EXAM DUMP
NO.1 Which of the following Windows Enterprise OS version Offers BitLocker as a feature that can be enabled? (A). Windows 7 (B). Windows 8 (C). Windows 8.1 (D). Windows 10
A
NO.103 A security learn recommends a disaster recovery plan with the following requirements: * Recent backups should be readily available. * Only long-term backups should be stored off premises * There should be minimum expenditure on hardware. Which of the following satisfies all of these requirements? (A). Store 30 days of backups on premises and then age the backups to the public cloud (B). Store backups on premises and burst to the public cloud if needed. (C). Store backups both on premises and in a public cloud infrastructure (D). Store all the backups in a public cloud with no on-premises backup storage
A
NO.14 Joe, a mobile device user, reached his monthly quota of data about halfway through the current billing cycle. Joe contacts a technician to identify potential issues with the mobile device, as his usage patterns have not changed over the past month. Which of the following is MOST likely causing this issue? (A). There are unintended WiFi connections (B). Location tracking has been enabled (C). Applications are causing high resource utilization. (D). Malware is causing excessive data transmission
A
NO.19 A user reports slow performance on a computer. A technician checks the computer and finds the RAM utilization Is very high. The technician restarts the computer, and the RAM use is still high. The technician discovers a program running in the background Is using most of the RAM. The user only uses this program once at the end of the year to produce a report. Which of the following steps should the technician take to improve the computer's performance? (A). Uninstall and reinstall the program. (B). Perform a repair installation of the program (C). Install the latest updates for the program. (D). Disable the program on startup
A
NO.22 A user is working with the command line interface on a Linux computer. To show the contents of the current directory, which of the following commands should be used? (A). Is (B). dir (C). -get (D). mv
A
NO.23 A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue? (A). Roll back updates (B). Disable the Windows Update service (C). Check for updates (D). Restore hidden updates
A
NO.26 Which of the following would MOST likely be connected to a computer Id provide electricity in case of a blackout? (A). Battery backup (B). Surge suppressor (C). Portable generator (D). Power inverter
A
NO.27 Skip Which of the following is the MOST common method of allowing outside access through a wireless SOHO router for specific program access? (A). Enabling port forwarding (B). Creating a content filter whitelist (C). Increasing radio power levels (D). Properly placing access points
A
NO.3 Which of the following security settings can be changed on a folder to stop permission propagation and assign new rights? (A). Inheritance (B). Ownership (C). Sharing (D). Encryption
A
NO.38 An employee installed a new application on a shared Windows 10 PC. The next day, it becomes the employee who installed the application is the only one who has access to the application. Which of the following types of user accounts does the employee MOST likely have? (A). Administrator (B). Guest (C). Super user (D). Standard user (E). Limited user
A
NO.43 Which of the following is required to receive GPOs from a system's centralized servers? (A). Encrypting File System (B). Workgroup membership (C). Domain access Is (D). BitLocker
A
NO.44 An organization is developing testing schedules to ensure its disaster recovery plans will be effective in case of a disaster. In addition to the generators and UPS systems, which of the following should the technician recommend testing? (A). Server backups (B). Fire suppression systems (C). Emergency lighting (D). Alarm systems
A
NO.5 A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room? (A). Air filters (B). Privacy screens (C). Vacuums (D). ESD mats
A
NO.6 Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following should the technician have covered previously as part of the original repair? (A). End-user education (B). Pre-installation environment cleaning (C). Disabling of System Restore (D). Infected system quarantine
A
NO.62 Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe's slow data speeds? (A). Joe's data transmission is over the limit (B). The phone needs to be rebooted from overuse (C). The use of GPS interferes with data speeds (D). There is unintended Bluetooth pairing
A
NO.64 A systems administrator needs to reset a user's password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account. Which of the following should the systems administrator do? (A). Require the user to change the password at the next login. (B). Disallow the user from changing the password. (C). Disable the account. (D). Choose a password that never expires.
A
NO.65 A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT? (A). Reboot into safe mode and roll back the updates (B). Repair the Windows Registry (C). Configure boot options in the BIOS (D). Disable Windows services and applications
A
NO.66 A technician is attempting to remove a virus from the machine of a user who just returned from leave. The virus is a known signature that was identified 30 days ago. The antivirus solution the company is using was updated seven days ago with the most current signatures. Which of the following MOST likely allowed the infection? (A). The last antivirus update the machine received was seven days ago. (B). The user changed the machine's password 30 days ago. (C). The user manually killed the antivirus process. (D). The machine has not received an antivirus update in the past 30 days.
