1002

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which version(s) of Window's 7 has the same features as Home Premium as well as domain connection, Remote Desktop, and EFS, but not bitlocker

7 Professional

Which version of Windows 7 was built for netbooks?

7 Starter

Which version(s) of Window's 7 has domain connection, Remote Desktop, BitLocker, and EFS

7 Ultimate, Enterprise

Basic home edition of windows 8/8.1. It integrates you microsoft account (SSO), has a built in anti-malware (Windows Defender), and Windows media player

8/8.1 Core

What are the 3 different editions of Windows 8/8.1?

8/8.1 Core 8/8.1 Pro 8/8.1 Enterprise

This version of windows 8/8.1 has the same features as Windows 8/8.1 Core as well as EFS, Bitlocker, Windows Domain, and GP support

8/8.1 Pro

True or False? A work group consist of 25 computers.

False

A user's smartphone is overheating. Which of the following the MOST likely cause? Faulty GPS program Damaged battery Damaged CPU Proper Ventilation Virus

Faulty GPS program Of the listed, this is the most likely cause. As a fault application will be using too many resources.

Madison is trying to open up her anti-malware solution to run a full system scan because she suspects her computer has become infected. When she attempts to run the tool, she receives an error of "Access denied." What security issue is MOST likely occurring? ​ - Disappearing files ​ - Renamed system files ​ - Rogue anti-virus ​ - File permission change

File permission change OBJ-3.2: If the user receives an "access denied" error message, it indicates that the file permissions have been changed. If the system files were renamed or the files disappeared, an error of "file not found" would be seen instead.

You are trying to locate a protected .dll file to edit, but you cannot see it under the System32 folder. Which Control Panel utility should you use to find the file? ​ System ​ Folder Options ​ Indexing Options ​ Display

Folder Options OBJ-1.6: The "View hidden files" option is located under the Folder Options utility in the Windows Control Panel.

Which of the following commands should be used to search for a specific string in a filename? Sudo Chmod Grep wget

Grep Grep is the Linux command used to search for matching information in a file, files or filename. Chmod is used to change permissions of a file or folder. Wget retrieves content from web servers.

What are the 7 steps of malware removal?

(1) Investigate and verify malware symptoms, (2) Quarantine the infected systems, (3) Disable System Restore in Windows, (4) Remediate the infected systems, update anti-malware software, scan the system, and use removal techniques (e.g., safe mode, pre-installation environment), (5) Schedule scans and run updates, (6) Enable System Restore and create a restore point in Windows (7) Educate the end user

Which of the following should you use to configure a network adapter's duplex setting manually in Windows 10? - Device Manager - Internet Options - System - Windows Defender Firewall

- Device Manager

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the file be in?

.ps1

A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use? ​ .py ​ .sh ​.bat ​.vbs

.sh OBJ-4.8: A .sh file is used for a shell script in Linux, macOS (OS X), and Unix. Since the first line says #!/bin/bash, it is a bash script.

What does chkdsk /f do?

/f = fix? Fixes basic errors on the drive

What does chkdsk /r do?

/r = recover? Locates bad sectors and recovers readable information on a drive

Amount of hard drive space needed for Windows 10 32-bit

16 GB

How many computers make up a work group?

20

Amount of hard drive space needed for Windows 10 64-bit

32 GB

What is the minimum amount of hard drive space needed to install Windows 10 on a 64-bit system?

32 GB

Max RAM limit for a system running a 32-bit version of windows?

4 GB

This version of Windows 7 has the same features as Windows 7 Professional as well as multilingual interface packages and Bitlocker encryption. For large organizations

7 Enterprise

This is the version of Windows 7 that was built for the consumer market. DVD playback, Aero, ICS

7 Home Premium

Which of the following NTFS security settings overrides all other settings? A. Deny B. Modify C. Read D. Write

A. Deny

In which of the following file extension types would a user expect to see the command. 'net use T:\ \server\files†? A. .bat B. .vbs C. .js D. .py

A. .bat

Which of the following extensions identify files that are typically implemented as scripts? (Choose two.) A. .vbs B. .txt C. .exe D. .zip E. .bat F. .xlsx

A. .vbs E. .bat

A technician is encrypting the company's laptops using BitLocker, but some of the laptops do not have a built-in TPM. Which of the following would enable the technician to use BitLocker on these machines? A. A USB key B. A firmware update C. A local disk D. Two-factor authentication

A. A USB key

A technician is creating a network topology diagram. Which of the following would be the MOST appropriate to include? (Choose two.) A. A list of network addresses for each device B. A list of the ports on each device and what they are connected to C. Technical specifications and performance ratings for the devices D. Settings, configuration details, and notes on proper operations E. A list of devices that need replacement within the next 6-12 months F. The MAC address and serial number of each device on the network

A. A list of network addresses for each device B. A list of the ports on each device and what they are connected to

A user lives in a location that experiences frequent lightning storms. Which of the following would be the LEAST expensive solution to protect the user's computer hardware? A. A surge protector B. Grounding C. A power generator D. An uninterruptible power supply

A. A surge protector

Which of the following is the MOST secure wireless security protocol? A. AES B. WPA C. WPA2 D. WEP

A. AES

Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit? A. Acceptable use policy B. Incident documentation policy C. Password compliance policy D. Change control policy

A. Acceptable use policy

After installing an application on a smartphone, a user starts receiving pop-up ads for recently visited physical stores. The user also receives prompts to install other applications. Which of the following permissions should be revoked to disable the unwanted notifications? A. Account access B. Mobile data C. Location access D. Contacts access

A. Account access

Which of the following security measures would BEST prevent unauthorized individuals from being granted access to a secure location? A. An infrared retina scanner and RFID lock B. Smart cards with a chip and PIN reader C. Barcoded ID badges and an electronic scanner D. Keys and a mechanical deadbolt lock E. Key fobs and wireless entry locks

A. An infrared retina scanner and RFID lock

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions? A. Avoid distractions B. Deal appropriately with customer's confidential material C. Adhere to user privacy policy D. Set and meet timelines

A. Avoid distractions

A computer running Windows 7 has an icon that has the appearance of an unlocked padlock with a yellow warning graphic. This icon advises the user that: A. BitLocker is operating on the system but not for the user. B. BitLocker has locked the drive, and it is no longer accessible. C. BitLocker is suspended, and the drive is no longer encrypted. D. BitLocker has encountered an error, and the user should run the check disk utility.

A. BitLocker is operating on the system but not for the user.

Which of the following is a reason to use WEP over WPA? A. Device compatibility B. Increased security C. TACACS D. Multifactor authentication

A. Device compatibility

A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a 'Stop†error on every boot. Which of the following should the technician complete to resolve the issue? A. Boot the workstation in safe mode and disable the graphics driver system tray menu B. Boot the workstation in safe mode with networking and install the latest stable graphics driver C. Boot the workstation in safe mode and disable Windows driver signing requirements D. Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standardsettings

A. Boot the workstation in safe mode and disable the graphics driver system tray menu

A technician recently updated a printer driver on all the computers in an office. Shortly after the update, several users' accounts and passwords were compromised. Which of the following MOST likely explains the compromised accounts? A. Botnet B. Ransomware C. Antivirus definitions D. Keylogger

A. Botnet

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access? A. BranchCache B. Swap partition C. Domain access D. Proxy server

A. BranchCache

A remotely managed self-checkout machine in a retail store runs Windows 10. The image contains drivers for locally attached third-party hardware (i.e., receipt printers), third-party applications, and proprietary applications made by the company's IT department. The self-checkout machine is experiencing errors, and the store employees are instructed to reload the OS. Which of the following would be the BEST option to restore full functionality to this machine with the least administrative effort? A. CD-RW B. BD-R C. Thin client D. Network boot

A. CD-RW

When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site? A. Certificates B. Software tokens C. Firewall D. Port security

A. Certificates

A smartphone user receives notice that a threshold for high-speed data usage, despite the user's usage behaviors being unchanged from previous periods. Which of the following troubleshooting steps should the user take FIRST? A. Check network access permissions on recently loaded applications. B. Limit data usage to WiFi networks only. C. Wipe the device and restore to the factory default. D. Change the lock screen password.

A. Check network access permissions on recently loaded applications.

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT? A. Check the contents of the hosts file B. Do a System Restore to a date before the infection C. Rerun the antivirus scan with higher sensitivity D. Rebuild the OS on the machine

A. Check the contents of the hosts file

A user is having trouble accessing websites on a computer. A technician troubleshoots and tries to access a site the user typically visits but is instead presented with a completely different site. Which of the following should the technician do NEXT? A. Clear the DNS cache and check the hosts file. B. Verify the default gateway settings are correct. C. Ensure the outbound firewall rules are accurate. D. Configure the workstation for IPv6.

A. Clear the DNS cache and check the hosts file.

The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user? A. Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan. B. Validate that the alerts are false positives, and disable security software on the workstation to prevent further false notifications. C. Back up the user's files. Restore the system to the original system image designated by corporate IT policies. Restore the user's files. D. Request a content filter exception to allow access to the link from the notification. Once available, follow the instructions on the linked site.

A. Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan.

Joe, an end user, just changed his network password. A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation? A. Credential Manager B. Network and Sharing Center C. Security and Maintenance D. Troubleshooting

A. Credential Manager

Which of the following security principles help to prevent employees from changing files they are intended only to view? A. DLP B. MDM C. ACL D. MFA

A. DLP Data Loss Prevention (DLP) Mobile Device Management (MDM) Access Control List (ACL) Multi-Factor Authentication (MFA)

A Chief Executive Officer (CEO) is giving a presentation at an industry conference but forgot to bring a laptop. The company has emailed several large presentation files and the links to several videos that will be streamed during the presentation. While showing the last video, it starts to buffer, times out, and will not display. The CEO restarts the phone that is being used for the presentation and verifies there is enough free storage space, but the video still will not play. Which of the following is MOST likely causing the issue? A. Data transmission over limit B. Unauthorized account access C. Resource over use D. Unintended Bluetooth pairing

A. Data transmission over limit

A technician has enabled port security on a switchport. Which of the following BEST describes the effect this will have? A. Devices must match a list of allowed MAC addresses before accessing the network. B. Devices need to conform to the policies set forth by the MDM software. C. Data loss prevention software will be monitoring for data exfiltration on the port. D. A firewall is actively monitoring the network traffic using heuristic analysis.

A. Devices must match a list of allowed MAC addresses before accessing the network.

A technician receives the Chief Executive Officer's (CEO's) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario? (Choose three.) A. Disconnect the device from the network B. Identify and research the symptoms C. Restore the computer to the previous checkpoint D. Scan and use removal techniques E. Create a restore point F. Educate the end user G. Schedule scans and run updates

A. Disconnect the device from the network B. Identify and research the symptoms D. Scan and use removal techniques

The Chief Executive Officer at a bank recently saw a news report about a high-profile cybercrime where a remote access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bank's risk? (Choose two.) A. Enable multifactor authentication for each support account. B. Limit remote access to destinations inside the corporate network. C. Block all support accounts from logging in from foreign countries. D. Configure a replacement remote-access tool for support cases. E. Purchase a password manager for remote tool users. F. Enforce account lockouts after five bad password attempts

A. Enable multifactor authentication for each support account. C. Block all support accounts from logging in from foreign countries.

Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some websites, and web services are not responding from any of the web browsers, although Joe can access these services from his smartphone without issue. The computer's malware scanner has the latest definitions installed. Which of the following would BEST explain why the computer is functioning this way? A. Expired root certificate B. OS update failures C. Pop-up blocker D. Hijacked email

A. Expired root certificate

Which of the following security permissions takes precedence over the other? A. File permissions over share permissions B. Share permissions over inherited permissions C. Share permissions over file permissions D. File permissions over user permissions

A. File permissions over share permissions

A company is creating a disaster recovery plan. Which of the following should be implemented to BEST ensure the company's data can be successfully restored in the event of a disaster? A. File-level backups B. Backups for critical applications C. Regular backup testing D. Backups to cloud storage E. Redundant backups on site

A. File-level backups

Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.) A. Firewall B. Antivirus C. Email filtering D. ACLs E. VPN

A. Firewall E. VPN

A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to user's mobile devices? (Choose two.) A. Full device encryption B. Remote backup application C. SSO authentication D. Device profiles update E. OS security updates F. Biometric authentication

A. Full device encryption F. Biometric authentication

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter 'J†assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive? A. GPT B. Dynamic C. Basic D. Extended

A. GPT

Which of the following would BEST support an 8TB hard drive with one partition? A. GPT B. FAT16 C. FAT32 D. EFS

A. GPT

Which of the following are best practices to avoid ESD-related damage when handling internal computer components? (Choose two.) A. Ground oneself before touching components. B. Avoid exposing components to sources of RFI. C. Maintain cool and dry air in the work environment. D. Handle cards by their edges to avoid contacting ICs. E. Wear adequate eye protection at all times. F. Ensure hardware is plugged into a grounded outlet.

A. Ground oneself before touching components. D. Handle cards by their edges to avoid contacting ICs. IC (Integrated circuit)

A technician is monitoring a network and notices an outage has occurred that could potentially cause a major disruption to the business workflow. Which of the following should the technician do NEXT? A. Identify the issue and its impact to the business B. Report the incident to the proper teams or management for awareness C. Start a root cause analysis and create documentation D. Create an action plan and implement the solution

A. Identify the issue and its impact to the business

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer? A. Image deployment B. Multiboot configuration C. In-place upgrade D. System repair

A. Image deployment

A technician needs to secure a SOHO network against unauthorized access. A switch has been deployed, and all endpoints have been patched; however, not all of the endpoints are in use. A solution must be implemented to secure the unused endpoints. Which of the following should the technician do FIRST? A. Implement firewall rules and restrictions. B. Disable the inactive ports. C. Implement a NAC solution. D. Enable MAC filtering.

A. Implement firewall rules and restrictions.

A company would like to increase its security measures because a workstation was recently hacked. Which of the following would offer the BEST protection from unauthorized access of workstations? A. Implementing strong passwords B. Restricting user permissions C. Encrypting the filesystem D. Disabling AutoRun

A. Implementing strong passwords

A network technician is creating a set of scripts to help complete some common tasks. The technician wants to leave notes within the scripts to explain the purpose of each section and allow for changes later. Which of the following should the technician use? A. Inline comments B. End-user documentation C. Change management D. Environmentally aware variables

A. Inline comments

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints, the user needs a quick way to install and access the program. Which of the following is the user's BEST option given the situation? A. Install to a network drive B. Install to a USB drive C. Install to a DVD-RW D. Install to a secondary internal HDD

A. Install to a network drive

Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hotspot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe's slow data speeds? A. Joe's data transmission is over the limit B. The phone needs to be rebooted from overuse C. The use of GPS interferes with data speeds D. There is unintended Bluetooth pairing

A. Joe's data transmission is over the limit

A company wishes to secure entry and provide a reviewable entry log to specific offices within its building. Which of the following would be the lowest-cost solution to BEST meet the company's needs? A. Key fob B. Biometric locks C. Entry control roster D. Cipher locks

A. Key fob

A technician is installing new software on an older laptop that has a current OS. The software contains a database back end that also requires installation. Which of the following should the technician review to ensure the software will run before installing it? (Choose two.) A. Memory usage B. Display settings. C. Network utilization D. Storage capacity E. Firewall rules F. Antivirus signatures

A. Memory usage D. Storage capacity

A technician is working on an infected computer that is currently turned off. The technician is concerned the boot sector is affected. Which of the following is the BEST method for the technician to use to scan the boot sector? A. Mount the drive using a forensic platform. B. Boot into safe mode. C. Boot to last known good configuration. D. Boot the drive in another computer

A. Mount the drive using a forensic platform.

A technician is updating a network switch at a location facility. The technician needs to ensure the data is not sent in plaintext over untrusted networks. Which of the following should the technician use? (Choose two.) A. SSH B. SCP C. TFTP D. FTP E. RDP F. VNC

A. SSH B. SCP Secure copy (SCP) is a file transfer protocol, which helps in transferring computer files securely from a local host to a remote host. It works on the Secure Shell (SSH) protocol technique

An issue with a user's computer was addressed several times by multiple technicians, but the user has continued to experience the issue. The user calls the help desk and insists on speaking to a supervisor; however, the supervisor is away at lunch. Which of the following should the technician perform FIRST? A. Offer to address the concern since the supervisor is currently unavailable. B. Show the work orders to the customer as proof the issue was resolved. C. Tell the customer to return at a later time when the supervisor is available. D. Call the supervisor on the phone and let the customer talk to the supervisor directly.

