Exam DUmppp

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring.Which of the following would BEST accomplish this goal? A. Use an antivirus product capable of performing heuristic analysis B. Use a host-based intrusion detection system on each computer C. Disallow the password caching of accounts in the administrators group D. Install a UTM in between PC endpoints to monitor for suspicious traffic E. Log all failed login attempts to the PCs and report them to a central server

A

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter `J` assigned only to the drive.Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive? A. GPT B. Dynamic C. Basic D. Extended

A

Which of the following is considered government-regulated data? A. PHI B. End-user license agreement C. Digital Millennium Copyright Act D. DRM

A

A small office's wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network. Which of the following configurations MOST likely allowed the attack to take place? (Choose two.) A. Guest network B. TKIP C. Default login D. Outdated firmware E. WPS F. WEP

C E

Which of the following would MOST likely contain troubleshooting guides? A. Acceptable use policy B. Topology diagram C. Knowledge base D. Incident documentation

C

A customer is pressuring a project manager to get things done on time. Which of the following has the project manager failed to do in this case? A. Follow up with the customer after project completion B. Maintain a positive attitude during the project. C. Disclose project experiences on social media D. Communicate with the customer clearly.

D

A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.Whenever they attempt to launch the application, it fails and gives an error message. Which of the following should the technician do FIRST? A. Reinstall the application B. Roll back the application to the earlier version C. Clear the application cache D. Update the OS of the smartphones

D

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10. Which of the following installation methods would the technician MOST likely use to accomplish this quickly? A. Unattended installation B. Remote network installation C. In-place upgrade D. Clean installatioN

A

A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue? A. exFAT security B. Ext3 security C. HFS security D. EFS security E. CDFS security

D

A technician is disposing of computer hardware that contains PHI. The drive must be reusable.Which of the following methods should be used? A. Degauss B. Drive wipe C. Standard format D. Low-level format

D

A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use? A. apt-get B. iwconfig C. sudo D. ifconfig

D

A technician must manually modify the HOSTS system file in order to resolve a website address to a specified local destination. Which of the following utilities should the technician use to BEST accomplish the task? A. Regedit B. services.msc C. Msinfo32 D. Notepad E. MMC

D

A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task? A. Drill B. Hammer C. Low-level format D. Degaussing

D

A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue? A. Zero-day malware B. Safari code injection C. OS corruption D. Overheating E. Time sync failure

D

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future? A. System memory B. Surge protector C. Hard drives D. Battery backup

D

Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by. Which of the following security measures should be used? A. Biometric device B. Common access card C. Cable lock D. Privacy screen E. Mantrap

D

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.Which of the following should the technician have covered previously as part of the original repair? A. End-user education B. Pre-installation environment cleaning C. Disabling of System Restore D. Infected system quarantine

a

Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested? A. Single-factor B. Multifactor C. RADIUS D. TACACS

a

Joe, an end user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password.Which of the following Control Panel utilities can Joe use to help with this situation? A. Credential Manager B. Network and Sharing Center C. Security and Maintenance D. Troubleshooting

a

Which of the following NTFS security settings overrides all other settings? A. Deny B. Modify C. Read D. Write

a

Which of the following built-in accounts was removed in Windows 10? A. Power User B. Administrator C. Guest D. Standard Use

a

Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols? A. AES B. TKIP C. S/MIME D. 3DES

a

Which of the following is a reason to use WEP over WPA? A. Device compatibility B. Increased security C. TACACS D. Multifactor authentication

a

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications? A. SSO B. Permission propagation C. Inheritance D. MFA

a

Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit? A. Acceptable use policy B. Incident documentation policy C. Password compliance policy D. Change control policy

a

Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer's design? (Choose two.) A. UPS B. Server rack C. PoE phone D. Desktop printer E. Modem F. Patch panel

a b

A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.Which of the following actions should be taken to close the vulnerability? (Choose two.) A. Disable guest account B. Remove admin permissions C. Modify AutoRun settings D. Change default credentials E. Run OS security updates F. Install a software firewa

a c

A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings. Which of the following Control Panel utilities should the technician use to accomplish this task? A. Network and Sharing Center B. Sync Center C. Credential Manager D. User Accounts

d

A technician is troubleshooting a computer that may have some corrupt operating system files. Which of the following command line tools should the technician use to check these files? A. dism B. chkdsk C. diskpart D. sfc

d

A technician recently updated a printer driver on all the computers in an office. Shortly after the update, several users' accounts and passwords were compromised. Which of the following MOST likely explains the compromised accounts? A. Botnet B. Ransomware C. Antivirus definitions D. Keylogger

d

Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow.Which of the following is the MOST likely cause of this issue? A. Files disappearing B. File permission changes C. Application crash D. Too many startup items

