor is beginning to malfunction intermittently. The power supply has been switched to the wrong voltage setting.

An accumulation of dust has gradually built up.

Which of the following BEST describes a scripting language? The process of organizing commands and structures into a script. A popular method of scripting based on the Bourne shell. A text file with commands and structures. An interpreted programming language used to write scripts.

An interpreted programming language used to write scripts.

One of your users suspects that the battery in their laptop computer is failing. You test it by using a known good power adapter long enough to receive a full charge. The battery reads that it is fully charged in Windows. You then disconnect the laptop from its power source and wait to see how long the battery lasts. The battery dies after only about 15 minutes. Which of the following actions will MOST likely fix this problem? Assume that the battery is failing and replace it. Calibrate the battery to synchronize the power meter to the actual charge capacity of the battery. Put the battery in another laptop to verify that it is, in fact, the battery that is failing. Configure the Power Scheme settings to minimize battery usage.

Assume that the battery is failing and replace it.

Which of the following types of Blue-ray Discs can hold up to 100 GB of data? Triple-layer Quadruple-layer Dual-layer Single-layer

Triple-layer

While running a graphics editing program on your Windows workstation, a screen suddenly pops up with an error message warning. You note the error message, but the only way to continue working is to reboot your system. What is this type of error screen called? BSoD POST SPoD HVAC

BSoD

Joe, a mobile device user, is allowed to connect his personally owned tablet to a company's network. Which of the following policies defines how company data is protected on Joe's tablet? Device Encryption Policy Trusted Sources Policy BYOD Policy Remote Backup Policy

BYOD Policy

To improve system performance, you have configured a motherboard to run with a higher multiplier than what the CPU is specified to use. Since doing this, the system has become unstable and crashes frequently. Which of the following should you do to restore system stability? Make sure the BIOS firmware supports the overclocking settings you're using. Back off on the overclocking settings until the system runs in a stable manner. Make sure the switch on the power supply is set to the correct voltage. Replace the CMOS battery to make sure that the real-time clock has the correct time.

Back off on the overclocking settings until the system runs in a stable manner.

You have just received a frantic call from a customer. She informs you that after turning her computer on, she received the following error: The SMART hard disk check has detected an imminent failure. Which of the following is the best FIRST step to take? Correct the bad areas on the drive using chkdsk. Run a hard drive test to verify the hard disk's condition. (It may be a false error.) Run a reliable defragmentation tool. Back up all important data and files.

Back up all important data and files.

Which of the following is an important aspect of evidence gathering in response to a security incident? Restore damaged data from backup media. Purge transaction logs. Back up all log files and audit trails. Monitor user access to compromised systems.

Back up all log files and audit trails.

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 11. She is concerned that she may accidently delete a personal file or that her primary hard disk may fail at some future time, causing her to lose her personal files. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would BEST protect Lily's files? Create a network share to which Lily can copy her files. Back up her files using File History. Configure scheduled disk maintenance. Purchase a third-party backup software program.

Back up her files using File History.

What tool can you use to create a full system image of your Windows drive? System Repair Backup and Restore Recovery drive Windows Installation Media

Backup and Restore

Which of the following indicates that a drive is unavailable when you check the status of a hard drive? Bad Failed Caution Uncertain Down

Bad Down

You need to use a common USB flash drive to transport important sensitive information for your organization. Which of the following would be the BEST program for protecting the data on the flash drive with encryption? EFS BitLocker To Go BitLocker Microsoft Defender

BitLocker To Go

Which of the following devices would you add to a computer if you needed to take inventory at a retail store by scanning the UPC symbols on products? Scanner Trackball Touch screen Bar code reader

Bar code reader

When Linus Torvalds first released Linux version 0.02 in 1991, which utilities were included in the release? (Select three.) File server Bash shell Update utility Print server GCC compiler system Database server Web server

Bash shell Update utility GCC compiler system

Use primary and extended partitions. Only support volumes made up of contiguous disk space. Are supported by all operating systems.

Basic disks

Which of the following scripting languages includes multiple Windows commands that are run in sequence? Python JavaScript Shells Batch

Batch

A user has configured their mobile device to unlock with facial recognition. Which of the following methods for securing the mobile device is being used? Biometric authentication Antivirus application Locator application Trusted source

Biometric authentication

Which of the following devices authenticates users based on their physical features? Biometric scanner VR headset Barcode reader NFC device

Biometric scanner

Which Windows feature can you use to encrypt a hard drive volume? BitLocker EFS BitLocker to Go NTFS

BitLocker

Which of the following is true of the Windows BitLocker program? BitLocker is designed to protect files against offline and online access. BitLocker is designed for use on the Home version of Windows 10 and later. BitLocker is designed to encrypt individual files. BitLocker is designed to protect files against offline access only.

BitLocker is designed to protect files against offline access only.

When you arrive at your company, you discover that a hard drive with your customers' sensitive information has been stolen. You feel confident that the thief will not be able to view the data on the hard drive because you had previously taken security precautions to protect the data in case the hard drive was stolen. Which of the following precautions is the MOST likely solution you used to protect the data on the hard drive? BitLocker To Go Microsoft Defender BitLocker with TPM Windows Security

BitLocker with TPM

You have just purchased a smart watch to track your fitness statistics and health. To change the interface or update the firmware, you need to use an app on your smartphone. Which of the following connection technologies will you MOST likely use to communicate between your watch and the app? USB cable Bluetooth Wi-Fi E Ink

Bluetooth

You need a type of wireless connection that can transfer data between your phone, PDA, and laptop. You are transferring sensitive information. Which of the following is the BEST choice for this wireless connection? Cellular WAN Wireless Ethernet Infrared Bluetooth

Bluetooth

You want to be able to use a high-quality, noise-cancelling headset with your mobile phone to make conference calls and to listen to music. However, your new mobile phone does not have an earphone jack. Which of the following technologies allows you to wirelessly connect your headset to your new phone? USB Bluetooth MicroSD Docking station

Bluetooth

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions for the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission for the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file? Bob can find the file in a search, but he cannot open the file. Bob can open and read the file, but he cannot write changes to the file. Bob has Full Access to the file and can open, read, write, delete, and change permissions on the file. Bob cannot search for or open the file. Bob can open, read, and write changes to the file.

Bob can open, read, and write changes to the file.

A technician is tasked with installing the Windows OS on a macOS computer so that the computer can boot to either macOS or the Windows OS. Which macOS feature should the technician use to complete this task? Finder Keychain Boot Camp Disk Utility

Boot Camp

You experience startup errors after you install a new device. What should you do FIRST to resolve the issue? Boot in Safe Mode and roll back the driver. Boot in Safe Mode and disable all unnecessary devices. Disable automatic restart. Recover the system image.

Boot in Safe Mode and roll back the driver.

While trying to start your Windows 11 system, you see the following error message: Could not read from the selected boot disk. Check boot path and disk hardware. Which of the following will MOST likely fix the problem? Boot into the recovery console and run the bootcfg /rebuild command. Boot into the recovery environment and run the bootrec /rebuildbcd command. Boot into the recovery console and copy the NTLDR file to the boot volume. Boot into the recovery console and run the fixmbr command on the boot volume. Boot into Safe Mode and restore to a restore point.

Boot into the recovery environment and run the bootrec /rebuildbcd command.

Rodney, an employee in the Research Department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot, and now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent him from using the TV until you can install an updated driver. What should you do? Reboot the system and select Safe Mode. Edit the properties of the TV tuner driver in Device Manager and select Roll Back Driver. Use the Reset This PC option in the Settings app. Re-install Windows from the installation disc. Boot the system from a Windows installation disc and select the Startup Repair option. Boot the system in Safe Mode. Disable the TV tuner driver in Device Manager.

Boot the system in Safe Mode. Disable the TV tuner driver in Device Manager.

You have decided to install a new Ethernet network adapter in your Windows 11 desktop computer. After installing the card and booting to Windows, you notice that you have no network connection. After looking in Device Manager, you see that the new network card was detected, but Windows doesn't know what it is. After doing a quick search on the internet, you find what looks like the correct driver and install it. A reboot of Windows is performed, but almost immediately after logging on, your computer crashes. Thinking this must be a fluke, you reboot again with the same result. Which of the following is the BEST method in this scenario to get Windows to load properly? Boot from the Windows installation DVD and run Start-up Repair. Boot from the Windows installation DVD and restore your computer back to a previous restore point. Boot to the computer's BIOS/UEFI settings and uninstall the network driver. Boot to Safe Mode and uninstall the network driver.

Boot to Safe Mode and uninstall the network driver.

You have just created an account for your web browser, and you want to be able to access the bookmarks you create on your home laptop with the same web browser on your company workstation. Which of the following can you use to make these bookmarks accessible on both computers? Private Browsing Mode Browser synchronization Pop-up blocker Data cache clearing

Browser synchronization

You work as the IT administrator for a small corporate network. Sam, an employee in the support department, wants to run a virtual machine on his computer for troubleshooting customer issues, and he needs a very stable computer from which to work. You need to decide whether to install buffered or non-buffered RAM in his computer. Which of the following BEST describes the reason to choose buffered instead of unbuffered memory for this new computer? Buffered memory is faster and less expensive. Buffered memory reduces the load on the memory controller and allows the system to be more stable. Buffered memory reduces the load on the memory controller, but due to the extra clock cycle, is less stable. Buffered memory increases the load on the memory controller, but is faster and more stable.

Buffered memory reduces the load on the memory controller and allows the system to be more stable.

You have a friend who is offering to sell the monitor and video card from his gaming system along with several PC games. The games have fast-moving graphics, and you want to be able to play them on your own home system. The monitor he is selling is an LCD TN with a 144-Hz refresh rate. The video card he is selling supports a max refresh rate of 144 Hz. You're sure you want to buy the games, but you have a couple of other choices when it comes to the monitor and the video card. The monitor in your current system has a 60-Hz refresh rate. The video card has a max refresh rate of 75 Hz. This configuration has always worked fine for watching videos. You're also looking at new 60-Hz LCD IPS monitors and several high-end video cards with max refresh rates of up to 240 Hz. Which of the following will MOST likely allow you to play the games on your home system with the best gaming experience possible? Buy the games and use your existing card and monitor. Buy the games from your friend and spend some extra money on the newer 60-Hz LCD IPS monitor and one of the newer 240-FPS video cards. Swap out both your video card and monitor. Buy your friend's games, monitor, and video card. Swap out both your video card and monitor. Buy the games and the monitor from your friend. Swap out just your current monitor, and use your existing video card.

Buy your friend's games, monitor, and video card. Swap out both your video card and monitor.

Inkjet printers are popular for small businesses because they provide good quality printouts. However, fuzzy lines can appear in artwork, or colored areas in images can sometimes start and stop before they should. Which of the following should you do when this happens? Replace the ink supply Clean the printhead Clear the paper jam Calibrate the printer

Calibrate the printer

Which of the following are features of the Windows taskbar component? (Select two.) Provides options to personalize your news feed and interests. Includes a search field for quick location of applications. Can be moved to the left or left-centered on the screen. Can be hidden. Displays breadcrumb navigation when accessing components.

Can be moved to the left or left-centered on the screen. Can be hidden.

What should be created when you destroy a hard drive? Certificate of Destruction Outsourcing Record Chain of Custody Record of Format

Certificate of Destruction

Which of the following identifies who had possession of a hard drive and for how long before it was actually destroyed? Record of Format Chain of Custody Certificate of Destruction Outsourcing Record

Chain of Custody

As part of the response to a security incident on your company network, you have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up to the time of presentation in court. Which document have been asked to draft? CPS (Certificate Practice Statement) Rules of evidence FIPS-140 Chain of custody

Chain of custody

You have purchased a 1600 x 1200 LCD monitor and connected it to the DVI-I port on your computer using a DVI-D cable. You configure the screen resolution at 1280 x 1024 with 24-bit color. The display output seems to be fuzzy and stretched. Which of the following BEST describes the action you should take to correct the problem? Change the screen resolution to the native resolution of the monitor. Replace the DVI-D cable with a DVI-I cable. Replace the DVI-I cable with a DVI-A cable. Increase the color depth to 32-bit.

Change the screen resolution to the native resolution of the monitor.

You have purchased an LED monitor and connected it to the DVI-I port on your computer using a DVI-D cable. You configure the screen resolution to 1440 x 900 with 32-bit color. The display on the screen seems to be pixilated. Which of the following solutions is MOST likely to fix this problem? Replace the DVI-I cable with a DVI-A cable. Decrease the color depth to 24-bit. Replace the DVI-D cable with a DVI-I cable. Change the screen resolution to 1600 X 1200. Change the screen resolution to the native resolution of the monitor.

Change the screen resolution to the native resolution of the monitor.

Which of the following are likely symptoms of a malware infection? (Select two.) Cookies placed by a recently visited website. Receipts of phishing emails in your inbox. Changed file permissions. Renamed system files. Operating system updates that were installed without your knowledge.

Changed file permissions. Renamed system files.

You have just purchased a new plug-and-play sound card on your Windows workstation that uses a PCI slot. You've updated the sound card driver and installed the apps that came with the card. You decide to play some songs located on your hard drive using a third-party app that you've installed. However, there is no sound coming out of your headphones or speakers. You've checked the Sound applet and the Sound Properties dialog from Control Panel and the volume settings to make sure the settings are correct. You've also tried playing a few system sound files on your workstation, as well as YouTube videos, and the sound is coming through the headphones and speakers. What should you do next to try and resolve the issue? Check the BIOS to make sure the sound card is selected (instead of the onboard sound card). Check to make sure the sound card is seated correctly. Check to make sure the workstation is not experiencing EMI. Check System Information to make sure the correct codec is installed for your song file format.

Check System Information to make sure the correct codec is installed for your song file format.

You have just finished upgrading the CPU in your desktop system. After running the system for about 10 minutes, the system locks up and automatically restarts. Which of the following is the BEST first steps in troubleshooting the problem? (Select two.) Check the power supply voltage switch. Remove any unneeded components and run the system. Check the CPU fan power. Make sure the heat sink is properly mounted and has thermal paste. Replace the power supply.

Check the CPU fan power. Make sure the heat sink is properly mounted and has thermal paste.

You have a computer with a 64-bit dual-core processor that runs the 64-bit version of Windows 10 Professional edition. You would like to upgrade to the 64-bit version of Windows 11 Home. You want to perform the upgrade with the least amount of effort possible. Which of the following installation methods do you need to perform? In-place upgrade Clean installation Windows 10 Installation Assistant installation Repair installation

Clean installation

You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by the DataComLink corporation. What should you do to ensure this? (Select two.) Configure Windows Update to download updates for other Microsoft products when Windows is updated. Check the DataComLink website regularly for patches and updates to the software. Configure the application to automatically download and install updates as they are released. Configure Windows Update to download and install updates automatically. Download any patches from the company as you are notified of them.

Check the DataComLink website regularly for patches and updates to the software. Configure the application to automatically download and install updates as they are released.

You have decided to purchase a new SSD drive for your Windows 11 workstation. Which of the following should you do before purchasing the SSD drive? Check your power supply to make sure it can adequately support the SSD drive. Install a data cable in a free SATA data cable port on your workstation. Check to make sure that you have adequate RAM to run the SSD drive. Check the Microsoft Hardware Compatibility (HCL) to make sure the SSD drive is compatible with Windows 11.

Check the Microsoft Hardware Compatibility (HCL) to make sure the SSD drive is compatible with Windows 11.

A customer complains that a recently purchased monitor no longer displays a picture. You verify that the monitor is powered on and that the video cable is securely fastened to the video port. Which of the following actions is the BEST to take next? Open the computer and switch the video card to a different slot. Check the brightness and contrast settings using the monitor's controls. Return the monitor to the manufacturer. Unload and then reload the video card's software driver.

Check the brightness and contrast settings using the monitor's controls.

Which of the following is a firewall type that scans network traffic based on TCP or UDP transmission? Application-level gateway Packet filtering Access control list Circuit-layer gateway

Circuit-layer gateway

While browsing the internet, you notice that your browser performance is continually slowing down. Which of the following would MOST likely increase the overall performance of your web browser? Clear the data cache. Switch to Private Browsing Mode. Synchronize your web browser data. Enable a pop-up blocker.

Clear the data cache.

Which of the following functions are enabled by Server Message Block (SMB) protocol when using the scan-to-folder network document scanning method? (Select two.) Targeting of individuals or groups Ability to use the Windows Fax and Scan utility to enable transmission Client-server network communication File, print, scan, and device sharing Secure transmission through SSL encryption

Client-server network communication File, print, scan, and device sharing

As an IT network administrator for your financial company, you have decided to set up document scanning services to digitize, store, and share the large number paper-based documents used in financial transactions. You want to be able to store these digitized documents offsite and make them available to all authorized employees from a centralized storage location for mobility and collaboration in real time. Which of the following document scanning solutions MOST closely matches your requirements? Scan-to-email Cloud services Scan-to-folder OCR

Cloud services

Which of the following features are supported by digital audio in a sound card? (Select two.) Compress audio data to support Dolby Digital or DTS surround sound. Broadcast digital audio through Bluetooth. Play digital audio directly from an internal CD player. Save digital audio files over a network. Upload digital audio files to the cloud.

Compress audio data to support Dolby Digital or DTS surround sound. Play digital audio directly from an internal CD player.

You have just installed a new video card in your friend Mark's computer. When you power on the computer, Windows automatically detects the new device and tries to locate an applicable device driver. Unfortunately, Windows cannot locate the required driver. Which of the following is the BEST Control Panel administrative tool to fix Mark's computer? Computer Management System Configuration Resource Monitor Component Services

Computer Management

You work as the IT administrator for a small news station. Jill, an employee in Building 2, works in the audio-video editing department and would like to increase her productivity. For example, she would like to be able to run multiple programs simultaneously and be able to compare video clips side by side. Which of the following configuration changes would provide the BEST solution for Jill? Configure Jill's computer with a higher resolution. Provide Jill with a second computer. Grant Jill access to a remote workstation. Configure Jill's computer with dual monitors.

Configure Jill's computer with dual monitors.

You are currently running a video editing application on your Windows 11 laptop. The laptop includes both an SSD drive and a traditional hard drive. You run the video application on the hard drive, but you would like to install and run the app from the SSD drive to enhance performance speed. Which of the following should you do to protect the video application and associated data files from drive failure when you move them to the SSD drive? Encrypt the data on the SSD drive. Enable the TRIM functionality. Defragment the SSD drive on a regular basis. Configure an automatic backup to the hard disk drive.

Configure an automatic backup to the hard disk drive.

A technician is replacing a SOHO router and has configured DHCP to assign private IP addresses to hosts on the local network. These hosts can communicate with each other, but users can't browse the internet. Which of the following changes to the SOHO router is MOST likely to restore internet connectivity? Disable DHCP and configure the hosts with static IP addresses. Configure the SOHO router for NAT. Remove any QoS settings that give low priority to HTTP traffic. Update the firmware on the SOHO router.

Configure the SOHO router for NAT.

You have been given a .app file for your Macintosh computer. The file is a graphics editor that you plan to install. What would you normally do to install the graphics editor? Drag the .app file from Mission Control to the Dock. Launch the .app file from the Terminal application. Copy the .app file to the Applications directory. Launch the .app file and follow the installation instructions.

Copy the .app file to the Applications directory.

Which of the following is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster? Configure your device to back up important data to your personal computer. Only use apps, such as email apps, that store data on the app provider's servers. Configure your device to remotely back up important data to the cloud. Don't put important information on your mobile device.

Configure your device to remotely back up important data to the cloud.

The hard drive (HDD) you are installing in a PC is the boot drive with the operating system on it. You want to make sure that the BIOS recognizes this HDD as the boot drive without the need to configure it as the boot drive in BIOS. Which of the following should you do to make sure the HDD is recognized as the boot drive automatically? Connect the HDD to the motherboard using a SATA data cable designed for boot drives. Connect the HDD to the lowest numbered SATA connector on the motherboard. Connect the HDD to the lowest numbered power supply connector. Connect the HDD to the highest numbered SATA connector on the motherboard.

Connect the HDD to the lowest numbered SATA connector on the motherboard.

Which of the following methods can be used to connect a printer to a network? (Select two.) Connect your printer to an external print server device that is connected to the network. Plug a network cable into your printer's serial port. Plug a network cable into your printer's USB port. Plug an Ethernet cable into the printer's network port. Plug a USB-to-Ethernet adapter into your printer's USB port.

Connect your printer to an external print server device that is connected to the network. Plug an Ethernet cable into the printer's network port.

Which of the following are common symptoms of a compromised mobile device? (Select two.) Wi-Fi spoofing Connectivity issues Increased data usage An increase in junk email Screen flickering

Connectivity issues Increased data usage

You have been tasked with designing a workstation to run over 20 applications virtually that all use the same operating system. You want to: Minimize the amount of space required for each virtual application. Make sure each application starts quickly (within a few seconds). What virtualization type will BEST meet your application computing requirements? Container virtualization Type 2 hypervisor Virtual desktop interface (VDI) Type 1 hypervisor

Container virtualization

Administrative Templates are Registry-based settings that you can configure within a GPO to control a computer system and its overall user experience. Which of the following can you do with an Administrative Template? (Select two.) Determine who can add trusted publishers. Control notifications. Allow users to run only the files you specify. Identify allowed or blocked software. Restrict access to Control Panel features.

Control notifications. Restrict access to Control Panel features.

Your system hangs immediately after the BIOS information is shown and displays an error loading operating system error message. What is the MOST likely source of the problem? Corrupt boot sector Inaccessible boot disk Missing or corrupt file Corrupt MBR or partition table

Corrupt MBR or partition table

Which of the following would be a reason to outsource hard drive destruction? Cost of special equipment Availability of low-level formatting Against the law to do it internally Required COD

Cost of special equipment

Which of the following settings can you modify in the Time & Language category in the Windows 10 Settings app? (Select three.) Manage sound devices Let websites provide locally relevant content by accessing my language list Show notifications on the lock screen Choose your input device Country or region Choose the language you speak with your device Show additional calendars in the taskbar

Country or region Choose the language you speak with your device Show additional calendars in the taskbar

Your computer has a single hard disk with a single volume that is used by the C:\ drive. You have previously upgraded the disk to a dynamic disk. The disk has run out of space, so you want to add more space to the C:\ volume. You add a new hard disk to the computer. Which of the following is the BEST step to complete while adding space to the C:\ drive? Strip the C:\ volume to the second disk. Extend the C:\ volume to the second disk. Span the C:\ volume to the second disk. Create a mount point using space on the second disk.

Create a mount point using space on the second disk.

You have a computer with a single hard disk, which is configured as a basic disk with an NTFS-formatted single partition. The computer runs Windows 11. The disk has run out of space, and you want to add more space to the disk. You install a new hard drive and start Disk Management. Which of the following is a required task to add space to the existing volume? Extend the C:\ volume. Create a new partition with or without a drive letter on the new hard disk. Create an empty folder on the new hard disk. Upgrade both disks to dynamic.