A. Offer to address the concern since the supervisor is currently unavailable.

A user's login screen does not look normal when booting the computer. A technician states the computer was showing the company's workstation imaging system screen, but it has since been fixed. Which of the following did the technician update? A. Operating system B. Drivers C. Boot order D. BIOS firmware

A. Operating system

A company wants to move the contents of its users' My Documents folders from their local hard drives to a file server so they are backed up every night. Which of the following security concepts does this describe? A. Organizational units B. Folder redirection C. Group Policy D. Login script

A. Organizational units

Which of the following is considered government-regulated data? A. PHI B. End-user license agreement C. Digital Millennium Copyright Act D. DRM

A. PHI

A customer is setting up a new cable modem and wireless router. The customer wants to be able to access a remote desktop while traveling. Which of the following must be configured FIRST to enable this capability? A. Port forwarding B. Disabling ports C. Content filtering D. MAC filtering

A. Port forwarding

A user's computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT? A. Preserve data integrity B. Identify violations of acceptable use C. Collect evidence of illegal activity D. Report through proper channels

A. Preserve data integrity

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate? A. Preserving chain of custody B. Implementing data protection policies C. Informing law enforcement D. Creating a summary of the incident

A. Preserving chain of custody

A user's computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening. Which of the following should the technician attempt NEXT? A. Reboot into safe mode and roll back the updates B. Repair the Windows Registry C. Configure boot options in the BIOS D. Disable Windows services and applications

A. Reboot into safe mode and roll back the updates

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Choose two.) A. Reduce the transmit power B. Reduce the channel availably C. Disable the DHCP server D. Enable QoS management E. Disable the SSID broadcast F. Implement WPA encryption

A. Reduce the transmit power E. Disable the SSID broadcast

A technician needs to configure a user's PC so it can be powered on remotely by another employee who will be working at the help desk after hours. The technician puts the employee in the correct organizational unit; however, the employee is still unable to connect. Which of the following settings should the technician configure? A. Remote Assistance B. Firewall exceptions C. Static IP address D. Wake-on-LAN

A. Remote Assistance

An administrator created a connection to a private network using TLS 1.2. The Linux servers on the network do not support secure protocols. Which of the following will the administrator MOST likely use to log in to these servers? A. SSL B. RDP C. SSH D. Telnet

A. SSL Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are protocols used to authenticate data transfers between servers and external systems such as browsers

A small office calls a technician to investigate some 'invalid certificate†errors from a concerned user. The technician observes that whenever the user attempts to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.) A. Remove any proxy servers configured on the user's browsers. B. Assist the user with purchasing an SSL certificate and save the certificate to the desktop. C. Disable the SPI firewall on the office's gateway and any other routers. D. Instruct the user to ignore the certificate error since the user is connecting to a secure website. E. Create an outbound rule in Windows Firewall named after the user's homepage. F. Run anti-malware scans and download the latest Windows updates

A. Remove any proxy servers configured on the user's browsers. F. Run anti-malware scans and download the latest Windows updates

An end user's PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Choose two.) A. Remove applications from startup B. Defragment the hard drive C. Install additional RAM D. Install a faster hard drive E. End the processes in Task Manager F. Run the Disk Cleanup utility

A. Remove applications from startup B. Defragment the hard drive

Ann, a technician, is dispatched to a corporate customer that has reported a malware infection. Upon arrival, Ann notices the system is shut off, and she is able to start the computer without incident. Ann also notices numerous pop-ups appear when the web browser is opened. Which of the following should Ann do NEXT? A. Report the incident to the appropriate contact B. Clear the system logs and browser history C. Take a screenshot of the pop-ups D. Advise the customer to use the browser in private mode

A. Report the incident to the appropriate contact

Joe, a user, is receiving automated replies but does not remember sending any emails to those recipients. He checks the sent items folder and sees email messages he did not send. Which of the following would be the BEST way to resolve thisissue? A. Reset Joe's email password. B. Set up a rule to delete the automated replies. C. Mark the automated replies as spam. D. Rebuild Joe's profile.

A. Reset Joe's email password.

A user reports that when opening a web browser, the initial page loads to a search engine the user does not recognize. When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups. Which of the following should a technician do to resolve these issues? (Choose two.) A. Reset the user's browser to default settings B. Delete the user's cached images, temporary files, and cookies C. Reboot the user's computer and install a secondary antivirus D. Convince the user to use a different web browser that is currently unaffected E. Download the update to the user's web browser of choice F. Remove any unapproved applications from the user's startup items

A. Reset the user's browser to default settings F. Remove any unapproved applications from the user's startup items

A help desk technician receives a call from a user who is experiencing a recurring issue. The user complains and demands an immediate, permanent resolution. Which of the following actions should the technician take NEXT? A. Review all existing case notes from previous calls and restate the issue. B. Apologize for the inconvenience and then escalate the call to a supervisor. C. Ask the user to walk through each step taken that created the issue. D. Establish a theory of probable cause based on what the user reported

A. Review all existing case notes from previous calls and restate the issue.

The IT department is assisting with an upgrade of the third-party software the payroll department uses to track time and create paychecks. When modifications were made three years ago, there were issues with the upgrade. Which of the following change management processes should the IT department use after scoping the change but before implementing the new version of the software? A. Risk analysis B. Managerial approvals C. Economic feasibility D. Software compatibility E. Backout plan

A. Risk analysis

A technician is working on a desktop computer that is not performing as expected. Program windows sometimes open and close without user intervention. Windows cannot check for OS updates, and some websites are not accessible. Which of the following tasks should the technician perform FIRST? A. Roll back recent driver updates. B. Replace the defective keyboard. C. Reset all the settings in the Internet Options. D. Unplug the Ethernet cable.

A. Roll back recent driver updates.

A customer's smartphone has been overheating frequently and becoming unresponsive since installing an OS update. A technician has already performed a soft reboot of the device. Which of the following should the technician perform NEXT? (Choose two.) A. Roll back the OS update B. Update the PRL C. Force stop running applications D. Enable airplane mode E. Perform a factory reset F. Run application updates G. Reset network settings

A. Roll back the OS update F. Run application updates

A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT? A. Roll back the video card device drivers for all computers and escalate the issue to the video card vendor. B. Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed. C. Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the videocard vendor. D. Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.

A. Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.

A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem. Which of the following would MOST likely fix the issue? A. Roll back updates B. Disable the Windows Update service C. Check for updates D. Restore hidden updates

A. Roll back updates

A technician needs to connect securely to a Linux-based network appliance in a remote datacenter. Which of the following will the technician MOST likely use? A. SSH B. SFTP C. RDP D. Telnet

A. SSH

After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.) A. Screen locks B. Screensaver passwords C. UEFI passwords D. Login time restrictions E. Strong passwords F. Multifactor authentication G. BitLocker H. Credential Manager I. Smart card J. Biometric authentication

A. Screen locks B. Screensaver passwords G. BitLocker

A technician is setting up a SOHO router for a customer. Per the customer's requirements, data security is the highest priority. Which of the following provides the MOST security for the network? A. Set up encryption for wireless B. Set up port forwarding C. Set static IP addresses D. Change the default SSID

A. Set up encryption for wireless

A technician was alerted by IT security of a potentially infected desktop, which is at a remote location. The technician will arrive on site after one hour. Which of the following steps should be performed prior to traveling to prevent further infection? (Choose two.) A. Start system updates B. Back up PC data C. Run antivirus D. Install the firewall E. Turn off System Restore F. Install a keylogger

A. Start system updates C. Run antivirus

A technician is helping a remote user who has a Windows issue. The user is working from a shared office space and is not on the corporate network. Which of the following remote access methods is MOST likely to be successful in this case? A. Telnet B. Remote desktop C. Third-party screen sharing D. Secure shell

A. Telnet

A Mac user needs to configure a network device using a serial connection to enable a remote network connection. Which of the following utilities would MOST likely be used to make the necessary changes? A. Terminal B. Disk maintenance C. iCloud D. Image recovery

A. Terminal

A Windows user logs on to a network domain computer after recently being switched to a roaming profile. The user reports extremely long startup times. Which of the following should a technician check to address this issue? A. The amount of data on the user's desktop. B. The total quantity of RAM installed on the computer. C. The free space available on the network share. D. The size of the Windows swap file.

A. The amount of data on the user's desktop.

Joe, a user, cannot read encrypted email messages on a corporate smartphone, but he has been able to read them in the past. A technician restarts Joe's smartphone, but the issue remains. The technician deletes the corporate email account and has Joe re-add it, verifying all settings are correct. Despite these steps, the issue persists. Which of the following is MOST likely causing the issue? A. The certificate is expired. B. The TPM is bad. C. The phone is not encrypted. D. The incorrect mail server is selected in settings.

A. The certificate is expired.

A SOHO user is working on a laptop, but the wireless connection indicator is showing a limited connection. Each time the user tries to access a website, the browser redirects to an unfamiliar authentication page. Which of the following should the user check to troubleshoot the cause of the issue? A. The existing wireless network connection B. The signal strength from the ISP regional satellite C. The data speeds from the user's ISP D. The user's default gateway settings

A. The existing wireless network connection

A user moves a file from one NTFS disk to another NTFS disk. Which of the following describes the changes to the file permissions? A. The file has both the source and destination permissions B. The file keeps the source permissions C. The file permissions have to be set manually D. The file receives the destination permissions

A. The file has both the source and destination permissions

A user downloaded a program from a website. After saving the file, the user cannot find the executable. Which of the following is MOST likely the cause? A. The file was quarantined by an anti-malware software. B. The host-based firewall blocked the download. C. The file is incompatible with the operating system. D. File permissions do not allow the user to access the file.

A. The file was quarantined by an anti-malware software.

Joe, a mobile device user, reached his monthly quota of data about halfway through the current billing cycle. Joe contacts a technician to identify potential issues with the mobile device, as his usage patterns have not changed over the past month. Which of the following is MOST likely causing this issue? A. There are unintended WiFi connections. B. Location tracking has been enabled. C. Applications are causing high resource utilization. D. Malware is causing excessive data transmission.

A. There are unintended WiFi connections.

Ann, a user, is experiencing issues trying to decrypt email on a new mobile device. She is unable to access internal resources, but she can get to the Internet while connected to the WLAN. Ann can also decrypt email while using a desktop computer. A technician notices she has several authentication errors when connecting to the WLAN. Which of the following is MOST likely causing the wireless issues? A. There is an incorrect certificate on the mobile device. B. There is no wireless connectivity. C. Ann is using an incorrect password. D. The email application is not working correctly. E. Ann's user account is disabled.

A. There is an incorrect certificate on the mobile device.

Which of the following would be the FASTEST method to perform a clean install of the latest Windows OS? A. USB media B. Optical drive C. Network boot D. In-place upgrade

A. USB media

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10. Which of the following installation methods would the technician MOST likely use to accomplish this quickly? A. Unattended installation B. Remote network installation C. In-place upgrade D. Clean installation

A. Unattended installation

A company has several hard drives that contain old and irrelevant information. The company would like to wipe and repurpose the hard drives for another system. Which of the following would be the BEST option to meet the requirement and ensure no residual data remains on the repurposed hard drives? A. Wipe the drives. B. Format the drives. C. Degauss the drives. D. Delete the drive partitions

A. Wipe the drives.

When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are abysmal, and the browser creates numerous pop-ups. Jonathan asks for your assistance in fixing this issue. Which TWO of the following actions do you recommend Jonathan perform first? ​ A. Uncheck any unapproved applications from the Startup tab in MSCONFIG ​ B. Update Jonathan's web browser to the latest version ​ C. Reboot Jonathan's computer and install a second anti-virus program ​ D. Reset the web browser to the default settings and configuration E. Tell Jonathan to switch to a different web browser ​ F. Delete the web browser's cache, temporary files, and cookies

A. Uncheck any unapproved applications from the Startup tab in MSCONFIG D. Reset the web browser to the default settings and configuration OBJ-3.2: Browser redirection and pop-ups are a common symptom of malware being installed on a computer. It is recommended that the web browser be reset to its default settings and configurations to remove any redirection settings that the malware may have made to the browser. Additionally, any unapproved applications should be unchecked from the Startup tab in MSCONFIG to ensure the malware isn't reloaded during the next reboot.

A user's desktop will not run an accounting program. The program's splash screen pops up, and then the software freezes. Which of the following actions should a technician take FIRST to help resolve the issue? A. Uninstall, reinstall, and restart the application. B. Reseat the memory. C. Ensure the PC meets the minimum requirements. D. Reset the PC display settings.

A. Uninstall, reinstall, and restart the application.

An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers? A. Uninterruptible power supply B. Voltage regulator C. Surge suppressor D. Generator

A. Uninterruptible power supply

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal? A. Use an antivirus product capable of performing heuristic analysis B. Use a host-based intrusion detection system on each computer C. Disallow the password caching of accounts in the administrators group D. Install a UTM in between PC endpoints to monitor for suspicious traffic E. Log all failed login attempts to the PCs and report them to a central server

A. Use an antivirus product capable of performing heuristic analysis

A technician accessed a network share from a computer joined to workgroup. The technician logged in as 'user1†and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the 'user1†account. Which of the following would allow the technician to log in using the 'administrator†username? A. Use the command: net use Z: \\fileserver\share B. Go to the Sync Center and disable the offline files feature. C. Delete the 'user†account for the network share in Credential Manager. D. Join the computer and file server to a domain and delegate administrator rights to 'user1†. E. Use the Advanced Sharing options in the Network and Sharing Center and enable 'turn on network

A. Use the command: net use Z: \\fileserver\share

A technician is contacted by a user who is working from home but is unable to connect to any office resources (e.g., files, printers). The user is able to access the Internet. Which of the following should the technician check FIRST? A. VPN B. DHCP C. NAT D. DNS

A. VPN

A user contacts a technician to report issues with unwanted pop-ups appearing on a computer. Additionally, when the user types a search term into the browser, the user is taken to an unexpected search engine. The technician checks the IP configuration of the computer and determines the DNS is set to 8.8.8.8. Which of the following should the technician perform to determine the cause of the unwanted behavior? A. Verify any modifications to the hosts file. B. Flush the DNS records. C. Install a software-based IDS. D. Change to a different DNS server.