D

2. During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade. Which of the following plans must be implemented to revert back to the most recent version of the firmware? A. Backout plan B. Contingency plan C. Alternative plan D. Backup plan

a

A Windows user is attempting to install a local printer and is unsuccessful based on permissions.Which of the following user types BEST describes this user? A. Guest B. Power User C. Administrator D. Standard User

a

A large corporation wants to secure its wireless network so only employees can connect. Which of the following technologies should be used to control access by user account? A. RADIUS B. WPA2 C. TKIP D. AES

a

A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a `Stop` error on every boot. Which of the following should the technician complete to resolve the issue? A. Boot the workstation in safe mode and disable the graphics driver system tray menu B. Boot the workstation in safe mode with networking and install the latest stable graphics driver C. Boot the workstation in safe mode and disable Windows driver signing requirements D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard settings

a

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs in automatically without a password.Which of the following account types would the technician MOST likely set up on this kiosk machine? A. Guest B. Administrator C. Power User D. Remote Desktop User

a

7.A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user's request? (Select TWO). A. MAC filtering B. Default SSID C. Radio power levels D. Content filtering E. Physical security

a d

A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company's AUP.Which of the following would be the NEXT appropriate act? A. Promptly notify the administrator's immediate supervisor B. Rename the folder on the server, and notify the information security officer C. Move the folder to another location on the server, and notify the local authorities D. Ask the owner to move the files from the server to a local computer

A

A technician accessed a network share from a computer joined to workgroup. The technician logged in as "user1" and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the "user1" account. Which of the following would allow the technician to log in using the "administrator" username? (A). Use the command: net use Z: \\fileserver\share (B). Go to the Sync Center and disable the offline files feature. (C). Delete the "user" account for the network share in Credential Manager. (D). Join the computer and file server to a domain and delegate administrator rights to "user1". (E). Use the Advanced Sharing options in the Network and Sharing Center and enable "turn on network discovery

A

A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use? A. netstat B. net use C. nslookup D. ping

A

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website.Which of the following should the technician do NEXT? A. Check the contents of the hosts file B. Do a System Restore to a date before the infection C. Rerun the antivirus scan with higher sensitivity D. Rebuild the OS on the machine

A

A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom.Which of the following needs to be adjusted on the workstation to fix the issue? A. Date and time B. UEFI boot mode C. Logon times D. User access control

A

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem.Which of the following should the technician do NEXT? A. Provide documentation of the repair to the customer B. Allow the customer to voice concerns and post the story to social media later C. Inform the customer the job is done and return to the office D. Defend each step and why it was necessar

A

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend? A. Uninterruptible power supply B. Surge protector C. Power strip D. Power distribution unit

A

A user's computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive.Which of the following actions should the IT department perform NEXT? A. Preserve data integrity B. Identify violations of acceptable use C. Collect evidence of illegal activity D. Report through proper channels

A

Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she opens a browser, she gets a message indicating the page cannot be displayed. She notices there is a `?` in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance.Which of the following is the MOST likely issue Ann is experiencing? A. There is unauthenticated wireless connectivity B. She has exceeded the data allowance C. The phone is only 3G capable D. It is an unrooted phone E. The SIM card was not activated F. A data plan was not purchased

A

Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS. Which of the following can Joe do to ensure the backups will work if needed? A. Frequently restore the servers from backup files and test them B. Configure the backups to restore to virtual machines for quick recovery C. Set up scripts that automatically rerun failed backup jobs D. Set up alerts to let administrators know when backups fail E. Store copies of the backups off-side in a secure datacente

