A+ 252 -300
D. exFAT
QUESTION 279 A technician installs Windows 7 on a 4TB hard drive. Which of the following should the technician choose when initializing the drive for the machine to access all the disk space? A. GPT B. FAT32 C. MBR D. exFAT
A. Configure remote desktop connection B. Configure BIOS to enable Wake-on-LAN
QUESTION 281 A technician has been tasked with remotely imaging a computer tab. The imaging process is failing because there is no response from the computers over the network. Which of the following should the technician perform to resolve the issue? (Choose two.) A. Configure remote desktop connection B. Configure BIOS to enable Wake-on-LAN C. Configure BIOS to enable SSH D. Configure automatic updates E. Configure startup applications F. Configure BIOS to enable PXE boot
B. Screen lock timeouts
QUESTION 297 A new policy requires all users to log on to their corporate workstations using smart card authentication. Which of the following best practices should be implemented to further secure access to workstations? A. Data encryption B. Screen lock timeouts C. Required screensavers D. Strong passwords
A. spoofing
A user has changed the MAC address of a laptop to gain access to a network. This is an instance of: A. spoofing B. brute force C. man-in-the-middle D. a botnet
E. mkdir
An administrator needs to create a new folder on a Windows PC. Which of the following commands should the administrator use? A. cd B. md C. sc D. ftp E. mkdir
A. Administrator
An employee installed a new application on a shared Windows 10 PC. The next day, it becomes the employee who installed the application is the only one who has access to the application. Which of the following types of user accounts does the employee MOST likely have? A. Administrator B. Guest C. Super user D. Standard user E. Limited user
A. Ransomware
QUESTION 252 Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key. Which of the following is MOST likely the cause? A. Ransomware B. Cryptomining C. Rootkit D. Keylogger
A. keys
QUESTION 253 A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange: A. keys B. passwords C. root CA D. tokens
D. ps and kill
QUESTION 254 A Linux user reports that an application will not open and gives the error. Only one instance of the A root administrator logs on to the device and opens a application may run at one time. terminal. Which of the following pairs of tools will be needed to ensure no other instances of the software are currently running? A. pad and chmod B. sudo and vi C. ls and chown D. ps and kill E. cp and rm
C. Update the SATA controller driver from the manufacturer's website
QUESTION 255 A technician responds to a report that a user's desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue? A. Roll back the OS upgrade. Continue using the older version of Windows B. Reset the PC to its factory conditions. Perform the OS upgrade again C. Update the SATA controller driver from the manufacturer's website D. Perform a full backup and replace the hard drive
A. Communicate the findings to the client and offer replacement options.
QUESTION 256 A client reports a laptop does not power on after a lightning storm. The technician diagnoses the problem as being a faulty motherboard. after replacing the motherboard and booting the laptop, the screen remains black, although the laptop displays an image on an external monitor. Which of the following would be the technician's NEXT step? A. Communicate the findings to the client and offer replacement options. B. Explain how to use the laptop with an external monitor and offer to set it up. C. Contact the sales department and provide a quote for a new motherboard. D. Document the repair process and provide a detailed report to the client.