A. Verify any modifications to the hosts file.

An administrator wants to deploy updates during the company's off-hours. Which of the following properties should the administrator implement to facilitate the deployment of the updates? A. Wake-on-LAN B. Proxy settings C. Remote Assistance D. Quality of service

A. Wake-on-LAN

A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following OSs should the technician recommended to ensure the BEST performance on this computer? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

A. Windows 7

Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

A. Windows 7

Which of the following Windows Enterprise OS versions offers BitLocker as a feature that can be enabled? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

A. Windows 7

Which of the following devices provides protection against brownouts? A. battery backup B. surge suppressor C. rack grounding D. line conditioner

A. battery backup

A user is trying to find a file that contains a specific string on a Linux workstation. The user locates the file and then needs to navigate to another directory to work with it. Which of the following commands should the user enter to accomplish both of these tasks? (Choose two.) A. grep B. chmod C. rm D. pwd E. sudo F. cd

A. grep F. cd

A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use? A. netstat B. net use C. nslookup D. ping

A. netstat

Which of the following Internet Options tabs should you access to enable TLS 1.2 in Internet Explorer? Privacy Security Connections Advanced

Advanced Use the Advanced tab to enable TLS 1.2. Trick question. TLS 1.2 is a security feature, however the security tab deals more with zone security and not specific protocol-based security options.

What does the gpresult command do?a

Allows user to view the results of the Microsoft Group Policy config and print it

Sam and Mary both work in the accounting department and use web-based software as part of their job. Sam cannot log in to the website using his credentials from his computer, but Mary can log in with her credentials on her computer. Sam asks Mary to login into her account from his computer to see if the problem is with his account or computer. When Mary attempts to log in to Sam's computer, she receives an error. Mary noticed a pop-up notification about a new piece of software on Sam's computer when she attempted to login to the website. Which TWO of the following steps should Mary take to resolve the issue with logging in from Sam's computer? ​ Ask Sam about the pop-up notification and determine what new programs he installed on his computer ​ Ask Sam for his username/password in order to log on to the website from Mary's computer ​ Have Sam attempt to log on to another website from Sam's computer to see if it works ​ Verify Sam's computer has the correct web browser configuration and settings Have Sam clear his browser cache on his computer and then attempt to log on to the website again Install a new web browser, reboot Sam's computer, and attempt to log on to the website again from Sam's computer

Ask Sam about the pop-up notification and determine what new programs he installed on his computer&Verify Sam's computer has the correct web browser configuration and settings OBJ-3.2: Since Mary was able to log in to the website from her computer but not from Sam's, this indicates an issue with Sam's computer and/or web browser. The pop-up notification about the new program being installed indicates that something exists on Sam's computer that doesn't exist on Mary's computer. Therefore, it could be the cause and should be investigated further. Additionally, the browser's configuration should be checked to ensure the correct settings are being used.

You are helping to set up a backup plan for your organization. The current plan states that all of the organization's servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend? ​ Create an additional copy of the backups in an off-site datacenter ​ Attempt to restore a test server from one of the backup files to verify them ​ Frequently restore the server from backup files to test them ​ Set up scripts to automatically reattempt any failed backup jobs

Attempt to restore a test server from one of the backup files to verify them OBJ-1.9: The only way to fully ensure that a backup will work when needed is to restore the files from the backups. To do that, it is best to restore them to a test server since this will not affect your production environment.

Which the following is an executable that checks the integrity of an NTFS volume in Windows? Regedit.exe Autochk.exe Convert SFC

Autochk.exe This is an executable that checks the integrity of the NTFS volume in Windows. It enables windows to revert core system settings to their original state. SIMILAR to chkdsk - but autochk runs during system bootup (after a cold boot), whereas chkdsk runs in the command line.

A customer built a computer with the following specifications: Single hexa-core processor 8GB DDR4 memory 256GB SSD drive Built-in graphics card 32-bit Windows OS Audio editing software The computer seems to be working, but the OS reports only 3.5GB of RAM is available. Which of the following would correct the issue? A. 16GB DDR4 memory B. 64-bit Windows OS C. Dual hexa-core processors D. 512GB SSD drive

B. 64-bit Windows OS

A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access. Which of the following policies is needed? A. Password policy B. Acceptable use policy C. Regulatory policy D. Compliance policy

B. Acceptable use policy

A user installed an application that now requires a license key to enable full functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user. Which of the following will support this task? A. SSH B. RDP C. FTP D. Telnet

B. RDP

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as 'ConnectMe†and appears as unsecure. Which of the following should the help desk perform to fix the issue? A. Remote into Ann's system and restart the wireless adapter B. Ask Ann to open a browser and watch for a redirect page C. Advice Ann to plug an Ethernet cable into her laptop D. Direct Ann to run an antivirus program on herlaptop

B. Ask Ann to open a browser and watch for a redirect page

After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users. Which of the following is the BEST way for the technician to perform this security feature? A. Push a group policy B. Assign a local security policy C. Create a network login script D. Update the AUP

B. Assign a local security policy

A user visited a website and infected a Windows 10 computer with a virus. A technician troubleshoots the issue, but the virus runs every time the computer is restarted. Which of the following should the technician try NEXT to resolve the issue? A. Use Advanced Startup to run a System Image Recovery. B. Boot to safe mode and run System File Checker. C. Boot to safe mode and run Task Manager. D. Use Advanced Startup to run Windows System Restore.

B. Boot to safe mode and run System File Checker.

Which of the following would MOST likely be used in secure client-server communication? A. Redirection B. Certificates C. Port security D. Group Policy

B. Certificates

Joe, a technician, is configuring advanced security settings on a SOHO router. Joe cannot locate the settings he intends to change, but the online vendor documentation has instructions for configuring those settings. Which of the following should the technician perform? A. Configure content filtering B. Check for a firmware update C. Disable the SSID broadcast D. Change the firewall settings

B. Check for a firmware update

When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT? A. Change the browser's home page B. Check the Windows host file C. Update the default web browser D. Restore Windows to a previous date

B. Check the Windows host file

A user received a brand new mobile device about six months ago. The device is now running very slowly and is hotter than normal, and certain applications crash when they are started. Which of the following are the BEST options for troubleshooting this phone? (Choose two.) A. Check for any applications that are running and stop them. B. Check the device's battery and replace it. C. Check the smartphone's screen and replace it. D. Check the smartphone's charging cable to ensure it is working properly. E. Check for any unnecessary applications and uninstall them. F. Check for any OS updates and install them.

B. Check the device's battery and replace it. E. Check for any unnecessary applications and uninstall them.

A smartphone user has been receiving unsolicited emails that contain PII in the webmail inbox associated with the device. Which of the following steps should the user take FIRST to identify the cause of the issue? A. Report the emails as spam. B. Check the permissions on all installed third-party applications. C. Delete the webmail account and create a new one. D. Restore the smartphone to factory default settings.

B. Check the permissions on all installed third-party applications.

An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application? A. Network-based B. Client/server C. Application streaming D. Peer-to-peer

B. Client/server

A technician sees the following in a .ps1 file: #Script to copy files to a server #uses file name computers.txt for list #Share as you like Get-Object Which of the following BEST describes the lines that start with the # symbol? A. Basic loops B. Comments C. Integers D. Environment variables

B. Comments

A technician needs to install Windows 10 on a 4TB hard drive. Which of the following should the technician perform to accomplish this task? A. Format the drive to use exFAT. B. Configure the drive to use the GPT. C. Configure the drive to use an MBR. D. Format the drive to use CDFS

B. Configure the drive to use the GPT.

A user is locked out of the local user account on a UEFI-based workgroup computer. A technician is trying to use a third-party tool to unlock and reset the local account password but cannot boot from the USB drive to run the program. Which of the following would be the BEST way to fix the issue? A. Start up in safe mode, verify the USB device in Device Manager, restart the computer, and boot from USB. B. Disable Secure Boot, restart the computer, and boot from USB. C. Use Bootsect.exe to modify the boot priority, restart the computer, and boot from USB. D. Boot into recovery console, navigate to the USB drive, and boot from USB.

B. Disable Secure Boot, restart the computer, and boot from USB.

A company brings in contractors several times a year to perform inventory, and the contractors use companysupplied laptops. The company's security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory. Which of the following BEST enforces this policy? A. Delete the user accounts B. Disable the user accounts C. Restrict the user accounts D. Reset the user accounts

B. Disable the user accounts

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the following tools should the technician use to accomplish this task? A. Console B. Disk Utility C. Time Machine D. FileVault

B. Disk Utility

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan? A. Inform management regarding the anticipated amount of downtime B. Document a backout plan to roll back changes to the router C. Configure a redundant data path to eliminate downtime D. Make the downtime window larger than actually anticipated

B. Document a backout plan to roll back changes to the router

A technician was contacted regarding an issue affecting hundreds of users on a domain network. Which of the following would be MOST effective at remediating future issues through documentation? A. Take personal notes for future reference. B. Document the findings in the technician ticketing system. C. Document the solution in a user-facing FAQ page. D. Brief upper management in a meeting regarding the findings.

B. Document the findings in the technician ticketing system.

A technician is disposing of computer hardware that contains PHI. The drive must be reusable. Which of the following methods should be used? A. Degauss B. Drive wipe C. Standard format D. Low-level format

B. Drive wipe

A home user reports slow computer performance and application crashes after clicking a 'repair†button on a pop-up warning while browsing the Internet. Which of the following are the FIRST steps a technician should take to identify and resolve the issue? (Choose two.) A. Perform a system file check and replace any changed files with their original versions B. Enable the pop-up blocker on the Internet browser C. Uninstall any recently installed unknown programs and browser extensions D. Perform a hard shutdown and cold boot the computer E. Scan the RAM and hard drive using an up-to-date antivirus program

B. Enable the pop-up blocker on the Internet browser C. Uninstall any recently installed unknown programs and browser extensions

A user's mobile social media application is sending emails on behalf of the user. However, the user has not authorized any new permissions for the social media application. The user only has this application installed on their smart phone and no other devices. Which of the following should a technician perform to resolve the issue? A. Run a malware scan on the device. B. Instruct the user to change the device's password. C. Disable access to the user's contacts. D. Deny access to text messages.

B. Instruct the user to change the device's password.

A proxy server is required for Internet access from a corporate network. Which of the following should a technician perform to manually configure a Windows 10 device for Internet access? A. Add the proxy server's URL and IP address to the computer's hosts file under C:\Windows\System32 \drivers\etc. B. Enable the use of a proxy server and enter an address for it under Control Panel > Internet Options > Connections > LAN settings. C. Open a command prompt and run ipconfig /release, followed by ipconfig /renew. D. Set the proxy server as the default gateway under the computer's network connection IP settings by selecting Manual, then entering the proxy server's IP address under Gateway

B. Enable the use of a proxy server and enter an address for it under Control Panel > Internet Options > Connections > LAN settings.

A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software. Which of the following would be MOST important during this phase of the request process? A. Back-out plan B. End-user acceptance C. Risk analysis D. Test plan

B. End-user acceptance

A user calls the help desk to report issues with multiple pop-ups and degraded PC performance. The user is out of the area, and assistance can only be provided remotely. Which of the following steps should a technician perform? A. Establish a remote connection, install free third-party malware software, scan the machine for malware, and restart the machine. B. Explain the steps to access safe mode with networking, establish a remote connection, run approved malware tools, and restart the machine C. Establish a remote connection, install a free third-party backup tool, back up the user's software, and instruct the user on how to reinstall Windows. D. Explain the steps to access safe mode with networking, set a restore point, run company-approved malware tools, and restart the machine.

B. Explain the steps to access safe mode with networking, establish a remote connection, run approved malware tools, and restart the machine

A user in a SOHO wants to allow Joe, a remote technician, to connect securely to the user's workstation. Joe informs the user that the VPN was successful, but he still cannot connect. Which of the following settings in the SOHO router MOST likely need to be adjusted? A. Encryption B. Firewall C. DHCP D. DNS E. NAT

B. Firewall

A customer is having trouble opening several files on a computer. The customer renames one of the files, but then the correct program will no longer open it. Which of the following settings is a solution to the issue? A. Set the view options to detail B. Hide the extensions C. Utilize Credential Manager D. View the system files

B. Hide the extensions

A Chief Financial Officer (CFO) who is returning from vacation notices several emails from the Chief Executive Officer (CEO) requesting funds be transferred immediately. The CFO replies that the funds will be transferred, but the CEO responds that there was never a request for funds to be transferred. Which of the following MOST likely happened? A. Shadow IT B. Hijacking C. Malware D. Virus E. Spear phishing

B. Hijacking

A user's antivirus recently expired, so the user downloaded and installed a free system protection application. The application found numerous rootkits, Trojans, viruses, and missing critical patches. It was unable to fix all the issues, however, and suggested the user call technical support. Which of the following is the FIRST step to begin repairing the computer? A. Remove the rogue antivirus. B. Install Windows Updates. C. Reimage the computer. D. Call the technical support number

B. Install Windows Updates.

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the Internet. Which of the following actions should the user take? A. Update antivirus definitions B. Install anti-malware software C. Enable the pop-up blocker D. Reboot the PC

B. Install anti-malware software

A technician is running Windows on a company's Mac workstations without incurring an additional expense to the company. The Windows licenses were purchased in the past. Users are required to run both Windows and Mac operating systems on their machines, but never at the same time. Which of the following would be the BEST way to accomplish this? A. Perform a PXE boot on the workstations. B. Install virtualization software. C. Utilize Mission Control on the Mac workstations. D. Install Boot Camp on the workstations.