A

Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed.Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.Which of the following is MOST likely the cause? A. Ransomware B. Cryptomining C. Rootkit D. Keylogger

A

Joe, an end user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password.Which of the following Control Panel utilities can Joe use to help with this situation? A. Credential Manager B. Network and Sharing Center C. Security and Maintenance D. Troubleshooting

A

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process? A. Driver detection B. Metro interface C. Account control D. PXE installation

A

A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again. Which of the following recommendations should the contractor give to the customer? (Choose two.) A. Backup testing B. Cloud storage C. Local storage backups D. Data recovery E. Hot site F. Waterproof devices

A B

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Choose two.) A. Administrative share permissions B. Mapped drives C. Group Policy hours restriction D. Denied write/delete permissions E. Disabled proxy settings

A B

An end user's PC is taking a long time to boot.Which of the following operations would be the BEST to resolve this issue with minimal expense? (Choose two.) A. Remove applications from startup B. Defragment the hard drive C. Install additional RAM D. Install a faster hard drive E. End the processes in Task Manager F. Run the Disk Cleanup utility

A B

Not sure A user reports that when opening a web browser, the initial page loads to a search engine the user does not recognize. When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups.Which of the following should a technician do to resolve these issues? (Choose two.) A. Reset the user's browser to default settings B. Delete the user's cached images, temporary files, and cookies C. Reboot the user's computer and install a secondary antivirus D. Convince the user to use a different web browser that is currently unaffected E. Download the update to the user's web browser of choice F. Remove any unapproved applications from the user's startup items

A B

A customer's smartphone has been overheating frequently and becoming unresponsive since installing an OS update. A technician has already performed a soft reboot of the device. Which of the following should the technician perform NEXT? (Choose two.) A. Roll back the OS update B. Update the PRL C. Force stop running applications D. Enable airplane mode E. Perform a factory reset F. Run application updates G. Reset network settings

A C

Corporate management is concerned about the security of the company's mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users.Which of the following would provide the BEST level of protection in this scenario? (Choose two.) A. Use full device encryption B. Enable a pattern lock C. Implement remote wipe features D. Use device lockout policies E. Require complex administrator passwords F. Disable unknown application installations

A C

A small office calls a technician to investigate some `invalid certificate` errors from a concerned user. The technician observes that whenever the user attempts to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error.Which of the following should the technician do NEXT? (Choose two.) A. Remove any proxy servers configured on the user's browsers. B. Assist the user with purchasing an SSL certificate and save the certificate to the desktop. C. Disable the SPI firewall on the office's gateway and any other routers. D. Instruct the user to ignore the certificate error since the user is connecting to a secure website. E. Create an outbound rule in Windows Firewall named after the user's homepage. F. Run anti-malware scans and download the latest Windows updates.

A F

A Linux user wants to use the grep command to identify every file name in the current directory that contains the word `mandatory`. Which of the following commands would BEST accomplish this? (A). grep -d mandatory * (B). grep -i mandatory * (C). grep mandatory file D. grep mandatory *

B

A new company policy states that all end-user access to network resources will be controlled based on the users' roles and responsibilities within the organization.Which of the following security concepts has the company just enabled? A. Certificates B. Least privilege C. Directory permissions D. Blacklists

B

A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon.Which of the following actions should the user take FIRST? A. Check to ensure the printer selected is the default printer B. Check the status of the print server queue C. Cancel all documents and print them again D. Check that the printer is not in offline print mode

B

A user's smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue? A. Uninstall the camera application B. Check the application permissions C. Reset the phone to factory settings D. Update all of the applications on the phone E. Run any pending OS updates

B

An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for subscribing to an organization's mailing list. Which of the following should be performed to remove and prevent any further emails from this organization? (A). Click the "Unsubscribe" button on each unwanted email (B). Send the unwanted items to the spam or junk folder (C). Deploy an email address whitelist (D). Create domain-based filters

B

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed? A. NTLDR not found B. No boot device available C. Operating system not found D. BIOS ROM checksum error

B

Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.) A. LCD monitor B. Power supply C. Laptop screen D. CRT monitor E. Motherboard F. Tablet

B D

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.) A. Access control lists B. Multifactor authentication C. Organizational unit D. Trusted software sources E. Data loss prevention F. Pre-shared ke