Create a new partition with or without a drive letter on the new hard disk.

You are about to begin an upgrade of a Windows 10 workstation to Windows 11. What should you do before beginning? (Select two.) Create a system backup of the hard drive. Verify that the computer meets the minimum requirements. Repartition and reformat the hard drive. Install all the applications that will be used on the new system. Remove all peripherals and expansion boards.

Create a system backup of the hard drive. Verify that the computer meets the minimum requirements.

You are in the process of preparing to install Windows 11 on your Windows 10 computer. Which of the following pre-installation steps is critical to complete (not optional) if you are performing a clean installation? Verify software compatibility Back up existing data Create a system image Obtain hardware drivers

Create a system image

Which of the following functions are performed by the Trusted Platform Module (TPM)? Performs bulk encryption. Creates a hash based on installed system components. Generates authentication credentials. Encrypts data on the hard disk drive.

Creates a hash based on installed system components.

When two files claim the same cluster.

Cross-linked file

While sorting through a box of cables in your storage room, you find one that matches the configuration shown in the image. Which of the following BEST describes the type of cable configuration and the purpose for which it would be used? Patch (or straight-though) cable configuration used to connect computers to network devices, such as switches and hubs. RJ-11 configuration used to connect wireless routers to phone line connections. Crossover cable configuration used to connect computers directly to one another for networking. Rollover cable configuration used to connect computers to routers for console management.

Crossover cable configuration used to connect computers directly to one another for networking.

You have a workstation running Windows 10 Home. However, you want to install Windows 11 Professional as a separate instance in order to boot into either operating system. Which of the following installation types will meet your needs? Repair installation Upgrade installation Custom/clean installation In-place installation

Custom/clean installation

Which of the following are optical storage devices? (Select three.) SDHC USB flash drive DVD HDD BD CD SSD

DVD BD CD

Which component is responsible for converting digital audio into sound that can be played on speakers? MP3 DAC THX ADC

DAC

Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your emoloyer's needs? SCADA HMI PLC DCS

DCS

Your motherboard has sockets for 184-pin DIMM RAM. Which type of RAM should you install? DDR FPM EDO SDRAM

DDR

Which of the following DDR memory types can be used by a triple-channel memory system? (Select two.) DDR DDR-400 DDR4 DDR2 DDR3

DDR4 DDR3

What are the advantages of DDR4 over DDR3, assuming the same operating frequency? (Select two.) DDR4 includes a buffer between the data bus and the memory. DDR4 accepts sixteen consecutive 64-bit words per bus clock cycle. DDR4 doubles the data transfer rate of DDR3. DDR4 accepts four consecutive 64-bit words per bus clock cycle. DDR4 uses less power than DDR3.

DDR4 doubles the data transfer rate of DDR3. DDR4 uses less power than DDR3.

Which of the following memory ratings identifies the fastest memory? DDR2-667 PC-2700 PC-133 DDR4-1600 PC-3200

DDR4-1600

You are in charge of putting together the display design for a new conference center at your organization. The conference center will be in a large auditorium with 500 or more seats. Which of the following technologies will provide a large display for such a group and also provide very high resolutions? LCD display panel DLP projector LCD projector OLED display panel

DLP projector

You want to set up a service on your company network that can be configured with a list of valid websites. The service should give employees a certificate warning if they try to visit a version of an untrusted site. Which of the following services is designed to provide this functionality? Extensions Hashing DHCP server DNS server

DNS server

Which of the following are the FIRST settings you should check if you suspect that a malware attack has impacted your internet connection? (Select two.) VPN settings BIOS settings Internet Connection Sharing settings DNS settings Proxy settings

DNS settings Proxy settings

Mission Control is a desktop and window management utility that is used to access several macOS features. Which of the following are macOS features that you can access through Mission Control? (Select three.) Secure Notes System Preferences Dashboard Spotlight Multiple Desktops All windows Boot Camp

Dashboard Multiple Desktops All windows

Which of the following items of information does a packet header contain? (Select three.) Data chunk order Receiver How to deliver the packet TFTP data ACK data SYN data Sender

Data chunk order Receiver Sender

Which of the following are risks of implementing a BYOD policy? (Select three.) Employee satisfaction Data leakage Increased productivity Lower costs Improper disposal Number of different devices Work flexibility

Data leakage Improper disposal Number of different devices

You have a computer with three hard disks. A RAID 0 volume uses space on Disk 1 and Disk 2. A RAID 1 volume uses space on Disk 2 and Disk 3. Disk 2 fails. Which of the following is true? Data on the RAID 0 volume is accessible. Data on the RAID 1 volume is not. Data on both volumes is inaccessible. Data on both volumes is still accessible. Data on the RAID 1 volume is accessible. Data on the RAID 0 volume is not.

Data on the RAID 1 volume is accessible. Data on the RAID 0 volume is not.

Which of the following are IoT systems that work together to make communication between two endpoints possible? (Select two.) Data storage Gateway system Wi-Fi Access gateway Middleware

Data storage Gateway system

Which of the following are popular Linux OS distributions? (Select three.) SaaS Terminal Debian Library Ubuntu SUSE NaaS

Debian Ubuntu SUSE

You have just connected a new computer to your local network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having problems. Which of the configuration values would you most likely need to change? DNS server Default gateway IP address Subnet mask

Default gateway

Which hard drive destruction method uses a strong magnetic pulse to destroy data? Degaussing Incineration Drilling Disk shredder

Degaussing

Which of the following BEST describes a community cloud implementation? Designed to be used by a single organization. Designed to be accessed by the general public. Designed to be shared by several organizations. Designed to be a combination of public and private cloud resources.

Designed to be shared by several organizations.

After several new computers are connected to a network device, every computer connected to the device begins to experience slow transfer speeds. Which of the following is the FIRST step to troubleshoot this problem? Determine whether the network device is a hub or a switch. Use a loopback plug to determine whether the NIC in each computer is good. Use a loopback plug to determine whether each port on the network device is good. Use a cable tester to determine whether all cables between each computer and the device are good.

Determine whether the network device is a hub or a switch.

Alice recently purchased a new cell phone. After her vacation, Alice decided to transfer her holiday photos to her computer to do some touchup work before sending the pictures to her children. When Alice attached her phone to her computer, she saw that Windows detected her phone and tried to load the applicable software to give her access. Unfortunately, after trying for several minutes, Windows displayed a message indicating that it was unsuccessful. When Alice explored her available drives, her phone was not listed. Which of the following would be the BEST administrative tool to help Alice gain access to her phone? Device Manager Services System Configuration Component Services Event Viewer

Device Manager

Alice recently purchased a new cell phone. After her vacation, she decides to transfer her holiday photos to her computer, where she can do some touchup work before sending the pictures to her children. When Alice attaches her phone to her computer, she sees that Windows detected her phone and tried to load the applicable software to give her access to her phone. Unfortunately, after trying for several minutes, Windows displays a message indicating that the attempt was unsuccessful. When Alice explores her available drives, her phone is not listed. Which of the following would be the BEST administrative tool to help Alice gain access to her phone? System Configuration Component Services Services Event Viewer Device Manager

Device Manager

As a member of the help desk team, you have been assigned to update the driver for the network adapter that is installed on most of the computers in your department. You have a copy of the latest driver on a USB flash drive. Which Windows utility allows you to manually update this new driver? Answer Driver Manager Device Manager Network and Sharing Center Internet Properties

Device Manager

You have a new employee that is left-handed and needs the mouse for her computer to have the right button be the primary button for ease of use. Under which of the following Windows 10 Settings app categories can you change the mouse settings to make the right button the primary button? Devices Ease of Access Systems Personalization

Devices

Single-sided discs can hold about 4.7 GB of data. Dual-layer discs can hold up to 8.5 GB of data.

Digital Versatile Disc (DVD)

Dual-layer version employs two recordable dye layers, each capable of storing data.

Digital Versatile Disc-ReWritable (DVD-RW)

You have a mobile device that provides a touchscreen, but does not have touchscreen technology embedded into the display. Which of the following mobile device display components provides the touchscreen functionality? OLED LCD Inverter Digitizer

Digitizer

You are an IT technician for your company. Vivian, an employee, has been receiving error messages, indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian called again because she is still having the same issue. You now suspect that a corruption or a renaming of the system files is being caused by malware. Which of the following is the FIRST step you should take to remove any malware on the system? Back up Vivian's critical files and perform a clean install of Windows. Disconnect Vivian's computer from the network. Disable System Restore. Perform a scan using anti-malware software.

Disconnect Vivian's computer from the network.

Jamie has been tasked with designing a solution for the paralegals in his office. They need to review old documents that are on paper files and create word processor documents from them that can be searched and cross-referenced. Which of the following devices should Jamie use to create the solution? (Select two.) Digitizer Projector Biometric scanner Printer Scanner

Digitizer Scanner

A container in a file system used to logically sort and organize data.

Directory

You have purchased a new notebook. This notebook system uses UEFI firmware and comes with Windows 11 preinstalled. However, you want to use Linux on this system. You download your favorite distribution and install it on the system, removing all Windows partitions on the hard disk in the process. When the installation is complete, you find that the operating system won't load when the system is rebooted. Which of the following would allow your computer to boot to Linux? Reinstall Windows 11 on the system. Disable SecureBoot in the UEFI configuration. Enable SecureBoot in the UEFI configuration. Enable the TPM chip on the motherboard. Set the boot order to boot from the hard disk first in the UEFI configuration.

Disable SecureBoot in the UEFI configuration.

You have been tasked with removing malware from an infected system. You have confirmed that there is an infection, and you continue running scans and removing the malware, but every time the system is rebooted, the malware comes back. Which of the following should you do to help prevent this from happening? Quarantine the system Disable Windows System Restore Use a different anti-malware program Boot into Safe Mode

Disable Windows System Restore

You have been troubleshooting startup errors on your Windows 11 computer by undoing recent changes, such as rolling back device drivers for a local printer and new graphics card while in Safe Mode. However, the changes you are making are not resolving the startup errors. Which of the following steps will MOST likely help you to find the specific cause of the error without the need to re-install Windows? Launch and use the utilities provided in the Recovery Environment. Disable Driver Signature Enforcement. Disable and then enable devices and services one by one. Disable automatic restart on system failure.

Disable and then enable devices and services one by one.

One of the Windows workstations you manage has four user accounts defined on it. Two of the users are Limited users, while the third (your account) is an Administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each Limited and Administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has also been disabled on the system. Which of the following actions is MOST likely to increase this system's security? Change your user account to a Limited user. Change the two Limited user accounts to Administrative users. Disable the Guest account. Enable Autorun on the system.

Disable the Guest account.

You want to configure User Account Control so that you see the permission prompt only when programs try to make changes to your computer (not when you make changes). You do not want the desktop to be dimmed when the prompt is shown. What should you do? Disable the Secure Desktop. Configure UAC to Always notify. Configure UAC to Never notify. Disable UAC.

Disable the Secure Desktop.

Which of the following disk maintenance utilities locates and disposes of files that can be safely removed from a disk? Disk Management Disk Defragmenter Disk Cleanup Check Disk

Disk Cleanup

You have recently been hired by a course development company to develop online simulations, and you have been given permission to work at home. The company has given you a laptop computer, two external displays, and a wireless mouse and keyboard. However, you also want to connect several of your own personal devices to the laptop, including a printer, headset, webcam, a third external display, and a drawing pad. You also want to be able to boot your laptop with all these devices without opening up the laptop. Which of the following items should you request from your company to help connect all these devices in the EASIEST and most EFFECTIVE way possible? Bluetooth accessibility CGM device Port replicator Docking station

Docking station

A technician was able to stop a security attack on a user's computer. Which of the following actions should be performed FIRST when conducting the subsequent forensic investigation? Turn off the system. Document what is on the screen. Stop all running processes. Remove the hard drive.

Document what is on the screen.

Which of the following is a type of printer that is considered very noisy because it hits the printhead on the paper? Dot matrix Inkjet Thermal Laser

Dot matrix

You recently purchased a copy of Windows 11 from a retail store. The system that you want to install Windows on does not have an optical drive. What is the BEST option for installing Windows in this scenario? Install Windows on a system that has an optical drive and then create a disk image and copy it to the system that you originally wanted to install Windows on. Install the system over the network from a Windows Deployment Services (WDS) server. Download an ISO copy of the installation files to a USB flash drive. Perform a reset installation.

Download an ISO copy of the installation files to a USB flash drive.

You've just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. Since the installation, the system frequently crashes when you try to access the new device. Which of the following steps would MOST likely resolve this issue? Remove and then reinstall the device. Run the Add Legacy Hardware wizard and manually configure the device. Replace the device itself. Download and install the latest driver from the manufacturer's website.

Download and install the latest driver from the manufacturer's website.

You have just installed a new video card in a employee's Windows workstation. When you power the system on and load the OS, everything on the screen looks enlarged and pixelated. You try to change the resolution, but the only available option is 640x480. Which of the following BEST resolves this problem? Download and install the latest driver from the video card manufacturer's website. Upgrade the monitor to one that supports a higher refresh rate. Verify that the system BIOS is compatible with the video card. Reboot the system into Safe Mode.

Download and install the latest driver from the video card manufacturer's website.

You have just installed a new video card in a user's Windows workstation. When the system is powered on, the screen displays in 16 colors at 640 x 480 resolution. Which of the following will BEST resolve this problem? Reboot the system in Safe Mode. Download and install the latest driver from the video card manufacturer's website. Upgrade the monitor to one that supports a higher sync rate. Verify that the system's UEFI firmware is compatible with the video card.

Download and install the latest driver from the video card manufacturer's website.

To fix a problem you are having with your PC, you have determined that you must flash the computer's BIOS. Which of the following would MOST likely need to be completed prior to flashing the BIOS? (Select two.) Download the flash utility or tool from the manufacturer's website. Create a backup of the hard disk in the event of a failure. Properly identify the motherboard. Test the memory to ensure that it is functioning properly. Locate the flash utility or tool that was shipped with your computer.

Download the flash utility or tool from the manufacturer's website. Properly identify the motherboard.

You've just installed a new device on your Windows system. After installation, you can't use the device. You check Device Manager and find an icon with a yellow exclamation mark. What is the BEST first step for resolving the device issue? Enable the device. Reinstall the device. Download the latest driver from the manufacturer's website. Run the Add Legacy Hardware wizard and manually configure the device. Replace the device.

Download the latest driver from the manufacturer's website.

Which of the following hard drive destruction methods only works with mechanical hard drives? Disk shredder Low-level format Drilling Incineration

Drilling

You are a trainer for your company and often teach courses in a classroom located on campus or in a hotel conference room. In your office, which is separate from the classroom, you have two external monitors connected to your laptop, and you are able to display different content on each monitor. However, when teaching, you only have your laptop and a projection unit. To make teaching easier, you want the same content to show on both the laptop monitor and the projection screen. Which of the following multiple display options would be BEST to select when you are teaching? Show only on 1 Show only on 2 Duplicate these displays Extend these displays

Duplicate these displays

You want to install Windows from optical media on a mirrored RAID disk array. You run the motherboard disk configuration utility and create the RAID 1 array. Then you configure the system to boot from the Windows installation optical media. The Windows installation starts, but does not detect the RAID array. Which of the following will MOST likely allow the RAID array to be detected? During the installation, browse to and select the appropriate drivers for your RAID controller when prompted. In the UEFI configuration, set the SATA mode to AHCI. In the UEFI configuration, configure the boot order to boot from the hard drive instead of the optical drive. In the UEFI configuration, set the SATA mode to IDE.

During the installation, browse to and select the appropriate drivers for your RAID controller when prompted.

When you turn on your workstation, you immediately hear a grinding noise coming from inside the computer case. Which of the following are the MOST likely causes of this noise? Dust buildup that needs to be cleaned. An uneven case surface that causes fan blade and motor noise. A video card that is failing. A POST test error message. A connector that is not seated properly.

Dust buildup that needs to be cleaned. An uneven case surface that causes fan blade and motor noise.

A technician has configured a client computer's network interface to request an IP address. Which of the following TCP/IP suite protocols does the client computer use to perform the request and receive an IP address from a server? Simple Network Management Protocol (SNMP) Domain Name System (DNS) Lightweight Directory Access Protocol (LDAP) Dynamic Host Configuration Protocol (DHCP)

Dynamic Host Configuration Protocol (DHCP)

After creating an FEK (file encryption key) for a file, what does EFS do next to add a greater level of security for the file? EFS stores the FEK with the public key. EFS instructs Windows to create a key pair (private and public). EFS creates a symmetric key. EFS encrypts the FEK by creating a key pair (private and public).

EFS encrypts the FEK by creating a key pair (private and public).

The PCI sound card in your computer has stopped working. You decide to use the motherboard's integrated sound until you can replace the PCI sound card. After removing the PCI sound card and powering on the computer, you have no sound, and the built-in sound card does not show up in Device Manager. Which of the following is the BEST action to try first to resolve this issue? Enable the sound card in Device Manager. Update the device's drivers. Update the necessary audio codecs. Edit the CMOS settings and enable the onboard sound.

Edit the CMOS settings and enable the onboard sound.

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been granted Allow Full Control for the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file without affecting her ability to access any other files in that folder and without affecting the abilities of any other users? Remove Rachel from the Sales group. Edit the file properties and assign the Sales group the Deny Full Control permission. Edit the folder properties and assign the Sales group the Deny Full Control permission. Edit the file properties and assign Rachel the Deny Full Control permission. Edit the folder properties and assign Rachel the Deny Full Control permission.

Edit the file properties and assign Rachel the Deny Full Control permission.

You are attempting to boot a new system. The boot fails, and the system sounds a beep code. Which of the following describes the MOST likely cause of this error? Either no memory is installed or the memory was not detected. Either a card/memory module is not seated properly or the system includes unsupported memory. The POST failed to recognize all of the memory. The new memory is not compatible and was not installed and configured properly.

Either no memory is installed or the memory was not detected.

Which of the following dot matrix printer components converts impulses into physical movements that cause small hammers to strike the printhead? Tractor feed Daisy wheel Logic board Electromagnet

Electromagnet

Since it has no moving parts, a CPU will usually work properly for several years. Which of the following is a common factor that might cause a CPU to fail prematurely? Magnetic field Electromagnetic interference Unsupported memory modules Electrostatic discharge (ESD) High CPU usage

Electrostatic discharge (ESD)

You are in a carpeted office lighted by fluorescent bulbs. You are preparing to add memory modules to a user's computer. The user has already unpacked the memory modules and stacked them on top of an old, unused CRT monitor. What is the greatest threat to these memory modules in this environment? Electromagnetic interference (EMI) from the fluorescent lights. The magnetic field around the CRT monitor. Electrostatic discharge (ESD). High-voltage discharge from the CRT monitor.

Electrostatic discharge (ESD).

After upgrading to the newest version of Windows, an important application is no longer running. Which of the following is the BEST option for troubleshooting the problem? Stop Windows Defender from checking apps. Install an antivirus program to prevent malware interference. In Control Panel, uncheck the box next to Block all incoming connections, including those in the list of allowed apps. Enable Hyper-V to run the program on the previous version.

Enable Hyper-V to run the program on the previous version.

A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate content while browsing the web. Which of the following actions would help accomplish this goal? Enable content filtering. Disable SSID broadcast. Disable DHCP. Update the firmware.

Enable content filtering.

A user complains that his USB scanner no longer works. You check Device Manager and see an icon with a black down arrow through it. What should you do? Enable the device in Device Manager. Remove and then reinstall the device. Update the device drivers. Replace the device.

Enable the device in Device Manager.

Which of the following keeps track of various network devices while ensuring that the software is secure? Syslog server All-in-one security appliance Endpoint management server Firewall

Endpoint management server

You want to use hibernation on your Windows notebook. What does it need to have for this to work? 1 gigahertz (GHz) or faster processor A minimum of 1 GB of RAM A UPS Enough free hard disk space

Enough free hard disk space

Which of the following should you always do to avoid damage when you prepare to install a CPU? (Select two.) Run a benchmark test. Make sure that the memory (RAM) modules are seated properly. Ensure that the CPU and motherboard socket type match. Adjust the motherboard bus, processor, and memory settings. Use anti-static protection.

Ensure that the CPU and motherboard socket type match. Use anti-static protection.

After upgrading from Windows 10 to Windows 11 on your laptop, everything seems to be going well until you start running a graphics editing program that you have used for years. The program keeps locking up after a few minutes. Which of the following pre-installation steps would have helped to resolve this issue? Gather third-party installation media and drivers. Ensure that your software is compatible with Windows 11. Create a system image. Verify that your system (drive space, memory, and so on) is compatible with Windows 11.

Ensure that your software is compatible with Windows 11.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from an employee who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what might be causing the problem. Which of the following is the BEST way to provide the assistance the employee needs? (Select two.) Drive to the other location as soon as possible and then watch as the employee performs the task. Establish a Remote Desktop connection and perform the task on the employee's system. Establish a Quick Assist session with the employee and watch what he is doing. Schedule the employee to receive more training on using the application. Establish a Remote Assistance connection and watch what the employee is doing.

Establish a Quick Assist session with the employee and watch what he is doing. Establish a Remote Assistance connection and watch what the employee is doing.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the device driver over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What is the BEST method for resolving the user's issue? Drive to the other location as soon as possible and update the driver. Establish a Remote Desktop connection and update the driver. Escalate the call to another technician or your supervisor. Tell the user to wait until you are scheduled to be in that location.

Establish a Remote Desktop connection and update the driver.

You have just purchased a new USB drive that you want to use to troubleshoot the computers in your company as well as other network devices, such as printers and projectors. You need to format this new drive with a file system that will be recognized and used on all devices. Which of the following file system types would meet MOST, if not all, of your needs when formatting your USB drive? FAT32 NFS NTFS CDFS

FAT32

You have been troubleshooting services on your system. Where is the best place to check to make sure that they are now running properly? System File Checker Advanced Options Menu File Explorer Event Viewer

Event Viewer

At company headquarters, several employees are having issues with their Wi-Fi access suddenly dropping and then reconnecting to the same wireless network. You decide to investigate and determine that someone has set up a rogue access point near company headquarters and is using it to capture sensitive data from the company network. Which type of social engineering attack is being used? Evil twin Phishing Eavesdropping Impersonation

Evil twin

You have been hired to help assess the security of your client's organization. During your assessment, you have found a rogue wireless access point that is configured to look identical to the legitimate wireless network. Which of the following attacks was MOST likely being carried out? Evil twin attack DNS spoofing HTTPS spoofing Session hijacking

Evil twin attack

You have a single hard drive on your laptop with a basic system volume. The volume is running out of space, and you would like to extend the space on the volume. Which of the following would work BEST to resolve the issue? Extend the system volume on the existing hard drive by using contiguous unallocated space. Extend the system volume on the existing hard drive by using non-contiguous unallocated space. Extend the system volume by adding a second hard drive and using non-contiguous space on the new drive. Extend the system volume by adding a second hard drive and using contiguous space on the new drive.