B. Trojan
QUESTION 257 The general manager installed a popular archive utility. Antivirus software flagged the software because it was also exhibiting malicious behavior. This is an example of which of the following? A. Rootkit B. Trojan C. Spyware D. Worm
B. Multifactor authentication D. Trusted software sources
QUESTION 258 Which of the following provide the MOST security for PCs and mobile devices? (Choose two.) A. Access control lists B. Multifactor authentication C. Organizational unit D. Trusted software sources E. Pre-shared key
C. EFS
QUESTION 259 A folder is displayed in green in the tree of the local hard drive. Which of the following would describe what type of folder this is? A. Compressed B. PII C. EFS D. Hidden
D. Ensure the surge suppressors and devices are unplugged from the power sockets
QUESTION 260 A technician starts hard drive transfers in a SOHO that will take up to 16 hours to complete. Immediately after starting the transfers, the technician gets warning of a hurricane that will occur overnight. Which of the following is the BEST action to complete before leaving the office? A. Turn off the monitors and printers so they do not overheat B. Unplug the computers, but keep the hard drive transfer running C. Call the power company to turn off any power coming to the office D. Ensure the surge suppressors and devices are unplugged from the power sockets
B. gpresult
QUESTION 261 A technician creates a GPO, tests it in a test environment, and deploys it company-wide. After deployment, the accounting department does not seem to be receiving the GPO. The technician suspects another GPO that was specifically deployed to the accounting department is overriding the newly deployed GPO. Which of the following command line tools should the technician use to verify this suspicion in this situation? A. nbtstat B. gpresult C. nslookup D. gpupdate E. tasklist
B. Document the findings D. Identify the problem
QUESTION 262 A customer has just experienced a blue screen and the PC will not boot. A technician is dispatched to the customer's site. Which of the following are the FIRST and LAST steps the technician should take? (Choose two.) A. Test the theory to determine the cause B. Document the findings C. Establish a plan of action to resolve the problem and implement a solution D. Identify the problem E. Verify full system functionality and implement applicable preventive measures F. Establish a theory of probable cause
D. Unauthorized root access
QUESTION 263 A user purchases a new Android smartphone. After downloading an application from a third-party app store, the user consults a technician about additional applications that have installed automatically. Which of the following BEST explains what has happened? A. Unauthorized location tracking B. Unauthorized camera activation C. Unauthorized account access D. Unauthorized root access
B. Cell tower analyzer
QUESTION 264 A user's smartphone is getting a very weak signal from the service provider. One day the user notices the phone has full bars and the signal strength has inexplicably increased. Which of the following tools should be used to verify the user is connecting to a legitimate signal from the phone service provider? A. WiFi analyzer B. Cell tower analyzer C. Spectrum analyzer D. Packet analyzer
A. Terminate the running processes
QUESTION 265 A technician is troubleshooting a PC that has been running slow. The technician looks at the resource utilization and notices the user has many programs open. When attempting to open another program, the technician receives a message indicating there are insufficient resources. Which of the following should the technician do to troubleshoot the issue? A. Terminate the running processes B. Increase the page file size C. Renew the network connection D. Run chkdsk
B. PaaS
QUESTION 266 A company has a web application that is in the cloud on a multi-tenant server. The web application is connected to a database that is also in the cloud. Which of the following cloud computing concepts does this describe? A. IaaS B. PaaS C. SaaS D. DaaS
B. Change the antenna placement D. Change the radio power level
QUESTION 267 A small office owner has asked a technician to ensure all users in the office have the ability to access the wireless network but that the network is not accessible outside the building. Which of the following should the technician recommend? (Choose two.) A. Change the static IP addresses B. Change the antenna placement C. Change the default SSID D. Change the radio power level E. Change the encryption type F. Change the content filtering settings
C. Validate OS security patches in a test environment before pushing them to user machines
QUESTION 268 A technician for an enterprise company is determining the best method to keep the organization's Windows PCs up to date with OS security patches. Which of the following options would be MOST appropriate to deploy? A. Invest in a server solution to deploy virtual hosted desktops for all users B. Enable Windows updates to be installed manually by users C. Validate OS security patches in a test environment before pushing them to user machines D. Outsource OS security patch management to a third-party solution provider
A. Windows 7