B E

Which of the following security concepts can be overcome through social engineering? (Select TWO) (A). Port blocking (B). Strong passwords (C). Firewalls (D). MAC filtering (E). Email attachment filtering (F). Antivirus updates

B E

A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW? A. Risk analysis B. Plan to change C. Backout plan D. Change board approvals

C

A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point.Which of the following should the technician do NEXT? A. Run the scan again to ensure all malware has been removed B. Quarantine the infected workstation from the network C. Install all of the latest Windows Updates to patch the system D. Educate the user on safe browsing practices

C

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the machine are: ✑ Two 1GHz CPUs ✑ 2GB of memory ✑ 15GB hard drive800 ֳ— 600 screen resolution Which of the following should the technician do to resolve the problem? A. Increase the number of CPUs B. Increase the amount of memory C. Increase the amount of hard drive space D. Increase the screen resolution

C

A technician is recycling PCs to be reused by a middle school.Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs? A. Standard formatting B. HD drilling C. Low-level formatting D. HD partitioning

C

A technician responds to a report that a user's desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue? A. Roll back the OS upgrade. Continue using the older version of Windows B. Reset the PC to its factory conditions. Perform the OS upgrade again C. Update the SATA controller driver from the manufacturer's website D. Perform a full backup and replace the hard drive

C

A user's smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car.Which of the following troubleshooting steps should the technician take NEXT? A. Reset the device's network settings B. Check the data usage statistics on the device C. Verify the SSID with which the device is associated D. Run any pending application or OS updates

C

An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue? A. Increase the amount of RAM B. Reboot the server C. Check the system logs D. Perform disk defragmentatioN

C

Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation.Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings? A. Acceptable use policy violations B. Server configuration C. Chain of custody D. Data loss incidents

C

Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed? A. Unattended installation B. Remote installation C. Repair installation D. Image deployment installation

C

Which of the following is the MOST secure wireless security protocol? A. AES B. WPA C. WPA2 D. WEP

C

Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server.Which of the following is the FIRST step the technician should take to correct this issue? A. See if Joe's email address has been blacklisted B. Change the password on Joe's email account C. Update the antivirus and perform a full scan on the PC D. Isolate Joe's computer from the network

D

NO.366 Which of the following operating systems has mandatory update installation built in? (A). Windows 7(B). Windows 8(C). Windows 8.1(D). Windows 10

D

Users notify the help desk of an email that was just received. The email came from the help desk's email address and asked the users to click on an embedded link.This email is BEST described as: A. phishing. B. zombie. C. whaling. D. spoofing

D

Which of the following BEST describes the Guest account on a Windows system? A. This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system. B. This account is designed to provide basic permissions for completing common daily tasks. Users of this account are restricted from performing things like installing new software. C. This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones. D. This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions.

D

A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company.Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation? A. Enable System Restore on the file server and make frequent restore points. B. Disable full disk encryption on the file server. C. Install a next-generation firewall at the network edge. D. Use a host-based intrusion detection system and continuously monitor filesystem changes. E. Use granular file permissions on the share and follow the principle of least privilege.

E

A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:There are 1033 infected files on this computer. Click here to disinfect.The link is blocked by the corporate content filter and displays a message stating the site contains known malware.Which of the following should the technician complete to secure the computer with MINIMAL impact to the user? A. Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan. B. Validate that the alerts are false positives, and disable security software on the workstation to prevent further false notifications. C. Back up the user's files. Restore the system to the original system image designated by corporate IT policies. Restore the user's files. D. Request a content filter exception to allow access to the link from the notification. Once available, follow the instructions on the linked site

a

A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue? A. Roll back updates B. Disable the Windows Update service C. Check for updates D. Restore hidden updates

a

A user has changed the MAC address of a laptop to gain access to a network. This is an instance of: A. spoofing B. brute force C. man-in-the-middle D. a botnet

a

A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange: A. keys B. passwords C. root CA D. tokens

a

A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance on this computer? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

a

A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT? A. Reboot into safe mode and roll back the updates B. Repair the Windows Registry C. Configure boot options in the BIOS D. Disable Windows services and applications