Extend the system volume on the existing hard drive by using contiguous unallocated space.

You have just visited a website on your mobile device when your web browser locks up, and you receive a warning that your device has a virus. You are given a phone number to call to remove the virus. Which of the following describes the type of malware symptom that you are MOST likely experiencing? Increased data usage Spoofed application Connectivity issue False security warning

False security warning

A one-dimensional stream of bits treated as a logical unit.

File

As the system engineer for a large financial institution, you have decided to implement a backup system on all the Windows 11 laptops used by the financial consultants to ensure that critical customer data is securely stored. Your requirements for the backup system include: Only customer data files created by the financial consultants need to be backed up. Data backed up to a flash drive. Backed up files must be uncompressed. Include contact lists and desktop preferences. Which of the following backup solutions BEST meets your requirements? System Image File History File Backup Differential

File History

You have decided to use the Apple Remote Disc feature to share CDs and DVDs among employees on your company headquarters office network. Which of the following DVDs can you share with the employees using Remote Disc? Audio files from the latest company conference Graphics editor installer Financial application documentation Human Resource Blu-ray training videos

Financial application documentation

You need to replace the video card in a laptop. Which of the following is the first step? Find a service manual with correct disassembly procedures. Remove the display wires if the video card is integrated into the motherboard. Remove the keyboard. Remove the access panel at the bottom of the laptop. Remove the bezel.

Find a service manual with correct disassembly procedures.

You are establishing a new security policy for user authentication and want to implement multi-factor authentication. Which of the following would BEST accomplish this? Fingerprint and one-time code text message Smart card and one-time code text message Username and password Fingerprint and iris scan

Fingerprint and one-time code text message

Which of the following medical devices utilize Bluetooth or Wi-Fi technology to communicate with a mobile phone? (Select two.) Fingertip EKG Trackpad USB-C CGM MicroSD

Fingertip EKG CGM

You are trying to connect from outside the company network to a server inside the company network using RDP (Remote Desktop Connection). However, the connection is failing. Which network device does your network administrator MOST likely need to configure to allow this connection? Firewall Access point Switch Hub

Firewall

For some time now, you have been using an application on your Windows 11 computer at home and while in the office. This application communicates with the internet. Today, your team lead decides to have a special team meeting at a local hotel. During this meeting, you obtain access to the internet using the hotel's network, but when you try to run your application, it cannot communicate with the internet. Which of the following Windows settings is MOST likely causing this behavior? Network & internet Windows permissions Firewall & security Bluetooth & devices

Firewall & security

Memory is not properly seated, is missing, or the motherboard is defective.

First boot of a new computer

What is the minimum number of storage devices you need in order to implement three-way mirroring for a storage space? Three Seven Two Five

Five

You have decided to optimize the hard drive on your Windows laptop by running the Error Checking utility. What are the things that you can expect the Error Checking utility to perform? (Select two.) Delete temporary files Compress old files Fix cross-linked files Defragmentation Fix lost clusters

Fix cross-linked files Fix lost clusters

You are a sales representative for a large pharmaceutical company. You often want to share information from your laptop quickly with customers during onsite visits. Which of the following storage media would BEST allow you to quickly and inexpensively share your files with the customers? HDD drive Flash drive SDHC memory card SSD drive

Flash drive

You want to scan a variety of family history documents and photos, many of which are very large. There are also some family history books that you need to scan. Which of the follow scanners will MOST likely meet your scanning needs? Multi-function printer (MFP) scanner Flatbed scanner Stand-alone scanner Network scanner

Flatbed scanner

You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot connect by using the hostname. Which of the following do you need to configure to access the site with the hostname? Forward lookup zone Dynamic DNS CNAME record Reverse lookup zone

Forward lookup zone

As a network administrator for your company, you want to set up a network device that manages traffic leaving and entering your network from the outside. Which of the following would BEST meet your requirements? Reverse proxy server Forward proxy server Content filter VPN

Forward proxy server

You are building a new computer and have purchased a motherboard that includes four built-in SATA connectors. Which of the following MOST accurately lists the maximum number of SATA devices you can connect to the motherboard using the integrated ports? Four Eight Sixteen Thirty-two Sixty-four

Four

Your server runs in quadruple-channel memory mode. How many memory controllers are being used? Four Eight Two One

Four

You have just purchased a used laptop, and you want to configure it to hibernate when you press the power button. You edit the Power Options settings and enable hibernation. Then you configure the power button to trigger hibernation. Everything works fine for several weeks. One day, when you press the power button, the laptop does not hibernate. Which of the following will BEST resolve this issue? Enable ACPI support in the BIOS. Configure the laptop to use the Max Battery power scheme. Charge the battery before pressing the power button. Free up disk space.

Free up disk space.

You are comparing methods for securing your mobile device. Which of the following is the BEST method to secure your device's storage? Full device encryption Locator applications Biometric authentication Remote backup applications

Full device encryption

After removing the printed paper from your laser printer, the toner smudges and can be wiped off in places. Which of the following printer components is MOST likely causing the problem? Secondary corona Primary corona Fuser rollers Print drum

Fuser rollers

One of the employees in your company calls and complains that text printed on the laser printer smudges easily and is staining hands and cloths. Which of the following printer components (if adjusted or replaced) would BEST fix the printer? Fuser unit Toner hopper Laser OPC drum Photoreceptor drum

Fuser unit

You have subscribed to a satellite radio service that you use in your car to access music and news on long trips through areas where cellular service is not available. However, when going through long tunnels and heavily forested canyons, you sometimes lose your signal for a short period of time. Which of the following satellite technologies is your service provider using? GEO ADSL SDSL LEO

GEO

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. Where should you look next to determine whether the policy is enabled? The Local Group Policy. GPOs linked to organizational units that contain this user's object. GPOs linked to the domain that contains this user's object. The Default Domain Policy GPO.

GPOs linked to organizational units that contain this user's object.

Which of the following VPN protocols was developed by Cisco and can be used to route any Layer 3 protocol across an IP network? SSL GRE L2TP IPSec

GRE

What is normally disabled by default on most Linux servers? Embedded Linux GUI TUI IaaS

GUI

Which of the following peripheral devices are designed specifically for playing games on a computer? (Select two.) Gamepad Joystick Microphone Mouse Digitizer

Gamepad Joystick

Which of the following Windows Update options releases updates as soon as they are available to the public? Windows Insider Program Long-Term Servicing Channel General Availability Channel Windows Server Update Services

General Availability Channel

Which type of software-generated problems can indicate that a software bug is causing a memory error? (Select three.) Registry error General-protection fault Parity interrupt Incorrect memory count Exception error Page fault

General-protection fault Exception error Page fault

Which of the following keys let you switch between keyboard languages? Option key Control key Globe key Command key

Globe key

Indicates that the disk is turned on, can be accessed, and that the volume on the disk is valid and has no errors.

Healthy

You have four volumes on a basic hard disk. You convert the disk to dynamic. After the conversion, which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors? Healthy (Basic) Healthy (Primary Partition) Healthy (Dynamic) Healthy (Logical Drive) Healthy

Healthy

You have four volumes on a basic hard disk. Which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors? Healthy (Primary Partition) Healthy (Dynamic) Healthy Healthy (Basic) Healthy (Logical Drive)

Healthy (Logical Drive)

A user calls to report a problem. She is trying to install an application on her new Windows 11 system, but the installation will not proceed. Her user account is a member of the Users group. What is MOST likely causing the installation issue? The application is incompatible with Windows 11. She is not a member of the Power Users group. Her group membership does not allow her to install new software. She is not using an app from the Microsoft Store.

Her group membership does not allow her to install new software.

Which ACPI power state allows a system to start where it left off, but turns all other components off? Off Hibernate Standby Working

Hibernate

Which formatting method leaves data on a drive in a state that can be recovered using special software? Deep format Full format High-level formatting Low-level formatting

High-level formatting

Which of the following mobile connection types can enable other mobile devices to connect to the internet? NFC Bluetooth USB Hotspot

Hotspot

While traveling in a car, a user who has an unlimited data plan on a smartphone opens a wireless connection to share the internet with other passengers. Which of the following connection types is the user MOST likely using? NFC Hotspot MicroUSB Lightning

Hotspot

Which of the following is the No operating system found error likely caused by? Time drift Incorrect boot order Outdated applications Outdated drivers

Incorrect boot order

Which of the following sound card port types can normally handle video content? RCA IEEE 1394 HDMI Mimi TRS TOSLINK

IEEE 1394 HDMI

Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server? IMAP POP3 SMTP NTP

IMAP

Which of the following UTM appliances monitors all network traffic and blocks malicious traffic while notifying the network security team? IPS Anti-malware Firewall NAT

IPS

Which of the following protocols provides authentication and encryption services for VPN traffic? L2TP TCP SSL IPsec

IPsec

Provides access to virtual machines through a network connection.

IaaS

You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the company's current size but would also be able to scale as the company grows. The service needs to provide adequate storage as well as additional computing power. Which cloud service model would BEST fit these requirements? PaaS IaaS DaaS SaaS

IaaS

Two employees are unable to access any websites on the internet, but they can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. Which of the following actions would BEST resolve this issue? Identify the proxy server name and port number in Internet Options. Identify the filter settings on the proxy server for specific internet sites. Use ipconfig to confirm that APIPA has not assigned an IP address. Reconfigure the clients to send all traffic directly to the ISP, bypassing the proxy server.

Identify the proxy server name and port number in Internet Options.

Which of the following BEST describes the purpose of the USB Selective Suspend feature? The USB Selective Suspend feature suspends power to any attached USB devices when the system hibernates. The USB Selective Suspend feature monitors and logs how long USB devices are powered on. If a USB device is not in use, the USB Selective Suspend feature lets you selectively suspend power to a port. If a USB device is not in use, the USB Selective Suspend feature stops providing power to the port.

If a USB device is not in use, the USB Selective Suspend feature stops providing power to the port.

What is the best way to set up a Wi-Fi-incompatible printer to provide the most reliable wireless printing? If the printer is Bonjour-enabled, use workstation discovery with the Bonjour service. Share the printer from a computer that has a wireless network connection. If the printer is Ethernet-capable, connect it to the network through a wireless router. If the printer has a USB port, plug in a USB wireless adapter.

If the printer is Ethernet-capable, connect it to the network through a wireless router.

You are an IT administrator for a large company that is doing very well in their business endeavors. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications that your company uses to do their business. To make this process easier, you only give new employees the choice of one of two laptops. Which of the following installation types would be the BEST use of your time in this scenario? Recovery partition Clean installation Image deployment Upgrade

Image deployment

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following BEST describes the type of attack that just occurred? Phishing Eavesdropping Tailgating Impersonation

Impersonation

Which of the following is a best practice when using Remote Desktop Protocol (RDP) to access another computer? Make sure both computers have the same amount of RAM. Implement additional security protocols. Enable Bitlocker on the remote computer. Make sure both computers are in the same workgroup.

Implement additional security protocols.

A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria and be cost effective: No one from the internet should be able to access her internal network. Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria? Implement an intrusion prevention system (IPS). Implement an email security appliance. Implement an all-in-one UTM security appliance. Implement a content filter. Implement a firewall.

Implement an all-in-one UTM security appliance.

Which of the following LCD display technologies is the BEST choice for use on touchscreen displays? Vertical alignment (VA) Twisted nematic (TN) Touch screen digitizer (TSD) In-plane switching (IPS)

In-plane switching (IPS)

Which of the following MOST accurately describes a touch pen? Includes a soft rubber tip at the end. Does not contain electronics. Includes features such as tilt and pressure sensitivity. Works well for high-quality digital drawings.

Includes features such as tilt and pressure sensitivity.

A user reports that they cannot browse to a specific website on the internet. From their computer, you find that a ping test to IP address of the web server succeeds. A tracert test shows 17 hops to the destination web server. What is the most likely cause of the problem? Duplicate IP addresses Incorrect default gateway address Incorrect subnet mask value Incorrect DNS server address

Incorrect DNS server address

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 Which of the following is the MOST likely cause of the problem? Incorrect subnet mask Incorrect DNS server address Incorrect IP address Incorrect default gateway

Incorrect default gateway

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet, which uses the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask. . . . . . . . : 255.255.0.0 Default Gateway . . . . . . : 192.168.1.1 DNS Servers . . . . . . . : 192.168.1.20 192.168.1.27 Which of the following is the MOST likely cause of the problem? Incorrect default gateway Incorrect DNS server address Incorrect subnet mask Incorrect IP address

Incorrect subnet mask

Shows while a disk is being converted from a basic disk to a dynamic disk.

Initializing

You have a notebook computer with a built-in wireless network card. One day, the network card stops working. Because the network card is integrated onto the motherboard, you do not want to replace the entire motherboard. What can you use to connect to the wireless network? (Select two.) Install a PCI wireless network card. Enable the Bluetooth adapter on the notebook. Insert an ExpressCard wireless network card. Enable the infrared port on the notebook. Insert a wireless USB network card.

Insert an ExpressCard wireless network card. Insert a wireless USB network card.

Your company relocated you from the United States to their United Kingdom office in London. You brought your personal computer with you, and you are in the process of setting it up. Your computer was previously configured to receive 115 VAC, but the electricity in London uses 230 VAC. Which of the following would allow your computer to run on 230 VAC? Edit the BIOS and modify the voltage input setting. Purchase a new power supply that is compatible with 230 VAC. Purchase a voltage converter and plug your computer into the converter box. Inspect the power supply unit for a manual voltage switch and move it to 230 VAC. Otherwise, no action is necessary.

Inspect the power supply unit for a manual voltage switch and move it to 230 VAC. Otherwise, no action is necessary.

You need to install Windows 11 on a new computer system that uses a SATA SSD device to store data. Which of the following is the BEST method for installing Windows 11 on this system? Add a standard hard disk to the system and install Windows on the disk instead of the SSD device. Install Windows the same way you would install a system that uses a standard hard disk drive. Set the SATA configuration in the UEFI firmware to RAID. Load the drivers for the SSD device during the initial phase of the Windows installation.

Install Windows the same way you would install a system that uses a standard hard disk drive.

You have installed a new computer with a quad-core 64-bit processor, 6 GB of memory, and a PCIe video card with 512 MB of memory. After installing the operating system, you see less than 4 GB of memory showing as available in Windows. Which of the following actions would MOST likely correct this issue? Flash the BIOS. Update the memory controller driver in Device Manager. Disable the AGP aperture in the BIOS. Install a 64-bit version of the operating system.

Install a 64-bit version of the operating system.

You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria? Configure a packet-filtering firewall. Add rules to allow or deny access based on time of day and content. Configure each system's Local Security Policy to add access restrictions based on time of day and content. Configure internet zones using Internet Options. Enable Windows Firewall on each system. Add or remove exceptions to control access based on time of day and content. Install a proxy server. Allow internet access only through the proxy server.

Install a proxy server. Allow internet access only through the proxy server.

A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older network laser printer that is shared by everyone in her department. When she picks up the print job, only the top half of each page is printed, and the bottom half is blank. Which of the following will MOST likely rectify this issue? Install additional memory in her workstation. Ask the network administrator to increase the speed of the network link in her department. Update the printer driver on her workstation. Instruct her to avoid sending complex print jobs to the printer. Install additional memory in the printer.

Install additional memory in the printer.

You have been hired to evaluate a client's building security. In your walkthrough, you notice the following: A high fence is installed around the property. Security cameras are installed on all buildings. The parking lot has light poles installed in all areas. Vehicles are able to drive straight to the building entrance itself. Which of the following would you MOST likely recommend that your client do to increase security based on this information? Upgrade the security cameras to a better quality option. Upgrade the light poles to LED lights. Install bollards. Install barbed wire on the fence.

Install bollards.

You notice that your applications are loading and running slowly when you switch between them. You also notice that your hard disk drive light is constantly lit. Which of the following is the BEST option to stop this problem from happening frequently on your system? Configure a larger paging file on the HHD. Reboot the system at the first indication of the problem. Install a larger CPU. Install more physical RAM.

Install more physical RAM.

Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 11 licenses for your organization's accounting department. She received a single Windows 11 installation disc with the licenses. Which of the following would be the BEST installation methods to use? (Select two.) Copy the installation media to 10 flash drives and install 10 systems at a time. Install one system and image it to the other systems. Use the installation disk to install Window on each system individually. Burn 50 copies of the installation disc and install 50 systems at a time. Use a network installation.

Install one system and image it to the other systems. Use a network installation.

You have been hired to evaluate a client's building security. In your walkthrough, you notice the following: All pieces of equipment have cable locks installed. Server racks are locked and have alarms. The WAP for the guest Wi-Fi is located on the receptionist's desk. Biometric locks are installed on high security rooms. Which of the following would you MOST likely recommend that your client do to increase security based on this information? Install biometric locks on the server racks. Replace the biometric locks with standard locks. Install the WAP on the ceiling or inside of a special locked box. Upgrade the equipment cable locks.

Install the WAP on the ceiling or inside of a special locked box.

You have just purchased a new Windows 11 computer for creating and editing animations. You install a new high-end video adapter to handle the animation creation requirements. However, when compiling and running the animations, the computer seems sluggish, and the compilation takes longer than expected. Which of the following would be the BEST first step to resolve this issue? Update the animation software to the latest version. Install the adapter driver from the manufacturer instead of using the Windows driver. Add more RAM to your computer to improve performance. Purchase and install a video adapter with more onboard memory.

Install the adapter driver from the manufacturer instead of using the Windows driver.

You have a computer with a dual-core 64-bit processor that uses the x86-x64 instruction set. You want to install the 32-bit application on the computer. Which of the following BEST describes the action that you should perform? Edit the BIOS and configure the processor to run in 32-bit mode. Install the application normally. Install the 32-bit compatibility drivers during installation. Replace the processor with a 32-bit processor.

Install the application normally.

Which of the following actions directly improves system security on a Windows workstation? Create regular restore points. Disable automatic reboot on an error. Create a password reset disk. Install the latest updates.

Install the latest updates.

As an IT technician, you added a printer for a client. When you did this, you were prompted to select and install the drivers. Which of the following can you do to avoid repeating this step for subsequent clients? Configure a wireless print server to be accessible on the network. Configure the computer for each client to act as a print server. Install the printer drivers on the print server. Reconfigure the printer as a wireless printer so that the printer drivers are not necessary.

Install the printer drivers on the print server.

Don is an accountant in the finance department. For the last several months, he has been testing an online accounting program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. Don downloads the application and tries to install it, but the operating system will not allow him to. Out of frustration, he calls the help desk. The help desk sends a technician to Don's machine while Don is out to lunch. The technician installs the application without issue. Which of the following is the MOST likely reason Don could not install the application? Insufficient disk space Failed device driver Insufficient permissions Incorrect service pack level Insufficient system RAM

Insufficient permissions

Upon reviewing the specifications for a motherboard, you find that the motherboard uses a 1155 CPU socket. Which of the following manufacturers' CPUs can you use for this motherboard? Cyrix Intel IBM AMD

Intel

Which of the following processors allowed macOS users to run Windows on their computers? Intel AMD M1 IBM

Intel

Which of the following projector issues would MOST likely be caused by poor air flow through dirty vents in the projector? A dim display Audio out of sync with video Intermittent shutdowns Fuzzy display images

Intermittent shutdowns

Which of the following is a network that uses internet technologies, but the data and services are only available to the hosts connected to the private network? Subnet Internetwork Intranet Extranet

Intranet

Which of the following mobile device display components provides the required power for a mobile device's screen? TN Digitizer Inverter IPS

Inverter

While researching a fix to a system file issue, you find that using the attrib command should resolve the issue you are experiencing. The instructions you found said to run the following command: attrib +s +r -a myfile.dll Which of the following BEST describes the function of this command? It adds the System file attribute, removes the Read-only attribute, and removes the Archive attribute for myfile.dll. It adds the System file attribute, adds the Write-only attribute, and removes the Archive attribute for myfile.dll. It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll. It removes the System file attribute, removes the Read-only attribute, and adds the Archive attribute for myfile.dll.

It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll.

What does the term cloud mean when referring to cloud computing? It is a metaphor for a data storage service with an ever-growing capacity, like storm clouds. It refers to the virtual hardware that cloud computing is built on. It is the name of an operating system that anyone can use to design, build, and provide cloud services. It is a metaphor for the internet based on the basic cloud drawing used to represent a telephone network.

It is a metaphor for the internet based on the basic cloud drawing used to represent a telephone network.

Which of the following describes spyware? It is a program that attempts to damage a computer system and replicate itself to other computer systems. It monitors the actions you take on your machine and sends the information back to the originating source. It monitors the actions of a user and then sends pop-up ads to the user that match their tastes. It is a malicious program that is disguised as legitimate software.

It monitors the actions you take on your machine and sends the information back to the originating source.

KNOW TYPES OF USBS AND PORTS AND CABLES FOR PICTURE QUESTIONS

KNOW TYPES OF USBS AND PORTS AND CABLES FOR PICTURE QUESTIONS

You have three computers in your office. You would like to reduce the time it takes to switch from one computer to the next, and you would like to use only one keyboard, one monitor, and one mouse for all three computers. Which of the following devices BEST allows this type of setup? Router DVI USB hub KVM

KVM

Used for cooling memory modules Has no fan attached to the heat sink

Passive heat sink

You are an IT professional that works with home users. One of your customers works from home and uses multiple Windows computers as well as an Apple Mac computer. Your customer wants to be able to switch between his computers without changing the keyboard and monitor currently in use. Which of the following devices would BEST facilitate sharing his monitor and other input devices with all of his computers? KVM switch USB multi-port hub VGA splitter HDMI splitter

KVM switch

Provides a trusted Key Distribution Center (KDC) Is a key component of Windows Active Directory

Kerberos

Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform for applications to run on. What is the name of this core component? Central Processing Unit Interface Kernel Driver Desktop

Kernel

Which of the following door locks provides authentication to a specific lock over a Bluetooth connection? Key fob Smart card Biometric Standard lock

Key fob

Which statements are true of processor caches? (Select two.) L3 cache is typically on the motherboard. L1 is the largest type of cache. L1 is typically unique to a processor core. A processor with L2 cache performs better than a processor with L3 cache (all else being equal). L3 is shared between all cores.

L1 is typically unique to a processor core. L3 is shared between all cores.

Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select three.) FTP L2TP WEP WPA PPTP IPsec RDP

L2TP PPTP IPsec

Which of the following display technologies require backlighting? (Select two.) LCD Plasma OLED LED DMD

LCD LED

You are putting together a system for a graphic artist and need to make sure that you find a display that meets their needs. The display needs to have very good color reproduction quality and viewing angles. The display also needs to have proper cooling and be power-efficient. Which of the following display types will MOST likely meet these needs? OLED display with wide-angle viewing. LCD display with TN panel. Plasma display with no motion blur. LCD display with IPS panel.

LCD display with IPS panel.

