ITSP II
The Master Boot Record (MBR) method of partitioning hard drives is limited to what maximum size of drives?
2.2TB
What type of OS should you install for best performance when you have enough RAM?
64-bit
Ben is part of the service desk team and is assisting a user with installing a new software on their corporate computer. In order for Ben to complete the installation, he requires access to a specific account. From the following, which account will allow him access to install the software needed?
Administrator Account
Richard has been called to the human resources department to repair a desktop computer. The colleague using the computer is currently working on the company's payroll and wants to get their computer working quickly so that everyone will be paid on time. While working at their desk, Richard notices that the paperwork they are entering into the system has his coworkers' bank account information. What should Richard do when he discovers this paperwork?
Ask the client to remove the documents.
Keeping track of company resources can be an extremely important endeavor for any organization. Unavailable resources are essentially a loss, as they cannot be employed to accomplish company objectives. What is a tool that is used to manage company resources?
Asset tag
Isaac was assigned to work on a computer in his company's R&D department. While working on the system, Isaac received several text messages and emails from his coworkers about another issue in the data center. Isaac answered the text messages as they came in and finished working on the computer system in the R&D department. The next day Isaac was called into his supervisor's office. His supervisor told him that he received a complaint that Isaac was on his phone instead of working on the problem with the computer. What should Isaac have done differently to avoid this complaint?
Avoided distractions.
What is a list of what content cannot be accessed through a router's preferences?
Blacklists
James travels for business and is always worried that his laptop will be taken from his room. Which type of device will ensure that James's laptop will not be stolen while he travels?
Cable lock
Ensuring that an organization is on track and that the projects any group within a company are going well is important. When change happens, it needs to be managed. Which of the following is a group tasked with meeting on a regular basic to oversee changes?
Change Advisory board
What type of installation should you perform if you want to install a 64-bit version of Windows on a computer that already has a 32-bit OS installed?
Clean install
Jerry is working at the desk of a client in the marketing department of his company. The client thinks that the problem is the video card, because they have a computer at home with the same problem. The client explains to Jerry that when they fixed the problem, they had to reseat the video card. What should Jerry do when dealing with the client? (Select all that apply.)
Compliment the client on his knowledge. Ask the client to backtrack to see what things they tried in order to fix the computer. Check the simple things first to make sure you do not miss anything.
Lane received a phone call from a client. The client claimed that a file they were working on the day before had disappeared from their computer along with several other files. Lane went to the client's desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When Lane called the next morning to see if everything was working, the client said that two of their files were gone again. They also noticed new files in a folder. When Lane arrived, she checked to see how much free space the computer had available and found that it had 250GB less than the day before. What is the issue with the client's computer?
Computer virus
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. What step can be taken to limit access to the computer?
Configure logon time restrictions.
Which of the following needs to be completed prior to creating a spanned, striped, or mirrored volume on an unallocated space in Windows?
Convert basic disks to dynamic disks.
Nick works for a software development company that has just created a new application that will revolutionize the computer security industry. Nick's company owns the patent for the software and has a copyright for the software. The company would like to sell this new software, but they are concerned about someone pirating the software. Which option can Nick's company use to prevent software piracy?
DRM
On a Windows computer, which tab(s) that can be used in Task Manager to set the priority given to a specific application or service?
Details
The company that you work for has recently had a security breach. During the recovery and assessment, it was discovered that the malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN. What can you recommend to the company?
Digital certificate
You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks. What is best practice for the remaining unused account?
Disable the account until the employee is ready to use it.
Which of the following is not considered good customer service? (Select all that apply.)
Disclose the experience on social media.
What utility can be used to convert two or more basic disks to dynamic disks?
Disk Management
A large corporation would like to setup a shared network for their employees and have asked James their IT support technician to choose a large network for the team to use. Which of the following below would be the preferred network to use?
Domain
Hardware and software are supported for long periods of time by the creating organization. However, vendors may eventually discontinue modifications or replacement parts. Which of the following refers to a device aging out of the vendor's updates?
EOL
James's computer is not booting properly. The computer begins to boot and then just stops and restarts. After the third restart, the computer attempts to repair the computer using Startup Repair. Startup Repair does not seem to work. Instead, the computer asks you to choose an option from the Startup Settings screen. James has followed the Troubleshoot screen to the Startup Settings screen and clicked Restart. Choose the option in the Startup Settings screen that would enable James to see which driver might be failing and causing his computer not to boot.
Enable Boot Logging
Resolving issues is a common task for any administrator. Knowing where to look when starting the diagnosis process is an important skill. Tools that can help to identify applications that are not functioning properly or are not supposed to be running can help to shorten the resolution process. Choose the following option that provides access to logs about hardware or network failure.