A
NO.7 A user's personal settings are not saving, and a technician suspects the user's local Windows profile is corrupt. The technician wants to check the size of the ntuser.dat file, but it does not appear in the user's profile directory. Which of the following Control Panel utilities should the technician use to correct this? (A). Folder Options (B). Sync Center (C). Display Settings (D). User Accounts
A
NO.75 A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT? (A). Check the contents of the hosts file (B). Do a System Restore to a date before the infection (C). Rerun the antivirus scan with higher sensitivity (D). Rebuild the OS on the machine
A
NO.83 A user needs assistance setting up auto-sync on a Windows 8 phone. Which of the following tools is MOST appropriate for this scenario? (A). Google Sync (B). OneNote (C). Dropbox (D). Amazon Cloud Sync
A
NO.87 A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance on this computer? (A). Windows 7 (B). Windows 8 (C). Windows 8.1 (D). Windows 10
A
NO.93 As part of a BYOD program, the organization requires BYOD users to register devices prior to using them on the organization's network. The registration process logs a unique identifier assigned to every mobile phone produced. Which of the following must be collected during the registration process? (A). IMEI (B). MIMO (C). IMSI (D). MAPI
A
NO.96 Which of the following is a risk to computer equipment when the humidity is low? (A). Static discharge (B). Corrosion (C). Frequent brownouts (D). Increased dust
A
NO.98 An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate? (A). Preserving chain of custody (B). Implementing data protection policies (C). Informing law enforcement (D). Creating a summary of the incident
A
Skip NO.10 A user wants to ensure important documents are protected from accidental deletion, system malfunctions, and malicious activity. Which of the following features should the user implement? (A). Run System File Checker (B). Configure recurring backups. (C). Allocate space to System Restore (D). Update antivirus software
A
Skip for now NO.63 A technician needs to remediate an infected computer. Which of the following is the FIRST step the technician should take? (A). Quarantine the system (B). Update the anti-malware software (C). Scan and remove the infections (D). Research the malware symptoms
A
Skip for now NO.68 A user's computer is quick to boot up but very slow at login. It tends to get faster throughout the day. A technician checks the RAM usage: and it looks fine during the day. The slowdown is MOST likely being caused by too many: (A). boot devices (B). startup applications. (C). device drivers. (D). Windows profiles loading
A
Skip for now NO.94 A recent ransomware attack caused several datasets to be inaccessible. Security technicians were able to mitigate any additional attacks and remove any unauthorized software. Which of the following should the technicians do NEXT? (A). Run an antivirus tool. (B). Boot to the Recovery Console (C). Update the software firewall (D). Restore from backup
A
NO.59 A technician has been tasked with remotely imaging a computer tab. The imaging process is failing because there is no response from the computers over the network. Which of the following should the technician perform to resolve the issue? (Choose two.) (A). Configure remote desktop connection (B). Configure BIOS to enable Wake-on-LAN (C). Configure BIOS to enable SSH (D). Configure automatic updates (E). Configure startup applications (F). Configure BIOS to enable PXE boot
A B
NO.81 Which of the following provide the BEST security for a server room? (Select two.) (A). Badge reader (B). Bollard (C). Biometric lock (D). Cable lock (E). USB token (F). Privacy window shades
A C
NO.21 Which of the following extensions identify files that are typically implemented as scripts? (Select TWO). (A). .vbs (B). .txt (C). .exe (D). .Up (E). .bat (F). .xlsx
A E
NO.12 A customer Is having trouble opening several files on a computer. The customer renames one of the files, but then the correct program will no longer open it. Which of the following settings is a solution to the issue? (A). Set the view options to detail. (B). Hide the extensions. (C). Utilize Credential Manager. (D). View the system files
B
NO.13 A help desk technician needs to make administrative changes securely on a remote user's machine. The user must be logged off when the changes are made. Which of the following tools would the technician MOST likely use? (A). RDP (B). Virtual network computing (C). Microsoft Remote Assistance (D). SFTP
B
NO.18 - Skip Which of the following is MOST likely to be specified as a system requirement for the installation of a photo editing application in Microsoft Windows? (A). HDD speed (B). RAM quantity (C). Network bandwidth (D). CPU compatibility
B
NO.24 Which of the following is the BEST method to secure a smartphone? (A). Disallow access to any mobile operating systems or application accounts (B). Require fingerprint unlock with password backup (C). Disable copy/paste and autofill functions across the entire device (D). Download and install all programs manually
B
NO.37 A systems administrator is configuring a new workstation. Which of the following will MOST likely be the administrator's FIRST step? (A). Set the screen timeout lock (B). Change the default administrator account (C). Require a BIOS/UEFI password. (D). Enable full-disk encryption.