B. Install virtualization software.

Joe, a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action? A. Acceptable use policy B. Inventory management C. EULA D. MDM policy

B. Inventory management

A technician is troubleshooting vendor-specific software. Which of the following is where the technician should go to find problem-specific fixes on the vendor's website? A. Software user manual B. Knowledge base articles C. System requirements documentation D. Installation instructions

B. Knowledge base articles

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.) A. Inventory management policy B. Knowledge base articles C. End-user acceptance document D. Acceptable use policy E. Incident documentation F. Network diagrams

B. Knowledge base articles D. Acceptable use policy

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business's concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Choose two.) A. Default SSID B. MAC filtering C. NAT D. QoS E. Signal strength F. Encryption

B. MAC filtering E. Signal strength

Which of the following identifies changes in the environment, such as alternating current failure? A. UPS monitor B. MSDS C. ESD mat D. Surge suppressor

B. MSDS

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Choose two.) A. Administrative share permissions B. Mapped drives C. Group Policy hours restriction D. Denied write/delete permissions E. Disabled proxy settings

B. Mapped drives D. Denied write/delete permissions

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.) A. Access control lists B. Multifactor authentication C. Organizational unit D. Trusted software sources E. Data loss prevention F. Pre-shared key

B. Multifactor authentication D. Trusted software sources

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized. Which of the following messages will be displayed? A. NTLDR not found B. No boot device available C. Operating system not found D. BIOS ROM checksum error

B. No boot device available

Which of the following forms of regulated data is MOST important to consider when browsing e-commerce sites on the Internet? A. GDPR B. PII C. PCI D. PHI

B. PII

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician? A. Process diagram B. Physical network diagram C. Fiber backbone diagram D. Logical topology diagram

B. Physical network diagram

Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.) A. LCD monitor B. Power supply C. Laptop screen D. CRT monitor E. Motherboard F. Tablet

B. Power supply D. CRT monitor

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Choose two.) A. System files have been deleted B. Proxy settings are configured improperly C. The OS has been updated recently D. There are disabled services on the vendor website E. Program file permissions have changed recently F. There is a rogue anti-malware program

B. Proxy settings are configured improperly F. There is a rogue anti-malware program

A technician is setting up a new corporate wireless network. One of the requirements for the network is that connections must only be allowed for current domain accounts without giving users a wireless key. Which of the following should the technician use? A. MAC filtering B. RADUIS C. MFA D. WPA2

B. RADUIS

A user calls the help desk to report an issue accessing a new application on a Windows PC. When the user tries to launch the application, an error message appears and then quickly disappears before the user can read it. Which of the following protocols would a technician MOST likely use to help diagnose this issue? A. FTP B. RDP C. SNMP D. SSH

B. RDP

Which of the following key and mouse combinations can be used to run an application as a different user? A. FN + Right-click B. Shift + Right-click C. Alt + Right-click D. Ctrl + Right-click

B. Shift + Right-click

A folder on an NTFS volume has the following permissions enabled for the administrators group: full control, modify, and write. A technician adds a permissions entry to the folder's security settings, denying the administrators group write and modify access. Which of the following permissions will the administrators group effectively have? (Choose two.) A. Write B. Read C. Full control D. Modify E. Execute F. Special permissions

B. Read E. Execute

A technician needs to recommend a disaster recovery solution for a company that has three offices across two states. The technician must ensure the solution has: - The ability to centralize data backups - High availability - The ability to synchronize user data to local machines Which of the following solutions will the technician MOST likely recommend? (Choose two.) A. Cold storage of all corporate data B. Redundant network links C. Hot site D. Servers at each location E. Clustered backups F. Cloud replication G. Local backups

B. Redundant network links F. Cloud replication

A technician is cleaning up a warehouse and has several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques. Which of the following should the technician do NEXT to proceed with disposal of the batteries? A. Place securely in trash receptacles. B. Refer to the manufacturer's specific usage. C. Review the material safety data sheet. D. Conduct an Internet search of disposal techniques.

B. Refer to the manufacturer's specific usage.

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer? A. Unattended installation B. Refresh upgrade C. Clean installation D. In-place upgrade

B. Refresh upgrade

A user is trying to access a popular email website but is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue. Which of the following should the technician do to remove the threat from the system? A. Remove all parameters after the FQDN website address. B. Remove all files from the temporary folder and restart the computer. C. Remove and reinstall the web browser in safe mode. D. Remove all lines that are not comments from the hosts file.

B. Remove all files from the temporary folder and restart the computer.

A user reports unwanted pop-ups are appearing on a computer's screen, and the system is performing slowly. Which of the following should a technician do FIRST to troubleshoot the threat? (Choose two.) A. Kill all processes that are not related to Windows. B. Restart the computer in safe mode. C. Run antivirus and anti-malware scans. D. Search for software related to the pop-ups. E. Uninstall the network driver from the Device Manager. F. Disable all non-Microsoft services

B. Restart the computer in safe mode. C. Run antivirus and anti-malware scans.

A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help desk to report the error. A technician remotely connects to the user's computer and identifies the problem. Which of the following should the technician do NEXT? A. Reboot the computer B. Restart the network services C. Roll back the device drivers D. Rebuild the Windows profiles

B. Restart the network services

A recent outbreak of a virus has uncovered that a company must put a security template in place to mitigate future virus outbreaks. Which of the following best practices would a technician MOST likely implement as part of the security template? (Choose two.) A. Failed attempts lockout policy B. Restricting user permissions C. Login time restrictions D. Setting strong passwords E. Patch/update management

B. Restricting user permissions E. Patch/update management

Joe, a user, reports the programs and icons on his Windows desktop are much larger than they were the day before. He tried changing the screen resolution and restarting the computer, but it still does not look right. Joe also states the computer showed it was finishing updates when he first powered it on. Which of the following should a technician perform NEXT? A. Reboot the computer. B. Roll back the video driver. C. Reload the OS. D. Boot into safe mode.

B. Roll back the video driver.

A network administrator needs to be able to securely connect to a local router from within the office. Which of the following protocols should the administrator ensure is enabled on the router? A. RDP B. SSH C. TFTP D. HTTP

B. SSH

Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT? A. Educate the end user on safe browsing and email habits. B. Scan and remove the malware from the infected system. C. Create a system restore point and reboot the system. D. Schedule antivirus scans and perform Windows updates.

B. Scan and remove the malware from the infected system.

A user suspects a computer is infected with malware. A technician identifies the symptoms as being related to a recent spread of malware. Which of the following steps should the technician take NEXT to address the infection? A. Educate the end user. B. Schedule scans and run updates. C. Disable System Restore. D. Remediate the infected system.

B. Schedule scans and run updates.

Malware has been identified on a critical system that is currently quarantined. Which of the following should a technician do after the malware symptoms are correctly identified? A. Educate the power user for that system. B. Schedule weekly scans and run routine updates. C. Disable System Restore. D. Remediate the infected system

B. Schedule weekly scans and run routine updates.

A new policy requires all users to log on to their corporate workstations using smart card authentication. Which of the following best practices should be implemented to further secure access to workstations? A. Data encryption B. Screen lock timeouts C. Required screensavers D. Strong passwords

B. Screen lock timeouts

A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues? (Choose two.) A. Slow performance B. Slow data speeds C. No wireless connectivity D. Baseband E. Application hang F. Overheating

B. Slow data speeds C. No wireless connectivity

Which of the following variable types should be used to store the data 'Chicago" within a script or code? A. Integer B. String C. Boolean D. Float

B. String

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT? A. Create a risk analysis report for review B. Submit a change order for approval C. Insist the worker accepts the standard desktop D. Document the request and place the order

B. Submit a change order for approval

A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook? A. Installation method B. System requirements C. OS compatibility D. File permissions

B. System requirements

A company is implementing multifactor authentication and requires a solution that utilizes TCP. Which of the following will the company MOST likely select? A. SNMP B. TACACS+ C. DHCP D. RADIUS E. Kerberos

B. TACACS+

A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take? A. Continue to work on the assigned task B. Take the print job to the office manager C. Remove the print job from the output tray D. Disconnect the printer from the network to prevent further print jobs

B. Take the print job to the office manager

A user recently connected a Windows laptop to a free WiFi hotspot. After returning to the office, the user cannot access network shares. Which of the following is the MOST likely cause? A. Remote access has been disabled B. The local firewall settings are incorrect C. Location-based settings are not turned on D. The network shares are hidden

B. The local firewall settings are incorrect

A user is staying at a hotel that only offers Fast Ethernet connectivity to the network. The user's laptop is currently using the corporate network for access to network resources as well as the cloud. Which of the following should the help desk recommend performing prior to using the hotel network? A. Add a country code exception to the firewall B. Unmap all network drives C. Change the proxy settings D. Enable Remote Assistance

B. Unmap all network drives

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem? A. Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings C. Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode D. Send a test email, open a command prompt to check the file system, and empty the browser cache

B. Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings

Several users in an office need to attend training. The training video will be played on a projector, but each user will need access to a lab server to follow along. The administrator needs to configure the proper permissions for each user, as well as the appropriate applications. Which of the following remote access technologies should the administrator configure for the training? A. Telnet B. Virtual network C. Remote desktop D. Video conferencing software

B. Virtual network

Which of the following wireless security protocols supports the use of a 40-bit encryption key? A. TKIP B. WEP C. WPA D. WPA2

B. WEP WPA: 60 WPA2: 128

During a network server outage, the administrator's computer received an IP address of 169.254.0.10 and had no access to internal or external resources. Which of the following should be configured to ensure the administrator's computer retains network access? A. Alternative IP address B. Wake-on-LAN C. APIPA D. Proxy setting

B. Wake-on-LAN

A user's smartphone takes longer to access websites than it did prior to a weeklong vacation. The user also observes the smartphone no longer says LTE in the corner of the screen, but it has significant improvements in speed when connected to a local hotspot. Which of the following is the cause of the symptoms the smartphone is experiencing? A. Network settings B. Weak signal C. Data limits D. Airplane mode

B. Weak signal

Which of the following Windows versions introduced using applications in the Metro interface? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

B. Windows 8

A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory" . Which of the following commands would BEST accomplish this? A. grep "d mandatory * B. grep "i mandatory * C. grep mandatory file D. grep mandatory *

B. grep "i mandatory *

A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use? A. apt-get B. iwconfig C. sudo D. ifconfig

B. iwconfig

A user's computer is quick to boot up but very slow at login. It tends to get faster throughout the day. A technician checks the RAM usage, and it looks fine during the day. The slowdown is MOST likelybeing caused by too many: A. boot devices. B. startup applications. C. device drivers. D. Windows profiles loading.

B. startup applications.

You are concerned that your servers could be damaged during a blackout or brownout. Which TWO devices would protect against blackouts and brownouts? ​ Grounding the server rack ​ Surge suppressor ​ Battery backup ​ Line conditioner

Battery backup & Line conditioner OBJ-4.3: A blackout is a total loss of power in a particular area. A brownout is a reduction in or restriction on the availability of electrical power in a particular area. The irregular power supply during the brownout can ruin your computer and other electronic devices. Electronics are created to operate at specific voltages, so any fluctuations in power (both up and down) can damage them. To protect against a brownout, you can use either a battery backup or a line conditioner. To protect against a blackout, a battery backup should be used.

What is a feature in Windows that allows full drive encryption? (What version of windows has this?)

BitLocker

A technician is configuring a static IP address on a Windows machine. The information is as follows: IP address: 192.168.10.15 Subnet mask: 255.255.255.0 Which of the following would be a valid default gateway address? A. 192.168.0.1 B. 192.168.9.1 C. 192.168.10.254 D. 192.168.15.10

C. 192.168.10.254

A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users' mobile devices. Which of the following should the security administrator recommend? (Choose two.) A. Change management policy B. EULA C. BYOD policy D. Business continuity plan E. MDM policy F. Time-based login policies

C. BYOD policy E. MDM policy

A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW (statement of work?) for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage. Which of the following would the project team MOST likely add to the SOW? A. Risk analysis B. Plan to change C. Backout plan D. Change board approvals

C. Backout plan

A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users' computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose two.) A. Risk analysis B. End-user acceptance C. Backout plan D. Plan for change E. Business processes F. Request for proposal

C. Backout plan D. Plan for change

A technician has been asked to review the configuration of an executive's SOHO network following a recent news report regarding home Internet routers that are being added to botnets for malicious purposes. Which of the following would be BEST to prevent the router from being added to a botnet? (Choose two.) A. Upgrading to an enterprise-grade router B. Enabling WPA2-Enterprise encryption C. Changing the default credentials D. Updating to the latest firmware E. Reducing the transmit power levels F. Disabling the SSID from being broadcast

C. Changing the default credentials D. Updating to the latest firmware

Ann, an employee at a company, calls the help desk to report issues logging on to a vendor's website. Joe, the technician, is able to log in successfully with his credentials before going to Ann's office. However, when he attempts to log in from Ann's office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification. Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.) A. Ask Ann for her credentials to verify and log on to the vendor's website from Ann's laptop B. Verify Ann's laptop has the correct browser settings C. Check all browser cached files on Ann's laptop and log on to another vendor's website D. Attempt to log on to another vendor's website from Ann's laptop E. Ask Ann about the notification and review the installed programs F. Reinstall the browser, reboot the laptop, and check the vendor's website again

C. Check all browser cached files on Ann's laptop and log on to another vendor's website E. Ask Ann about the notification and review the installed programs

A customer has been using a computer to download and copy files to a USB flash drive. The customer accidentally stepped on the power strip, and the computer suddenly powered off. When the computer turned back on, it displayed an error message: No OS found. Which of the following should a technician perform NEXT? A. Connect a UPS. B. Repair the OS. C. Check the boot order. D. Run hardware diagnostics

C. Check the boot order.

An Android smartphone user constantly receives notices that the device is low on storage. The user has uninstalled unneeded applications and does not want to remove any others. Which of the following troubleshooting steps should the user take FIRST to identify the issue? A. Upgrade the device to a newer version with more storage. B. Restore installed applications to their original device versions by uninstalling updates. C. Check the storage type and size of the data and cache on each installed application. D. Add more storage using a memory card

C. Check the storage type and size of the data and cache on each installed application.

An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue? A. Increase the amount of RAM B. Reboot the server C. Check the system logs D. Perform disk defragmentation

C. Check the system logs

Which of the following basic scripting components can be used to repeat an operation until a specific requirement is met? A. If-then logic B. String variables C. Conditional loop D. Goto statement

C. Conditional loop

A company is upgrading the desktops of all its employees. Users in the multimedia department would like to keep the RAM from their current desktops to upgrade their new devices. Following change management best practices, which of the following actions should a technician perform NEXT? A. Report the request to the board. B. Document the change in the project notes. C. Consult the back-out plan for guidance. D. Perform the RAM upgrade as requested.

C. Consult the back-out plan for guidance.

The Chief Information Security Officer (CISO) wants to ensure the company is prepared in case of a ransomware attack. The CISO has requested network vulnerability scans, firewall audits, and ACL logs. Which of the following should the CISO also request? A. Audits of the cloud storage platform B. Tests of the data backups C. Physical penetration tests D. NIDS signature updates

C. Physical penetration tests

Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications? A. Create a static DNS entry on the server for the PC B. Change her NIC IP address to dynamic C. Create a new exception on her local firewall D. Make sure the PC's IP is in the management VLAN

C. Create a new exception on her local firewall

A sales representative regularly modifies confidential files on a laptop and needs them to be available all the time. The sales representative will be on a six-month business trip in two weeks. A technician has been asked to assist the sales representative with saving files. Which of the following is the BEST method to implement to prevent any data loss for the sales representative? A. Give the sales representative a USB security lock. B. Encrypt the laptop's image on the server. C. Create a redundant cloud storage drive. D. Give the sales representative an external hard drive.

C. Create a redundant cloud storage drive.

A company recently experienced a security incident in which an unauthorized user was able to insert a USB flash drive into a kiosk, launch a non-native OS, and deliver malicious payloads across the network. Which of the following security measures would have been BEST to prevent the attack from being executed in the first place? (Choose two.) A. Using a host-based antivirus with real-time scanning B. Implementing automatic screen locks after 60 seconds of inactivity C. Creating a strong BIOS/UEFI password D. Disabling AutoRun for USB devices E. Enabling the Secure Boot option F. Changing the default administrator credentials

C. Creating a strong BIOS/UEFI password D. Disabling AutoRun for USB devices

A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to test a theory. Which of the following should the technician use to accomplish this? A. Devices and Printers B. Sync Center C. Device Manager D. Power Options

C. Device Manager

A user opens a phishing email and types logon credentials into a fake banking website. The computer's antivirus software then reports it has quarantined several temporary Internet files. A technician disconnects the computer from the network. Which of the following should the technician perform NEXT? A. Have the user change the password. B. Update the antivirus software and run scans. C. Disable the user's local computer account. D. Quarantine the phishing email.