Event viewer
Susan would like to open an application found within her finder. There are 3 files with similar names, but different file types. Based on what Susan would like to open, what file would allow you to do so?
Example.app
This file format is used mostly for distributing software. These install packages appear as a virtual disk drive on the Mac. Once the file has been double-clicked the virtual disk is mounted to macOS, you then can access the files inside it. What file would this be?
Example.dmg
During your service call at the residence of a customer, you discover you will need a part that you don't currently have. What should you do in this case?
Explain the situation and give the customer options on how to order the part and when you will return to complete the repair.
Debugging settings are of genuine importance and can help to more quickly and easily diagnose and resolve issues. Which of the following would be used to enable safe mode with command prompt?
F6
You are planning to install Windows 10 on your computer and must decide which file system to use on the hard drive. What files systems are available in Windows 10 for a local hard drive? (Select all that apply.)
FAT32 NTFS
Devices malfunction on a regular basis and can require some level of intervention to return to working order. Administrators need to understand the various types of potential fixes that can be put in place to ensure devices are back in working order as soon as possible. Which of the following is a last resort solution to return a device to working order and involves erasing all data and resetting the device to its default state?
Factory reset
Choose the Windows 10 utility that allows a user to create a backup schedule that can include any folder on the hard drive and system image. (Choose all that apply)
File History Backup and Restore
What term describes one or more characters following the last period in a filename, such as .exe, .txt, or .avi?
File extension
Louis has been tasked as the lead IT technician to setup a way to secure the company's data on the hard disk of the main macOS Desktop. They have requested it be a form of encryption that can only be accessed by logging in with a password or using a recovery key. What would allow Louis to secure the company data following the given requirements?
FileVault
A user calls the service desk for assistance finding a specific app on their macOS. The service desk technician can help the user locate the app using one of the embedded applications. This macOS app helps users locate applications as well as data files. What is the name of the application being described?
Finder
Understanding the tools and techniques for protecting a device or a network is an important knowledge base for any administrator. There are a number of security measures that can be employed to accomplish device and data protection. Which of the following is a tool that controls which apps or services can use network connections?
Firewalls
Samuel is assisting an internal user with one of their corporate applications. It is currently not responding to any actions, nor can the user close it using the button in the top left corner. Samuel knows there is a method to forcibly close the app. Which of the following can Samuel use to take this action?
Force Quit
Frank is helping an internal employee set up their new MacBook. While setting up their security settings, Frank suggests that the employee set up their Touch ID through the biometric scanner found in their trackpad. Where could they set up these functions?
Gestures
What user accounts are created automatically and disabled by default when Windows is installed? (Select TWO.)
Guest Administrator
Your computer has a single HDD formatted with NTFS with the following data folders:C:\DocumentsC:\PicturesYou create a new child folder under the C:\Documents folder.What term describes the permissions the new folder automatically attains from the C:\Documents folder?
Inherited permissions
Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation, she receives an error message saying the software cannot be installed. The error reports that she does not have the privilege to install software. Jennifer is using the administrator account, so she knows she should be able to install the program. Which Windows option can Jennifer use to install anti-malware software?
Install in Safe Mode.
A user reports having issues with Internet Explorer on Windows 10. The service technician would like to further troubleshoot by checking the configuration in the control panel. This will allow the technician to check the current certificates and delete browsing history. What would the applet be called?
Internet options
Susan is in the process of setting up her new MacBook for her current job as a service technician. She begins to setup her passwords but wants to use a password manager to keep all her passwords in one place. What would allow her to do so?
Keychain
David would like to add extra security to his network device. He is afraid that someone might try and connect an unauthorized device to the network via an open network drop. Which security option should David employ?
MAC filtering.
Mobile policies are extremely important for organizations as using personal devices for work activities is a growing trend. As a result, categories of applications have developed to help enforce these mobile policies. Which of the following policies would ensure the installation of software on servers and mobile devices to enforce an organization's various mobile device policies?
MDM policy
A user calls the service desk for assistance with an issue they are having on their computer. The service desk technician uses a program to remote into the user's computer in order to troubleshoot. What allowed the technician to access the user's computer?
Microsoft Remote Assistance (MSRA)
What are the likely error messages that will appear if the BIOS/UEFI cannot find a Windows Boot Manager or cannot turn over operations to the boot manager? (Choose all that apply)
Missing operating system Error loading operating system Invalid partition table
Marian is assisting a user with connecting to the Active Directory (AD). The user requires a specific account in order to be able to use and connect to the directory database. Which of the following would the user need as their domain-level account on the corporate network?