a

A user's mobile device is losing its battery charge very quickly. The user reports a 90% charge at 9:00 a.m., but has 22% battery by 1:00 p.m. The user has installed several applications, and the phone is a relatively new, high-end phone. The user claims most of the usage involves checking emails for a few minutes three or four times per hour.Which of the following should a technician perform FIRST to diagnose the issue properly? A. Check the applications and their resource usage. B. Order a replacement battery and see if the phone maintains its charge. C. Configure the email software to work on a fetch schedule instead of the push setting. D. Wipe the phone entirely and reset all settings to their default states. E. Decrease the screen brightness to 30%. F. Uninstall all the applications on the phone and see if the battery issues remain.

a

A user's phone contains customer's PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone? A. Fingerprint lock B. Passcode lock C. Swipe lock D. PIN lock

a

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.When testing the policy, a removable drive is plugged in but can still be accessed.Which of the following command-line tools should the technician use to apply the new policy? A. grupdate B. diskpart C. gpresult D. net use

a

Ann, an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the `from field`. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware.Which of the following should the technician check NEXT? A. Hijacked email B. DNS entries C. Hosts file D. POP3 errors

a

In which of the following file extension types would a user expect to see the command. `net use T:\\server\files`? A. .bat B. .vbs C. .js D. .py

a

Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe? A. Contact his supervisor so the supervisor can make scheduling changes. B. Move the appointments to the next business day. C. Reach out to a colleague to assist in completing the jobs. D. Continue to work on the current call, and get to the other as soon as possible.

a

Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe's slow data speeds? A. Joe's data transmission is over the limit B. The phone needs to be rebooted from overuse C. The use of GPS interferes with data speeds D. There is unintended Bluetooth pairing

a

Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some websites, and web services are not responding from any of the web browsers, although Joe can access these services from his smartphone without issue. The computer's malware scanner has the latest definitions installed. Which of the following would BEST explain why the computer is functioning this way? A. Expired root certificate B. OS update failures C. Pop-up blocker D. Hijacked email

a

6.An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO). A. Close applications when tasks are completed. B. Increase the time to dim the screen automatically. C. Increase the frequency for syncing corporate email. D. Set the smartphone display to maximum brightness. E. Connect to the office WiFi network automatically. F. Disable 802.11ac and use mobile data exclusively.

a e

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Choose two.) A. Reduce the transmit power B. Reduce the channel availably C. Disable the DHCP server D. Enable QoS management E. Disable the SSID broadcast F. Implement WPA encryption

a e

A technician receives the Chief Executive Officer's (CEO's) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario? (Choose three.) A. Disconnect the device from the network B. Identify and research the symptoms C. Restore the computer to the previous checkpoint D. Scan and use removal techniques E. Create a restore point F. Educate the end user G. Schedule scans and run updates

abd

5.Which of the following can be applied directly to an organizational unit in Active Directory to provide security to both the user and the machine? A. Folder Redirection B. Group Policy C. Security Groups D. Home Folder

b

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem? A. Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode D. Send a test email, open a command prompt to check the file system, and empty the browser cache

b

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.Which of the following BEST enforces this policy? A. Delete the user accounts B. Disable the user accounts C. Restrict the user accounts D. Reset the user accounts

b

A customer built a computer with the following specifications: ✑ Single hexa-core processor ✑ 8GB DDR4 memory ✑ 256GB SSD drive ✑ Built-in graphics card ✑ 32-bit Windows OS ✑ Audio editing software The computer seems to be working, but the OS reports only 3.5GB of RAM is available. Which of the following would correct the issue? A. 16GB DDR4 memory B. 64-bit Windows OS C. Dual hexa-core processors D. 512GB SSD drive

b

A customer wants to format a 4TB external drive with a filesystem that is compatible with both Windows and Linux OSs.Which of the following should the technician suggest the customer use? A. Ext4 B. exFAT C. NFS D. FAT32 E. CDFS

b

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server.Which of the following Control Panel utilities should the technician use to configure the setting? A. Internet Options : Advanced B. Internet Options : Connections C. Internet Options : Security D. Internet Options : Content E. Internet Options : Privacy