QUESTION 269 A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following Oss should the technician recommend to ensure the BEST performance on this computer? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10
C. sudo
QUESTION 270 A technician is troubleshooting an application install on a Linux PC and cannot install the application. Which of the following would be the BEST tool for the technician to use to install the application? A. pwd B. su C. sudo D. ls E. sfc
B. Enable MAC filtering
QUESTION 271 The network administrator is investigating latency on a WiFi network. The administrator discovers a number of unidentified devices connected and wishes to limit access to only authorized users. Which of the following will BEST meet the requirement? A. Assign static IP addresses B. Enable MAC filtering C. Disable SSID broadcast D. Limit the DHCP scope
B. To reduce the likelihood of identity theft
QUESTION 273 Which of the following is the MAIN reason that corporate policies protect access to PII? A. To protect proprietary company data B. To reduce the likelihood of identity theft C. To maintain the integrity of knowledge management systems D. To limit access to those who "need to know"
C. Reconfigure the default program for the file type
QUESTION 274 A technician performs an in-place upgrade from Windows 7 to 8.1. After the upgrade is complete, a user reports that a frequently used file will not open. Instead, the user is prompted to search the Windows Store for an appropriate program to open the file. Which of the following should the technician do FIRST? A. Install the most recent Windows updates B. Verify the USMT worked properly C. Reconfigure the default program for the file type D. Perform System Restore E. Reinstall the program that is usually used to open the file
D. eventvwr
QUESTION 275 A technician is working on a computer when the PC suddenly experiences a blue screen and restarts before the technician can note the error message. The computer boots up normally, and the technician now wants to know which error message was displayed. Which of the following should the technician use to help troubleshoot the issue? A. sfc B. msconfig C. regedit32 D. eventvwr E. msinfo32
B. Utilize a different antivirus program and scan method
QUESTION 277 A home user reports the PC is running slow, and pop-up advertisements are appearing on screen. The user can access the Internet and performs an antivirus scan. A technician is now troubleshooting the problem and cannot update the antivirus to the latest definitions or navigate to the vendor's support website. Which of the following is the BEST next step to resolve this issue? A. Uninstall the antivirus program and apply operating system patches B. Utilize a different antivirus program and scan method C. Format and reinstall D. Reinstall the antivirus program from a shared executable
A. Key fob B. RFID badge F. Smartphone
QUESTION 278 Which of the following are examples of possession authentication? (Choose three.) A. Key fob B. RFID badge C. Passphrase D. PIN E. Passwords F. Smartphone G. Fingerprint reader
D. pwd
QUESTION 282 A technician is attempting to troubleshoot a Linux home folder issue, but does not remember which directory is current. Which of the following tools should the technician use to find the current directory? A. dir B. sudo C. cd D. pwd
B. PC backup and system image deployment
QUESTION 283 A technician needs to upgrade 20 PCs that have the same hardware specifications. The PCs must be configured with identical settings tailored for the network. Which of the following provides the BEST solution with the LEAST administrative effort? A. PC backup and multiboot setup B. PC backup and system image deployment C. PC backup and OS upgrade D. PC backup and clean install
A. Multiheaded client
QUESTION 284 A client has requested a workspace environment configuration that will allow employees to work in a virtual space for specific projects, but when working on other projects, allow them to work locally. Which of the following is the BEST solution for this virtual configuration? A. Multiheaded client B. Thin client C. Zero client D. Thick client
C. Unattended installation
QUESTION 285 A technician was told that 50 new computers were delivered. The company's standard Windows image needs to be installed on all of them. Which of the following would be the MOST efficient way to get the image on all 50 computers? A. Multiboot installation B. Repair installation C. Unattended installation D. Clean installation
B. Hybrid
QUESTION 286 A company wants to leverage a cloud infrastructure that allows it to keep confidential information away from other companies outside its industry while allowing data to be shared with other companies in the same field. Which of the following is the BEST option to accomplish this task? A. Public B. Hybrid C. Community D. Private
E. grupdate /sync
QUESTION 287 A domain administrator has applied a Group Policy that restricts the installation of USB devices. The technician has asked the domain administrator to exempt this policy for a computer that needs to have a USB digital camera installed. Once the domain administrator has exempted the computer from the policy, which of the following is the BEST command for the technician to run locally on the computer so the digital camera can be installed without waiting? A. grupdate /? B. grupdate /bootings C. grupdate /force D. grupdate /logoff E. grupdate /sync