Network ID
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity?
Network printer
Patrick is working on a computer that is having wireless network connection issues. Patrick decides that he needs to take the laptop with him to repair it and then return it to the user. While Patrick is replacing the wireless network card, he receives a phone call from the user. The user wants to know where the laptop is because they are leaving on a business trip that day and need the computer. What should Patrick have done to avoid this situation?
Offered the user different repair options.
How often does Windows automatically defragment a hard drive or trim a solid-state drive?
Once a week
Which of the following Windows tools is used to measure how well software and hardware are performing by displaying statistics in real time?
Performance Monitor
What are applications that can be installed in a browser to change the way the browser functions or to enhance the features of a single website?
Plug-ins and extensions
In Windows 10, which Task Manager tab shows running processes organized by Apps, Background processes, and Windows processes?
Processes
Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting to manage users on its network. The company uses a wireless network and an earlier authentication service on the server to authenticate end users accessing resources on the network. Which service is Jennifer's company making use of?
RADIUS
In a number of situations, manual edits to a system can be an important part of the resolution of issues. If successful, many of these manual edits can be automated and rolled out to an entire network. There can be a number of times where editing various keys and other settings can help to resolve application issues. Choose the following option that allows you to adjust various keys in your Windows system.
Registry Editor
Michael is going through onboarding for his new position as a supervisor. While setting up his new corporate-owned device, he would like to make sure that all his data is not only backed up through Google, but also through the company's cloud storage. Which of the following would allow him to back up the device's data to the company's cloud storage?
Remote Backup Application
Steve just got back from a business trip and noticed that his corporate mobile device was missing. Using My Device, Android's built-in locator application, Steve was able to locate his device in another state. Feeling worried that the device may be compromised, Steve would like to take the next step and erase the device. Which of the following would allow him to erase the device from the My Device application?
Remote Wipe
Ken has discovered that a vice president of his company has been using their computer to send data about a new product to a competitor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent. Which would be the most appropriate option for Ken to complete next?
Report the person through proper channels.
What is a snapshot of the system settings and configuration called?
Restore point
A popular activity for some users with their mobile devices is to create an environment where any applications can be installed from any source. Which of the following is a reference to an Android device that is able to have applications from any source installed?
Rooting
Jannette has just finished setting up the modem within the corporate office and would like to connect several devices to the modem at once in an organized method. She needs something that can manage the traffic between all the networks. What would help to facilitate this scenario?
Router
Allison's computer is displaying a strange error message saying that Allison, who is an administrator, does not have access to a folder in the Documents library on her user account. Allison tried to take ownership of the folder but was still denied access. She tried running an antivirus scan on the folder, and again access to the folder was denied. Which option can Allison employ to resolve the security issue?
Run a Windows Defender Offline scan.
While there are a number of different types of malicious applications, there can sometimes be common characteristics or exploits of particular weaknesses. Administrators need to be on the lookout constantly for these types of attacks. Which of the following involves the insertion of various data retrieval statements into an application?
SQL injection attack
What is another name for a type of computer that has no firewall, limited protections, and can receive any communication from the Internet?
Screened subnet
Larry has been asked to assist a user in placing a Tag on a very important file. Larry remembers a technique that would allow the user to do this quickly and efficiently. He asks the user to tap on the trackpad using two fingers. Which one of the following is this action called?
Secondary-click
A coworker asks your opinion about how to minimize ActiveX attacks while they browse the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls but can't remember which tab to use. What tab would suggest the coworker look in for the ActiveX controls?
Security tab
What term refers to a major update release on Windows 7?
Service pack
A technician needs to configure a Windows 10 computer to start a background service automatically each time the computer is booted. Which of the following tools should the technician use?
Services Console
Choose the type(s) of physical drives Windows disables defragmenting, but provides another method of optimization.
Solid-state drives
Knowing what tools can be tried to ensure that a device is operating at peak efficiency is important. Having the skills to be able quickly, easily and seamlessly address system-based issues is extremely to an organization being able to operate effectively. Which of the following would be one of the first steps to try when addressing powerup issues with a device?
Startup repair
If a printer connected to your local network does not get a dynamically assigned IP address from the DHCP server, an IP address can be manually configured. What type of IP address is this?
Static IP
Lance works for a company that allows users to bring their own devices to work. Last week Lance purchased a software package from a company that allows him to change fonts on pictures that he uses in his work presentations. Lance wants to share the program with his coworker Susan. Which option would be apt for Lance's permission to share the application with Susan?
Susan would need to purchase the software from the company.