C. Disable the user's local computer account.

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network. Which of the following best practices could have prevented the attack? A. Implementing strong passwords B. Changing default credentials C. Disabling AutoRun D. Removing Guest account E. Encrypting data

C. Disabling AutoRun

A technician needs to format a 64GB flash drive. Which of the following formats will the technician MOST likely use? A. FAT B. ExFAT C. FAT32 D. CDFS

C. FAT32

A technician is installing the Mac OS X operating system. The technician is prompted to select the filesystem. Which of the following filesystems should the technician utilize to install the listed operating system? A. Ext2 B. FAT32 C. HFS D. NTFS

C. HFS (Hierarchical File System) The previous file system in the Mac, which was replaced with the Apple File System

A technician is setting up a new virtualization server, which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans to utilize the server to host other VMs. Which of the following should the technician implement to ensure maximum uptime of the client VM? A. Cloud storage backup B. Large file storage C. Image-level backup D. Uninterruptible power supply

C. Image-level backup

Which of the following is the MOST common method of allowing outside access through a wireless SOHO router for specific program access? A. Enabling port forwarding B. Create a content filter whitelist C. Increasing radio power levels D. Properly placing access points

C. Increasing radio power levels

A technician has been dispatched to resolve a malware problem on a user's workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point. Which of the following should the technician do NEXT? A. Run the scan again to ensure all malware has been removed B. Quarantine the infected workstation from the network C. Install all of the latest Windows Updates to patch the system D. Educate the user on safe browsing practices

C. Install all of the latest Windows Updates to patch the system

Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST? A. Download antivirus updates B. Update the device drivers C. Quarantine the affected systems D. Perform hardware diagnostics

C. Quarantine the affected systems

Which of the following would MOST likely contain troubleshooting guides? A. Acceptable use policy B. Topology diagram C. Knowledge base D. Incident documentation

C. Knowledge base

A technician has created a new fileshare for an organization. To maintain data security, all users should have read-only rights to the fileshare. Additionally, supervisors need to be able to write and delete files. After the technician has configured the fileshare, users can read documents, but supervisors cannot modify documents. Which of the following utilities should the technician use to troubleshoot the issue? A. Microsoft Management Console B. User Account Control C. Local Security Policy D. Map Network Drive

C. Local Security Policy

A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs? A. Standard formatting B. HD drilling C. Low-level formatting D. HD partitioning

C. Low-level formatting

A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Choose two.) A. Disable guest account B. Remove admin permissions C. Modify AutoRun settings D. Change default credentials E. Run OS security updates F. Install a software firewall

C. Modify AutoRun settings D. Change default credentials

A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message. Which of the following is causing the error? A. Small hard drive B. Insufficient RAM C. OS compatibility D. Folder permissions

C. OS compatibility

A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users. Which of the following should the technician add to meet the multifactor requirement? A. Passphrase B. Knowledge-based authentication C. PIN D. Thumbprint

C. PIN

A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (Choose two.) A. Image deployment B. Multiboot C. PXE D. Unattended installation E. USB F. Wake-on-LAN

C. PXE F. Wake-on-LAN

Ann, a user, is setting up a new mobile phone, and the phone is asking for an authentication method to enroll the device. Ann is not sure which method is acceptable. Which of the following methods would a technician MOST likely tell Ann to use? A. Face lock B. Voice lock C. Passcode lock D. Fingerprint lock

C. Passcode lock

A computer's power light is on, but the screen is completely black. The user is unable to wake the computer and then contacts a technician. The technician asks the user to inspect the display cable, but it is securely connected at each end. Which of the following steps should the technician ask the user to take NEXT? A. Roll back the Windows updates B. Perform a startup recovery C. Perform a hard restart D. Boot from the last known-good configuration

C. Perform a hard restart

A Chief Information Officer (CIO) recently learned a critical update is required to secure several servers within the organization. The CIO asks a technician to: Deploy the patches to the environment following best practice protocols. Ensure the servers and applications are functioning properly after the deployment. Which of the following steps will the technician most likely take NEXT? A. Document the business processes. B. Scope the change. C. Perform a risk analysis. D. Develop a back-out plan. E. Document the changes.

C. Perform a risk analysis.

Which of the following would MOST likely be used by an attacker to identify the hash value of a strong password quickly? A. Brute force B. Key stretching C. Rainbow table D. Dictionary attack

C. Rainbow table A rainbow table is a precomputed table for caching the output of cryptographic hash functions, usually for cracking password hashes.

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message, and no changes have been made within the company. Which of the following has infected the computer? A. Cryptominer B. Phishing C. Ransomware D. Keylogger

C. Ransomware

Joe, a user, notices the data stored on his desktop has disappeared. Joe is able to log in to the computer and use it normally, but he cannot create any new files. All of the applications Joe installed are present, and he is the only person who uses the computer. Which of the following steps should Joe perform FIRST to resolve the issue and recover the data with minimal effort? A. Roll back the device drivers B. Roll back system updates C. Rebuild account profiles D. Run Recovery Environment

C. Rebuild account profiles

A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC? A. Download and apply the security patch that addresses the vulnerability that was exploited B. Use System Restore to bring the PC back to a previous restore point C. Reimage the computer and update it with all the latest patches D. Download another antivirus software that will quarantine the virus

C. Reimage the computer and update it with all the latest patches

Which of the following should be performed FIRST after discovering an employee is using a corporate laptop to steal trade secrets? A. Disable the laptop B. Preserve the data C. Report the incident D. Track the evidence

C. Report the incident

A user's computer was infected with malware, and a technician successfully removed the infection. However, the user reports certain web-based services are still inaccessible. Which of the following should the technician perform FIRST to resolve the issue? A. Turn off System Restore. B. Update the malware signatures. C. Reset the Internet Explorer settings. D. Check the hosts file.

C. Reset the Internet Explorer settings.

A technician is removing malware from a workstation. The malware was installed via a phishing attack, which was initiated from a link that was included in an email. Which of the following should the technician do to address this issue? (Choose two.) A. Ensure the anti-rootkit utility is up to date and run it to remove the threat. B. Update the host firewall to block port 80 on the workstation. C. Restore the system using the last known-good configuration from the recovery console. D. Ensure antivirus is up to date and install the latest patches. E. Educate the user on verifying email links by hovering over them before clicking. F. Ensure endpoint protection is up to date and run the utility to remove the threat

C. Restore the system using the last known-good configuration from the recovery console. E. Educate the user on verifying email links by hovering over them before clicking.

A technician needs to update the network firewall, which will cause a temporary outage. The technician submits a change management request to perform the required maintenance. Which of the following provides details about what the technician will need to do if the update fails? A. Back-out plan B. Scope of the change C. Risk analysis D. End-user acceptance

C. Risk analysis

A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business? A. Plan for the change B. Scope of the change C. Risk analysis of the change D. Documentation of the change

C. Risk analysis of the change

A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the 'My Documents†folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue? A. Remove the registry entry and rename the local account folder B. Delete or rename the local user folder C. Run DISM and re-add the local power user account D. Remove the user account in Credential Manager and restart the PC

C. Run DISM and re-add the local power user account

A customer's computer was turned off overnight. When the customer restarts the computer, an advanced startup menu is displayed. The startup repair option is unsuccessful and causes the computer to reboot repeatedly until the advanced startup screen reappears. Which of the following should a technician attempt FIRST? A. Go back to the previous build B. Refresh the PC C. Run System Restore D. Perform System Image Recovery E. Reset the PC

C. Run System Restore

A technician is remediating a virus on an infected workstation. All user files are set to system and hidden. Which of the following should a technician perform NEXT to remediate the system? A. Back up user data and rebuild the user profile. B. Restore user data and reset the user file attributes via a command line. C. Run System Restore to a date before the infection. D. Perform a clean install of the OS and restore the user data. E. Reset all file attributes on the user's profile via command line.

C. Run System Restore to a date before the infection.

Which of the following can be applied directly to an organizational unit in Active Directory to provide security to both the user and the machine? A. Folder Redirection B. Group Policy C. Security Groups D. Home Folder

C. Security Groups

Which of the following is a device that stores a copy of a certificate that is used for authentication? A. Biometric scanner B. Soft token C. Smart card D. OTP token

C. Smart card

A customer recently lost data because it was accidentally deleted. The customer calls a technician and asks to have a Windows backup solution installed. The customer needs to ensure all company data is backed up and quickly recoverable every time a change is made. Which of the following solutions would the technician MOST likely recommend? (Choose two.) A. File level B. Bare metal C. Snapshot D. Shadow Copy E. Critical applications F. Image level

C. Snapshot D. Shadow Copy

Which of the following is the MOST cost-effective option to protect computers and peripherals from damage caused by power fluctuations? A. Generator B. Battery backup C. Surge suppressor D. Line conditioner

C. Surge suppressor

Which of the following authentication methods was designed to be used primarily for administration purposes, such as giving users access to manage switches and routers? A. RADIUS B. LDAP C. TACACS D. Active Directory

C. TACACS

Which of the following features allows for the separation of authentication, authorization, and accounting? A. MFA B. RADIUS C. TACACS+ D. LDAP

C. TACACS+

A user's corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue? A. The Internet security options have changed B. The operating system updates have changed C. The network directory permissions have changed D. The user account permissions have changed

C. The network directory permissions have changed

A user's workstation is running extremely slow. A technician sees a pop-up on the workstation offering what appears to be fake technical support, so the technician begins the malware removal procedure. After disabling System Restore, the technician runs a malware scan, but the scan does not find any malware on the machine. Which of the following is the MOST likely reason the technician cannot find any malware? A. The technician should not have disabled System Restore B. The technician never quarantined the workstation C. The technician did not update the anti-malware software D. There is no malware on the workstation

C. The technician did not update the anti-malware software

A user receives an error message when trying to upgrade an application on a work computer. Which of the following is the MOST likely reason the user cannot complete this task? A. The computer does not meet the application's minimum requirements. B. The program is being deployed via optical media. C. The user account lacks administrative rights. D. A 32-bit application cannot be installed on a 64-bit system

C. The user account lacks administrative rights.

Joe, a user, did not receive emails over the weekend like he usually does. Productivity software is functioning properly. Joe never powers off his computer and typically leaves all applications open. No other users are reporting email issues. Which of the following is MOST likely the cause of the issue? A. There is an OS update failure. B. Out-of-office is turned on. C. There is an Internet connectivity issue. D. SMTP services are not running.

C. There is an Internet connectivity issue.

A technician responds to a report that a user's desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue? A. Roll back the OS upgrade. Continue using the older version of Windows B. Reset the PC to its factory conditions. Perform the OS upgrade again C. Update the SATA controller driver from the manufacturer's website D. Perform a full backup and replace the hard drive

C. Update the SATA controller driver from the manufacturer's website

A recent ransomware attack caused several datasets to be inaccessible. Security technicians were able to mitigate any additional attacks and remove any unauthorized software. Which of the following should the technicians do NEXT? A. Run an antivirus tool. B. Boot to the Recovery Console. C. Update the software firewall. D. Restore from backup.

C. Update the software firewall.

A user's smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT? A. Reset the device's network settings B. Check the data usage statistics on the device C. Verify the SSID with which the device is associated D. Run any pending application or OS updates

C. Verify the SSID with which the device is associated

A technician wants to deploy a solution to manage a computer remotely. The technician is not allowed to modify any network configuration and is not able to forward any ports on the router to internal devices. Which of the following remote access technologies would be BEST suited for this situation? A. Remote desktop protocol B. Telnet client C. Virtual network computer D. Third-party tools E. Secure shell

C. Virtual network computer

A technician replaced the hard drive for the organization's Chief Financial Officer (CFO). The technician wants to reuse the old drive in another system. Which of the following actions would be MOST appropriate? A. Format the drive. B. Degauss the drive. C. Wipe the drive. D. Drill the drive. E. Shred the drive.

C. Wipe the drive. When you format a hard drive or delete a partition, you're usually only deleting the file system, making the data invisible or no longer actively indexed, but not gone. A file recovery program or special hardware often recovers the information. If you want to make sure that your private information is gone forever, you'll need to wipe the hard drive using special software.

A technician plugs a 16GB jump drive into a Windows PC, and it has multiple smaller partitions that are unwritable. Which of the following single DiskPart commands can be used to restore the drive, allowing it to be formatted to full capacity? A. extend B. merge C. clean D. repair

C. clean

A user is unable to access a network share but can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST? A. ping B. nslookup C. net use D. ipconfig

C. net use

A technician notices a workstation is connecting to an IP address on the network and wants to determine the machine name that belongs to that IP address. Which of the following commands should the technician use? A. gpresult B. ipconfig C. nslookup D. net user

C. nslookup

A technician is able to connect to a website; however, the technician receives the following error when attempting to access a different website: Page cannot be displayed. Which of the following command line tools would be BEST to identify the root cause of the connection problem? A. ipconfig B. tracert C. nslookup D. netstat E. ping

C. nslookup nslookup is the name of a program that lets an Internet server administrator or any computer user enter a host name (for example, "whatis.com") and find out the corresponding IP address or domain name system (DNS) record. The user can also enter a command for it to do a reverse DNS lookup and find the host name for an IP address that is specified.

Where are 32-bit programs located on a 64-bit version of Windows?

C:\Program Files (x86)

Difference between chmod and chown

Change mode - change permission of files Change owner - changing owner of a file

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue? ​ Cancel all documents and print them again ​ Check the status of the print server queue ​ Check that the printer is not offline ​ Check to ensure the printer selected is the default printer

Check the status of the print server queue OBJ-3.1: When this issue occurs, it is often because the system properly sent the print job to the print queue, but the print queue has become stuck. If no error is shown in the taskbar's printer icon, the user should open the print queue to determine if the print job has become stuck. If it is, then the print queue can be emptied or reset.

SecureCorp is worried about the security of the data on their corporate smartphones if they are lost or stolen. The Chief Security Officer has instructed that the devices be configured so that unauthorized users cannot access the data. Which TWO of the following settings would provide the BEST security and protection for the corporate smartphones' data? ​ Disable the installation of application from untrusted sources ​ Configure the ability to perform a remote wipe ​ Enable a pattern lock ​ Enable full device encryption ​ Enable device lockouts after 3 failed attempts ​ Require complex passwords

Configure the ability to perform a remote wipe & Enable full device encryption OBJ-2.8: The BEST protections for the data would involve enabling full disk encryption and configuring the ability to perform a remote wipe. Even if the device is lost or stolen, the device's data would be unreadable if it was using full disk encryption. Additionally, by configuring the ability to wipe the device's storage remotely, the data would be erased before a thief can access it.

What does the Ping -t command do?