You are putting together a gaming system and need to make sure that you find a display that meets your needs. The display needs to have a very good response time, and you would prefer that it be affordable and power-efficient. Which of the following display types will MOST likely meet these needs? LCD display with TN panel. LCD display with IPS panel. OLED display with wide-angle viewing. Plasma display with no motion blur.

LCD display with TN panel.

Which of the following is true of modern LCD monitors in regards to backlighting? Cold cathode florescent (CCFL) is used for backlighting. LCD monitors have small cells containing electrically charged ionized gas that do not need backlighting. LEDs are used to backlight the screen. Red, green, and blue light provides the least expensive type of backlighting technology.

LEDs are used to backlight the screen.

Which type of printer uses a drum, plastic toner, and fuser to create a printed page? Ink jet Dot matrix Laser Dye sublimation

Laser

Your company needs to print a lot of high-quality black-and-white text documents. These documents need to be printed as quickly and inexpensively as possible. The printer must also have the capacity to perform duplex printing. Which of the following printers BEST meets your company's printing requirements? Laser Inkjet Dot matrix Thermal

Laser

Which of the following will ensure optimal system cooling? (Select three.) Leave space between the case and any walls or obstructions. Stack hard drives next to each other. Keep the ambient temperature below 80 degrees F. Bundle cables together and secure unused cables to the case. Remove the side panel on the case. Remove unused expansion slot covers to increase air flow.

Leave space between the case and any walls or obstructions. Keep the ambient temperature below 80 degrees F. Bundle cables together and secure unused cables to the case.

What are the benefits of installing integration services (IS) on a Hyper-V Windows virtual machine? (Select two.) Lets you increase the amount of RAM used by the virtual machine. Lets you cut and paste between the virtual machine and host. Lets you select a NIC if you have configured an external virtual network. Dramatically improves performance by installing Hyper-V aware drivers. Makes it possible to decrease the virtual machine storage space.

Lets you cut and paste between the virtual machine and host. Dramatically improves performance by installing Hyper-V aware drivers.

Which of the following is a disadvantage of using a Lithium Ion (Li-Ion) battery over a Nickel Metal Hydride (NiMH) battery? Li-Ion batteries have a shorter lifespan than NiMH batteries. Li-Ion batteries develop a memory, while NiMH batteries do not. Li-Ion batteries take up more physical space than NiMH batteries. Li-Ion batteries are more heat-sensitive than NiMH batteries.

Li-Ion batteries have a shorter lifespan than NiMH batteries.

You are creating a Linux program that needs to write data to a hard disk. In order to save time, you decide to have your program call a pre-written code element that tells the operating system to perform the task. What is this focused pre-written code element called? Distribution Library Embedded Kernel

Library

Which of the following Linux software applications provides word processing, spreadsheets, and presentations? GIMP LightWorks Distro LibreOffice

LibreOffice

A landscaping company's employees receive payment for their services using a credit card reader that physically attaches to an Apple mobile device. Which of the following connection types is being used? IR Lightning Bluetooth NFC

Lightning

Which of the following can be paired with a motion sensor to improve security? Lights Door lock Magnetometer Cable lock

Lights

Ruth has a startup business and limited resources. She wants to save money by using an operating system on her business computers that has no associated fees for installation. Which of the following operating systems could Ruth install for free? Chrome OS macOS Windows Linux

Linux

Which of the following is an open-source operating system? Windows Linux macOS Chrome OS

Linux

Which of the following must specifically be modified to embed Linux within intelligent devices (such as smart TVs and tablets)? Linux user interface Linux distribution Linux utilities Linux operating system

Linux operating system

Used for cooling high-performance systems Used for cooling high-end gaming computers

Liquid cooling

Which of the following battery types offers the greatest storage capacity in the smallest amount of space? Carbon Nickel Cadmium (NiCad) Lithium Ion (Li-Ion) Nickel Metal Hydride (NiMH)

Lithium Ion (Li-Ion)

You begin the installation process and discover that you need to load additional drivers to support your storage controller so that Windows can write to that disc. What should you do? Allow Windows to find the necessary drivers. Load the necessary drivers from a USB drive. Insert or connect to the installation media and boot from that media. Remove all drivers and restart.

Load the necessary drivers from a USB drive.

You manage a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administrative tool can you use to enable a policy that turns off the Store application for all users on this computer? Settings Programs Windows Firewall Control Panel Local Group Policy Editor

Local Group Policy Editor

You have just upgraded your computer's CPU. You consulted the motherboard documentation to make sure that the CPU was compatible with the motherboard. However, when you turn the system on, it locks up shortly after startup. Which of the following are the BEST steps to try first while troubleshooting this issue? (Select two.) Replace the CMOS battery. Look for something that could be causing the new CPU to overheat. Make sure that the CPU is seated properly, oriented correctly, and locked in to the socket. Make sure that the power cord is plugged in and that the power supply switch is in the On position. Test the power supply using a multimeter.

Look for something that could be causing the new CPU to overheat. Make sure that the CPU is seated properly, oriented correctly, and locked in to the socket.

A series of used clusters on the hard disk drive that are not associated with a specific file.

Lost clusters

Which of the following should you perform when disposing of a computer? Document the Chain of Custody. Low-level format of the hard drive. Run the motherboard through a shredder. Lock the hard drive in storage.

Low-level format of the hard drive.

Which formatting method is done by the manufacturer to write new sectors and tracks to a hard drive? Low-level formatting High-level formatting Full format Deep format

Low-level formatting

You have just purchased an Ultrabook with an SSD expansion card that provides SATA 3.0, PCI Express 3.0, and USB 3.0 ports. Which type of expansion slot standard is your Ultrabook using? mSATA M.2 NVMe HDD

M.2

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address? WEP MAC address filtering SSID WPA2

MAC address filtering

You work in the IT department. To perform your daily tasks, you often use many of the available Windows consoles, such as Device Manager, Hyper-V Manager, and Performance Monitor. Although each of these can be accessed from various locations in Windows, you want one location from which these common tools can be accessed. Which of the following system utilities BEST provides this capability? MSTSC MMC SERVICES.MSC MSINFO32

MMC

Which of the following should be installed inside the entrance to the building to prevent weapons or unauthorized equipment being brought into the building? Badge reader Cable lock Magnetometer Access control vestibule

Magnetometer

After installing two memory modules, you power on the system to check for errors. You find that the BIOS program recognizes only one of the memory modules. Which of the following is BEST to try first when troubleshooting this issue? Make sure that both modules are seated properly in their slots. Return both modules for a replacement. Change the memory timings in the BIOS to a slower (higher) setting. Reboot the computer and run memory diagnostic tests. Scan for new devices in Device Manager and enable any disabled memory modules.

Make sure that both modules are seated properly in their slots.

A customer needs to use several applications. Currently, the computer cannot keep all the necessary applications open at the same time. Which of the following components should you consider upgrading? Hard disk drive System board CPU Memory

Memory

Several of your employees are experiencing limited connectivity issues when trying to access some websites on the internet from their workstations. However, they can access the local company network without any problems. You have already tried using the ip and ipconfig commands to determine that the websites can be reached and that the IP information on the workstations is configured properly. You know that the connection to your internet service provider is working properly as well. What should you do next? Make sure that the DNS server is functioning properly. Replace the workstations' network cables. Verify that the workstations' DNS server information is correct. Check for port flapping on the network switch.

Make sure that the DNS server is functioning properly.

You have just finished upgrading the 250-watt power supply in your desktop computer to a 450-watt power supply. Now the BIOS does not recognize one of the hard disk drives in the system during POST. Which of the following troubleshooting steps is the BEST to try first? Replace the power supply. Make sure that the hard disk is connected to the power supply. Manually enter the hard disk geometry parameters in the BIOS. Use the voltage switch on the power supply to go from 110 volts to 220 volts. Reconfigure the hard disk to utilize the higher-wattage power supply with drive jumpers.

Make sure that the hard disk is connected to the power supply.

You're trying to connect a new USB device to your computer. You install the driver and then connect the device to an open USB port. The device does not work. Which of the following troubleshooting steps is the BEST to try first? Try a different USB cable. Replace the USB device. Make sure the USB device is plugged in properly. Install a new USB controller card.

Make sure the USB device is plugged in properly.

Jared has just installed an additional HDD on his Windows computer for storing multimedia files. He inserts a DVD disc to watch a movie with his usual movie player software, but the movie fails to play. In fact, the player indicates that there is no DVD drive available. What is the BEST first step that Jared should take to resolve the issue? Open the case and make sure that the DVD drive is connected to the power supply. Make sure the movie player is pointing to the correct drive letter for the DVD drive. Eject the DVD disc and re-insert it to make sure the drive is reading the disc properly. Use Device Manager to make sure the DVD drive is being recognized by the system.

Make sure the movie player is pointing to the correct drive letter for the DVD drive.

You have just installed an SSD drive in your older Windows workstation. However, after you start Windows, you do not see the SSD drive listed in Windows Explorer. What should you do FIRST? Replace the power supply. Use the voltage switch on the power supply to switch from 110 to 220 volts. Configure the jumpers on the SSD drive. Make sure the power connectors on the SSD drive are plugged in all the way.

Make sure the power connectors on the SSD drive are plugged in all the way.

Which of the following are the most common means of virus distribution? (Select two.) Malicious websites Email Music files from the internet Commercial software CDs Floppy disks

Malicious websites Email

Which printer permission would you assign to a user so that they can pause the printer? Manage documents Print Pause printers Manage this printer

Manage this printer

Which of the following is a valid distinguished name for the MarketSpace common domain name? MarketSpace/com MarketSpace_com MarketSpace.org Market.Space.org

MarketSpace.org

Which of the following are devices categorized as part of the Internet of Things (IoT)? (Select two.) Tablets Medical sensors Routers Smartwatches Laptops

Medical sensors Smartwatches

You have just built a new system from scratch. You turn the computer on, but the system boot fails and sounds a beep code. Which of the following is the MOST likely cause? Incompatible memory was installed. The system includes unsupported memory. New and old memory have been mixed. Memory is not installed or is not detected.

Memory is not installed or is not detected.

Which of the following must be included in a hard drive's Certificate of Destruction? Name of security administrator Method of destruction Location of destruction Cost of destruction

Method of destruction

A sales person requires that a large number of document, data, presentation, image, and video files be accessible on their personal mobile device when making sales pitches to new customers. A cloud solution is not feasible since cellular and internet connections are not always guaranteed at a customer site. Which of the following accessories would a technician suggest to BEST meet the sales person's requirements? Micro SD card Credit card reader Wireless hotspot Docking station

Micro SD card

Which of the following mobile device components are often installed under the bezel of a mobile device display? (Select three.) OEM Microphone Wi-Fi antenna wires OLED Inverter Webcam Touchscreen digitizer

Microphone Wi-Fi antenna wires Webcam

Which of the following tools can manage bandwidth usage and deployment times for updates? Windows Server Update Services Microsoft Endpoint Configuration Manager Windows Update Windows Update for Business

Microsoft Endpoint Configuration Manager

Which of the following vendors offers the largest variety of editions for its operating system? Microsoft Windows Ubuntu Apple macOS Google Chrome

Microsoft Windows

Shows when a dynamic disk has been removed or turned off.

Missing

Which of the following should you implement to monitor and manage the risks of a BYOD policy? Security management Bring Your Own Device Mobile application management Mobile device management

Mobile device management

Linux has been a mainstay operating system in server rooms for many years, and it has grown even more pervasive in recent times. Which of the following types of devices has Linux taken over a large percentage of the market for? Wi-Fi routers Printers Desktop workstations Mobile devices

Mobile devices

A common type of connector used to power internal computer components.

Molex

Which of the following characteristics accurately describes passive heat sinks? Used on high-end video cards More efficient than active heat sinks Used by liquid-based cooling systems More reliable than active heat sinks

More reliable than active heat sinks

You are in the process of configuring a new computer. The motherboard has four memory slots and supports dual-channel memory. You install two memory modules. When you boot the computer, the BIOS recognizes both modules, but the memory is not configured to run in dual-channel mode. What should you do to resolve the issue? Move the modules to the correct motherboard slots. Replace the memory with dual-channel capable memory. Add continuity modules to unused memory slots. Change the CAS latency to a higher setting.

Move the modules to the correct motherboard slots.

Which of the following is the most common method for removing RAM from a motherboard? Move the tabs holding the RAM out of the way; then pull straight up to remove the RAM. Tip the RAM module at a 45-degree angle while pulling on it. Remove the screw from the one side; then pull straight up to remove the RAM. Pull the RAM module up from one corner and then twist to release the other corner.

Move the tabs holding the RAM out of the way; then pull straight up to remove the RAM.

You have just installed a wireless network, but the network is experiencing slow speeds, especially when accessing the internet from your workstation. Which action should you try FIRST to resolve the issue? Move the wireless access point. Move your workstation closer to the wireless access point. Reset your wireless router to the factory defaults. Add a network extender.

Move the wireless access point.

Which of the following is a characteristic of a multi-processor system? Ability to use over 4 GB of memory. Multiple processor sockets on the motherboard. Shared L2 cache. Multiple cores on the same die.

Multiple processor sockets on the motherboard.

Which of the following is an advantage of connecting a printer to a network? Printing speed is increased. Multiple users can print to the same printer. Troubleshooting costs are decreased. You can use a less costly printer.

Multiple users can print to the same printer.

Ability to use multiple processing devices.

Multiprocessing

Ability to run multiple applications simultaneously.

Multitasking

Ability to run multiple parts of an application simultaneously.

Multithreading

You have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the data to be synchronized, this service uses a process where the cloud service and the client on the mobile device verify each other's security certificates. What is this process called? Hotspot connection Tethering Virtual private network Mutual authentication

Mutual authentication

A user pays for a retail purchase by placing a smartphone next to the merchant's reader. Which of the following wireless mobile device connections is this? Bluetooth NFC MicroUSB Lightning

NFC

Which of the following wireless communication technologies can be described as follows? It has a limited transmission range of less than two inches. It is used with credit cards and passports. It is slower than other wireless technologies. It constantly emits a signal. Infrared in diffuse mode Infrared in line-of-sight mode Bluetooth NFC IEEE 1394

NFC

You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following technologies is being used in these phones? Infrared transmitters VPN NFC chips Bluetooth transmitters

NFC chips

You are working at the local hospital in the IT department. You have just received a promotion to junior network technician. Part of your new role involves troubleshooting network communication issues. Which of the following user groups should your account be added to? Cryptographic Operator Remote Desktop Users Administrator Network Configuration Operator

Network Configuration Operator

Which of the following are common uses for scripting? (Select three.) Network drive remapping File management Bookmark list management Email mass mailings Script creation System updates Automated backups

Network drive remapping System updates Automated backups

Which of the following network components is responsible for converting digital data into a signal that can be transmitted? Transmission medium Network interface Switch Protocol

Network interface

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's request? Administrative share Remote Desktop connection VPN connection Hidden share Network share

Network share

You decided to upgrade your PC with a faster processor. To do this, you ordered a new motherboard over the internet that supports the processor that you want to use. When the motherboard arrives, you discover that the motherboard uses the Micro-ATX form factor. Your current case is an ATX mid-tower with a standard ATX motherboard inside. Which steps must you take for the Micro-ATX motherboard to work in the ATX case? Drill new holes in the Micro-ATX motherboard to match the mounting hole pattern in the ATX case. No additional steps are necessary. You can install the Micro-ATX motherboard in the ATX case. Return the motherboard and replace it with an ATX form factor motherboard, as the Micro-ATX motherboard does not fit without modifying the case. Drill new holes in the ATX case to match the mounting hole pattern in the Micro-ATX motherboard.

No additional steps are necessary. You can install the Micro-ATX motherboard in the ATX case.

You need to back up user data on a Windows 11 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: Use Backup and Restore to back up user data. Run the backup automatically every night at 11:00 p.m. Store the backups in the C:\Backups folder. Include a system image in each backup. Will this configuration work? No, Windows 11 does not include the Backup and Restore utility. You must use File History instead. Yes, all of the requirements for using Backup and Restore have been met. No, system image backups can't be scheduled with Backup and Restore. You must run them manually. No, backups created with Backup and Restore can't be stored on the drive that contains the information being backed up.

No, backups created with Backup and Restore can't be stored on the drive that contains the information being backed up.

Which method does an SD card use to store data? Non-volatile memory chips Magnetic disks and platters Magnetic tape Reflective surface and optical readers

Non-volatile memory chips

You have configured Disk 3 and Disk 4 on your Windows 11 workstation as a RAID 1 array with the NTFS file system, and you have assigned F as the drive letter for the array. Each disk has an individual storage capacity of 1 TB. However, when you check the available storage size of F, you notice that it only lists 1 TB (instead of 2 TB) of available disk storage space. What should you do to resolve the issue? Make sure both disks are set to dynamic instead of basic. Nothing. The RAID array is working as designed. You need to change to a RAID 5 array. Change the volume to a spanned volume.

Nothing. The RAID array is working as designed.

You have booted your Windows workstation in Safe Mode and enabled boot logging. To which log file is the boot logging information now written? Ntbtlog.txt Myboot.txt Boot.log Bootlog.txt

Ntbtlog.txt

Which of the following thermal solutions might you find on memory modules? Liquid cooling Passive heat sink Active heat sink Surface area dissipation

Passive heat sink

You have recently purchased a new, foldable smart phone. Which of the following types of mobile device display technologies is MOST likely being used for the foldable display? VA IPS OLED TN

OLED

After a malware infection has been fully remediated, you should re-enable System Restore and run a full system backup. Which of the following is the BEST place to save this backup? On an external drive In the cloud On the main hard drive on your computer On the secondary drive on your computer

On an external drive

Which of the following are critical times when memory problems manifest themselves? (Select two.) After cleaning the dust from inside your computer On the first boot of a new computer After you reconfigure the BIOS/UEFI After installing new drivers on your computer After you remove or install hardware

On the first boot of a new computer After you remove or install hardware

You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file? On the system volume Split between two storage devices On a drive other than where the operating system files are stored On a USB flash device

On the system volume

Which of the following is the generally accepted rule for manually setting the initial and maximum paging file size? One and a half times the size of the physical RAM for the initial size and three times for the maximum size. Double the size of the physical RAM for the initial size and quadruple for the maximum size. Two and a half times the size of the physical RAM for the initial size and four and a half times for the maximum size. Three times the size of physical RAM for the initial size and five times for the maximum size.

One and a half times the size of the physical RAM for the initial size and three times for the maximum size.

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the Read-only (R) and Encryption attributes. Which of the following will be true when the file is copied? All the attributes and NTFS permissions are retained on the file. None of the NTFS permissions or attributes are retained on the file. Only the R and Encryption attributes are retained on the file. Only the R attribute is retained on the file. Only the NTFS permissions are retained on the file.

Only the R attribute is retained on the file.

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model? Open source Persistent Enterprise Personal Proprietary

Open source

You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. Which of the following is the BEST solution to your problem? Configure a VPN connection to your computer. Move your home computer outside of the firewall. Open the Telnet and SSH ports in your firewall. Open the firewall port for the Remote Desktop protocol.

Open the firewall port for the Remote Desktop protocol.

You are your company's Active Directory system administrator. The company has branch offices in several countries, including Mexico, Argentina, Canada, and the UK. The company only has a total of 250 employees organized in the same departments in each office. However, the company is projected to expand rapidly in the next two years. You want to create a tree of organizational units (OUs) that can adapt to the rapid growth without re-organizing the OU structure in the near future. You also want to be able to easily assign rights to certain network resources based on departmental organizational roles. Which of the following solutions would BEST meet your requirements? Organize the OUs at the top level by employee and resource; then assign specific rights to each user. Organize the OUs at the top level by office (country); then use group accounts to help control resource rights. Organize the OUs at the top level by resource and office (country); then assign specific rights to each user. Organize the OUs at the top level by department; then use group accounts to help control resource rights.

Organize the OUs at the top level by office (country); then use group accounts to help control resource rights.

Files that exist on the hard drive, but are not associated with a directory in the index.

Orphaned files

You need to replace the power supply in your home desktop computer. Which of the following specifications are the MOST likely to affect your power supply choice? (Select three.) An on/off power switch Output voltage selections Output wattage Type and number of connectors Form factor Input voltage selections A fan that cools the unit

Output wattage Type and number of connectors Form factor

Zoey has brought her computer in for servicing. When she dropped off her computer, she mentioned that it spontaneously reboots and freezes occasionally. Which of the following is the MOST likely cause of these problems? Failing drive Bad network card Failed UPS Overheated CPU

Overheated CPU

A computer was brought into your help desk center for repair. You have been told that it randomly locks up. Which of the following is MOST likely causing this issue? Loose monitor cable Failing network adapter Overheated processor Faulty mouse or keyboard

Overheated processor

Each bus slot routes data through a point-to-point dedicated connection. Data rates depend on the protocol version and number of transmission lines.

PCI Express (PCIe)

Which of the following must be set up before you can register a facial or fingerprint scan for your account? Security key Password PIN Picture password

PIN

Which of the following authentication combinations is an example of multi-factor authentication? Fingerprint and retinal scan Username and password PIN and authentication app Smart card and one-time code

PIN and authentication app

Steve, a computer technician, receives a help desk ticket for a computer that will not start. When Steve powered the computer on, there was one long and two short beeps. Which of the following programs is reporting this error condition? ESP POST initramfs CMOS

POST

Which option is the first process that runs once a computer is powered on and the CPU loads the BIOS? Winload.exe Boot Loader POST WININIT

POST

Which of the following was developed by Microsoft as one of the first VPN protocols and supports only TCP/IP? PPTP IPSec L2TP SSL

PPTP

You want to use a VPN tunneling protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task? NetBEUI SLIP PPTP PPP

PPTP

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select two.) PPTP PPPoE VNC RDP L2TP

PPTP L2TP

You are an IT administrator for your company. You have been tasked with installing 300 copies of Windows 11. You need to finish this task as quickly and efficiently as possible. Which of the following boot methods would be the BEST method for installing Windows under these circumstances? Solid-state/flash drives PXE DVD USB

PXE

Requires at least three storage devices. Allows data reconstruction if one of the storage devices fails.

Parity

A logical division of a storage device associated with a hard drive.

Partition

While sorting through a box of cables in your storage room, you find one that matches the configuration shown in the image. Which of the following BEST describes the type of cable configuration and the purpose for which it would be used? Patch (or straight-though) cable configuration used to connect computers to network devices, such as switches and hubs. Rollover cable configuration used to connect computers to routers for console management. Crossover cable configuration used to connect computers directly to one another for networking. RJ-11 configuration used to connect wireless routers to phone line connections.

Patch (or straight-though) cable configuration used to connect computers to network devices, such as switches and hubs.

You would like to set Windows Update to delay updates for a week. Which of the following Windows Update settings would you use to configure the delay? Update History Windows Insider Program Advanced Options Pause Updates

Pause Updates

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer? Intranet Extranet Peer-to-peer Client/server

Peer-to-peer

You are an IT technician for your company. Jodie, a receptionist, thinks that her Windows 11 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run Task Manager. Which of the following tabs are MOST helpful for getting an overall view of how Jodie's computer is running? (Select two.) Details App history Performance Services Processes Users

Performance Processes

Which tool can you use to gather data and display statistics (in counters) that help you monitor the operation of a Windows system? Event Viewer Performance Monitor MSinfo Computer Management

Performance Monitor

The CPU and bus can process concurrently. Replaced ISA and VESA bus standards.