B
NO.45 Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT? (A). Educate the end user on safe browsing and email habits. (B). Scan and remove the malware from the infected system. (C). Create a system restore point and reboot the system. (D). Schedule antivirus scans and perform Windows updates.
B
NO.50 A technician is reviewing system updates. Some of the updates address vulnerabilities found in mission-critical servers, and they need to be performed immediately. Which of the following should the technician perform FIRST? A. Implementation plan B. Risk analysis C. Back-out plan D. Change board
B
NO.53 A technician is attempting to create a hidden administrative share Administrative shares can be created by using which of the following symbols after the drive letter or share name? (A). # (B). $ (C). ! (D). &
B
NO.54 A technician notices a Windows computer is running slowly. The computer boots up slowly and has long delays when executing large files. The technician runs Disk Cleanup, but the problem persists. Which of the following will MOST likely help speed up the computer? (A). Boot into safe mode. (B). Reboot the computer (C). Defragment the hard drive (D). Install device drivers
B
NO.60 A technician is implementing a change to a piece of production environment. The change is causing other several other problem to occur. Which of the following should the technician do NEXT? A. Complete the change to the prod ction environment within the attotted time frame. B. Attempt to recreate the issues in QA environment troubleshoot them quickly. C. Begin following the back-out plan that was outlined in the planning meeting. D. Complete a risk analysis of the new changes and their potential impact on other systems
B
NO.67 A technician is installing an application on an Android system using the GUI. Which of the following extensions should the technician select to install the application? (A). .app (B). .apk (C). .exe (D). .sh
B
NO.70 A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT? (A). Reboot the computer (B). Restart the network services (C). Roll back the device drivers (D). Rebuild the Windows profiles
B
NO.71 Malware has been identified on a critical system that is currently quarantined. Which of the following should a technician do after the malware symptoms are correctly identified? (A). Educate the power user for that system. (B). Schedule weekly scans and run routine updates. (C). Disable System Restore. (D). Remediate the infected system.
B
NO.72 A company needs a software package for a new branch office. Which of the following license should the business purchase to allow correct licensing of the software? (A). Personal license tor each employee (B). Commercial license for each concurrent user (C). Open-source license for each installation (D). Enterprise license for all corporate computers
B
NO.80 Joe, a user, reports the programs and icons on his Windows desktop are much larger than they were the day before. He tried changing the screen resolution and restarting the computer, but it still does not look right. Joe also states the computer showed it was finishing updates when he first powered it on. Which of the following should a technician perform NEXT? A. Reboot the computer. B. Roll back the video driver. C. Reload the OS. D. Boot into safe mode
B
NO.86 Which of the following is a reason to use WPA over WEP? (A). Device compatibility (B). Increased security (C). TACACS (D). Multifactor authentication
B
NO.9 Joe, a user, notices someone use his computer while he was on break, Joe s browser history reveals searches for websites he did not visit. The local print also has document in the output tray with someone else's PII. Which of the following steps should Joe take to prevent unauthorized access of his account. (A). Lock the desktop while he is away (B). Change his password (C). Implement login time restriction (D). Change the default administrator password
B
NO.97 Which of the following identifies changes in the environment, such as alternating current failure? (A). UPS monitor (B). MSDS (C). ESD mat (D). Surge suppressor
B
Skip for now NO.82 A user lives in a location that experiences frequent lightning storms. Which of the following would be the LEAST expensive solution to protect the user's computer hardware? (A). A surge protector (B). Grounding (C). A power generator (D). An uninterruptible power supply
B
Skip for now NO.99 A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a "Stop" error on every boot. Which of the following should the technician complete to resolve the issue? (A). Boot the workstation in safe mode and disable the graphics driver system tray menu (B). Boot the workstation in safe mode with networking and install the latest stable graphics driver (C). Boot the workstation in safe mode and disable Windows driver signing requirements (D). Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings
B
NO.78 A security director is designing a company's disaster recovery procedure. The information security officer wants the servers to continue to function during short power outages, and important documents should be stored off site in case of a catastrophe at the datacenter. Which of the following would BEST fulfill these requirements? (Choose two.) (A). Power distribution unit (B). UPS (C). Cloud storage (D). Surge protector (E). Local file replication (F). RAID