Continuous ping

A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task? A. Drill B. Hammer C. Low-level format D. Degaussing

D. Degaussing

Which of the following types of scripts would be seen on the user end of a web page? A. .bat B. .js C. .sh D. .vbs

D. .vbs

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement? A. MDM B. EULA C. IRP D. AUP

D. AUP

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log. Which of the following should the technician replace to prevent these issues in the future? A. System memory B. Surge protector C. Hard drives D. Battery backup

D. Battery backup

A technician is completing the documentation for a major OS upgrade of a Linux distribution that will impact a company's web services. The technician finishes the risk assessment and documents the change process. Which of the following should the technician complete NEXT? A. Scope of the change B. Back-out plan C. Purpose of the change D. Change request

D. Change request

A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue? A. Remove and reinstall the application. B. Hard reset the cell phone. C. Reconnect the wireless network connection. D. Close all running applications

D. Close all running applications

Which of the following must a systems administrator employ to protect the contents of all corporate machines? A. Regulatory policy B. Password policy C. Acceptable use policy D. Compliance policy

D. Compliance policy

A technician is repairing a computer. Which of the following should the technician do to protect the computer from accidental voltage spikes? A. Practice electrical fire safety. B. Clean tools properly before use. C. Remove any jewelry. D. Connect a proper ESD strap.

D. Connect a proper ESD strap.

A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime? A. Only a surge protector is needed due to the backup generator B. Plug directly into the emergency power source C. Plug a surge protector directly into the UPS D. Connect to a UPS that utilizes the emergency power source

D. Connect to a UPS that utilizes the emergency power source

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user's request? (Select TWO). A. MAC filtering B. Default SSID C. Radio power levels D. Content filtering E. Physicalsecurity

D. Content filtering E. Physicalsecurity

A technician needs to make changes to a production system. Before doing so, which of the following should be completed in case the changes have unintended consequences beyond their original scope? A. Draft a complete scope of the changes. B. Formulate a back-out plan for the changes. C. Ensure all relevant end users are notified of the changes. D. Create a risk analysis involving the changes.

D. Create a risk analysis involving the changes.

An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for subscribing to an organization's mailing list. Which of the following should be performed to remove and prevent any further emails from this organization? A. Click the 'Unsubscribe†button on each unwanted email B. Send the unwanted items to the spam or junk folder C. Deploy an email address whitelist D. Create domain-based filters

D. Create domain-based filters

The medical records department of a local hospital recently upgraded its computers. A technician needs to ensure the data stored on the hard drives is unrecoverable. Which of the following methods should the technician use to meet the requirement? A. Standard format B. Low-level format C. Overwrite D. Degauss

D. Degauss

A technician needs to adjust the folder permissions for the human resources department's fileshares. The technician must ensure users in the marketing group cannot be granted access to the folders, even if the folders inherit permissions from a parent folder. Which of the following should the technician use to accomplish this task? A. Encrypting File System B. Administrative shares C. BitLocker D. Deny permissions

D. Deny permissions

A customer is missing files from the Desktop and Documents folders after logging on to a PC. A technician looks in the Recycle Bin for the items, but nothing is there. Which of the following steps should the technician take NEXT? A. Disable application startup. B. Rebuild the user profile. C. Reinstall the operating system. D. Disable Update Services.

D. Disable Update Services.

A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue? A. exFAT security B. Ext3 security C. HFS security D. EFS security E. CDFS security

D. EFS security

A desktop technician needs to replace a laptop's SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement? A. Antistatic bags B. Needle-nose pliers C. Safety goggles D. ESD straps

D. ESD straps

A technician is repairing a computer's motherboard in a clean environment. The technician needs to ensure all necessary safety procedures are taken prior to performing the replacement. Which of the following should the technician employ during this process to ensure safety? (Choose two.) A. CPU paste B. Safety goggles C. Self-grounding D. ESD straps E. Antistatic bag F. Air filter mask

D. ESD straps E. Antistatic bag

A customer keeps receiving the following message: Website blocked due to PUP. The customer asks a technician to resolve the issue immediately. Which of the following should the technician do to help resolve the customer's issue? A. Check the customer's computer for a rogue antivirus. B. Update the antivirus software and run a scan. C. Advise the customer to not revisit the website. D. Enable pop-ups for the website the customer is attempting to visit.

D. Enable pop-ups for the website the customer is attempting to visit.

A user is attempting to create a Windows fileshare on a Windows 10 workstation in a small peer-to-peer environment. The user is logged in with a Microsoft account. Which of the following would be the MOST secure way to allow other users to access the share? A. Create a new local user for peer-to-peer share access. B. Provide other users with the Microsoft account information. C. Set the share permissions to Everyone/Full Control. D. Enable the local guest account access.

D. Enable the local guest account access.

A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar. To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented? A. Remote wipe B. Device encryption C. Biometric authentication D. Enterprise sandbox

D. Enterprise sandbox

A customer wants to format a 4TB external drive with a filesystem that is compatible with both Windows and Linux OSs. Which of the following should the technician suggest the customer use? A. Ext4 B. exFAT C. NFS D. FAT32 E. CDFS

D. FAT32

Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server. Joe has verified he is connected to the Internet. Which of the following would explain why Joe cannot access his personal shares? A. An IP conflict is present B. A corporate VPN is enabled C. A firewall exception must be set D. HomeGroup must be enabled

D. HomeGroup must be enabled

A technician logs on to a Linux computer and runs the following command: ps -aux | grep vi Which of the following MOST accurately describes the effect of the command? A. It kills any running programs starting with the letters vi. B. It opens a list of directories that start with the letters vi. C. It creates a new file named grep in the current working directory. D. If finds a list of processes running a text editor.

D. If finds a list of processes running a text editor.

Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed? A. Unattended installation B. Remote installation C. Repair installation D. Image deployment installation

D. Image deployment installation

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem? A. Untrusted software B. Outdated antivirus C. MDM policies D. Inactive VPN

D. Inactive VPN

A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change? A. File attributes B. Share permissions C. Local share D. Inheritance

D. Inheritance

A customer has a Windows 7 x86 computer with 4GB of RAM and needs to upgrade the RAM to meet the minimum specifications for a new piece of software. Which of the following should a technician recommend to the customer FIRST? A. Migrating to a Linux OS B. Installing a new SSD C. Using a 64-bit architecture D. Installing 8GB DDR4 RAM

D. Installing 8GB DDR4 RAM

Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server. Which of the following is the FIRST step the technician should take to correct this issue? A. See if Joe's email address has been blacklisted B. Change the password on Joe's email account C. Update the antivirus and perform a full scan on the PC D. Isolate Joe's computer from the network

D. Isolate Joe's computer from the network

Joe, a user, is getting out-of-office replies from people he did not email. A technician inspects Joe's inbox and sees a sent email that appears to have come from Joe. The email contains a link to a well-known company's website, which is spelled incorrectly. Joe's sent items folder shows dozens of emails that were sent to everyone on his contact list. Which of the following is the MOST likely cause of this issue? A. Joe was the victim of a man-in-the-middle attack B. Joe inadvertently triggered a mail merge C. Joe's email address was spoofed D. Joe's email password was compromised

D. Joe's email password was compromised

Which of the following is used for building entry and computer access? A. Smart card B. Personal identity verification card C. Hardware tokens D. Key fobs

D. Key fobs

A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem. Which of the following should the technician do FIRST? A. Contact the application vendor support staff for more information B. Boot into safe mode, and then load the ERD and restore the most recent files C. Boot the PC, run msconfig, check the safe boot box under the Boot tab, and then restart D. Log in as an administrative user and determine if the problem persists

D. Log in as an administrative user and determine if the problem persists

A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers. Which of the following data destruction methods should the technician perform to ensure the data is removed completely? A. Degaussing B. Standard format C. Overwrite D. Low-level format

D. Low-level format

A technician determines a newly installed service is keeping a device from functioning in Windows. Which of the following tools should the technician use to keep the service from being loaded on the PC reboot? A. Task Scheduler B. MSINFO32 C. System Restore D. MSConfig

D. MSConfig

A technician must manually modify the HOSTS system file in order to resolve a website address to a specified local destination. Which of the following utilities should the technician use to BEST accomplish the task? A. Regedit B. services.msc C. Msinfo32 D. Notepad E. MMC

D. Notepad

A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue? A. Zero-day malware B. Safari code injection C. OS corruption D. Overheating E. Time sync failure

D. Overheating

A company requires multifactor authentication. When accessing one of the available RemoteApp programs that requires authentication, the user is not prompted to enter a pin. Which of the following BEST describes this scenario? A. Principle of least privilege B. Password expiration C. Single sign-on D. Permission inheritance

D. Permission inheritance

A user is unable to print to the office's networked laser printer from a Windows desktop. A technician attempts to print a test page, but nothing comes out of the printer. The technician tries to print from a label printer, which is connected via USB, but there is no output from that printer either. Which of the following actions are MOST likely to restore printing functionality to both printers? (Choose two.) A. Restart the wired AutoConfig service B. Restart the Windows Firewallservice C. Power cycle the label printer D. Power cycle the desktop E. Power cycle the laser printer F. Restart the print spooler service

D. Power cycle the desktop F. Restart the print spooler service

An administrator is creating a new user account and wants to grant access to only the resources required to perform the user's assigned job duties. Which of the following will the administrator MOST likely use? A. Access control lists B. Multifactor authentication C. Directory permissions D. Principle of least privilege

D. Principle of least privilege

A technician performs a risk assessment and determines a requested change has low risk and low impact. Which of the following best practices should the technician follow to proceed with implementing the change? A. Update the ticket with the results of the risk assessment and implement the change. B. Reference the business policy and follow all change management procedures. C. Obtain approval from the department and implement the change. D. Provide a risk assessment to colleagues for peer review.

D. Provide a risk assessment to colleagues for peer review.

A technician is working on a computer that has the following symptoms: - Unable to access the Internet - Unable to send email -Network connection (limited or no connectivity) The technician runs hardware diagnostics on the computer and verifies the computer's NIC is functioning correctly. The technician attempts to access the Internet and receives the message: page cannot be displayed. The technician runs a command to verify the computer network settings and sees the following information: - IP address: 192.168.0.100 - Subnet mask: 255.255.255.0 - Gateway: 192.168.0.1 - DNS: 192.168.0.1 The technician confirms other computers on the network can access the Internet. Which of the following is MOST likely causing the issues? A. Rogue antivirus B. Firewall rule C. Ransomware D. Proxy settings

D. Proxy settings

Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources? A. WPA2 B. AES C. MAC filtering D. RADIUS E. WPS

D. RADIUS

A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue? A. Check for and apply software updates B. Perform repair installation on the application C. Add the user to the local administrators group D. Rebuild the user's mail profile

D. Rebuild the user's mail profile

A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step? A. Disable System Restore. B. Create a restore point. C. Apply system updates. D. Restart into safe mode.

D. Restart into safe mode.

A technician needs to allow RDP access for a user. Port forwarding is already set up for port 3389. The technician will have to change the listening port for the new access. Which of the following OS tools should the technician use on the PC to change the listening port for RDP? A. Local firewall B. MSTSC C. MSINFO32 D. Services

D. Services

A user receives the following error message while browsing the Internet on a PC: The connection is not private. Upon inspection, a technician discovers the issue only occurs on the user's banking website, and the issue can be duplicated on another PC. The function to view the certificate shows it is valid and has yesterday's date as the expiration. Which of the following should the technician do NEXT? A. Ignore the error and accept the certificate. B. Report the certificate error to the bank. C. Download an updated certificate. D. Stop and restart the certificate services. E. Reimage the desktop, as it contains malware.

D. Stop and restart the certificate services.

Which of the following allows for per-command authentication and authorization? A. TKIP B. RADIUS C. AES D. TACACS

D. TACACS

Several mobile users are reporting issues connecting to the WLAN within a warehouse. A technician tests wireless connectivity in the lobby and is able to connect successfully. Mobile users can connect to the Internet using cellular service, but they cannot access any internal resources on the WLAN. The technician received alerts of devices failing throughout the network due to a power outage. Which of the following is MOST likely causing the wireless issues? A. SSID is configured to not broadcast. B. The system locked out for all wireless users. C. The DHCP scope for WLAN is full. D. The WAP in the warehouse is down

D. The WAP in the warehouse is down

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS? A. The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit. B. The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds which causes the application to force quit. C. The technician opens Finder, navigates to the Applications folder, locates the application that is frozenin the list, right-clicks on the application, and selects the Force Quit option. D. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.

D. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.

Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue? A. Files disappearing B. File permission changes C. Application crash D. Too many startup items

D. Too many startup items

A user tries to open a client/server application, but a prompt appears for the username and password. The user is able to open and use the email client with no issues. The user's workstation is a loaner laptop. Everyone at the company is given administrator rights on their individual workstations. Which of the following is MOST likely preventing the user from running this program? A. EFS B. NTFS C. UTP D. UAC

D. UAC

A Microsoft application will not open when a user clicks on it. Instead, the following error message pops up: This application has crashed. Would you like to send an error report to Microsoft? Which of the following should the user try FIRST to resolve this issue? A. Open the application with administrative privileges. B. Open a run command and then type the application name. C. Reboot the computer into safe mode and try to open the program. D. Uninstall the program after saving any associated data and reinstall the program.

D. Uninstall the program after saving any associated data and reinstall the program.

A technician is removing a virus from a user's Windows workstation. The virus was installed by the user while downloading pirated software from the Internet. Which of the following should the technician do to address this issue? A. End the current explorer.exe task. Update and run an antivirus scanning utility to remove the threat. Relaunch explorer.exe using Task Manager. B. End the current explorer.exe task using the command line. Update and run an antivirus scanning utility to remove the threat. C. Launch explorer.exe using Task Manager. Update and run an antivirus scanning utility to remove the threat. D. Update and run an antivirus scanning utility to remove the threat. Launch explorer.exe using Task Manager.

D. Update and run an antivirus scanning utility to remove the threat. Launch explorer.exe using Task Manager.

A user reports malware activity on an isolated workstation used for testing. It is running an end-of-life OS, and a USB drive is the only method used to transfer files. After removing the malware and replacing the USB drive with a brand new one, the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system. Which of the following did the technician forget to do to prevent reinfection? A. Connect to the network and update the OS with the latest security patches B. Scan and clean the USB device used to transfer data from the equipment C. Disable System restore and remove all restore points from the system D. Update the local antivirus and set it to scan automatically every evening

D. Update the local antivirus and set it to scan automatically every evening

A technician is hardening a Windows workstation. One of the hardening requirements for the workstation is to prevent potential privilege escalation attacks on the local system. Which of the following steps should the technician perform to BEST meet this requirement? A. End the lsass.exe service running on the system. B. Uninstall and reinstall the antivirus program. C. Disable and rename the administrator account. D. Update the system with the latest security updates.

D. Update the system with the latest security updates.

A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation? A. Enable System Restore on the file server and make frequent restore points. B. Disable full disk encryption on the file server. C. Install a next-generation firewall at the network edge. D. Use a host-based intrusion detection system and continuously monitor filesystem changes. E. Use granular file permissions on the share and follow the principle of least privilege.

D. Use a host-based intrusion detection system and continuously monitor filesystem changes.

The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company's account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email? A. Spear phishing B. Impersonation C. Dumpster diving D. Whaling

D. Whaling

Which of the following Microsoft operating systems defaults to a tiled menu instead of the desktop? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

D. Windows 10

Which of the following operating systems has mandatory update installation built in? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

D. Windows 10

Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

D. Windows 10

What a user is allowed to do on a computer network would be addressed in: A. a user acceptance policy B. regulatory and compliance policy C. a password policy D. an acceptable use policy

D. an acceptable use policy

A user needs to transfer some information from a work computer to a server. The user plugs a personal USB into the computer but is denied access to save information on the storage medium due to the security policy. This is an example of: A. port security. B. an access control list. C. a Trojan horse. D. data loss prevention.