Peripheral Component Interconnect (PCI)

You manage the two folders listed below on your computer. C:\Confidential D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. On the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc You then take the following actions. You: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder? Permissions are kept on both files. Permissions are removed from Reports.doc but kept for Costs.doc. Permissions are kept for Reports.doc but removed from Costs.doc. Permissions are removed from both files.

Permissions are removed from both files.

Which of the following is true of online software activation? (Select three.) The software vendor does not track how many times each license code is activated, but uses persistent activation to annually audit the number of licenses being used. Since the license account information is stored online, it is usually not affected by operating system upgrades or migrations. Persistent activation may require the license to be continuously re-activated online at a preconfigured interval. With enterprise licenses, the software vendor tracks how many times each license code is activated and automatically charges the enterprise for activations above the license limit. Before running a newly installed application, the user must activate their license online on the software vendor's website. With personal software licenses, the limit is usually one to three online activations.

Persistent activation may require the license to be continuously re-activated online at a preconfigured interval. Before running a newly installed application, the user must activate their license online on the software vendor's website. With personal software licenses, the limit is usually one to three online activations.

A software vendor has had recurring problems with customers misusing their proprietary software. Which of the following technologies can give them the MOST control in regulating who, how, and when their software is being used? Persistent license activation Digital watermarking One-time license activation Digital fingerprinting

Persistent license activation

A group of workers in an office space communicate with each other on their smartphones and tablet devices through an ad hoc network linked using Bluetooth technology protocols. Which of the following network types is in use? Wide Area Network (WAN) Personal Area Network (PAN) Local Area Network (LAN) Metropolitan Area Network (MAN)

Personal Area Network (PAN)

If you want to change your taskbar from appearing on the bottom of the screen to the right side, under which of the following Windows 10 Settings app categories would you find the setting to change this? Systems Personalization Devices Ease of Access

Personalization

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site? Impersonation Social engineering Phishing Evil twin attack

Phishing

Which pin on the power supply connector connects to the power good wire on the motherboard in order to indicate an appropriate action for the motherboard if the power disappears, quickly reappears, or does not appear at all? Pin 8 Pin 6 Pin 2 Pin 5

Pin 8

The processor you have just purchased has a series of pins in an array on the underside of the processor package. You notice that the pins insert into corresponding receptacles within the processor socket on the motherboard. Which type of socket is this processor configured to use? Zero insertion force (ZIF) Ball grid array (BGA) Pin grid array (PGA) Land grid array (LGA)

Pin grid array (PGA)

You have been hired to evaluate your client's building security. In your walkthrough, you notice the following: A high fence is installed around the property. Visitors are able to enter the building and are checked in by a receptionist. Security cameras are installed on all buildings. Server racks are locked and have alarms. Which of the following would you MOST likely recommend that your client do to increase security based on this information? Upgrade the security cameras. Install biometric locks on all server racks. Install barbed wire around the top of the fence. Place a security guard at the entrance gate with an access list to control who comes on the property.

Place a security guard at the entrance gate with an access list to control who comes on the property.

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions for you to take next? (Select two.) Configure share permissions. Configure NTFS permissions. Place the files on an NTFS partition. Configure both share and NTFS permissions. Place the files on a FAT32 partition.

Place the files on an NTFS partition. Configure both share and NTFS permissions.

After using your LCD monitor for about three months, you notice a small black dot in one area of the screen. Regardless of what is shown on the monitor, the dot remains the same color and in the same location. Which of the following is the BEST method for removing the black dot from the monitor? Purchase a new monitor. Apply pointed pressure and rub the dead pixel. Apply a heated cloth enclosed in a bag to the dead pixel. Play a video designed to fix dead pixels.

Play a video designed to fix dead pixels.

You recently purchased a USB audio headset and connected it to a USB port on your Windows system. However, when you launch your music player, the audio is played through your desktop speakers instead of the new USB headset. You need to reconfigure the system to use the headset instead of the desktop speakers. Which the tab you would use in the Sound Properties window to accomplish this task? Playback Recording Sounds Communications

Playback

A technician is running a network above a dropped ceiling that is also used for ventilation. The cable must be twisted pair and must be capable of Gigabit Ethernet speeds. Which of the following cables should the technician use? Plenum-rated multimode fiber Riser-rated RG-58 Riser-rated Cat 5e Plenum-rated Cat 6a

Plenum-rated Cat 6a

Which of the following tasks would you complete as part of a normal SATA installation using a recently purchased motherboard? Complete a low-level format of the drive. Plug the 15-pin power connector into the SATA drive. Configure the device ID using a jumper. Set the Master/Slave relationship using a jumper. Use the 4-pin Molex power connector.

Plug the 15-pin power connector into the SATA drive.

Currently, your company is in the process of upgrading security in the company headquarters building by installing biometric sensors to limit access to specific rooms. Your network switches are PoE-enabled, which allows biometric sensors to connect to switches without an external power source. Which of the following PoE standards is designed for use with biometric sensors? PoE++ Higher-power PoE PoE+ Standard PoE

PoE+

While browsing the internet, you are constantly being bombarded by small advertisements with links attached to the web page. Which of the following can you use to prevent these advertisements from appearing? Data cache clearing Browser synchronization Pop-up blocker Private Browsing Mode

Pop-up blocker

Which of the following are characteristics specific to the Python programming language? (Select two.) Most popular method of scripting in the Linux world. Popular with the scientific community. Used for website and web page design. Executes multiple Windows commands in sequence. Focuses on code readability.

Popular with the scientific community. Focuses on code readability.

A technician is installing a network-enabled smart home control system in a SOHO. Which of the following configurations is MOST likely required on the SOHO router in order to access the system from the internet? DHCP NAT QoS Port forwarding

Port forwarding

Which of the following are printer languages? (Select three.) Capture PostScript PrintDef Pascal PCL Escape codes

PostScript PCL Escape codes

Which of the following scripting languages is gradually replacing Windows batch files? JavaScript PowerShell Visual Basic Python

PowerShell

While performing data entry on your Windows 11 laptop, your screen suddenly goes black. What can you do immediately to troubleshoot the issue without losing any data that you have entered? Press Ctrl + Shift + B Press F5 four times Press the Windows key + P four times Press Ctrl + Alt + Del

Press the Windows key + P four times

You have installed two multi-GPU CrossFire video cards in your computer and linked them together using a bridge clip. You now need to connect your monitor to test the video card installation. Where should you connect your monitor on your computer? Both the primary and secondary video cards Onboard video adapter Primary (first) video card Secondary (second) video card

Primary (first) video card

Which component in a laser printer prepares the photosensitive drum for writing by causing the drum to receive a negative electrostatic charge? Fuser Transfer corona Organic photoconductor (OPC) drum Primary corona

Primary corona

You have been hired to assess a client's security. During your testing, you discover that users have access to other departments' files. Which of the following should you recommend that the company implement? Certificate Manager Bring Your Own Device Principle of least privilege Mobile device management

Principle of least privilege

Which printer management features would you use to view the port that a printer uses? (Select two.) Print Server Properties Print queue Print spooling service Print Queue Properties Printer Properties

Print Server Properties Printer Properties

Location on the hard disk that holds print jobs waiting to be processed.

Print queue

Which term refers to the portion of the hard drive where print jobs are stored before going to the print device? Printer port Print device Print driver Print queue

Print queue

Software process that sends print jobs to the print device.

Print server

Software process that captures print jobs from applications.

Print spooler

When an application (such as Microsoft Word) sends a print job to the printer, which of the following manages the printing process? Print spooler Printer port Print driver Print queue

Print spooler

Several employees have called you to complain about the default configuration settings on the network printer. One has asked to change the page orientation, another has wanted to change the collating setting, and another asked about duplexing. Which of the following print features would allow the employees to make the requested changes to their print jobs? Print server Print queue Printer Properties Print spooling

Printer Properties

Connection point for the print device to connect to a print server.

Printer port

You have a Skype meeting scheduled, but when you open it to start the meeting, you find that Skype is not allowed to use the camera on your device. Under which Windows 10 Settings app category can you allow Skype to access your camera? System Privacy Devices Apps

Privacy

What are two major concerns regarding IoT devices? (Select two.) Accessibility Short lifespan Availability Privacy Hacking

Privacy Hacking

Your financial investment company has recently completed development of a custom application for maintaining customer portfolios. You want to install this application on each Windows laptop that was assigned to each investment advisor. Which of the following Windows 11 settings do you need to configure to sideload this custom app? Right-click Start > Apps & Features > Developer Mode: On Right-click the application's tile > Sideload app > Yes Update & Security > For developers > Sideload apps > Yes Privacy & security > For developers > Develop Mode: On

Privacy & security > For developers > Develop Mode: On

During an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information. Which of the following would make it difficult for other passengers to view this information on the laptop display? Mantrap Cable lock Smart card Privacy filter

Privacy filter

Which Windows network location enables network discovery and allows files and printers to be easily shared? Domain Private Public Work

Private

While browsing the internet, you want to make sure that the browser you are using does not store your search history, cookies, or password information. Which of the following can you enable to prevent this from happening? Private Browsing Mode Data cache clearing Pop-up blocker Browser synchronization

Private Browsing Mode

You are an IT technician for your company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctioning application. To help troubleshoot Rachel's computer, you run Task Manager. Which of the following tabs would be the MOST helpful in determining any issues with how the computer is running? (Select two.) Services Details Processes App history Performance Users

Processes Performance

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service? Proxy server Print server DHCP server Web server

Proxy server

You are in the process of building a new computer. You would like to configure your computer to use SLI to improve performance while playing your favorite game. Which of the following will MOST likely be part of the configuration process? (Select three.) Purchase a motherboard with two (or more) PCIe x16 slots. Connect at least one monitor to the graphics card. Purchase a motherboard with integrated video and an add-on card that supports the VGA standards. Purchase two graphics cards with SLI and similar specifications. Purchase a motherboard with integrated video and an AGP 8x slot. Purchase a 7200 rpm or better hard drive. Purchase dual 1200-watt power supplies.

Purchase a motherboard with two (or more) PCIe x16 slots. Connect at least one monitor to the graphics card. Purchase two graphics cards with SLI and similar specifications.

Which of the following should you do immediately after a malware infection is confirmed? Quarantine the infected system. Boot to a Windows Pre-installation Environment (WinPE). Run a deep malware scan. Disable Windows System Restore.

Quarantine the infected system.

You have recently purchased a gaming laptop and want to make sure that it is properly ventilated to avoid overheating. Which of the following is the BEST way to avoid overheating the laptop (especially when gaming for hours)? Purchase a special laptop cooling base. Set the laptop on a hard, solid surface. Configure Power Options to reduce power consumption. Keep all vents clear and unobstructed.

Purchase a special laptop cooling base.

You have an existing system that has a single DDR3 memory module installed. You would like to add more memory to the three remaining empty memory slots. Which of the following steps should you take to make sure that you get the right memory for the system? (Select two.) Purchase the fastest modules possible. Purchase additional modules that are the same as what is currently installed. Update the BIOS and then purchase the newest memory modules available. Purchase the slowest modules to ensure compatibility. Check the motherboard documentation to find which modules are supported.

Purchase additional modules that are the same as what is currently installed. Check the motherboard documentation to find which modules are supported.

Your organization has 75 workstations that each need a software program installed. Which of the following is the BEST choice to accomplish this? Purchase an enterprise license for the software program and reuse the activation code for each workstation. Purchase 75 personal licenses for the software program and use each unique activation code for each workstation. Purchase a personal license for the software program and reuse the activation code for each workstation. Purchase one personal license for the software program and then search online for additional activation codes provided by third parties or activation code generators.

Purchase an enterprise license for the software program and reuse the activation code for each workstation.

A computer that is being used by the HR department needs to ensure that all of the data on that computer is protected from a single hard disk failure. The data needs to be read as quickly as possible, and the HR department would like to maximize drive use as much as possible. This computer can use up to three hard drives. Which of the following RAID types would meet these requirements and provide the BEST data protection? RAID 0 RAID 1 RAID 5 RAID 10

RAID 5

Which of the following drive configurations uses striping with parity for fault tolerance? RAID 5 RAID 1 RAID 10 RAID 0

RAID 5

Cindy wants to install a new application on her computer. This application requires the operating system to have 1 gigabyte in working memory to function properly. Which of the following system requirements does Cindy need to check for compatibility? RAM capacity CPU capacity VRAM capacity SSD storage capacity

RAM capacity

A technician is installing a cable modem that supplies internet connectivity for a home office. Which of the following cabling types would they use to connect the cable modem to the wall outlet? Cat 5e Cat 6a RG-6 Multi-mode fiber

RG-6

You need to connect the satellite television signal to your HD 4K flat screen TV using a coaxial cable. Which of the following is the BEST type of coaxial cable to use? RG-6 RG-59 F-type BNC

RG-6

You are a network administrator for a large financial institution. There are several account advisors who are constantly on the road with their Windows laptop devices. You want to be able to occasionally check on the health of these laptops, including the ability to receive automated alerts for any unusual activity that may indicate some kind of security breach. Which of the following remote management technologies would BEST help you monitor these laptops? RMM MSRA Desktop management software File transfer software

RMM

A company has subscribed to a cloud service that offers cloud applications and storage space. Through acquisition, the number of company employees quickly doubled. The cloud service vendor was able to add cloud services for these additional employees without requiring hardware changes. Which of the following cloud concepts does this represent? Measured service On-demand Resource pooling Rapid elasticity

Rapid elasticity

You are building a new computer and want to purchase a motherboard that has integrated sound with digital audio output. Which of the following ports would you MOST likely find on a motherboard faceplate that indicates digital audio support? F-type DB-15 S/PDIF Mini-DIN Mini-TRS

S/PDIF

You have just upgraded your motherboard. Several weeks later, you suddenly start having issues with accessing Windows features on your computer. Which of the following will BEST resolve this issue? Perform a Startup Repair from the Advanced Startup Options menu. Disable your antivirus software. Boot into Safe Mode and revert to a prior restore point. Reactivate your copy of Windows.

Reactivate your copy of Windows.

You are troubleshooting a laptop system that uses a digitizer pad and stylus for user input. The user has complained that tapping the stylus on the digitizer pad taps about one inch to the right of where the taps actually occur. Which of the following actions would MOST likely fix this issue? Recalibrate the digitizer pad. Remove any scratches from the digitizer pad. Hold the stylus at an increased angle. Replace the stylus. Replace the digitizer pad.

Recalibrate the digitizer pad.

While using the touchpad on a laptop computer, you notice that the mouse is not responding very well, making it difficult to move the mouse around the screen. Which of the following actions would MOST likely fix this problem? Clean your fingers and try again. Use a stylus on the touchpad. Recalibrate the touchpad. Replace the touchpad.

Recalibrate the touchpad.

You recently replaced a malfunctioning video card on your laptop. After you reassemble the laptop, everything works well except for the wireless network connection. The wireless adapter functioned correctly before you replaced the video card. Which action can MOST likely resolve this problem? Reconnect the antenna connections. Replace the wireless network card. Reconnect the laptop battery. Use a wireless network adapter that plugs into a USB port.

Reconnect the antenna connections.

You recently purchased a USB audio headset and connected it to a USB port on your Windows system. The headset includes a microphone that can be used to record audio. However, when you launch your audio recording program, no audio is recorded. You need to reconfigure the system to use the headset mic instead of the built-in mic. Which tab you would use in the Sound Properties window to accomplish this task? Playback Recording Sounds Communications

Recording

You have been using the same computer for several years. To improve performance, you decide to upgrade the processor. You check the motherboard documentation and purchase the fastest processor that is supported by the motherboard. However, when you try to start the computer, it beeps regularly, and nothing is displayed on the screen. Which of the following actions will MOST likely resolve this issue? (Select two.) Replace the CPU with a new one. Reinstall the old processor in the motherboard. Flash the UEFI firmware. Replace the motherboard. Press F8 while booting the computer.

Reinstall the old processor in the motherboard. Flash the UEFI firmware.

Sends a user's credentials over UDP Only encrypts the password

Remote Authentication Dial-In Service (RADIUS)

Which remote access solution provides you with full remote access to the graphical desktop of a Windows system, including the ability to run programs, manipulate files, and restart or power down the computer? Remote Desktop Screen Sharing Remote Assistance Telnet

Remote Desktop

A user works primarily in your organization's production area. However, she frequently needs to access data stored on the Windows 11 desktop system in her office while on the production floor. She would like to be able to use a Remote Desktop connection in the production area to remotely access her desktop system over the network. Which desktop user groups should you make her user account a member of in order to enable this Remote Desktop connection? (Select two.) Remote Desktop Users Administrators Guests Power Users Users

Remote Desktop Users Administrators

Which of the following help to improve the security of sensitive information on your mobile device if it is lost or stolen? (Select three.) Remote backup Up-to-date OS updates and patches Remote wipe Anti-malware software A screen lock Locator applications A firewall

Remote wipe A screen lock Locator applications

You've just installed several devices to a computer at once, but now the computer fails to boot properly. Which of the following troubleshooting steps is the BEST to try first? Change the configuration of a single device. Swap a single device with one that you know to be good. Swap all of the devices with those you know to be good. Remove all of the newly added devices and install them one at a time.

Remove all of the newly added devices and install them one at a time.

Anna has been backing up her data on a hot swappable drive that is mounted on an external hard drive docking station. This docking station holds two drives. Anna would like to exchange one of the drives with a drive of higher storage capacity. Which of the following is the BEST method for replacing the drive? Remove and replace the drive without powering off the computer. Remove and replace the drive after using the Safely Remove Hardware feature to shut down the device. Power off the computer and then remove and replace the drive. Afterward, power on the computer and test the drive. Use the Disk Management tool in Control Panel to prepare the bad drive for ejection.

Remove and replace the drive after using the Safely Remove Hardware feature to shut down the device.

You have ordered and are about to replace an LCD screen on a laptop device. You have already placed the laptop on a static mat, attached a static wristband, and unplugged the laptop. What is your next step in replacing the LCD screen? Remove the bezel. Remove the video ribbon. Remove the battery. Remove the screen.

Remove the battery.

A point-to-point interface typically found in enterprise-level storage systems, like RAID and tape drives.

SAS

Your computer is not performing properly; an update was recently installed. Which of the following actions from the Windows 10 Settings app is the BEST troubleshooting choice to try first for this situation? Reset your PC. Use the Startup Repair function. Remove the installed Windows update. Go back to a previous version of Windows.

Remove the installed Windows update.

You have an Inkjet printer attached to the laptop computer in your home office. With a document ready to print, you select the Print option from your word processor. Unfortunately, shortly after the job has started, the printer stops printing. You turn the printer off. Which of the following actions should you perform to fix the printer? Remove the jammed paper by restarting the printer, which automatically attempts to clear the paper jam. Remove the jammed paper from the way it entered the printer. Remove the jammed paper by sending another file to the printer. Remove the jammed paper following its regular path.

Remove the jammed paper following its regular path.

You have a system that has been overheating. Which of the following actions will NOT help to keep the system cool? Removing the case side panel. Cleaning off the inside of the computer case. Adding thermal paste or a thermal pad between the CPU and the heat sink. Installing heat spreaders and heat sinks on internal components. Installing a water cooling system.

Removing the case side panel.

Your older notebook LCD display often goes dim or sometimes blank. Which of the following would be the BEST first step to resolve this issue? Reconnect the video ribbon. Replace the CCFL inverter. Replace the LCD screen display. Tighten down the bezel screws.

Replace the CCFL inverter.

While servicing your laptop, you notice that your Lithium Ion battery is swelling. What is the BEST action you can take to resolve the situation? Check the battery again in a few days. Remove the battery and cool it down. Check the battery's voltage. Replace the battery.

Replace the battery.

Your computer has a single core processor installed. The motherboard supports processors with up to four cores. You want to upgrade your computer to a quad-core system. Which of the following is part of the configuration steps? Configure the system to use dual-channel memory. Add a second processor that matches the speed of the first processor. Replace the existing processor with one that has four cores. Remove the terminating resistor from slots where the new processor is located.

Replace the existing processor with one that has four cores.

You work for a company based in Phoenix, Arizona, which is a very hot and dry area. Several people in the research department have reported that even though their files are printing to the laser printer correctly, a much lighter copy of the same text also prints within 2 to 3 cm of the original text. Which of the following would MOST likely fix this type of ghosting image? Vacuum the fuser assembly to clean off excessive ink toner. Use a heavier weight paper to avoid paper shift. Replace the imaging drum, as it is probably at end of life. Remove the toner container and gently shake it to remove clumps from the image toner.

Replace the imaging drum, as it is probably at end of life.

As a technician in a computer repair shop, you have determined that the processor in a laptop needs to be replaced with one with a faster processing speed. However, when you remove the keyboard to expose the processor, you notice that the processor is soldered onto the motherboard. Which of the following is the BEST solution for replacing the processor? Replace the entire laptop with one that has the processor needed. Replace the motherboard with a faster processor. Upgrade the memory in the laptop. Unsolder the processor and solder a new one into the motherboard.

Replace the motherboard with a faster processor.

An employee calls to complain that their computer is behaving erratically. Some days, it functions correctly, and other days, it crashes frequently. Sometimes, the system won't boot at all. You open the system case and notice the following: Two of the mounting screws are missing from the system hard disk drive. The system uses memory modules from several different manufacturers with mismatched capacities. Several capacitors on the motherboard are bulging and have a brown liquid oozing from them. The chassis fan on the front of the case is oriented to blow air into the system. What should you do? Replace the leaky capacitors on the motherboard. Reorient the chassis fan to draw air out of the system case. Replace the existing memory modules with matching modules. Replace the motherboard. Use additional screws to mount the hard disk drive to the system case.

Replace the motherboard.

Frequently used in modern computers to connect hard drives to the motherboard.

SATA

Which interface is primarily used for internal hard drives in modern desktop PC systems? SATA USB Firewire SCSI PATA

SATA

You are servicing a client's computer that has been randomly restarting. You decide to test the power supply voltage on the 12 V rail using a multimeter. Which of the following BEST describes the action you should take based on the multimeter reading shown below? (10.24 V on multimeter) Continue using the power supply until the voltage drops to less than 9 volts. Replace the power supply because it is failing. Keep using the power supply, but stop using that 12 V rail. Switch the voltage selector on the back of the power supply to 230 volts AC.

Replace the power supply because it is failing.

Your system crashes at various times. It happens sometimes on startup, sometimes when running a software application, and sometimes when a certain group of applications is running. You suspect a malfunctioning CPU, but none of the common issues seem to be present. You have not configured overclocking. There is no overheating. The CPU is seated correctly and locked into its socket. What is the BEST step you can take to determine if the CPU is causing the system crashes? Switch to a comparable CPU from a different manufacturer. Throttle the processor to reduce the operating frequency and minimize power consumption. Downgrade to a CPU that has fewer cores and is less demanding on your system resources. Replace the suspect CPU with a known good CPU of the same make and model.