B C
NO.56 A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.) (A). Default SSID (B). MAC filtering (C). NAT (D). QoS (E). Signal strength (F). Encryption
B E
NO.11 A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Choose two.) (A). System files have been deleted (B). Proxy settings are configured improperly (C). The OS has been updated recently (D). There are disabled services on the vendor website (E). Program file permissions have changed recently (F). There is a rogue anti-malware program
B F
N.100 Following a recent password change, a user can log on successfully to an Apple computer but cannot access a web-based service. An error message displays each time the user attempts to authenticate to the service. Prior to changing the password, the computer had no communication issues. Which of the following should a technician use to continue troubleshooting the issue? A. passwd B. FileVault C. Keychain D. Gatekeeper
C
NO. 16 Which of the following operating systems is based on UNIX source code and is closed source? (A). Android (B). Windows (C). macOS (D). Linux
C
NO.15 A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible.Which of the following technologies should the technician use to manage this system? (A). Telnet (B). HTTPS (C). SSH (D). RDP (E). SFTP
C
NO.17 Which of the following may include the use of a password and a rotating PIN lo access a wireless network? (A). RADIUS authentication (B). TKIP authentication (C). Multifactor authentication (D). TACACS authentication
C
NO.20 A technician notices a PC displays a missing DLL error message every time on start up. Which of the following tools should the technician use to find out which application is responsible for the error message? a. Msinfo32.exe b. System recovery options c. Event viewer d. Programs and features
C
NO.29 A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help desk team recommend the user do in this situation? (A). After granting these permissions, disable the camera and GPS (B). Install the application and change the permissions later (C). Cancel installation of the application and report it to the application source (D). Accept these permission requests and install the application
C
NO.30 ? A technician for an enterprise company is determining the best method to keep the organization's Windows PCs up to date with OS security patches. Which of the following options would be MOST appropriate to deploy? A. Invest in a server solution to deploy virtual hosted desktops for all users B. Enable Windows updates to be installed manually by users C. Validate OS security patches in a test environment before pushing them to user machines D. Outsource OS Security patch management to a third-party solution provider
C
NO.32 While preparing a computer that will be issued to a new user, the technician discovers the computer's former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed? (A). Reimage the machine from a network share (B). Change the boot order and boot to an external drive (C). Remove and then replace the CMOS battery (D). Use the BIOS user password to reset the supervisor password
C
NO.33 A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen. Which of the following should the technician instruct the user to do FIRST? (A). Ignore the message as a false positive (B). Shut down and restart the computer. (C). Unplug the Ethernet cable. (D). Follow the onscreen instructions to remove the malware
C
NO.35 Which of the following is the memory limitation of a 32-bit OS? (A). 16MB (B). 2048MB (C). 4GB (D). 1024GB (E). 2TB (F). 8TB
C
NO.39 A user's computer was infected with malware, and a technician successfully removed the infection. However, the user reports certain web-based services are still inaccessible. Which of the following should the technician perform FIRST to resolve the issue? (A). Turn off System Restore (B). Update the malware signatures (C). Reset the Internet Explorer settings. (D). Check the hosts file
C
NO.40 A technician responds to a report that a user's desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly.Which of the following should the technician attempt that will MOST likely resolve the performance issue? A. Roll back the OS upgrade. Continue using the older version of Windows B. Reset the PC to its factory conditions. Perform the OS upgrade again C. Update the SATA controller driver from the manufacturer's website D. Perform a full backup and replace the hard drive
C
NO.46 A home server rack is being installed in the computer room and is outfitted with a power distribution block. Which of the following safety precautions is required? (A). Cable management (B). Electrostatic discharge mat (C). Equipment grounding (D). Uninterruptible power suppl
C
NO.49 A technician scans a computer for malware, and it comes back clean each time. However, the user still sees suspicious activity from the computer.Which of the following should the technician check for NEXT? (A). Rootkit (B). Keylogger (C). Botnet (D). AdwarE
C