b

A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT? A. Reboot the computer B. Restart the network services C. Roll back the device drivers D. Rebuild the Windows profile

b

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan? A. Inform management regarding the anticipated amount of downtime B. Document a backout plan to roll back changes to the router C. Configure a redundant data path to eliminate downtime D. Make the downtime window larger than actually anticipate

b

A technician is running updates on a Windows PC. Some of the updates install properly, while others appear as failed. While troubleshooting, the technician restarts the PC and attempts to install the failed updates again. The updates continue to fail. Which of the following is the FIRST option to check? A. Visit the Microsoft Update website to see if there is an issue with a specific update B. Look up the error number associated with the failed update C. Look at the system Event Viewer to find more information on the failure D. Download the failed update to install manually

b

A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access. Which of the following policies is needed? A. Password policy B. Acceptable use policy C. Regulatory policy D. Compliance policy

b

A user installed an application that now requires a license key to enable full functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user. Which of the following will support this task? A. SSH B. RDP C. FTP D. Telnet

b

A user is staying at a hotel that only offers Fast Ethernet connectivity to the network. The user's laptop is currently using the corporate network for access to network resources as well as the cloud. Which of the following should the help desk recommend performing prior to using the hotel network? A. Add a country code exception to the firewall B. Unmap all network drives C. Change the proxy settings D. Enable Remote Assistance

b

A user wants to see the workstations present on the LAN in a workgroup environment. Which of the following settings must be enabled to make this possible? A. Turn off public folder sharing B. Turn on network discovery C. Use 128-bit encryption D. Turn on file and folder sharing

b

A user's computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic.Which of the following is MOST likely causing the high resource usage? A. A keylogger is running B. The computer is part of a botnet C. The computer is receiving a DDoS attack D. A software firewall is blocking traffic

b

An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application? A. Network-based B. Client/server C. Application streaming D. Peer-to-peer

b

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the Internet. Which of the following actions should the user take? A. Update antivirus definitions B. Install anti-malware software C. Enable the pop-up blocker D. Reboot the PC

b

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement.Which of the following should the technician do NEXT? A. Create a risk analysis report for review B. Submit a change order for approval C. Insist the worker accepts the standard desktop D. Document the request and place the orde

b

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as `ConnectMe` and appears as unsecure. Which of the following should the help desk perform to fix the issue? A. Remote into Ann's system and restart the wireless adapter B. Ask Ann to open a browser and watch for a redirect page C. Advice Ann to plug an Ethernet cable into her laptop D. Direct Ann to run an antivirus program on her laptop

b

Joe, a technician, is configuring advanced security settings on a SOHO router. Joe cannot locate the settings he intends to change, but the online vendor documentation has instructions for configuring those settings. Which of the following should the technician perform? A. Configure content filtering B. Check for a firmware update C. Disable the SSID broadcast D. Change the firewall settings

b

Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer.Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT? A. Educate the end user on safe browsing and email habits. B. Scan and remove the malware from the infected system. C. Create a system restore point and reboot the system. D. Schedule antivirus scans and perform Windows updates.

b

Joe, a technician, recently installed drivers for a webcam, but he is now experiencing issues when trying to operate it. Which of the following should Joe check NEXT to troubleshoot the issue? A. Services B. Device Manager C. Event Viewer D. Programs and Features

b

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hotspot and gets 200Kbps. Ann, Joe's coworker with whom he is travelling, also has a hotspot on her phone, and the speed test result on that hotspot is 15Mbps. The technician checks the hotspot settings on Joe's phone and sees the following: Network Name : Joe's Hotspot Security: WPA2/PSK Password: hotspot Band: 2.4GHz Client DHCP start address: 192.168.23.1 Which of the following is the MOST likely cause of the problem? A. Joe should be using WEP security on his hotspot for faster throughput B. Someone else is using Joe's hotspot due to weak password C. Joe's hotspot gave him an invalid IP address D. Joe is likely in a poor signal area and should try another area

b

When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists.Which of the following troubleshooting steps should the technician complete NEXT? A. Change the browser's home page B. Check the Windows host file C. Update the default web browser D. Restore Windows to a previous date

b

Which of the following Windows versions introduced using applications in the Metro interface? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