Scott has been asked to factory reset his old corporate-owned Android device. Upon opening the settings application, Scott is greeted with several options and paths. Which of the following paths would he need to take in order to erase all the data from his device?
System > Advanced > Reset options > Erase all data
Which of the following utility creates restore points at regular intervals and before you install software?
System Protection
A technician mistakenly uninstalled an application that is crucial for the productivity of the user. Which of the following utilities will allow the technician to correct this issue?
System Restore
A technician is attempting to use System Restore to restore a Windows 10 system to a point in the recent past; however, the option to choose a restore point is not available. What is most likely the reason for this issue?
System Restore is turned off.
Scott has just completed installing Windows 8.1 and needs to install several applications on the computer before returning it to his client. What should Scott check prior to installing the applications? (Select all that apply.)
System requirements Hard drive space
Brennan is working on a project that requires Linux Commands. He decides to open Finder, click Applications, double-click the Utilities folder, and double-click Terminal to allow him to run the required commands. What would allow Brennan to run the Linux commands?
Terminal
Which of the following describes why a normal hard boot takes longer than a normal soft boot.
The initial steps must be performed by the BIOS/UEFI
A technician removed several instances of malware from a customer's Windows PC. Now when the user double-clicks .doc files to open them, an error message appears asking what program to use to open the files. Which option is most likely to cause this error?
The malware removal process changed the file association for the .doc file type.
A Windows user called the help desk to request that their local user account password be reset on their computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. What is the most likely reason for the lost data files?
The user had previously encrypted their data files and folders using EFS.
If a storage pool is configured as if it has more virtual storage than the physical drives actually offer, what is the name of the feature being used?
Thin provisioning
Understanding the various types of attacks that a network can experience is a constant learning experience for administrators. Knowing the basic types and categories is important. Which of the following explains what a DoS attack is?
This type of attack is commonly referred to as a denial-of-service attack.
A user calls into a service desk due to their data not being backed up from their Mac to iCloud. The user wanted to know if there was another method, they may be able to save these important files. John is more than happy to assist as a service technician. He can provide a solution that is built-in and that will automatically back up user-created data, applications, and the entire macOS system. What utility John is using to back-up the information?
Time Machine
There are a number of network design approaches which might be employed to connect together devices for the purpose of communication and sharing of resources. Which of the following refers to those patterns in which network devices are connected?
Topology
It can provide a great amount of benefit for any organization to be aware of the types of origins of applications and be able to verify that they are legitimate. A type of site has evolved for mobile devices to download and use verified applications. This gives an organization confidence that the applications, their devices are employing, are safe. Which of the following is a safe site for downloading apps to use on a company or personal device?
Trusted sources
Cody is signing into the corporate network by using a VPN. Using this method, the VPN encrypts and protects data from when it leaves his computer until it reaches a server on the corporate network. What is the process referred to as?
Tunneling
A user contacted you to report that an unwanted Windows application is launching each time their computer is booted. Which option would permanently resolve this issue?
Uninstall the application.
A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained?
Updates are found in the App Store.
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide that an update might be installing, so you allow the computer to work for approximately 20 minutes. After 20 minutes, you turn off your computer and then restart it, and it fails two more times. Choose the tool you would use to help repair your computer system.
Use Safe Mode to boot.
Andy is working as a service technician and has been asked by a user for assistance with transferring files. Andy would like to not only assist in transferring files but also remote in and take control of the user's computer to further help walk through the requested process. What would allow Andy to do all three?
Virtual Network Computing (VNC)
What version of Windows 10 is a valid, in-place upgrade path for a computer that has Windows 7 Starter edition on it?
Windows 10 Home
Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual device is not available. Unfortunately, Eric does not have access to the Internet.Choose the location Eric can go to look up the device driver's filename that would determine what device uses the device driver.
Windows\System32\drivers folder
Choose the command that can be used to repair a dual boot system.
bootsect
A user wants to rearrange parts of files on the drive, so they are contiguous. What command should be used?
defrag
A Windows 10 user wants to display all the files in all the subdirectories on the E: drive with the file extension of doc. What command would perform this function?
dir e:\*.doc /s
What command can be used to totally wipe a hard drive clean, including the partitioning system?
diskpart
A user calls in about an issue they are having on their computer. In order to remotely control the user's computer, the help desk technician requires the user's IP address. Which of the following would provide the IP address?
ipconfig
Windows 10 Professional will not boot on Jackson's computer. During the boot process, the computer fails. While troubleshooting, Jackson determines that the graphical user interface did not load. Choose the boot process responsible for loading the graphical user interface and starting the client/server runtime subsystem.
smss.exe
Which of the following best meets the requirements of a strong password?
t*M&2.zY7