NO.51 A user has reported that when a document is being edited a pop-up appears and locks the workstation. The pop-up states that federal authorities have detected illegal copyrighted material on the workstation. The technician removes the malware and creates a restore point. Which of the following should the technician perform NEXT before closing the report? (A). Contact the local computer emergency response team (B). Quarantine the workstation for possible infections (C). Train the user on safe Internet browsing (D). Restore to an earlier state and disable System Restore
C
NO.58 Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications? (A). Create a static DNS entry on the server for the PC (B). Change her NIC IP address to dynamic (C). Create a new exception on her local firewall (D). Make sure the PC's IP is in the management VLAN
C
NO.74 A technician is upgrading the memory on a laptop in the field. The technician has misplaced the ESD strap. Which of the following should the technician do? (A). Return to the shop and obtain a replacement strap (B). Conduct the upgrade using ESD bags as mitts (C). Employ effective self-grounding techniques (D). Improvise an ESD strap with a length of copper wire
C
NO.77 An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this? (A). Phishing (B). Spear phishing (C). Dumpster diving (D). Impersonation
C
NO.79 A computer's power light is on, but the screen is completely black. The user is unable to wake the computer and then contacts a technician. The technician asks the user to inspect the display cable, but it is securely connected at each end. Which of the following steps should the technician ask the user to take NEXT? (A). Roll back the Windows updates (B). Perform a startup recovery (C). Perform a hard restart (D). Boot from the last known-good configuration
C
NO.8 Which of the following installation methods allows a technician to install Windows from a remote location? (A). USB (B). NetBoot (C). PXE (D). CD-ROM
C
NO.90 A technician needs to disable System Restore prior to a virus cleaning. Which of the following system settings has the System Restore options? A. MSINFO32 B. Device Manager C. Control Panel D. Microsoft Management Console
C
NO.91 Which of the following social engineering vulnerabilities occurs when someone follows a technician into a server room without using a key card? (A). Shoulder surfing (B). Man-in-the-middle (C). Tailgating (D). Impersonation
C
Skip for now NO.69 A technician is configuring a SOHO network of several Windows 7 PCs for a customer. The customer wants to easily share media and printers between all the PCs. Which of the following Windows features would BEST accomplish this ? (A). Homegroup (B). Workgroup (C). Directory Services (D). Offline Folders
C
NO.55 A customer recently lost data because it was accidentally deleted. The customer calls a technician and asks to have a Windows backup solution installed. The customer needs to ensure all company data is backed up and quickly recoverable every time a change Is made. Which of the following solutions would the technician MOST likely recommend? (Select TWO) (A). File level (B). Bare metal (C). Snapshot (D). Shadow Copy (E). Critical applications (F). Image level
C D
NO.102 A technician starts hard drive transfers in a SOHO that will take up to 16 hours to complete. Immediately after starting the transfers, the technician gets warning of a hurricane that will occur overnight. Which of the following is the BEST action to complete before leaving the office? (A). Turn off the monitors and printers so they do not overheat (B). Unplug the computers, but keep the hard drive transfer running (C). Call the power company to turn off any power coming to the office (D). Ensure the surge suppressors and devices are unplugged from the power sockets
D
NO.25 Which of the following threats uses personalized information in an attempt at obtaining information? (A). Whaling (B). Impersonation (C). Spoofing (D). Spear phishing
D
NO.31 A user needs to transfer some information from a work computer to a server. The user plugs a personal USB into the computer but is denied access to save information on the storage medium due to the security policy. This is an example of: (A). port security. (B). an access control list (C). a Trojan horse, (D). data loss prevention
D
NO.34 Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares? (A). An IP conflict is present (B). A corporate VPN is enabled (C). A firewall exception must be set (D). HomeGroup must be enabled
D
NO.36 A user is attempting to open Outlook, Outlook seems to have cached some invalid user login information, causing it to fail when trying to connect to Office 365 applications. Which of the following Control Panel applets should a technician use to clear the cached invalid user login information? (A). Network and Sharing Center (B). Sync Center (C). User Account Control (D). Credential manager
D
NO.4 A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade? (A). SSD (B). Optical drive (C). Flash drive (D). PXE
D
NO.41 A user has reported that a computer is running extremely slow when opening applications. A technician checks the computer and needs to verify memory utilization. Which of the following tools should the technician use to begin troubleshooting the issue? (A). Task Scheduler (B). Device Manager (C). Drive Status (D). Performance