b

Which of the following key and mouse combinations can be used to run an application as a different user? A. FN + Right-click B. Shift + Right-click C. Alt + Right-click D. Ctrl + Right-click

b

Which of the following wireless security protocols supports the use of a 40-bit encryption key? A. TKIP B. WEP C. WPA D. WPA2

b

Ann, an employee at a company, calls the help desk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification.Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.) A. Ask Ann for her credentials to verify and log on to the vendor's website from Ann's laptop B. Verify Ann's laptop has the correct browser settings C. Check all browser cached files on Ann's laptop and log on to another vendor's website D. Attempt to log on to another vendor's website from Ann's laptop E. Ask Ann about the notification and review the installed programs F. Reinstall the browser, reboot the laptop, and check the vendor's website again

b E

A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues? (Choose two.) A. Slow performance B. Slow data speeds C. No wireless connectivity D. Baseband E. Application hang F. Overheating

b c

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.) A. Inventory management policy B. Knowledge base articles C. End-user acceptance document D. Acceptable use policy E. Incident documentation F. Network diagrams

b d

Which of the following security concepts can be overcome through social engineering? (Select TWO) (A). Port blocking (B). Strong passwords (C). Firewalls (D). MAC filtering (E). Email attachment filtering (F). Antivirus updates

b e

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately.With which of the following types of infections are the PCs MOST likely infected? (Choose two.) A. Spyware B. Zombies C. Virus D. Ransomware E. Worm F. Botne

b f

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.Which of the following protocols and authentication methods should the technician implement? (Choose two.) A. WPA B. WPA2 C. WEP D. TKIP E. RADIUS F. Multifactor G. TACACS H. SSO

b f

3.A user is unable to access a network share but can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST? A. ping B. nslookup C. net use D. ipconfig

c

A company needs to destroy several SSDs that contain sensitive information. Which of the following methods is BEST suited for the total destruction of the SSDs? A. Overwriting B. Formatting C. Incinerating D. Degaussing

c

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection? A. Create a policy to remove Internet access from the server during off hours B. Set the local antivirus software on the server to update and scan daily C. Ensure the server is patched with the latest security updates D. Educate the manager on safe Internet browsing practices

c

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission.If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns? A. Default SSID B. MAC filtering C. Power levels D. Content filtering E. Firewall

c

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.Which of the following is MOST likely causing this error? A. The computer has GRUB Legacy installed B. Windows Startup services are not running C. An incompatible partition is marked as active D. An unsupported version of Windows is installed

c

A user is unable to access a network share but can access email. A technician has confirmed the user has the appropriate permissions to access the share.Which of the following commands should the technician use FIRST? A. ping B. nslookup C. net use D. ipconfig

c

A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the `My Documents` folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue? A. Remove the registry entry and rename the local account folder B. Delete or rename the local user folder C. Run DISM and re-add the local power user account D. Remove the user account in Credential Manager and restart the PC

c

A user's corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email.Which of the following is MOST likely causing the missing folders issue? A. The Internet security options have changed B. The operating system updates have changed C. The network directory permissions have changed D. The user account permissions have changed

c

Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications? A. Create a static DNS entry on the server for the PC B. Change her NIC IP address to dynamic C. Create a new exception on her local firewall D. Make sure the PC's IP is in the management VLAN

c

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested. Which of the following should the technician do? A. Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot B. Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one C. Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time D. Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved

c

Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue? A. Update limitations B. Limited access C. End-of-life D. Network connection

c

Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system? A. WPA2-PSK B. AES C. TACACS D. TKIP

c

Not Sure After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.) A. Screen locks B. Screensaver passwords C. UEFI passwords D. Login time restrictions E. Strong passwords F. Multifactor authentication G. BitLocker H. Credential Manager I. Smart card J. Biometric authentication

c d g

A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (Choose two.) A. Image deployment B. Multiboot C. PXE D. Unattended installation E. USB F. Wake-on-LAN

c f

A Linux user reports that an application will not open and gives the error. Only one instance of the application may run at one time. A root administrator logs on to the device and opens a terminal. Which of the following pairs of tools will be needed to ensure no other instances of the software are currently running? A. pad and chmod B. sudo and vi C. ls and chown D. ps and kill E. cp and rm