Replace the suspect CPU with a known good CPU of the same make and model.

When playing videos games or watching movies on your workstation, the screen sometimes freezes and displays strange colors. You suspect that your video card is causing the issues. What is the BEST solution to resolve your display issues? Update the video card driver. Check the video card connectors. Replace the video card. Check the video card fan.

Replace the video card.

Which of the following DHCP scope options will assign a static IP configuration to a device using the device's MAC address? Reservation Exclusion Default gateway IP range

Reservation

Which tool can you use to display hardware utilization statistics that tell you about your computer's operation? Advanced System Settings Event Viewer Computer Management Resource Monitor

Resource Monitor

You are a network engineer for a large financial institution. While monitoring a server on your WAN network, you notice that it is experiencing a bottleneck, slow cursor movements, and lagging application function. You want to determine if a particular process is causing the problem. Which of the following tools would BEST help you troubleshoot an issue with a process by providing information such as process ID, status, and threads, as well as how much CPU is being used in real time and the 60-second average of how much CPU utilization is being consumed by each process? Resource Monitor Reliability Monitor Task Manager Performance Monitor

Resource Monitor

You are an IT technician for your company. Fred calls you to complain that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware? Purchase a new disk and deploy a backup image of Windows. Format Fred's disks and perform a clean installation of the operating system. Perform an image deployment from a backup image to restore Fred's computer to a known good point. Restore Fred's computer back to a previous restore point.

Restore Fred's computer back to a previous restore point.

Micka, a tech-savvy employee, tried to upgrade her computer from Windows 10 to Windows 11 from the internet. Something went wrong during the upgrade, and Micka's computer will no longer boot to Windows. She has brought her computer to the IT department for you to repair. You have tried to repair the computer, but you are unable to get it to boot to Windows. Which of the following methods would be the QUICKEST way to get Micka's computer back to its original Windows 10 operating system? Using the Windows 10 DVD, perform an upgrade. Connect her computer to your external flash drive and install Windows 10 from the data it contains. Restore her system using the recovery partition. Download and reinstall Windows 10 from the internet.

Restore her system using the recovery partition.

You are assisting the security administrator and discover that a user was logged in to their workstation after hours. After further investigation, you discover that the user's account was compromised, and someone used the account to steal sensitive data. Which of the following could have BEST prevented this from happening? Implement a screen saver lock. Restrict the user's login times to work hours only. Implement a password reset policy. Require a stronger password.

Restrict the user's login times to work hours only.

Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you can find out what's going on and how to improve her computer's performance. You run Task Manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following actions can you take from Task Manager to immediately stop the application from running? Right-click > End task Right-click > Switch to Right-click > Disconnect Right-click > Disable Right-click > Stop

Right-click > End task

You have just completed installing an application from the Microsoft Store on your Windows 11 workstation. Which of the following can you use to access and manage your newly-installed application? (Select two.) Right-click the Start menu, select All apps, and then right-click the application. Right-click the Start menu's application tile. Right-click Start, select the application, and select Settings. Right-click Start and select Apps & Features. Right-click the Start menu, select the application, and then select Settings.

Right-click the Start menu's application tile. Right-click Start and select Apps & Features.

For a special project, you have been asked to recommend the lowest profile desktop computers available. You are attempting to put together the specifications for these machines. Which of the following types of cards are attached to the motherboard and allow additional cards to be installed? VESA local bus Riser PCMCIA Communications and networking riser

Riser

You want to connect your internal network to an external network in order to provide internet access to your employees. Which of the following network components is designed to make this type of connection? Router PoE Switch Hub

Router

You notice that the hard drive on your iMac Pro is running slower than before. You decide to run the First Aid utility to optimize the drive. Which of the following is recommended to make sure that the First Aid utility is 100% effective? Check Disk Usage in the Storage tab. Defragment the hard drive first. Run First Aid by booting into Recovery Mode. Make sure that the hard drive is at 80% or less capacity.

Run First Aid by booting into Recovery Mode.

A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue? Check the results of a cell tower analyzer. Remove all Bluetooth pairings. Perform a soft reset on the device. Run an anti-malware scan.

Run an anti-malware scan.

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run on Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application? (Select two.) Make all users who need to run the application members of the local Administrators group. Run the application in Compatibility Mode. Run the application in its own memory space. Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs. Purchase a new application that runs on Windows 10.

Run the application in Compatibility Mode. Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs.

A technician is tasked with adding a valid certificate to a mobile device so that encrypted emails can be opened. Which of the following email protocols is best for the technician to use? POP3 S/MIME IMAP IMEI

S/MIME

Which of the following is a specialized controller that you can use to remotely manage all your network devices? SSH SDN PoE VLAN

SDN

You are working on your Windows 10 computer during a fierce thunder storm. Lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools is MOST likely to rectify this issue? bootrec chkdsk defrag SFC

SFC

You've used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share? RDP SFTP SMB LDAP

SMB

You have been hired to investigate a recent cybersecurity attack. You have discovered that the attacker was able to send commands to the server using the login fields and steal user credentials from the database. Which of the following attacks was your client MOST likely the victim of? SQL injection Brute force Cross-site scripting On-path

SQL injection

Which of the following identifies the network name on a wireless network? MAC address WEP key WPA2 passphrase SSID

SSID

Which of the following protocols can encrypt emails on a mobile device? SSL SMTP IMAP POP3

SSL

Which Active Directory service simplifies how users log in to all the systems and applications that they need? SSO Domain Workgroup PIN

SSO

Provides access to software and data through the cloud.

SaaS

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network? PaaS IaaS SaaS DaaS

SaaS

Your company cloud service currently provides data storage, processing, and network connectivity that hosts several services and applications used by your employees. You want to transition to a cloud service that provides many of these services and applications natively without the IT department needing to constantly maintain and update the services and applications. In addition, the IT department wants to make sure that the cloud service provides employees with resources that are segregated from other employees. Which of the following cloud service solutions meets these requirements? PaaS with a fine-grain multi-tenancy implementation. PaaS with a simple multi-tenancy implementation. SaaS with a fine-grain multi-tenancy implementation. SaaS with a simple multi-tenancy implementation.

SaaS with a simple multi-tenancy implementation.

You want to create a virtual machine environment in which you can develop and test new software. Which virtualization benefit BEST describes the testing environment that you want to implement? Hardware virtualization Cross-platform virtualization Sandbox Hypervisor

Sandbox

A healthcare organization provides mobile clinics throughout the world and needs to transfer patients' statistical data to a central database via the internet. Which network technology would be BEST to use to ensure network connectivity for any clinic located anywhere in the world, even remote areas? Dial-up Satellite DSL Cable modem ISDN

Satellite

An administrator configures the Time Machine application on macOS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following? Driver and firmware updates Scheduled disk maintenance Patch management Scheduled backups

Scheduled backups

Which remote access solution is built into macOS? Remote Assistance Screen Sharing Quick Assist Remote Desktop

Screen Sharing

What else does the macOS Keychain utility store besides passwords? (Select two.) Public keys Password preferences Security configurations Security notes Certificates

Security notes Certificates

One of the Windows workstations you manage has three user accounts defined on it. Two of the users are Limited users, while the third (your account) is an Administrative user. Each Limited and Administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likely increase this system's security? (Select two.) Assign each user a simple password so that they won't be tempted to write it down. Set a screen saver password. Change the two Limited user accounts to Restricted users. Disable Autorun on the system. Enable the Guest account.

Set a screen saver password. Disable Autorun on the system.

You recently upgraded a client's older workstation to Windows 11. The client has called to complain that the interface is very slow. For example, after clicking on the Start button, the Start menu slowly appears on the screen. Which of the following will MOST likely fix this problem without requiring a hardware upgrade? Increase the display resolution. Increase the hardware acceleration settings. Set the visual effects for best performance. Increase the display's color depth.

Set the visual effects for best performance.

You want to set up a Windows system to also be able to boot to Linux. To be able to dual boot, the system needs a partition on which to install Linux. However, you don't have an extra hard disk that can be used for the Linux partition. The existing disk has no unpartitioned space available, but it has about 300 GB of free space. Which of the following disk management operations will BEST prepare your hard disk for dual boot in this scenario? Shrink the primary partition. Reformat the disk with the partitions needed for a dual boot system. Convert the disk from basic to dynamic. Convert the disk from physical to logical partitions.

Shrink the primary partition.

After arriving at work, you turn on your computer to begin your day. Instantly, you see smoke and smell a strange odor coming from the computer. Which of the following would be the MOST important action to take first? Shut off the system immediately. Open the computer case and look for dust buildup. Call the IT director. Log in and check Event Viewer.

Shut off the system immediately.

A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence? Copying the contents of memory to removable media Restricting physical access to the system Disconnecting the system from the network Shutting down the system

Shutting down the system

Which of the following Windows 11 options lets you associate your local user account with an online Microsoft account? Family & other users Users and Groups Manage my accounts Sign in with a Microsoft account instead

Sign in with a Microsoft account instead

Which peripheral device is best for capturing a customer's signature when they check out at a convenience store or supermarket? Signature pad NFC device Touchpad Card reader

Signature pad

Which of the following is a risk associated with using a web browser password manager? Web browser password managers cannot store complex passwords. You are limited to the number of passwords you can store in a web browser password manager. Signing in with the browser password gives a hacker control over all passwords stored on the browser. Passwords stored in the password manager may not work on newer web pages.

Signing in with the browser password gives a hacker control over all passwords stored on the browser.

Does not provide redundancy. Does not provide protection from a single storage device failure.

Simple

Which optical media has the greatest storage capacity? Single-layer, single-sided Blu-ray Disc Dual-layer, single-sided DVD Compact disc Dual-layer, double-sided DVD

Single-layer, single-sided Blu-ray Disc

Which of the following statements is true regarding single- and double-sided memory? Single-sided RAM can be organized into two banks. Single-sided memory uses half the number of memory modules as double-sided memory of the same capacity. Double-sided RAM allows the computer to access all of the memory. Double-sided RAM always has modules on both sides of the circuit board.

Single-sided memory uses half the number of memory modules as double-sided memory of the same capacity.

While running a presentation editor on your Windows 11 laptop, your computer locks up. When you try powering on your computer, Windows 11 will not start. Which of the following tools should you use FIRST to try and resolve the issue? Startup Repair Backup and Restore Restore Files Recovery Drive

Startup Repair

You have just installed the latest Windows updates on your Windows 11 computer. After the computer has rebooted, you get the following error message: Error: Windows failed to start. A recent hardware or software change might have caused the issue after you installed Windows updates. Because your computer won't start, you have booted your computer into the Advanced Options section of the Windows 11 recovery environment (see image below). While troubleshooting this issue, which of the advanced options would be the BEST to try first? System Image Restore System Image Startup Repair Command Prompt Startup Settings

Startup Repair

List the steps (3) you need to follow to add more disk space to a storage space in Windows. Drag the correct step from the left to the correct step number on the right.

Step 1 Install a new storage device on the system. Step 2 Add free space on a new storage device to a storage pool. Step 3 Allocate space from the storage pool to an existing storage space.

When using TCP, two hosts first establish a connection through a three-way handshake. From the items on the left, drag the three valid steps in the three-way handshake process to the right in the appropriate order. The first host sends a SYN packet asking to create a new session. The first host sends a SYN-ACK packet asking to create a new session. The receiving host replies with an ACK packet that the session can be created. The receiving host replies with a SYN-ACK packet acknowledging that the session can be created. The first host replies with the ACK packet, which then opens the session. The first host replies with a SYN packet, which then opens the session.

Step One: The first host sends a SYN packet asking to create a new session. Step Two: The receiving host replies with a SYN-ACK packet acknowledging that the session can be created. Step Three: The first host replies with the ACK packet, which then opens the session.

A security incident is currently occurring on your company's network. You discover that the attack involves a computer system that is attached to the network. You are unsure what kind of damage is being done to the network systems or data. Which of the following actions should you take FIRST? Determine whether you have the expertise to conduct an investigation or whether you need to call in additional help. Examine the active computer system to analyze the live network connection, memory contents, and running programs. Stop the attack and contain the damage by disconnecting the system from the network. Document and photograph the entire crime scene, including the current state of the attached computer system.

Stop the attack and contain the damage by disconnecting the system from the network.

Which of the following network types uses special hardware to provide high-speed access to storage across the network? Storage area network Peer-to-peer network Client-server network Local area network

Storage area network

You want to create a high-performance Windows laptop with both a 2-TB hard drive and a 1-TB SSD drive. Which of the following are data storage recommendations for your high performance system? (Select two.) Automatically back up important data on the hard drive to the SSD drive. Store heavily used information on the SSD drive. Store data that requires high performance on the SSD drive. Store heavily used information on the hard drive. Store data that requires high performance on the hard drive.

Store data that requires high performance on the SSD drive. Store heavily used information on the hard drive.

Susan works in the research and development department. She recently purchased a large high-speed external drive and has attached the drive to her computer using a USB cable. Her drive requires a minimum data transfer speed of 5 Gbps and needs to have access to 600 mA/15 volts of USB power to function properly. Although the correct drivers are installed, when she plugs her drive into her workstation, the drive is not working. To troubleshoot the problem, she has connected her drive to her coworker's computer, where the drive functions properly. No additional cables are required for this drive. Which of the following is the MOST likely reason that Susan's external hard drive is not working? Susan has connected her drive using a Type-C cable, which does not have enough power for her drive. Susan has connected her drive to a USB 3.2 port, which does not support the minimum data transfer speed required. Susan has connected her drive to a USB 2.0 port, which does not have the required data transfer speed. Susan has connected her drive to a USB 3.2 port, but the drive is only made to work with a 2.0 port.

Susan has connected her drive to a USB 2.0 port, which does not have the required data transfer speed.

Your job functions have recently changed. As a result, you find that you need to work with more programs running on your Windows computer at the same time. As a result, you're now starting to receive error messages warning you of low virtual memory, but there's no additional RAM that can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages? System Troubleshooting Programs Device Manager

System

Which of the following troubleshooting utilities scans the operating system files and replaces corrupt files? System Image Recovery System Restore Services System File Checker

System File Checker

Jason owns a MacBook Pro and is having an issue with his USB drive. Which of the following tools could Jason use to view information about the USB drive controller? Device Manager System Information utility ls usb Devices and Printers

System Information utility

A new computer has been added to the sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings must you use to make the change? System Properties > Advanced System Properties > Computer Name System Properties > System Protection System Properties > Remote

System Properties > Computer Name

Marcus was attempting to edit some registry settings on his Windows 11 system. Now, when he tries to boot his system, it hangs after the Windows splash screen is displayed. Because he cannot boot to Safe Mode, he boots the system from the Windows installation disc and accesses the Recovery Environment. Which Recovery option should Marcus use FIRST to help resolve his boot issue? Go Back to the Previous Build Use BOOTMGR System Restore Reset this PC

System Restore

Which of the following is true about System Restore? User data will be affected. System changes made since the restore point was taken are undone. If the restore freezes, you can cancel the restore process. Device drivers installed since the restore point will not be affected.

System changes made since the restore point was taken are undone.

You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically? msconfig Task Manager Task Scheduler msinfo32 Services

Task Scheduler

Which user type is the Windows Beta channel recommended for? The average user Commercial users Administrators Highly technical users

The average user

What are the fundamental differences between a DVD drive and a Blue-ray drive? (Select two.) Blue-ray discs are removable and can be used with other drives. The Blu-ray laser has a shorter wavelength, which allows data to be packed more tightly on the disc. Blu-ray uses a blue laser instead of a red laser. Blue-ray drives can only handle high definition video files. Blu-ray drives can read and write.

The Blu-ray laser has a shorter wavelength, which allows data to be packed more tightly on the disc. Blu-ray uses a blue laser instead of a red laser.

An employee complains that every time they turn their computer off, the computer's time is set to 12:00 p.m., and the date is set back to January 1, 1990. Which of the following is the MOST likely cause of this anomaly? The CMOS settings are not being saved before the computer powers off. The CMOS battery has failed. The CMOS chip is failing. The CMOS chip on the motherboard is loose.

The CMOS battery has failed.

When you boot your computer, it hangs after asking you for the current time and date. What is the MOST likely problem? The CMOS battery has failed. Daylight savings time has started or ended. The BIOS is outdated. The computer needs more RAM.

The CMOS battery has failed.

Which of the following actions occur during the Pre-EFI Initialization (PEI) stage of the UEFI boot process? (Select two.) Device drivers are loaded into memory. The CPU and chipset are verified and fully initialized. Power is supplied to the CPU. System memory is initialized, verified, and allocated. The EFI boot manager initializes.

The CPU and chipset are verified and fully initialized. System memory is initialized, verified, and allocated.

You work at a computer repair store. You have just upgraded the processor (CPU) in a customer's Windows-based computer. The customer purchased the latest AMD Ryzen processor, and you installed it in the computer. But when you power the computer on, you only see a blank screen. Which of the following is MOST likely causing the computer to display the blank screen? (Select two.) The power connector for the fan was not connected to the motherboard. Someone unplugged the computer without performing a proper shutdown first. The CPU is not supported by the BIOS. The CPU is bad. The heat sink and fan were not installed correctly.

The CPU is not supported by the BIOS. The CPU is bad.

Jason has installed a new hard drive (HDD) in his Windows PC workstation. He wants to use it to store multimedia files for his private video editing business. After installing the HDD in the PC case, he boots the PC in to the BIOS and verifies that the HDD is recognized by the system. When he tries to save files to the new HDD, he receives an error message. What is the MOST likely reason that Jason cannot save data to his new HDD? The HDD is not connected to the power supply. The HDD is not properly seated in the expansion slot. The HDD needs to be partitioned and formatted with a file system. The HDD SATA data cable is connected upside down.

The HDD needs to be partitioned and formatted with a file system.

A laptop has a wired connection to a network and is configured with a static IP address. The link light on the NIC is lit, but the laptop cannot communicate with any hosts on the local network. Which of the following is the MOST likely cause of the issue? The laptop is connected to a hub instead of a switch. Packet collisions are preventing the laptop from sending or receiving network communications. The IP address conflicts with another host on the local network. The network settings are configured with the wrong gateway address.

The IP address conflicts with another host on the local network.

You are troubleshooting a malfunctioning laptop computer system. The customer has indicated that the screen is always dark and difficult to read, even while the system is plugged into a wall outlet. You checked the system and determine that the backlight isn't working. Which of the following is the MOST likely cause of this issue? The wrong AC adapter is being used with the system. The LCD cutoff switch is stuck in the Off position. The laptop video adapter is malfunctioning. The laptop battery is failing and needs to be replaced.

The LCD cutoff switch is stuck in the Off position.

Which of the following are advantages of using an OEM replacement LCD display? (Select two.) OEM parts are designed to be used as generic replacement parts. The LCD display is guaranteed to work as a replacement. The LCD display is the same quality as the screen you are replacing. The OEM LCD part is better quality than a non-OEM part. The price of the LCD display replacement is equal to non-OEM parts.

The LCD display is guaranteed to work as a replacement. The LCD display is the same quality as the screen you are replacing.

Rachel wants to use Screen Sharing to allow a system administrator to remotely access her Apple iMac. However, when she initiates the Screen Sharing session, the administrator is not able to access her iMac desktop from his iMac computer. What is the MOST likely reason that the administrator cannot access the Screen Sharing session? Screen Sharing is not enabled on Rachel's iMac. The VNC Viewer setting is not enabled. The Observe mode is not enabled. The administrator is not included in her Specific Users Only list.

The administrator is not included in her Specific Users Only list.

Your laptop's LCD screen is beginning to flicker and dim. You have checked the brightness setting to make sure that it is configured correctly. Which of the following is the MOST likely cause of your screen issue? The video ribbon cable to the screen is disconnected. The LCD screen is failing. The system is configured to use an external display port. The LCD screen inverter is failing.

The LCD screen inverter is failing.

Which of the following best describes the GNU General Public License (GPL) that is associated with the Linux kernel source code? The Linux source code remains freely available to anybody who wants it. You can freely utilize, but not change, the Linux source code. The Linux source code remains free to those who use it for non-commercial applications. You need to pay a yearly fee to access and change the Linux source code.

The Linux source code remains freely available to anybody who wants it.

Jack has a small retail business. He had a custom application developed for his inventory tracking. All of Jack's company computers have an operating system on them that will soon reach end of life because a newer version was released two years ago. Jack is afraid that his custom inventory application won't be compatible with the new version of the operating system. Which of the following is a risk that Jack is taking if he continues to use the operating system after its end of life? He may lose some of the OS's features that he relies on. The OS will become increasing vulnerable to cyberattacks. He may lose sales during the migration process. The custom application may no longer be compatible.

The OS will become increasing vulnerable to cyberattacks.

You have just finished replacing the motherboard in your friend Ethan's computer with the same type of motherboard that the computer had originally. You tested the motherboard by powering it on and by verifying that the operating system started and that the applications work. Now Ethan is complaining that his computer no longer recognizes his external hard drive, which he had connected to the previous motherboard. Which of the following is MOST likely causing the external hard drive not to function? The computer's power supply was not connected properly. The replacement motherboard does not support external hard drives. The hard drive has failed. The USB front panel connector was not properly connected.

The USB front panel connector was not properly connected.

Which of the following is the biggest advantage of 64-bit processors over 32-bit processors? Use of the IA-32 instruction set. The ability to run multiple applications at the same time. The ability to use over 4 GB of memory. Support for hyper-threading.

The ability to use over 4 GB of memory.

Which of the following BEST describes the purpose of the north bridge chipset? The chip that controls the PCI bus. The chip that controls all of the USB ports. The chip that controls the audio. The chip that controls the system BIOS.

The chip that controls the PCI bus.

Which of the following factors significantly determine the number of virtual machines that a host can accommodate? (Select two.) The number of software applications installed on the host machine. The components installed on host machine. The VHD file you want to use. What has been allocated by the network manager. Installation of integration services (IS) on the virtual machine.

The components installed on host machine. What has been allocated by the network manager.

You have used EFS to encrypt a directory of highly sensitive company files on your hard drive. You then decide to copy one of the files in the directory to a thumb drive to edit the files on a laptop computer while you are travelling to an industry conference. What is the result of copying the file to the thumb drive? The file will no longer be encrypted. The file remains secure and accessible. The file becomes inaccessible. The file is compressed and remains secure.

The file will no longer be encrypted.

Lately, your computer has been spontaneously shutting down after only a few minutes of use. What is the likely cause? (Select two.) The CPU is bad. The heat sink and fan were not installed correctly. Someone unplugged the computer without performing a proper shutdown first. The power connector for the fan was not connected to the motherboard. The CPU is not supported by the BIOS.

The heat sink and fan were not installed correctly. The power connector for the fan was not connected to the motherboard.