B. Hard reset the cell phone
QUESTION 288 A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue? A. Remove and reinstall the application B. Hard reset the cell phone C. Reconnect the wireless network connection D. Close all running applications
B. Run Startup Repair
QUESTION 289 A technician is troubleshooting a computer that has been infected with a virus. Upon rebooting, the computer states that NTLDR is missing. The computer cannot boot into safe mode, and reinstalling the OS is not an option. Which of the following is the BEST option to use to restore the machine to a bootable state? A. Remove the CMOS battery B. Run Startup Repair C. Format the C drive D. Repair the MBR and then reboot
D. Power saving mode
QUESTION 290 A user reports the screen on a mobile device frequently dims even when the device settings are not being changed. Which of the following is MOST likely the cause? A. Faulty backlight B. High contrast mode C. Auto-brightness D. Power saving mode
A. DHCP reservations
QUESTION 291 To implement additional security on a small office wireless network, the administrator disables the DHCP server on the wireless router. To ensure traffic from specific network interfaces is able to traverse the router, which of the following should be used to limit traffic? A. DHCP reservations B. SSID broadcast deactivation C. MAC filtering D. Two-factor authentication
B. Remove the malware and recover the files from a backup
QUESTION 292 A user reports personal files have been renamed and are undecipherable. Images have been to the user's folder that request payment to unlock the files. The technician has quarantined the infected system and disabled System Restore. Which of the following should the technician do to unlock the user's files? A. Perform a clean installation of Windows B. Remove the malware and recover the files from a backup C. Initialize and repartition the hard drive to recover the files D. Run safe mode to decrypt the user's files
A. Do nothing
QUESTION 293 A user wants to connect a Windows notebook computer to an external desktop monitor, keyboard, and mouse. However, each time the user closes the notebook lid, the computer shuts down automatically. Which of the following options in the Power Settings menu should the technician select to prevent the automatic shutdown? A. Do nothing B. Sleep C. Hibernate D. Shut down
C. Asset ID, MAC
QUESTION 294 A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow? A. Domain name, location, IP address B. Domain name, location, asset ID C. Asset ID, MAC, Address D. Location, RFID
C. DNS server
QUESTION 295 Users are reporting web browsers are not working. A technician confirms that the end users can navigate to websites using the site's IP address. Which of the following is MOST likely causing this issue? A. Proxy server B. DHCP server C. DNS server D. SMTP server
B. Perform a malware scan in safe mode
QUESTION 296 A help desk technician receives a call from a user stating a program was installed and now random pop- ups are appearing on the computer. The technician notices a lot of suspicious network traffic generated by the user's computer. The technician quarantines the computer and disables System Restore. Which of the following is the NEXT step technician should take? A. Update the anti-malware software B. Perform a malware scan in safe mode C. Set up scheduled scans and updates D. Educate the end user on best practices
C. TPM
QUESTION 298 A technician wants to deploy a solution that will detect and prevent sensitive information from being saved on external storage. Which of the following should the technician implement? A. IPS B. FTPS C. TPM D. DLP
A. The technician did not disable the System Restore utility
QUESTION 299 A technician recently removed a malware infection from a client's computer. After removing the computer from the network, the technician used an approved customized tool to remove the malware, then updated the antivirus suite, and performed a scan that reported the system was clean. A week later, the client reports the same malware infection has returned. Which of the following is MOST likely the cause of the reinfection? A. The technician did not disable the System Restore utility B. The technician ran the malware remover before the antivirus scan C. The technician did not install a second antivirus suite to complement the first suite D. The technician did not put the computer back onto the network
C. System Restore
QUESTION 300 When starting a computer, a technician notices the computer displays a blue screen and reboots after POST. The technician completed several updates prior to encountering the blue screen. Which of the following tools would the technician use to resolve this issue? A. Disk Management B. Secure Boot C. System Restore D. msconfig E. fixboot
C. Data encryption
QUESTION 301 The office of admissions at a university has requested that all staff desktops be replaced with laptops. The staff members frequently go off-site for recruitment purposes and handle sensitive information. The technician is concerned about data leaks if a laptop is stolen. Which of the following is the BEST practice to use in this scenario? A. Cable locks B. Biometric security C. Data encryption D. Login time restriction E. LoJack