d

A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change? A. File attributes B. Share permissions C. Local share D. Inheritance

d

A technician has identified malware on a user's system. Which of the following should the technician do NEXT according to malware removal best practices? A. Enable System Restore and create a restore point so no data is lost B. Educate the user about how to avoid malware in the future C. Update the antivirus software and run a full system scan D. Move the infected system to a lab with no network connectivity

d

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access? A. Remove the guest account from the administrators group B. Disable single sign-on C. Issue a default strong password for all users D. Require authentication on wake-u

d

A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem. Which of the following should the technician do FIRST? A. Contact the application vendor support staff for more information B. Boot into safe mode, and then load the ERD and restore the most recent files C. Boot the PC, run msconfig, check the safe boot box under the Boot tab, and then restart D. Log in as an administrative user and determine if the problem persists

d

A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue? A. Check for and apply software updates B. Perform repair installation on the application C. Add the user to the local administrators group D. Rebuild the user's mail profile

d

An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all users are able to work. Which of the following is the BEST solution for the technician to recommend? A. Add more redundancy to the power cabling B. Purchase more battery backups for individual users C. Implement desktop virtualization D. Increase the capacity of the backup generator

d

Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.Which of the following would be the BEST resolution to Ann's issue? A. Restart the tablet. B. Disable and then reenable Bluetooth. C. Calibrate the touchscreen sensor. D. Disconnect and then reconnect the stylus.

d

Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares? A. An IP conflict is present B. A corporate VPN is enabled C. A firewall exception must be set D. HomeGroup must be enabled

d

Not sure, A user reports malware activity on an isolated workstation used for testing. It is running an end-of-life OS, and a USB drive is the only method used to transfer files. After removing the malware and replacing the USB drive with a brand new one, the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system.Which of the following did the technician forget to do to prevent reinfection? A. Connect to the network and update the OS with the latest security patches B. Scan and clean the USB device used to transfer data from the equipment C. Disable System restore and remove all restore points from the system D. Update the local antivirus and set it to scan automatically every evening

d

The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company's account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email? A. Spear phishing B. Impersonation C. Dumpster diving D. Whaling

d

What a user is allowed to do on a computer network would be addressed in: A. a user acceptance policy B. regulatory and compliance policy C. a password policy D. an acceptable use policy

d

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources? A. WPA2 B. AES C. MAC filtering D. RADIUS E. WPS

d

1.A systems administrator needs to add security to the server room. Which of the following would provide the BEST security for the room? (Choose two.) A. Universal serial bus locks B. Personal identity verification cards C. Privacy screen D. Entry control roster E. Door locks F. Privacy window

d e

4. A user is unable to print to the office's networked laser printer from a Windows desktop. A technician attempts to print a test page, but nothing comes out of the printer. The technician tries to print from a label printer, which is connected via USB, but there is no output from that printer either. Which of the following actions are MOST likely to restore printing functionality to both printers? (Choose two.) A. Restart the wired AutoConfig service B. Restart the Windows Firewall service C. Power cycle the label printer D. Power cycle the desktop E. Power cycle the laser printer F. Restart the print spooler service

d f

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence? A. Activate real-time protection on both antivirus software programs B. Uninstall one antivirus software program and install a different one C. Run OS updates D. Enable the quarantine feature on both antivirus software programs E. Remove the user-installed antivirus software

e

A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.) A. Reboot into safe mode B. Clear the application data C. Contact the application's developer D. Reinstall the application E. Do a force stop F. Clear the application cache

e f

Certain types of data are protected by special governmental regulations and are called

regulated data


Kaugnay na mga set ng pag-aaral

Anatomy Chapter 8: Articulations

View Set

ch 22 22.1 The value of biodiversity arises from social, economic, and ecological considerations

View Set

18. Capacitate reziduala functionala crf

View Set

Chapter 15; Atherosclerosis and other Arterial Diseases

View Set

LEGAL, ETHICAL & MORAL ISSUES OF HEALTH CARE

View Set

Positive and Negative reinforcement. 3 term contingency

View Set

Econ 320 Lecture 12 Practice Problems

View Set