Tyler has a computer with a Windows 32-bit operating system. He wants to install an application that requires a 64-bit operating system. Which of the following is likely to happen if he tries to install it anyway? The installation will fail. Windows will isolate the 64-bit binaries by redirecting Registry calls to allow the program to run. Windows will use WOW64 to run the application, but the program will run slowly. The program will install a 64-bit driver and will run normally.

The installation will fail.

You are troubleshooting a malfunctioning notebook computer system. The user has indicated that the LCD screen suddenly became dark and difficult to read while they were downloading a large file through the wireless network while the system was plugged in at their desk. You have checked the system and determined that the backlight has stopped working. Which of the following are the MOST likely causes? (Select two.) Malware was installed as part of the download that targeted the backlight circuitry. The inverter in the LCD assembly has malfunctioned. The wireless network card is emitting radio signals that interfere with the backlight, causing it to stop functioning. The extended download placed high demands on the system DC power, causing the BIOS to shut off the backlight. The cold cathode fluorescent lamp (CCFL) has burned out and needs to be replaced.

The inverter in the LCD assembly has malfunctioned. The cold cathode fluorescent lamp (CCFL) has burned out and needs to be replaced.

What happens in Windows when physical RAM is being used to its full capacity and a user runs a new application? Windows crashes. The CPU sends an error code to the user. The VMM divides the data from each app to different hard drives. The kernel moves the data from an app not currently being accessed from RAM to a paging file.

The kernel moves the data from an app not currently being accessed from RAM to a paging file.

Which of the following identifies the interface ID component of an IPv6 address? (Select two.) The last four quartets of an IPv6 address. The fourth quartet of an IPv6 address. The first four quartets of an IPv6 address. The last quartet of an IPv6 address. The last 64 bits of an IPv6 address. The first quartet of an IPv6 address.

The last four quartets of an IPv6 address. The last 64 bits of an IPv6 address.

When you try to boot your computer, it hangs after POST. When you access the UEFI setup program, you see that the date is several years behind, and the time is set to 12:01 a.m. Which of the following is the MOST likely cause of this behavior? The UEFI firmware is corrupt. The motherboard battery has failed. A RAM module has become unseated from its socket. The UEFI firmware is outdated.

The motherboard battery has failed.

A customer wants to add an additional video card to her computer so she can play the latest computer games. As a result, this system will now have a multi-GPU configuration. Which of the following statements are true when it comes to a multi-GPU configuration? (Select two.) Linking only shares memory resources, not GPU resources. The motherboard should support either SLI or CrossFire. Linking video cards also provides additional video output ports. An SLI video card can be linked with a CrossFire video card. For the best performance, both video cards should be identical.

The motherboard should support either SLI or CrossFire. For the best performance, both video cards should be identical.

As a Help Desk Level 2 operator, you are attempting to use Remote Desktop to connect to an employee's Windows desktop to resolve a printing issue that has been escalated from a Level 1 operator. You know that both your Windows computer and the employee's Windows computer are configured correctly for this Remote Desktop connection. You also have the correct connection information. However, you are having problems accessing the employee's desktop. Which of the following is the MOST likely reason that you cannot connect to the desktop? The employee's computer is turned off. Your firewall is not set up to allow the connection through port 3389. The remote session from the Level 1 operator has not been disconnected. You have the wrong IP address for the employee's computer.

The remote session from the Level 1 operator has not been disconnected.

Which of the following BEST describes authorization? The resources that a user can access. The process of verifying a user's identity. The policy of allowing employees to use their own devices for work purposes. The process of giving users access to only the resources they need.

The resources that a user can access.

Your projector is displaying the colors on the screen incorrectly. What is the MOST likely reason for this problem? The projector driver needs to be updated. The projector's filter sensor was triggered. The source computer's resolution settings do not match the projector's resolution settings. A VGA cable was used to connect the computer to the projector.

The source computer's resolution settings do not match the projector's resolution settings.

You have a thin-provisioned storage space that suddenly unmounts. What is the MOST likely cause of this problem? The storage space has become corrupted. A new storage device has been added to the pool. One of the disks in the storage space pool has crashed. The storage space has run out of disk space.

The storage space has run out of disk space.

You have just purchased a new computer. This system uses UEFI firmware and comes with Windows 11 preinstalled. You recently accessed the manufacturer's support website and saw that a UEFI firmware update has been released. You download the update. However, when you try to install it, an error message is displayed that indicates the digital signature on the update file is invalid. Which of the following MOST likely caused this to happen? Interim UEFI updates that have been released since the system was manufactured need to be installed before you can install the latest update. SecureBoot has been enabled in the UEFI firmware configuration. The system has a rootkit malware infection. The update file has been tampered with.

The update file has been tampered with.

What are the disadvantages of plasma display technology? (Select two.) They usually display colors less accurately than LCD displays. They consume less power than LCDs. They have low contrast and cannot produce true black. They generate much more heat than other display types. The gasses inside the cells are sensitive to air pressure fluctuations.

They generate much more heat than other display types. The gasses inside the cells are sensitive to air pressure fluctuations.

You are using an older utility to manage a GPT-partitioned drive on a Windows 10 system. You only see a single partition. However, you know you have multiple partitions across the hard drive. What is the MOST likely reason that you only see one partition? The utility is displaying the drive's unprotected MBR. The utility is only designed to work with Windows 7 or 8. The utility can only manage MBR partitions and is displaying the drive's protected MBR. The utility can only display dynamic partitions.

The utility can only manage MBR partitions and is displaying the drive's protected MBR.

Which of the following requirements must be met in order to extend a volume? (Select two. Each correct answer is a complete solution.) The target partition must not have a drive letter. The volume must be unformatted. The volume must have an empty folder. The volume must be formatted with NTFS. The volume must be spanned.

The volume must be unformatted. The volume must be formatted with NTFS.

Jesse, a professional graphic designer, has just installed a new application on his system, which needs a lot of memory for timely processing and high-quality images. Jesse's computer has an integrated graphics card. Which of the following is MOST likely to happen when Jesse runs the application on his computer? The whole system will run slowly. The battery life will diminish quickly when running the app. The graphics card will generate a lot of heat. The graphics card will produce high-quality images without delay.

The whole system will run slowly.

Which of the following situations is MOST likely to justify an investment in a Cat 6a cable instead of a Cat 6 cable? Users will be doing a lot of high-resolution printing. The cable needs to be run though a raised floor. The work area has a lot of electromagnetic interference (EMI). Users will be streaming a lot of video.

The work area has a lot of electromagnetic interference (EMI).

You have used a template as the source for a new sales proposal. To avoid overwriting the template, you have saved the proposal using the Save as feature. Knowing that Mark has been your best editor in the past, you decide to send him this new proposal to review and edit. However, when Mark receives the file, he promptly sends you an email stating that the file cannot be opened. You resend the file again, but Mark still cannot open the file. Which of the following is the MOST likely reason the file will not open on Mark's computer? The file was corrupted during the sending process. The wrong file extension was used when saving the file. The wrong default app is selected for the type of file that you sent. Mark's computer does not have the same program you used to write the proposal.

The wrong file extension was used when saving the file.

Hannah has been working for your company for several years. Recently, she moved to a new department, which is located on a different floor. After the move, Hannah informs you that when she tries to print a Microsoft Word document (the same program she has always used), the printer on her new floor prints page after page of seemingly random characters. Which of the following is the MOST likely cause of Hannah's print problems? The wrong printer driver has been selected. The cable connecting the printer to the network is failing. The program used to create the document has a bug. The hard drive on the print server is corrupt.

The wrong printer driver has been selected.

Which of the following is true of the way many large digital media vendors use Digital Rights Management technology today? (Select two.) They are moving away from DRM because of several key shortcomings in the technology. They are adopting alternatives to DRM, such as encouraging customers not to illegally share digital files. They are cooperating with other vendors to make their digital files more portable in relation to those vendors' hardware and software. They are offering free backup copies of protected digital files. They are moving to strengthen the encryption used to protect their digital files.

They are moving away from DRM because of several key shortcomings in the technology. They are adopting alternatives to DRM, such as encouraging customers not to illegally share digital files.

Your company has decided to use only SATA drives in their systems. Which of the following is true of MOST newer SATA drives? They can be added to or removed from a system without shutting down the computer, but you must enable them from Device Manager. They can be plugged into a system without shutting down the computer, but not removed without shutting down. They can be added to or removed from a system without shutting down the computer, but only after you install the latest driver from Device Manager. They can be added to or removed from a system without shutting down the computer.

They can be added to or removed from a system without shutting down the computer.

You want to set up storage spaces for several employees in your company with a maximum allocation of 100 gigabytes per drive. However, you only have 500 gigabytes of available space left in the pool where you want to create the storage spaces. Which Storage Spaces feature can you use to allocate more space than what is actually available? Pools Data resiliency Partition shrinking Thin provisioning

Thin provisioning

You have been asked to implement a RAID 5 solution for an engineer's desktop workstation. What is the minimum number of hard disks you can use to configure RAID 5? Two Three Four Five Six

Three

Requires at least five storage devices. Protects your data if two storage devices fail at one time.

Three-way mirror

Which of the following processor features is MOST likely to significantly reduce power consumption based on current operating conditions? Hyper-threading Multi-core Throttling Overclocking Caching

Throttling

Which of the following statements are true regarding administrative shares? (Select two.) To connect to an administrative share, you must use the UNC path. Adding a ! sign to the end of a share name creates an administrative share. By default, Windows automatically creates an administrative share for every volume. Default administrative shares grant access to the Administrators or Power Users group. If you are a member of the Administrators group, the administrative shares are visible to you when you browse the network.

To connect to an administrative share, you must use the UNC path. By default, Windows automatically creates an administrative share for every volume.

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to a locked door in the reception area. They use an iPad application to log any security events that may occur. They also use their iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area so that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations are you MOST likely to make to this organization to increase their security? (Select two.) Train the receptionist to keep their iPad in a locked drawer when not in use. Move the receptionist's desk to the secured area. Replace the biometric locks with smart cards. Disable the network jacks in the reception area. Require users to use screen saver passwords.

Train the receptionist to keep their iPad in a locked drawer when not in use. Disable the network jacks in the reception area.

Which of the following is one way that developers and organizations who produce open-source software can generate revenue from the software? Training contracts Persistent activation licenses One-time activation licenses Enterprise licenses

Training contracts

Anna, a user, downloaded a free PDF editing application from the internet. Now her laptop constantly displays desktop pop-ups, and several applications don't start. Which of the following types of malware was Anna the victim of? Trojan Spyware Social engineering Worm

Trojan

Which of the following is a program that appears to be a legitimate application, utility, game, or screen saver, but performs malicious activities surreptitiously? Ransomware Worm Scareware Trojan horse

Trojan horse

Mobile device applications fall into two categories. Some are reviewed, approved, and signed with a certificate by the app service, while others are not. Which category do apps fall into if they have been reviewed, approved, and signed with a certificate?

Trusted

Which of the following components is a special hardware chip included on a computer's motherboard that contains software that generates and stores cryptographic keys? BitLocker partition BIOS/UEFI Trusted Platform Module (TPM) USB device

Trusted Platform Module (TPM)

Your company is creating a financial application that you want to first test on mobile devices. Several customers have asked to be part of the beta testing process. What do the employees need to do on their mobile devices in order to be able to participate in the beta test? Jailbreak their mobile devices. Enable authentication on their mobile devices. Install and use a password manager. Turn on Developer Mode.

Turn on Developer Mode.

You have logged into your banking website using a password, but now the website indicates that it sent you an email with a confirmation code that you need to retrieve and enter before you can continue to access the website. Which of the following security measures is being used? Two-factor authentication Certificate authority Extensions Hash code

Two-factor authentication

Requires at least two storage devices.

Two-way mirror

You want to create a virtualization environment that runs directly on the host machine's hardware to manage the virtual machines. Which of the following virtualization types should you use? Type 2 hypervisor Type 1 hypervisor VDI Container virtualization

Type 1 hypervisor

A laptop that you previously purchased was shipped with SO-DIMM memory to accommodate the laptop's form factor. You would now like to upgrade the memory. Which of the following is an upgrade to the SO-DIMM standard? UniDIMM SODIMM2 DDR3 DDR4

UniDIMM

You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which of the following internet appliances should you install? Spam gateway Proxy server Unified Threat Management Load balancer

Unified Threat Management

You have just finished installing a new Windows Update when your computer locks up. What should you do first? Run a System Repair Reset your PC Complete a System Restore Uninstall the Windows Update

Uninstall the Windows Update

Maria, a smartphone user, has recently installed a new app. She now experiences a weak signal and sometimes a complete signal loss at locations where she used to have a good cellular signal. Her phone battery is fully charged. Which of the following actions would BEST address this issue? Reset to factory defaults. Force stop the new app. Uninstall the new app and scan for malware. Use a cell tower analyzer to determine normal signal strength.

Uninstall the new app and scan for malware.

Your Windows OS starts to act strangely. You find out that there was a Windows automatic update three days ago. Which of the following would be BEST to try first to resolve the issue? System Restore Startup Repair System Image Recovery Uninstall the update

Uninstall the update

You are walking through a shopping mall. Your smartphone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of this message? Weak or dropped cellular signal Leaked personal files Unintended Wi-Fi connections Unauthorized location tracking

Unintended Wi-Fi connections

You want to perform an upgrade from Windows 10 to Windows 11 on your laptop computer without going directly to a website or external source to retrieve or access the upgrade package. Which of the following should you use? Installation Assistant ISO Installation Media Updates and Security SCCM

Updates and Security

You have a workstation running a 64-bit version of Windows 10 Professional that you would like to upgrade to Windows 11 Professional. You want to preserve the existing data, settings, and applications. Which of the following would be the BEST installation methods to use to install Windows 11? Repair Custom/clean In-place Upgrade

Upgrade

Adding more RAM does not necessarily improve system performance. Which of the following must you also do to make sure that system performance does improve? Upgrade the CPU to one with multiple cores. Rebuild the Windows profile. Reboot the system. Uninstall the most current update.

Upgrade the CPU to one with multiple cores.

You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without losing any data. Which of the following is the BEST step to perform to accomplish this? Run the convert command. Delete the partitions and re-create them as simple volumes. Upgrade the disk to a dynamic disk. Run the fixboot command to convert the partition type to GPT.

Upgrade the disk to a dynamic disk.

You have overclocked the processor on your workstation to run at a higher speed. Now the workstation is overheating, and you are concerned that the processor might become damaged. Which of the following is the BEST solution to this issue? Adjust the motherboard bus, processor, and memory settings. Run a benchmark test. Reset the clock time back to its original setting. Upgrade the workstation cooling devices.

Upgrade the workstation cooling devices.

You have a desktop computer that provides a 250-watt power supply. You recently added a four-disk RAID 10 array to the system, and now it spontaneously shuts down. Which of the following would MOST likely solve this issue? Upgrade to a power supply that provides more watts. Upgrade to smaller capacity hard drives. Upgrade to a power supply that provides more volts. Use the switch on the power supply to switch from 115 VAC to 230 VAC.

Upgrade to a power supply that provides more watts.

A user installs a new graphics application on her Windows system. During the installation process, the application prompts the user to load a custom video driver that has been optimized for the application. She does so and then completes the installation. Several days later, the user reports that her display doesn't seem to be working properly under some conditions. To fix the problem, you need to reload the old video driver. Which of the following actions are the BEST choices to resolve the issue? (Select two.) Boot to the Advanced startup menu and select Last Known Good Configuration. Use Device Manager to roll back the video driver. Boot from the Windows installation media and select the Startup Repair option. Revert the system to a restore point prior to installing the video driver. Use Device Manager to disable the video driver.

Use Device Manager to roll back the video driver. Revert the system to a restore point prior to installing the video driver.

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? (Select two.) Use Resource Monitor to monitor memory utilization. Use Task Manager to monitor disk activity. Use Task Manager to monitor memory utilization. Use Reliability Monitor to monitor memory utilization. Use Reliability Monitor to monitor system reliability. Use Resource Monitor to monitor disk activity.

Use Resource Monitor to monitor memory utilization. Use Task Manager to monitor memory utilization.

You have an application that renders videos for your online business. You want to make sure that the application continues to receive adequate attention from the system CPU, even if you open other applications. How can you adjust the amount of attention given to that application? Use Task Manager to modify the process priority. Use Task Manager to switch to the running application. Use the Services console to change the startup type to Automatic. Use Task Manager to modify the processor affinity.

Use Task Manager to modify the process priority.

Jeremy has just purchased an entry-level filament 3D printer to create three-dimensional game accessories. He has just printed his first game piece, but there are problems with adhesion between the filament layers, and the final piece is slightly warped. Which of the following BEST provides the solution to Jeremy's issues? Use a heated bed Calibrate the build platform Calibrate the stepper motors Calibrate the extruder

Use a heated bed

You work for a small company as the human resources specialist. Since the company is fairly small, you are maintaining all of the employee information on your desktop computer, which is running Windows 11. This computer has two high-capacity hard disks. You want to ensure that this information is protected from a hard disk failure, so you want to set up a Windows software RAID system. Which of the following would be your BEST solution? Use mirrored volumes. Use striped volumes. Use spanned volumes. Use RAID 5 volumes.

Use mirrored volumes.

You are troubleshooting a malware infection. As part of the remediation process, you have used a USB drive to boot into a lightweight version of Windows. Which of the following did you MOST likely boot into? System Restore WinPE Safe Mode Sheep dip computer

WinPE

You have a business where employees are often called away from their desks for 30 minutes or more at a time. Many do not shut down or lock their computers before walking away because they don't want to take time to log on again when they return. Which of the following options from the Windows 10 Settings app is the BEST choice for keeping these computers secure considering the employees' behavior and situation? Have each person shut down their computer when leaving and use Windows Hello Fingerprint when signing on again. Have each person sleep their computer when leaving and use a password to sign on again when they return. Use a paired device that employees always keep on their person to lock and unlock their computer through the Dynamic lock option that works through proximity. Have each person use the Windows key plus the L key to lock the screen when they leave and use a PIN when they return to log on again.

Use a paired device that employees always keep on their person to lock and unlock their computer through the Dynamic lock option that works through proximity.

You have created a system image of Windows 11 on your laptop before updating several applications on your hard drive. The system image is stored on an external hard drive. After updating one of the applications, you are required to restart your laptop. However, during the restart, you receive an error message that the system is unable to reboot. You try to restore the system image from the external hard drive, but you are unsuccessful. Which of the following do you need to do BEFORE successfully restoring your Windows 11 system using the system image? Set the BIOS/UEFI settings to boot from the external hard drive first. Use a recovery disc to restore the operating system. Copy the system image to a network computer and access the image from there. Copy the system image to the Windows hard drive and then start the recovery process.

Use a recovery disc to restore the operating system.

You work as the IT administrator for a small corporate network. One of the company employees needs to add an additional PCI card to the motherboard. When you open the computer, you see that the card that you purchased does not fit due to the card's height. Which of the following is the BEST method for using the newly purchased card? Use a riser card to allow the new card to be installed parallel to the motherboard. Use a FireWire card to allow the new card to be installed parallel to the motherboard. Use a parallel card to allow the new card to be installed parallel to the motherboard. Use an expanded case to accommodate the height of the newly purchased card.

Use a riser card to allow the new card to be installed parallel to the motherboard.

As a network administrator for several hundred machines, you have been given the task of listing all workstations and servers in your company network that have less than 16 GB of RAM. What is the BEST method for accurately collecting this data? Use a script to run a query of all machines. Check each machine's IT record. Remotely connect to each machine. Send out an email requesting the information.

Use a script to run a query of all machines.

You are building a new computer from both new and used parts. The video card is a PCIe video card that requires an 8-pin power connector. However, your power supply does not have an 8-pin PCIe power connector. Which of the following solutions would be the least expensive option for your system? Connect the 8-pin processor cable to the video card. Use an adapter cable to connect two 4-pin Molex connectors to the 8-pin PCIe connector. Purchase a new power supply with the necessary connector. Purchase a new video card that does not require a power connector.

Use an adapter cable to connect two 4-pin Molex connectors to the 8-pin PCIe connector.

You need to connect a monitor that provides an HDMI port and a VGA port to a video adapter in a PC system that uses a DVI-D connector. Which of the following options provides the BEST display quality at the lowest cost? Use an adapter to connect the monitor VGA port to the DVI-D connector on the PC. It is not possible to connect this monitor to this PC. Use an adapter to connect the monitor HDMI port to the DVI-D connector on the PC. Purchase a new monitor with a DVI-D port.

Use an adapter to connect the monitor HDMI port to the DVI-D connector on the PC.

You have five salespeople who work out of your office and who frequently leave their laptops laying on their desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection method to address your concerns? Implement screen saver passwords. Encrypt all company data on the hard drives. Require strong passwords in the Local Security Policy. Use cable locks to chain the laptops to the desks.

Use cable locks to chain the laptops to the desks.

You want to combine storage space from two different hard disks into a single logical storage unit on your Windows computer. Which of the following is the BEST step to perform? Use basic disks and a primary partition. Use dynamic disks and a simple volume. Use dynamic disks and a spanned volume. Use basic disks and an extended partition.

Use dynamic disks and a spanned volume.

Which of the following is currently the most in-use operating system in the world? Chrome OS macOS Ubuntu Windows

Windows

Aubrey, an employee in the marketing department, has told you that when she prints to her laser printer, faint ghost-like images are being printed on her new page. As an IT administrator, you check with other employees who use the same printer and find that they are not experiencing the same problem. Which of the following would be the BEST fix for this issue? Remove the toner cartridge and gently shake it to equally distribute the image toner. Use pre-printed paper that has been printed with laser-compatible print toner. Use 99% isopropyl alcohol and a soft cloth to gently clean the imaging drum. Replace the imaging drum, as it is probably at end of life.

Use pre-printed paper that has been printed with laser-compatible print toner.

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following would be the FASTEST way to transfer a good file to the computer? Establish remote assistance and transfer the file within the session. Attach the file to an email and have the user copy the file to the correct folder. Use the C$ administrative share to copy the file. Have the user share the folder as a local share and copy the file to the share.

Use the C$ administrative share to copy the file.

A customer who uses a Windows computer purchased an Inkjet printer from your store. He recently called to complain that the colors in the photos he prints on his new printer do not match the colors in the original photos. Which of the following actions will MOST likely resolve the issue? (Select two.) Run the Windows FIXCOLR utility to automatically calibrate the driver's color settings. Use the Color Management tab of the printer driver to calibrate the driver's color settings. Educate the customer on the limitations of Inkjet printers. Use Driver Rollback to restore an earlier version of the printer driver. Download and install the latest printer drivers. Instruct the customer to upgrade to a color laser printer.

Use the Color Management tab of the printer driver to calibrate the driver's color settings. Download and install the latest printer drivers.