D
NO.42 A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem. Which of the following should the technician do FIRST? (A). Contact the application vendor support staff for more information (B). Boot into safe mode, and then load the ERD and restore the most recent files (C). Boot the PC, run msconfig, check the safe boot box under the Boot tab, and then restart (D). Log in as an administrative user and determine if the problem persists
D
NO.47 A technician just finished using BiteLocker to Go. The technician MOST likely encrypted: (A). A CD-RW disk. (B). the network drive. (C). the internal disk drive. (D). A USB drive
D
NO.48 A user reports the screen on a mobile device frequently dims even when the device settings are not being changed. Which of the following is MOST likely the cause? (A). Faulty backlight (B). High contrast mode (C). Auto-brightness (D). Power saving mode
D
NO.52 A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error. Which of the following tools should the technician use? (A). Performance Monitor (B). Component Services (C). Task Manager (D). Event Viewer
D
NO.57 A technician needs to load several new computers with the company's customized OS configuration. The technician asks if the systems can be PXE booted. To save the most time which of the following should be considered if the technician plans to use PXE to boot the systems? (A). Multiboot (B). Repair installation (C). Upgrade installation (D). Image deployment
D
NO.73 A technician is scheduled to upgrade a grocery store's network equipment at 11:00 p.m. There are only a few shoppers in the store, therefore, the store manager wants the technician to start the upgrade early. Which of the following is the NEXT step the technician should perform? (A). Create a back-out plan for the store. (B). Review the change request document (C). Draft the new network diagrams. (D). Get approval from the Change Advisory Board
D
NO.76 A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access? (A). Remove the guest account from the administrators group (B). Disable single sign-on (C). Issue a default strong password for all users (D). Require authentication on wake-up
D
NO.84 Skip for now A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT? (A). Run the scan again to ensure all malware has been removed (B). Quarantine the infected workstation from the network (C). Install all of the latest Windows Updates to patch the system (D). Educate the user on safe browsing practices
D
NO.85 Which of the following file types should be opened when executing a PowerShell script? (A). .bat (B). .vbs (C). .sh (D). .ps1 (E). .psd
D
NO.88 A help desk technician receives a call from a user stating a program was installed and now random pop- ups are appearing on the computer. The technician notices a lot of suspicious network traffic generated by the user's computer. The technician quarantines the computer and disables System Restore. Which of the following is the NEXT step technician should take? (A). Update the anti-malware software (B). Perform a malware scan in safe mode (C). Set up scheduled scans and updates (D). Educate the end user on best practices
D
NO.89 A user calls the help desk to report issues with multiple pop-ups and degraded PC performance. The user is out of the area, and assistance can only be provided remotely. Which of the following steps should a technician perform? (A). Establish a remote connection, install free third-party malware software, scan the machine for malware, and restart the machine. (B). Explain the steps to access safe mode with networking, establish a remote connection, run approved malware tools, and restart the machine. (C). Establish a remote connection, install a free third-party backup tool, back up the user's software, and instruct the user on how to reinstall Windows. (D). Explain the steps to access safe mode with networking, set a restore point, run company approved malware tools, and restart the machine.
D
NO.92 A technician received a call stating that all files in a user's documents folder appear to be changed, and each of the files now has a .lock file extension. Which of the following actions is the FIRST step the technician should take? (A). Run a live disk clone (B). Run a full antivirus scan (C). Use a batch file to rename the files (D). Disconnect the machine from the network
D
NO.95 Ann, a smartphone user receives an in-app notification that her third party note taking app has an update that requires additional permissions. The update requires access to connected storage, including networked resources, and the ability to enable or disable airplane mode. She has consulted the company's IT department about the situation. Which of the following is the BEST course of action for the IT department to recommend? (A). Accept the app update (B). Uninstall the app (C). Postpone the app update (D). Refuse the app update
D
NO.28 A systems administrator needs to add security to the server room. Which of the following would provide the BEST security for the room? (Choose two.) (A). Universal serial bus locks (B). Personal identity verification cards (C). Privacy screen (D). Entry control roster (E). Door locks (F). Privacy window
E F