D. data loss prevention.

A Linux user reports that an application will not open and gives the error. Only one instance of the application may run at one time. A root administrator logs on to the device and opens a terminal. Which of the following pairs of tools will be needed to ensure no other instances of the software are currently running? A. pad and chmod B. sudo and vi C. ls and chown D. ps and kill E. cp and rm

D. ps and kill

A user calls the help desk to report issues with a computer. Earlier in the day, the user received an email with a link to a document to download. Nothing happened immediately after the user downloaded the document, but the computer then began to respond slowly. Applications also started to crash. The help desk technician discovers many of the user's files and applications have been renamed with .enc at the end. There is also a .txt file on the desktop with instructions on how to obtain the encryption key. This is an example of: A. a virus. B. spam. C. spyware. D. ransomware.

D. ransomware.

Users notify the help desk of an email that was just received. The email came from the help desk's email address and asked the users to click on an embedded link. This email is BEST described as: A. phishing. B. zombie. C. whaling. D. spoofing.

D. spoofing.

You have been dispatched to a customer's small office that has four computers. One of the systems is displaying an Invalid Certificate error when visiting a website on port 443. The other systems do not get this error when visiting the same website. Which of the following should you adjust on the affected computer to resolve the problem? UEFI boot mode Logon times Date and time Domain policy UAC

Date and time Configure the date and time to resolve the issue. Do this in the BIOS/UEFI, or in the OS (or both). Certificates are time based, and are typically valid for one or two years. If the computer's time is outside of that range, then the browser will not be able to connect to the website. Time synchronization is an important concept with computers and networks.

A user reports that every time they try to access https://www.diontraining.com, they receive an error stating "Invalid or Expired Security Certificate." The technician attempts to connect to the same site from other computers on the network, and no errors or issues are observed. Which of the following settings needs to be changed on the user's workstation to fix the "Invalid or Expired Security Certificate" error? ​ Date and time ​ Logon times ​ User access control ​ UEFI boot mode

Date and time OBJ-3.2: There are two causes of the "Invalid or Expired Security Certificate." The first is a problem with your computer, and the second occurs when the certificate itself has an issue. Since the technician can successfully connect to the website from other computers, it shows that the error is on the user's computer. One of the common causes of an Invalid or Expired Security Certificate error is the clock on the user's computer being wrong. The website security certificates are issued to be valid within a given date range. If the certificate's date is too far outside the date on the computer, the web browser will give you an invalid security certificate error because the browser thinks something is wrong. To fix this, set the computer's clock to the correct date and time.

Which command or tool would display the contents of C:\Windows\System32\? Cd Net System information tool dir

Dir The dir command shows the contents of a folder or directory within the command line. If you were in system32, you would just type dir to show contents. If you were in another folder, you would type dir c:\windows\system32

Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the WPA2 password? ​ Disable SSID broadcast ​ Disabled WPS ​ Enable WPA ​ Disable WPA2

Disabled WPS (Wifi Protected Setup) OBJ-2.10: WPS was created to ease the setup and configuration of new wireless devices by allowing the router to automatically configure them after a short eight-digit PIN was entered. Unfortunately, WPS is vulnerable to a brute-force attack and is easily compromised. Therefore, WPS should be disabled on all wireless networks. If Bob could enter your apartment and press the WPS button, he could have configured his laptop to use your wireless network without your WPA2 password.

One of your co-workers tells you that whenever she returns to her desk she has to type her username and password to unlock the computer. She says she cannot modify the screensaver. After analyzing the system, you notice that the screensaver and the screen lock options are indeed grayed out. Which of the following is the most likely reason for this? Incorrect local-level user policies Domain-level group policies Corrupted registry Antivirus domain-level policies

Domain-level group policies The most likely reason for this is that domain-level group policies have been implemented by the administrator. This is by design so that end users cannot enable screensavers. This cannot be changed by the end user.

Which of the following Windows features has undergone the most significant changes from Windows 7 to Windows 10 and has also greatly simplified the OS installation process? User Account Control Metro Interface PXE Installation Driver Detection

Driver Detection This is usually the case when it comes to new versions of OS - they can "see" new hardware better.

You see an exclamation point next to a device in the Device Manager. What does this indicate? Driver is outdated Driver is disabled Driver is corrupt Driver is missing

Driver is missing An exclamation point indicates that the driver is missing. A down arrow would indicate a disabled driver.

A user is unable to access corporate email on a smartphone. After the user launches the email application, it crashes and does not display the expected inbox. Additionally, the user reports other applications are running slowly. Which of the following should the technician do NEXT? A. Calibrate the smartphone's touch screen. B. Verify the user's email credentials. C. Ensure the smartphone is not in airplane mode. D. Completely drain the smartphone's battery, and then fully charge it. E. Check the number of applications running on the smartphone.

E. Check the number of applications running on the smartphone.

A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.) A. Reboot into safe mode B. Clear the application data C. Contact the application's developer D. Reinstall the application E. Do a force stop F. Clear the application cache

E. Do a force stop F. Clear the application cache

A technician is working on a virtual server migration project. The technician has already completed the SOW; however, the servers will not work without a critical network configuration that was missed in the original SOW. The technician needs to make the adjustments quickly. Which of the following best practice processes should the technician perform NEXT? A. Obtain end-user acceptance for the proposed changes and submit a change plan for additional work. B. Submit the changes to the change board for approval. C. Notify the change team of the changes needed and perform the changes. D. Escalate to stakeholders and obtain override approval for out-of-scope changes. E. Document the changes and perform the work.

E. Document the changes and perform the work.

A systems administrator needs to add security to the server room. Which of the following would provide the BEST security for the room? (Choose two.) A. Universal serial bus locks B. Personal identity verification cards C. Privacy screen D. Entry control roster E. Door locks F. Privacy window

E. Door locks F. Privacy window

The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error: Cannot save file C: \Program Files\Business Application\file1.wrk â€" Access is denied. Which of the following would be the MOST secure solution to this error? A. Add Ann to the local Power Users group B. Set the software to save to the %APPDATA% folder C. Add Ann to the local administrator group D. Give Ann write access to C:\Program Files\ E. Give Ann permission to elevate her permissions through a UAC prompt

E. Give Ann permission to elevate her permissions through a UAC prompt

Which of the following threats commonly relies on DNS poisoning and spoofing to exploit an unknowing victim? A. Rainbow tables B. Brute force C. Man-in-the-middle D. Zero-day attacks E. Phishing

E. Phishing

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence? A. Activate real-time protection on both antivirus software programs B. Uninstall one antivirus software program and install a different one C. Run OS updates D. Enable the quarantine feature on both antivirus software programs E. Remove the user-installed antivirus software

E. Remove the user-installed antivirus software

In which of the following operating systems has the publisher removed the ability to turn off automatic updates with the Control Panel applet? A. Windows Server 2012 R2 B. Windows Server 2016 C. Windows 7 D. Windows 8.1 E. Windows 10

E. Windows 10

Two weeks ago, David's computer was infected with a virus. A technician performed the malware removal process on the machine and removed the infection from the system. Now, many of the symptoms have returned on David's computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation? ​ Update the anti-virus software and run a full system scan Quarantine the infected system by removing its network connectivity ​ Educate the end-user about how to avoid malware in the future ​ Enable System Restore and create a restore point (in Windows)

Educate the end-user about how to avoid malware in the future OBJ-3.3: If a technician neglects to educate the end-user about avoiding malware in the future, they will likely get their computer infected again. For example, educating the user on best practices like being cautious when opening an attachment or clicking a link in an email, instant message, or post on social networks can prevent future infections.

Which TWO of the following would provide the BEST security for both computers and smartphones? ​ Configuring organizational units ​ Utilizing access control lists ​ Enabling data loss prevention ​ Using a cable lock ​ Enabling multifactor authentication ​ Enforcing trusted software sources

Enabling multifactor authentication & Enforcing trusted software sources. OBJ-2.2: The use of multifactor authentication is considered an industry best practice for both computers and smartphones. Additionally, any software being installed should come from a trusted source to prevent malware infections.

After installation or change has been implemented, which of the following is necessary prior to closing out the change request?

End-user acceptance After the installation or implementation of the change, the end-user acceptance must be received. If the end-user hasn't approved the installation or change, then the project or ticket cannot be closed out.

Which of the following is used to communicate data and preferences to child processes within a script or batch file? ​ Variables ​ Environmental variables ​ Comments ​ Constants

Environmental variables OBJ-4.8: Shell scripts and batch files use environment variables to communicate data and preferences to child processes. They can also be used to store temporary values for reference later in a shell script.

A systems administrator is working on a Windows domain controller and needs to set up mapped network drives for users. Which of the following will allow the admin to perform this task? (Select two best answers) Account > Log On To Home folder Profile path Logon script

Home folder Logon script The administrator is working on a Windows domain controller, which has Active Directory installed. To configure user accounts, go to Active Directory Users and Computers > Users. Right click on individual users, Properties > Profile tab to configure a Home folder or logon script (or both).

You are attempting to install a Windows 10 64-bit OS within a VM but you keep receiving errors. The specifications for the VM include : Two 1-GHz CPU's 2 GB of RAM 15 GB hard drive space 800x600 screen resolution What needs to be increased to resolve the issue?

Increase amount of hard drive space Windows 10 64-bit requires 32gb of Hard Drive space

Your supervisor has requested remote access to a particular server to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do before granting remote access to the server to your supervisor? ​ Set the server's anti-virus software to automatically update itself and perform a full scan every Saturday night ​ Educate your supervisor on safe internet browsing techniques ​ Install the latest security updates and patches to the server ​ Disable internet access from the server outside of normal business hours

Install the latest security updates and patches to the server OBJ-2.7: To prevent infection, it is important that all servers and workstations remain patched and up to date on their security updates. After that, the next best thing would be to set up the anti-virus to automatically update itself daily and run a full scan nightly. Beyond that, educating your supervisor would be a good idea, as well.

A new corporate policy dictates that all access to network resources will be controlled based on the user's job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy? ​ Blacklists ​ Directory permissions Least privilege ​Permission creep

Least Privilege OBJ-2.2: Least privilege is the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities. Privilege itself refers to the authorization to bypass certain security restraints.

A cybersecurity analyst is auditing your company's network logs and identifies that a USB mass storage device was previously inserted into many of the company's servers. The logs also showed dozens of failed login attempts before a successful login occurring on the servers. Which TWO of the following actions are recommended to eliminate the vulnerabilities identified by the cybersecurity analyst? ​ Install a host-based firewall on the servers ​ Install the operating system security updates ​ Change the default credentials on the servers ​ Lockout the account after 3 failed login attempts ​ Modify the AutoRun settings ​ Remove administrative permissions

Lockout the account after 3 failed login attempts​ & Modify the AutoRun settings OBJ-2.7: Since the USB mass storage device was used to connect to the servers, it is recommended to modify the AutoRun settings. To prevent the password guessing attacks used, the servers should be configured to lock out any account after 3 failed login attempts.

You are setting up the Remote Desktop Services on a Windows 2019 server. To increase the security of the server, which TWO of the following actions should you take? ​ Change the default access port for the terminal server ​ Enforce password complexity on the server ​ Disable log on time restrictions on the server ​ Force the use of a local client certificate for authentication with the server ​ Logically place the Windows 2019 server into the network's DMZ ​ Block all unused ports on the switch, router, and firewall

Logically place the Windows 2019 server into the network's DMZ​ & Block all unused ports on the switch, router, and firewall OBJ-4.8: To best secure the server, you should logically place the Windows 2019 server into the network's DMZ and block all unused ports on the switch, router, and firewall. Since the server will allow remote connections from across the internet to access the server directly, the server must be placed into the De-Militarized Zone (DMZ) of the network and not in the internal trusted portion of the network. Additionally, any server or services that will be forward-facing to the internet (like a Remote Desktop Services server) should have all of the unused ports blocked on the switch, router, and firewall to minimize the footprint of the network. By blocking unused ports, there are fewer ways for an attacker to get into the network and attack the server.

You have been tasked with running updates on a Windows computer. Some of the updates go through fine, but another fails. While troubleshooting, you restart the computer and attempt to install the failed update, but it continues to fail. Which of the following should you do first? Look up error number associated with failed update Download and install manually Analyze Event Viewer for more info Visit Microsoft Update website to see if there is an issue with the update.

Look up the error number associated with the failed update The first thing you should do is look up the error number. An example of an error code is 0x80243FFF. This will be found in an error log called WindowsUpdate.log and should be written to the %systemroot%; usually C:\Windows.

You have been asked to recycle 20 of your company's old laptops. The laptops will be donated to a local community center for underprivileged children. Which of the following data destruction and disposal methods is MOST appropriate to allow the data on the drives to be fully destroyed and the drives to be reused by the community center? ​ Degaussing of the HDDs ​ Drill/hammer the HDD platters ​ Low-level formatting of the HDDs ​ Standard formatting of the HDDs

Low-level formatting of the HDDs OBJ-2.9: Low-level formatting is a hard disk operation that should make recovering data from your storage devices impossible once the operation is complete. It sounds like something you might want to do if giving away a hard disk or perhaps discarding an old computer that may have contained useful and important private information. Standard formatting of the drives could allow the data to be restored and make the data vulnerable to exposure. Drilling or hammers the HDD platters would physically destroy the drives and the data, making the laptops useful for the community center. Degaussing the drives would also render the drives useless to the community center. Therefore, the safest method is a low-level format since it fully destroys the data and allows the drives to be reused by the community center.

Which utility would you use to configure Windows for safe boot? Regedit Windows Recovery Environment MSConfig Advanced Boot Options menu Task Manager

MSConfig MSConfig (the system configuration utility) is used to configure Windows to boot in "Safe boot" mode within the boot tab. Advanced Boot Options (if you thought this) is different. You will see Safe MODE in this menu, however not Safe BOOT like in MSConfig.

Your company wants to get rid of some old paper files. The files contain PII from previous customers, including their names, birth dates, and social security numbers. Which of the following are the appropriate data destruction and disposal techniques that should be utilized for these papers? Micro-Cut Shredder Recycling Bin Cross-Cut Shredder Strip-Cut Shredder

Micro-Cut Shredder OBJ-2.9: The three most common types are; strip-cut, cross-cut, and micro-cut. The strip-cut machines shred long vertical pieces, as cross-cut adds horizontal cuts to make the shred pieces even smaller. Micro-cut machines shred to an even higher level of security, essentially converting your documents into tiny particles.

You downloaded an image file because you need to install an application stored within the image. When you attempt to execute the file, an error is displayed. Which of the following should be performed? Mount the file as an emulated disc. Rename the extension of the file to a known extension Download a different file from the website Verify the MD5 hash of the downloaded file.

Mount the file as an emulated disc. You should first attempt to mount the file as an emulated disc. Image files (for example, .iso files) are files that are meant to be burned to disc (or flash drive) or accessed from a mount point that will emulate the disc drive.

Which of the following tools will allow you to change the number of CPU cores that Windows uses? Msconfig Dxdiag Perfmon taskmgr

Msconfig The System Configuration utility (msconfig) can be used to change the total number of CPU cores used by Windows. Boot tab>Advanced options>Checkmark number of processors.