As the system administrator for a large financial institution, you have been assigned to upgrade the laptops for the sales representatives in your company. You have installed a 2-TB SSD drive in each of the laptops for quick access and storage of large multimedia files. You have also upgraded the memory to 16 GB and made sure that all the device drivers are updated. After delivering the upgraded laptops to the sales representatives, you begin to receive calls and emails saying that saving videos and other large files to the SSD drive is sluggish and sometimes impossible. Which of the following is the BEST first-step solution for trying to resolve the issue? Replace the SSD drive with a similar SSD drive from another manufacturer. Replace the SSD drive with an identical SSD drive that you know works well. Use the Roll Back Driver option in Device Manager to use the original SSD driver version. Remove the SSD drives and upgrade the HDD drives to ones with a larger storage capacity.

Use the Roll Back Driver option in Device Manager to use the original SSD driver version.

Which of the following are options for connecting a computing device, such as a notebook computer or tablet, to a cellular network? (Select four.) Use a USB transmitter to connect the device directly to the cellular network through a satellite. Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot. Use a USB cable to connect the device to the cellular network through a cable modem. Use an integrated cellular antenna to connect the device directly to the cellular network. Use a USB cable to connect the device to the network through a smartphone. Use a USB cellular adapter to connect the device directly to the cellular network. Use the device's Wi-Fi to connect to the cellular network through a cable modem's Wi-Fi antenna. Use an integrated transmitter to connect the device directly to the cellular network through a satellite.

Use the device's Wi-Fi to connect to the network through a cellular Wi-Fi hot spot. Use an integrated cellular antenna to connect the device directly to the cellular network. Use a USB cable to connect the device to the network through a smartphone. Use a USB cellular adapter to connect the device directly to the cellular network.

A user opens a help desk ticket to replace a laptop keyboard. The user reports that the cursor randomly moves when typing, causing them to make frequent typing corrections. The problem does not occur when the laptop is attached to a docking station and an external keyboard is used. You want to find a more affordable solution than replacing the keyboard. Which of the following actions BEST mitigates this problem? Decrease the operating system's mouse speed setting. Use the special function key to disable the touchpad when the laptop keyboard is used. Increase the screen resolution so that mouse movements are more granular. Lower the screen resolution so that mouse movements are less granular.

Use the special function key to disable the touchpad when the laptop keyboard is used.

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery. Which of the following Transport layer IP suite protocols is MOST likely used for this service? Transport Layer Protocol (TCP) Internet Control Message Protocol (ICMP) User Datagram Protocol (UDP) File Transfer Protocol (FTP)

User Datagram Protocol (UDP)

Which of the following statements about an SSL VPN are true? (Select two.) Uses port 443. Uses UDP port 500. Uses pre-shared keys for authentication. Encrypts the entire communication session. Provides message integrity using HMAC. Encapsulates packets by adding a GRE header.

Uses port 443. Encrypts the entire communication session.

As the network engineer for a large financial institution, you have been given the responsibility to provide a new financial desktop to the financial advisors in all company branch offices. The requirements for the software desktop include: It must be a virtualization solution. It must be hosted in the cloud by a third party. It must run on a tablet. Which of the following virtualization types BEST meets your desktop software requirements? Container virtualization Type 1 hypervisor VDI Type 2 hypervisor

VDI

A technician is tasked with configuring a mobile device to connect securely to the company network when the device is used at off-site locations where only internet connectivity is available. Which of the following should the technician configure? IMAP Bluetooth VPN Hotspot

VPN

Which of the following is another name for the paging file? Upper memory Random access memory Extended memory Virtual memory

Virtual memory

Which of the following is simulated memory that is created through a paging file on the hard drive? Virtual memory RAM Disk thrashing VMM

Virtual memory

You are building a PC workstation and are ready to install a newer hard drive (HDD) into an empty drive bay in the PC case. Which of the following steps should you complete first? Verify that the HDD has been detected by the BIOS or UEFI firmware. Verify that the power supply and SATA cables can reach the HDD. Connect the HDD to the SATA interface on the motherboard. Connect the HDD to the power supply.

Verify that the power supply and SATA cables can reach the HDD.

You have just set up a color laser printer on a customer's Windows workstation. You have connected the printer to the workstation using a USB cable and have loaded the appropriate drivers. Which of the following are the BEST steps to take next? (Select two.) Set the print driver to print grayscale by default to reduce color toner consumption. Use Driver Rollback to make a backup copy of the new printer driver. Verify that the printer is working correctly by printing a test page. Edit the printer's properties to configure paper tray and other device-specific settings. Use the USBTEST utility in Windows to verify that the USB connection is working properly.

Verify that the printer is working correctly by printing a test page. Edit the printer's properties to configure paper tray and other device-specific settings.

You have recently been given an older laptop to use for performing basic tasks such as sending emails and editing documents. However, when the display changes from one color to another, you notice that there is some distortion in the image. Which of the following LCD technology types is MOST likely being used for the LCD display? Organic light-emitting diode (OLED) In-plane switching (IPS) Twisted nematic (TN) Vertical alignment (VA)

Vertical alignment (VA)

Which of the following is the purpose of the Services snap-in? View historical data that describe the operating system's stability. View logs about programs, system events, and security. Display statistics that tell you about the operation of your computer. Manage end user applications running on your computer. View and manage software programs running in the background.

View and manage software programs running in the background.

A few of your employees have complained that their computers sometimes shut down spontaneously. You have noticed that these employees all work in a part of the building where the air conditioning does not adequately cool the room. These employees also use CPU-intensive programs. You suspect that the spontaneous shutdowns are caused by overheating. Which of the following is the simplest way to monitor the temperature of these computers' CPUs? Place thermostats on the PCs at the warmest locations. Place thermostats on the CPUs. Touch the PCs with your hand or fingers. View the temperature from within the BIOS.

View the temperature from within the BIOS.

Which of the following Windows desktop components lets you create multiple desktop to organize availability for different sets of applications? Taskbar Virtual desktop Settings Widgets

Virtual desktop

The human resources department wants to give gifts away at the company's summer party. They would like to have an assortment of fitness tracker wristbands, smartwatches, smart glasses, and virtual reality headsets. They have been trying to locate these on the internet, but have been unsuccessful. Which of the following types of mobile devices should you tell them to search for? E-readers Smartphones Tablets Wearable devices

Wearable devices

From your Windows laptop, you have been working on a large project that has required you to open a lot of items (programs, files, etc.). It is time to leave the office and make the two-hour journey home. You will be working on this project a bit more when you arrive at home. Your computer's battery is failing and only has a very short life span (about one hour) before your computer loses power. When you arrive home and open the laptop lid, nothing happens. After plugging in your computer and powering it on, you find that all of your programs and files have been closed. To troubleshoot, you open Control Panel and navigate to the settings that control what your computer will do when the laptop lid is closed. Which of the following power settings MUST you choose to prevent the same problem in the future? When I close the lid: Shut down When I close the lid: Sleep/Suspend When I close the lid: Hibernate When I close the lid: Standby

When I close the lid: Hibernate

When do you need to upgrade the system BIOS? Whenever you add a new peripheral device, such as a keyboard, mouse, or printer. Whenever you install a new hard disk drive. Whenever a BIOS update provides functionality that is not currently supported, but is required by the operating system or hardware. Whenever the BIOS settings need to be modified.

Whenever a BIOS update provides functionality that is not currently supported, but is required by the operating system or hardware.

You have just upgraded the memory in one of your network servers by adding two 4-GB ECC memory cards. Before purchasing the new memory, you made sure that the modules fit in the memory slots (packaging) and the speed (memory frequency) was supported by the memory controller. What did you forget to check that would significantly impact the memory checking of your new ECC memory cards? Whether or not the new memory modules are buffered. Whether or not the existing memory modules support parity RAM. Whether or not the existing memory modules support ECC. Whether or not the new memory modules are single- or double-sided.

Whether or not the existing memory modules support ECC.

What happens when you connect a new internal hard drive to a Windows PC? Windows automatically initializes (formats) the new hard drive. Windows automatically assigns the new drive to a pool. Windows automatically assigns the next available drive letter. Windows automatically partitions the new hard drive.

Windows automatically assigns the next available drive letter.

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches, you are concerned that your Windows 11 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers? Scheduled disk maintenance Windows updates Antivirus updates Scheduled backups

Windows updates

Which action is recommended to minimize the effect of scratches when wiping a disc to clean it? Wipe the disc in straight lines from the center to the edge. Use canned air specifically designed for electronics. Use a damp paper towel instead of a microfiber cloth. Wipe the disc in a circular motion on the surface.

Wipe the disc in straight lines from the center to the edge.

You are working as an installer for a small IT company. One of your residential clients has purchased some IoT devices and you have been tasked with installing them for the client. These IoT devices will be networked together in a small network. Each device will connect to each other and act a relay for the network signal so additional network infrastructure will not be needed. Which of the following best describes this type of network? Personal area network Wireless wide area network Local area network Wireless mesh network

Wireless mesh network

As the IT administrator for a small consulting firm, you want all the computers in the company office to be able to share files, printers, and local network resources. There are currently 15 computers in the office. Which of the following Windows features could you implement that would MOST closely match your network requirements? Remote Desktop Protocol (RDP) Workgroup Domain access Bitlocker

Workgroup

You are testing a printer that you just installed by using the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the MOST likely cause of the problem? Bad printer memory Wrong toner cartridge A problem with the printer power supply or power cable Wrong printer driver

Wrong printer driver

You are using a patch panel to connect the computers in your building to the appropriate switches, and you need to connect the Ethernet wires from the building network port cables to the patch panel. Where do you connect the wires on a patch panel? You connect the wires to the frontside of the panel. You connect the incoming wires to the front and the outgoing wires to the back. You connect the outgoing wires to the front and the incoming wires to the back. Yon connect the wires to the backside of the panel.

Yon connect the wires to the backside of the panel.

You have recently purchased a Windows 11 laptop and have just installed several applications, including a graphics editor. Using the application, you have edited several images that you need to send to a company executive for a presentation. However, you are experiencing problems using the application and are deciding whether or not to use the Reset this PC option to remove the application and try re-installing it. What can you expect to happen if you use this option? (Select two.) All your edited images will be removed. You are given the choice to keep your edited images. The laptop will be reset to the factory defaults. You can choose to remove only the graphics editor. The laptop will be reset to the last restore point.

You are given the choice to keep your edited images. The laptop will be reset to the factory defaults.

You are trying to push a memory module into a memory slot, but it is not seating properly. What is the MOST likely issue? You are trying to install the memory module backwards in the memory slot. You need to clear debris from the memory slot. You need to push down the slot tabs and move them back. You are trying to install a single-sided memory module in a double-sided slot.

You are trying to install the memory module backwards in the memory slot.

Which of the following is a benefit of extending a volume? You are increasing the access speed to files on the extended volume. You are able to add non-contiguous space to your system volume. You are adding fault tolerance to the volume. You can add space to the volume from another disk.

You can add space to the volume from another disk.

You have decided to use BitLocker as your whole disk encryption solution for the hard drive on your laptop. The laptop includes a TPM chip. What happens if you store the startup key required to unlock the hard drive in the TPM chip? You can boot the hard drive from another computer without providing the startup key. You are prompted to insert a USB drive with the startup key. You are prompted to provide the startup key before booting the hard drive. You can boot the hard drive without providing the startup key.

You can boot the hard drive without providing the startup key.

You currently use the Exchange email client on your desktop PC. You use the Exchange email client to connect to an email server, which utilizes the IMAP and SMTP protocols. You recently purchased an iPad, and you want to configure its Mail app to connect to your email server. Which of the following BEST describes whether you can accomplish this task? You cannot use the IMAP protocol for the Mail app. You must use POP3 instead. You can configure the Mail app on an iPad to connect to an email server using the IMAP and SMTP protocols. You can only connect the Mail app to email services such as Gmail or Yahoo! Mail. You must use SSL to secure the Mail app.

You can configure the Mail app on an iPad to connect to an email server using the IMAP and SMTP protocols.

You have recently purchased a third-party application and installed it on your workstation. However, after doing some maintenance work on the users and groups on your Windows system, the application begins to display error messages each time you try to run it. What is the MOST likely cause of the issue? You assigned the wrong permissions to your user account. You assigned the application user account to the Users group. You deleted a group that was created by the third-party application. You switched from a domain account login to a local login.

You deleted a group that was created by the third-party application.

Your system administrator shared a USB laser printer connected to your Windows 11 system so other users on the network could send jobs to it. A network user has sent a large job to the printer, but the print job has stalled. You try to delete the print job, but can't. Which of the following BEST describes the reason you cannot delete the print job? You do not have the Manage this printer permission. You do not have the Manage network printers permission. You do not have the Print permission. You do not have the Manage documents permission.

You do not have the Manage documents permission.

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select two.) Because you should be allowed one to three activations per user, this decision does not put you at risk for negative consequences. The software will eventually stop working properly for the 10 extra updates you installed. You expose your company to litigation by violating the software license agreement. You risk losing your job. The software company will never detect the violation, so negative consequences are unlikely.

You expose your company to litigation by violating the software license agreement. You risk losing your job.

You have purchased a refurbished Windows laptop and have just plugged the power adapter into the wall socket to begin charging the battery. However, after several hours of charging, the laptop does not turn on. What is the MOST likely cause of the power issue? The hard drive needs to be replaced. The Windows operating system is faulty and needs to be re-installed. One of the memory modules needs to be replaced. You have been given the incorrect adapter.

You have been given the incorrect adapter.

After installing a new RAM module, you boot your 64-bit system, but the display remains blank. What is the MOST likely cause of this issue? You have installed a 32-bit memory module. The POST failed to recognize the new memory. The Registry is configured to write to faulty sections of RAM. You have installed a non-parity RAM on an ECC system.

You have installed a non-parity RAM on an ECC system.

You have just installed a video card in a PCIe expansion slot in your Windows workstation. You have made sure that the card is connected to the power supply using an 8-pin connector. You also have your monitor connected to the video card. However, when you boot your workstation, it displays a blank screen instead of the Windows system. Which of the following is the MOST likely cause of the problem? You have not configured the motherboard in BIOS/UEFI to utilize the new video card. You have disabled the integrated video adapter. You forgot to link the bridge clip from the integrated video adapter to the video card. You inserted the video card into the wrong PCIe slot.

You have not configured the motherboard in BIOS/UEFI to utilize the new video card.

Where do you install the heat sink and fan once you insert the CPU into the motherboard socket? You install the heat sink on top of the CPU and the fan to the side of the CPU. You install both to the side of the CPU. You install both on top of the CPU. You install the fan on top of the CPU and the heat sink to the side of the CPU.

You install both on top of the CPU.

You are removing the bezel from a laptop's LCD display screen. After several attempts to pry up the bezel and remove it, you have not separated the bezel from the case. Which of the following is the MOST likely reason for your inability to remove the bezel? You missed a screw. The bezel is not designed to be removed. You have been using a metal tool to pry up the bezel. The bezel is glued in place.

You missed a screw.

In which of the following situations would driver rollback be the BEST option to use? You need to restore several driver files that were accidentally deleted. You recently installed a new video driver, and now the system behaves erratically. You recently installed a new application, and now the system behaves erratically. You accidentally deleted several important emails from Outlook and need to restore them.

You recently installed a new video driver, and now the system behaves erratically.

In which of the following situations should you install a firewall? You want to implement a password system for internet users who access your private website. You want internet users to see a single IP address when accessing your company network. You want to restrict internet users from accessing private data on your network. You want to improve internet performance by saving popular websites locally.

You want to restrict internet users from accessing private data on your network.

Which of the following are the MOST likely signs that your computer might need more memory? (Select two.) Your hard drive light on the system case is on for long periods of time. Your system boots, but the memory count is incorrect. You receive an exception error when running a software program. Your hard drive is constantly operating as you work. You system boots, but the display remains blank.

Your hard drive light on the system case is on for long periods of time. Your hard drive is constantly operating as you work.

You have just installed Windows 11 on your laptop, purchased an infrared camera, and set up Windows Hello facial recognition as your login option. As part of the setup process, you enter a PIN as a backup login method. After a few weeks of using facial recognition login, your infrared camera fails, and you are asked to enter your PIN. Because it has been several weeks, you have forgotten the exact number. You attempt to enter your PIN at least 24 times, but are never locked out. What is the MOST likely reason that you have not been locked out after several failed PIN login attempts? You have set up BitLocker for lockout, but you have also failed to set up your TPM chip. Your laptop does not have a TPM chip, and you have not set up BitLocker for lockout. You have failed to set up both your TPM chip and BitLocker for lockout. Your laptop has a TPM chip, but you have failed to set up BitLocker for lockout.

Your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.

What are the two mesh protocols that are used most often with IoT devices? (Select two.) Z-Wave Zbot Zensys Zigbee Zerg

Z-Wave Zigbee

Which of the following attacks exploits a vulnerability in software that has not been discovered by the developer? Zero-day attack Insider threat Brute force attack XSS attack

Zero-day attack

You want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer named Home1. Which of the following is an example of the UNC format? .Home1:Pictures \\Home1\Pictures Home1:\\Pictures Home1:Pictures

\\Home1\Pictures

On a Linux system using the Debian Package Manager, which of the following commands would you use to search online repositories for an installable Firefox package? apt search firefox yum search firefox rpm -s firefox apt-get search firefox

apt search firefox

Which of the following commands can you use to install updated packages (found in configured repositories) that are currently installed on a Debian Package Manager-based system? (Select two.) yum upgrade apt update yum update apt-get dist-upgrade apt dist-upgrade

apt-get dist-upgrade apt dist-upgrade

You use a Linux distribution that employs Debian Package Manager (dpkg) for package management. Which command would you use to install httpd (the Apache HTTP Server package) and all its dependencies? apt-get install httpd -dep yum install httpd -dep apt-get install httpd ps -e ps -ef yum install httpd dpkg install httpd

apt-get install httpd

You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use? attrib add r remove h attrib +r -h attrib /add r /remove /h attrib +ro -h

attrib +r -h

While troubleshooting an issue with an Apache web server on your Linux system, you need to look at the last several entries in the log file. Which of the following tools would be best suited for this task? (Select two.) Answer head ls cat dd tail

cat tail

You are an IT administrator who is troubleshooting a computer from within Windows Command Prompt. You are trying to execute the chkdsk command line tool, but it keeps failing. Which of the following command switches would give you the BEST information on how to run this command? chkdsk /i chkdsk /info chkdsk /? chkdsk /help

chkdsk /?

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following commands should the technician use? ls grep chmod ps

chmod

Which command would you use to display a simple list of all processes running on a Linux distribution that use either RPM or dpkg for package management? ps -ef ps -e yum info yum process info yum -ef yum -e apt-get -e apt-get -ef

ps -e

When you see the DNS server address, you realize that this information needs to be updated. Earlier in the day, you implemented a new DNS server with a new IP address. The workstation will update this information in 24 hours. Which command can you enter at the command line to update the DNS server information right away?

ipconfig /flushdns

You are the computer specialist for a small business. Your company server is named FS1 and has an IP address of 10.0.0.2. The hardware in your company server has started to experience intermittent failures, so you transfer the shares on the server to a spare server and take the main server offline. The spare server has an IP address of 10.0.0.3. You edit the existing A record for FS1 on your company's DNS server and redirect the hostname to the spare server's IP address of 10.0.0.3. Afterward, most users are able to access the shares on the spare server by hostname, but several users cannot. Instead, they see an error message indicating that the FS1 server cannot be found. Enter the command you can run from Command Prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart.

ipconfig /flushdns

You are troubleshooting network connectivity issues on a workstation. Which command would you use to request new IP configuration information from a DHCP server? ipconfig /renew ipconfig /all net config net use

ipconfig /renew

You want to know more about the usage, command syntax, and options available with the Linux cat command. What would you enter at the Command Prompt to display this information about the cat command?

man cat

While troubleshooting a Windows computer, you open a Command Prompt to explore the folders (directories) on the hard drive. You notice that one of the folders required for your project is missing. Which of the following Microsoft command line tools would allow you to QUICKLY create the missing folder? md rd sfc del cd

md

You are one of the IT administrators for your company. Your coworker, Rachel, says that when she boots her computer, it displays a message saying that one of her programs had an error while loading and is not working. To fix this issue, you would like to see if Windows can provide a log file that may give you a hint about what is failing at boot time. Which of the following Microsoft tools or consoles would MOST likely give you the ability to create such a log file? msconfig Device Manager Task Manager System Information

msconfig

A user has a problem accessing several shared folders on the network. After determining that the issue is not from his computer's IP configuration, you suspect that the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions? netstat ipconfig net use tracert

net use

Which utility can you use to view a computer's current connections, active sessions, and ports? netstat ipconfig nslookup ping

netstat

Resolves (looks up) a speficied hostname's IP address.

nslookup

Sends an ICMP echo request/reply packet to a remote host. A few simple replies to this request from the remote host indicates that a connection exists between sender and receiver. Performs a continuous connection test when used with the -t option.

ping

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation, and an application you are using is unable to connect to a Windows server named FileSrv2. Which of the following commands would work BEST to test network connectivity between your workstation and the server? (Select two.) ping arp nslookup tracert dig

ping tracert

You have had several employees call the help desk where you work, complaining that they are not able to reach the www.widgets.com server. To help troubleshoot this issue, you decide to run a variety of commands. Which of the following commands is MOST likely to return the IP address of the desired server? ipconfig www.widgets.com ping www.widgets.com ipconfig widgets ipconfig /all

ping www.widgets.com

You are the network administrator of a branch office for your company. The branch office network is part of a WAN that covers most of the United States. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. Which of the following TCP/IP utilities would be BEST to use to troubleshoot the routers? nslookup netstat nbtstat tracert

tracert

During a routine audit of a web server running on an RPM-based Linux system, you notice a package that is not installed from the standard server template. This is an error. Before you do anything, however, you need to find the package's dependencies. The package's name is orleans. Which of the following commands lists dependencies? apt info orleans apt search orleans yum info orleans yum list orleans

yum info orleans

You use a Linux distribution that uses RPM for package management. Which command would you use to install httpd (the Apache HTTP Server package) and all its dependencies? apt-get update httpd yum install httpd -dep yum update httpd apt-get install httpd yum install httpd

yum install httpd

You use a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on the system? yum show available ps -ef yum list all yum show all yum list available ps -e apt-get list apt-get list available

yum list available

You use a Linux distribution that utilizes RPM for package management. Which command would you use to verify that the httpd package (the Apache HTTP Server package) is installed? yum info httpd yum search httpd yum list installed httpd yum list installed

yum list installed httpd

On a Linux system using RPM for package management, which of the following commands would you use to search online repositories for an available Firefox package? yum search firefox apt search firefox apt-get search firefox rpm -s firefox

yum search firefox


Conjuntos de estudio relacionados

Culinary Essentials; Fruits and Vegetables

View Set

Federal Tax Considerations for Life Insurance and Annuities - Practice Questions

View Set

CLA 10 Unit 13 Trojan War: Beginning of Strife

View Set

Test bank: Ch.17 Gene Expression Bio 1

View Set

A Framework for Marketing Management Ch. 6

View Set