A customer runs frantically into your computer repair store. He says that his smartphone fell into a puddle, and now it won't turn on. He excitedly tells you that he needs the smartphone working again "right now" and cannot wait. What should you do? ​ When the customer leaves, post about the experience on Facebook ​ Offer the customer the option to replace his phone Tell the customer to calm down, after all, it is just a phone ​ Explain to the customer that the repairs may take several days

Offer the customer the option to replace his phone OBJ-4.7: It is important to set and meet expectations and timelines when dealing with a customer. If you cannot meet the timeline needed, you should offer different repair/replacement options (if applicable).

What does the command gpedit.msc do?

Opens the local group policy editor window

What does the command secpol.msc do?

Opens the local security policy window

Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards? ​ PCI ​ PII ​ GDPR ​ PHI

PCI OBJ-4.6: The Payment Card Industry Data Security Standard (PCI DSS) applies to companies of any size that accept credit card payments. If your company intends to accept card payment and store, process, and transmit cardholder data, you need to securely host your data and follow PCI compliance requirements.

Your company is concerned about the possibility of power fluctuations that may occur and cause a large increase in the input power to their server room. What condition is this known as? ​ Blackouts ​ Brownouts ​ Power spikes ​ Power surge

Power spikes OBJ-4.5: A power spike is a very short pulse of energy on a power line. Power spikes can contain very high voltages up to and beyond 6000 volts but usually last only a few milliseconds instead of longer but lower voltage power surges.

Your company is concerned about the possibility of power fluctuations that may occur and cause a small increase in the input power to their server room. What condition is this known as? ​ Power spikes ​ Power surge ​ Brownouts ​ Blackouts

Power surge OBJ-4.5: A power surge is basically an increase in your electrical current. A power surge often has levels of 10-30% above the normal line voltage and last from 15 milliseconds up to several minutes.

What is the PXE and how do you use it?

Preboot Execution Environment. Used to install Windows over a network. To use it, enter BIOS, locate screen with NIC, enable PXE setting there, and change the boot order to boot from the network.

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?

RADIUS With RADIUS and SSO configured, users on the network can provide their user credentials one time (when they initially connect to the wireless access point or another RADIUS client), and they are automatically authenticated to all of the network's resources

One of your Windows services is failing to start when you boot up your laptop. You have checked the service in the Windows Services tool and verified it is set to Automatic. What should you attempt to do NEXT to get the service to startup? ​ Update the operating system ​ Reboot into Safe Mode and see if the service starts ​ Run chkdsk on the system ​ Restore from backup

Reboot into Safe Mode and see if the service starts OBJ-3.1: Windows Services are applications that typically start when the computer is booted and run quietly in the background until it is shut down. For the Windows operating system to run smoothly, Windows Services must start when required. Many times, non-Microsoft services or Drivers can interfere with the proper functioning of System Services.

A user receives the following error message: "Windows Update cannot currently check for updates because the service is not running." The user calls the help desk to report the error they received. A support technician uses a remote connection tool to log in to the computer remotely, quickly identifies the issue, and fixes the issue. Which of the following should the technician do NEXT? ​ Rollback the device drivers ​ Reboot the computer ​ Register the Windows Update service's DLL files ​ Restart the network services

Reboot the computer OBJ-3.2: If any of the .DLL files involved with Windows Update are not correctly registered, you may also encounter this problem. To solve it, open services.msc and stop the Windows Update service. Then, open a Command Prompt as the administrator and use regsvr32 for each of the 6 Windows Update DLL files (wuapi.dll, wuaueng.dll, wups.dll, wups2.dll, wuwebv.dll, and wucltux.dll). Then, open services.msc and restart the Windows Update service. Finally, restart your computer for these changes to take effect.

A user is complaining that their profile is taking too long to load on their Windows 10 system. Which of the following is the BEST solution to this problem? ​ Disable unnecessary programs from automatically starting up ​ Rebuild your Windows profile ​ Reboot the system into Safe Mode ​ Reinstall Windows

Rebuild your Windows profile OBJ-3.1: Sometimes, a Windows profile can be corrupted over time, making it slow (or even impossible) to load. If this happens, you should re-create or rebuild the user profile and migrate the user's personal data into the new profile.

A macOS user is browsing the internet in Google Chrome when they see a notification that says, "Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!" What type of threat is this user experiencing? ​ Phishing ​ Rogue anti-virus ​ Pharming ​ Worm

Rogue anti-virus OBJ-3.2: Rogue anti-virus is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and to pay money for a fake malware removal tool (that actually introduces malware to the computer). It is a form of scareware that manipulates users through fear and a form of ransomware. Since the alert is being displayed on a macOS system but appears to be meant for a Windows system, it is obviously a scam or fake alert and most likely a rogue anti-virus attempting to infect the system.

You are troubleshooting a Windows system suffering from poor performance. The Event Viewer states that the file system is corrupt. What should you do next? Run chkdsk with the /R option and reboot the system Open the defrag utility and run the drive analysis Reload the OS using FAT32 instead of NTFS Change the drive from basic to dynamic

Run chkdsk with the /R option and reboot the system This is the only option that will help. Running chkdsk with the /R option locates bad sectors and recovers readable information and may fix the corruption. /R implies /F as well, which fixes basic errors on the drive.

What is the FIFTH step of the seven-step malware removal process? - Enable System Restore and create a restore point (in Windows) - Schedule scans and run updates ​- Identify and research malware symptoms - Remediate the infected systems

Schedule scans and run updates OBJ-3.3: The seven steps of the malware removal procedures are (1) Identify and research malware symptoms, (2) Quarantine the infected systems, (3) Disable System Restore (in Windows), (4) Remediate the infected systems, update the anti-malware software, scan the system, and use removal techniques (safe mode, pre-installation environment), (5) Schedule scans and run updates, (6) Enable System Restore and create a restore point (in Windows), and (7) Educate the end-user.

What is the FIFTH step of the seven-step malware removal process? Enable System Restore and create a restore point (in Windows) Schedule scans and run updates ​Identify and research malware symptoms Remediate the infected systems

Schedule scans and run updates OBJ-3.3: The seven steps of the malware removal procedures are (1) Identify and research malware symptoms, (2) Quarantine the infected systems, (3) Disable System Restore (in Windows), (4) Remediate the infected systems, update the anti-malware software, scan the system, and use removal techniques (safe mode, pre-installation environment), (5) Schedule scans and run updates, (6) Enable System Restore and create a restore point (in Windows), and (7) Educate the end-user.

Which TWO of the following devices should have a grounding wire attached to them when installed per the manufacturer's recommendations? ​ Server rack ​ VOIP device ​ Desktop printer ​ UPS ​ Patch panel ​ Modem

Server rack & UPS OBJ-4.4: A server rack and UPS should be installed with a grounding wire attached to them. Grounding is not required for functionality but rather for safety. Numerous issues are involved when there is no ground, including potential for electric shock, signal attenuation, and unpredictable operation.

A smartphone user notices that their phone gets very hot, and their batter is draining quickly. Even when the phone is in their pocket, the phone gets hot to the touch. What is likely the problem?

Smartphone is infected with malware and using a lot of processing power

List the 6 Windows 7 editions

Starter Home Basic Home Premium Ultimate Professional Enterprise

Difference between stateful and stateless firewall?

Stateful firewalls are capable of monitoring and detecting states of all traffic on a network to track and defend based on traffic patterns and flows. Stateless firewalls, however, only focus on individual packets, using preset rules to filter traffic.

Which of the following network configurations is used to identify your computer's individual host identifier and your computer's network identifier? ​ DNS ​ WINS ​ Gateway ​ Subnet mask

Subnet Mask OBJ-1.8: The subnet mask is used to identify the host identifier and the network identifier uniquely in combination with the IP address. The subnet mask is used by the TCP/IP protocol to determine whether a host is on the local subnet or a remote network.

Edward has just returned to his office after a two-week vacation. When he logs into his email client to access his company email, he notices that he cannot see the shared Customer Service inbox folder in his email client. He contacts the help desk, and they verify that his account is still connected to the domain controller and that it can still send and receive emails successfully. What is the MOST likely happened during Edward's vacation that caused the missing inbox folders in the email client?​ The internet security options in his email client have been modified​ The operating system was updated ​ Edward's user account permission has changed​ The network file share's permission has been modified

The network file share's permission has been modified OBJ-3.2: While Edward was on vacation, the network file share's permissions have likely been modified. Based on the fact that Edward's account is connected to the domain and can send/receive emails, it cannot be his user account's permissions causing the issue. The internet security options would also prevent him from sending/receiving mail, so that can be eliminated. Even if the operating system were updated, that would not affect the shared inboxes since they reside on the network file shares and not Edward's computer.

A customer reports to you that a file shared on her computer for another user is not accessible to that third party. The customer says that the third party was given Allow rights for Read and Write access to the file. Which of the following could be a reason as to why the third party cannot access the file? A. The parent folder has explicit Allow rights set for the third-party user B. User forgot to share the parent folder and only shared the specific file. C. The parent folder likely has the archive attribute enabled. D. The parent folder has explicit Deny rights set for the third-party user.

The parent folder has explicit Deny rights set for the third-party user. The best answer listed is that the parent folder has explicit Deny Rights set for the third-party user. You should remember two things: one, that a folder inherits its permissions from the parent; and two, that Deny rights will always override Allow rights.

Janice called the help desk to report that her computer will not boot up. The technician begins troubleshooting the issue, but after 20 minutes, the computer is still not booting up. Janice is getting frustrated with the technician, and she tells the technician that she feels that they are wasting her time since the issue isn't resolved yet. How should the technician respond to Janice's frustration? ​ The technician should tell Janice that they are required to follow a specific troubleshooting procedure to identify the issue and solve the problem ​ The technician should recommend that Janice call back to the help desk for more assistance when she has more time available ​ The technician should "accidentally" hang up the call so that Janice gets a different technician when she calls the help desk again ​ The technician should ask open-ended questions to properly identify the issue by narrowing down the possible symptoms or causes

The technician should ask open-ended questions to properly identify the issue by narrowing down the possible symptoms or causes OBJ-4.7: When dealing with frustrated customers, you should clarify the customer's statements by asking open-ended questions to narrow the scope of the problem, restate the issue, or ask questions to verify understanding. Technicians should also avoid arguing with customers, becoming defensive, dismissing customer problems, or becoming judgmental.

One of your computer's users just purchased an Android smartphone and is attempting to access a public hotspot. The user receives a message that a page cannot be displayed. The user notices a question mark (?) in the radio icon in the toolbar. The user has activated Bluetooth, and verified that airplane mode is off. Tethering is turned on. The user is using the smartphone to call in to the help desk for assistance. Which of the following is the most likely issue? The SIM card is not activated There is unauthenticated wireless connectivity. A data plan was not purchased. The user has exceeded the data allowance. It is an un-rooted smartphone

There is unauthenticated wireless connectivity The question mark on the icon or elsewhere in the wireless connection properties will normally indicate an unauthenticated connection, meaning that the user is connecting to an "open" public hotspot; which in turn means that the user did not have to log on, and might not be using any encryption to connect via Wi-Fi. In this case, certain web pages and sites may not open.

Which type of installation would require an answer file to install the operating system? ​ Repair ​ Upgrade ​ Clean ​ Unattended

Unattended OBJ-1.3: An unattended installation is a traditional method of deploying a Windows operating system in a large enterprise environment. Unattended installations use an answer file that contains user input to various GUI dialog boxes that would otherwise appear during the installation process. Unattended installation is the most practical way to install Windows when the client computers have different hardware components, and an image file cannot be used. Unattended installations save deployment time and can be used either for clean installs or in-place upgrades.

Which of the following types of installations would require the use of an XML text file containing the instructions that the Windows Setup program would need to complete the installation?

Unattended Installation

What does the gpupdate command do?

Updates settings on a computer regarding the computer policy config

What does the command chkntfs do?

Used to initiate chkdsk at bootup

What is Sysprep?

Used to remove specific settings or configurations within an image. (?)

Nicole's smartphone works fine when she is at work or the mall, but she has limited bandwidth on the device when she is at home. Nicole has asked you to help her. What is the FIRST step you should take in troubleshooting this issue? ​ Reset the smartphone's wireless network settings ​ Update the smartphone's applications or OS ​ Verify the smartphone is connected to the correct SSID Reset the data usage statistics on the smartphone

Verify the smartphone is connected to the correct SSID OBJ-3.5: Most likely, Nicole's smartphone is connecting to a neighbor's wireless network instead of her own. This network likely has a lower signal strength since it is outside her home, and this is causing the limited or slow bandwidth. Therefore, you should first verify that Nicole is connected to the proper wireless network before conducting any additional troubleshooting.

Which command in Linux will open the text editor shell? Edit Chown Vi dd

Vi Use the vi command to open the text editor shell in Linux. Edit is an older command in Windows that used to open the MS-DOS text editor. Chown is a Linux command that allows a user to change the file owner. Dd is a Linux command that is used to convert a file from one format to another.

Which of the following editions of Windows 10 can join a domain, run AppLocker, and run Credential Guard? (Two best answers) Windows 10 Education Windows 10 Enterprise Windows 10 Pro Windows 10 Home

Windows 10 Education Windows 10 Enterprise Only Education and Enterprise can join a domain AND run AppLocker and Credential Guard.

What does the Ping -I command do?

allows you to specify the number of bytes per ping

Which command on a macOS or Linux system is used to change the permissions of a file? ​ sudo ​ chmod ​pwd ​ chown

chmod OBJ-1.9: The chmod command is used to change a file or directory's permissions from the command line or terminal. The chown command is used to change the owner of the file, but not its permissions. The sudo command allows a command to be executed as the superuser (root) instead of the current user. The pwd is used to display the path to the present working directory (current directory) to the terminal or display.

Which command is used to create a new disk partition on a Windows system?

diskpart -DiskPart is a command-line disk-partitioning utility available for Microsoft operating systems. You can use it to view, create, delete, and modify a computer's disk partitions.

You are working on a Windows 10 workstation that is operating much too slowly. Which TWO of the following commands should you use to speed up the system? ​ dism ​ diskpart ​ chkdsk ​ ipconfig ​ format ​ dir

dism & chkdsk OBJ-1.4: The Deployment Image Servicing and Management (DISM) is a command-line tool used to mount and service Windows images before deployment. The dism command with the /RestoreHealth option can run a scan to identify and repair any corruption of an image or virtual hard drive. If you have a physical hard drive operating slowly, then the chkdsk command could be used instead.

Which command would be used to display the IP address and subnet mask for the wired network connection on a macOS or Linux system? ​ netstat ​ iwconfig ​ ifconfig ​ ipconfig

ifconfig OBJ-1.9: The ifconfig command is used to display information about the current wired network connection on a macOS or Linux system, including its IP address, subnet mask, and MAC address.

What does the Ping -n command do?

specifies the exact number of pings to send.


Ensembles d'études connexes

AD Banker: NJ Life Comprehensive

View Set

901 practice test hardware troubleshooting

View Set

Pharmacology 1: Prep U-Ch 19 3 to add, Chapter 19 PrepU, Pharmacology Prep U Chapter 19 Nerves and the Nervous System

View Set

Medical surgical (cardiovascular and hematologic)

View Set

CSM204 - Exam 1 (Knowledge Checks)

View Set