TO 1002 A+

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are writing a shell script for a computer running Linux. The script should execute in the standard command interpreter. What should you enter as the first line in the script?

#!/bin/bash

You are currently managing a few Apple iPad devices that run the iOS operating system. Which of the following BEST describes the architecture used by this device?

ARM

You want to upgrade your Windows 7 Professional computer to Windows 10 Professional. You begin by checking the hardware and discover it has 1 GB of RAM, a 2.0 GHz dual-core processor, a 128 GB solid state drive, and a video adapter with 128 MB RAM and DirectX 9 support. You want to install the 64-bit version of Windows 10. What should you do?

Add more memory.

Which disk types does Windows support?

Basic Dynamic

You have just installed a new video card in your friend Mark's computer. When you power on the computer, Windows automatically detects the new device and tries to locate an applicable device driver. Unfortunately, Windows cannot locate the required driver. Which of the following would be the BEST administrative tool to fix Mark's computer?

Computer Management

Ted, an employee in the sales department, has asked a coworker, Ann, to update the product descriptions contained in a sales document. Ann can open the file, can't save her changes to it. Which of the following digital security methods is MOST likely preventing her from saving the file?

Directory permissions

Timothy works in the graphic arts departments and has received approval to upgrade his video card. The card has arrived, and you are ready to begin the upgrade. To ensure your personal safety, which of the following should you do FIRST?

Disconnect power.

You are building an HTPC (home theater PC) that will be connected to an HDTV. You want to be able to play Blu-ray movies on the HTPC. Which of the following features should your video card and HDTV MOST likely support?

HDCP

A company is concerned about the potential for theft of laptop computers. It is looking for a way to prevent the theft of laptops. Users need to have easy access to the computers while at work. What should you recommend?

Install Cable Locks

A new laptop was delivered to your home and left on the porch while you were at work. It is very cold outside, and you don't know how long it has been there. You unpack the computer. You would like to know if it is working properly. Which of the following is the BEST action to take?

Let the computer warm up to room temperature before turning it on.

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggy-backing to gain access to your building. The individual in question did not have a security badge. Which of the following would you MOST likely implement to keep this from happening in the future?

Mantraps

You have just purchased a new computer that runs Windows 10. You would like to transfer all of the applications and user data from your old computer, which is running Windows 7, to the new computer. Which of the following steps is the BEST course of action?

Manually install applications, copy data, and configure settings on the new computer.

A company is researching software that wOuld allow its programmers to legally modify and customize the source code. What type of license does this describe?

Open source

You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. Which of the following would be the BEST actions to take next?

Place the files on an NTFS partition. Configure both share and NTFS permissions.

A company maintains a database of information about its employees. The information includes full name, mailing address, and date of birth. What type of information does this describe?

PII

Which type of policy is most easily implemented and enforced through operating system (OS) configuration settings?

Password Policy

What combination of authentication factors will qualify as multifactor authentication?

Password and smart card

Which of the following is not a form of biometrics?

Smart card

Which of the following security technologies stores identification information in a magnetic strip, radio frequency transmitter, or hardware contact to authorize access to a computer?

Smart card

A host on your network that provides a service that requires the server to always use the same IP address. Which IP addressing method can you use to manually assign the specific IP address?

Static IP addressing

An administrator configures the Time Machine application on Mac OS computers and develops scripts that use the tar command on Linux computers. Which of the following best practices is the administrator following?

Scheduled backups

Occasionally, Rachel works from another Mac in her office, rather than her own, and needs to be able to access her Mac while she is away from her desk. Which option can Rachel use to access her MAC?

Screen Sharing

You're troubleshooting a computer that runs Windows 10. The operating system has halted and a blue screen is displayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue?

Search for the error in Microsoft's knowledge base or using an internet search engine.

You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?

Task Scheduler

You would like to run an application on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically?

Task Scheduler

You need to ensure that, in case of AC power loss, servers in the server room will keep running long enough to be shut down.

Uninterruptable power supply

While trying to log on, a user accidentally typed the wrong password three times, and now the system is locked because he entered too many incorrect passwords. He still remembers his password, but he just typed it wrong. He needs access as quickly as possible. Which of the following would allow the user to log on?

Unlock the account

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed?

yum list installed httpd

You have responded to a call from a customer who is having problems with his computer. After troubleshooting the problem, you discover the switch on the power strip was off. After switching it on, all of the components and their functionality return to normal. Which of the following is the BEST way to explain the solution to the customer?

"I found this power strip switch in the off position. Now that it's on, it looks like everything is working. It appears as though that was the problem. Can you confirm that the problem has been resolved?"

You are logged in as a user with limited system privileges. You are the Linux system administrator, and you have the password to the root user account. When you need to switch to root user to perform administrative tasks, what command should you enter at the command prompt?

su -

A technician wants to copy the contents of a fixed hard disk to a removable hard disk for backup. Which command can copy all files, directories, and subdirectories to another disk all at once?

xcopy

Which of the following is an important aspect of evidence gathering?

Backing up all log files and audit trails

A company works on several government contracts. They need to provide proof that any devices containing data have been disposed of properly so that no data is a risk when a device is decommissioned. This proof needs to be available for at least 20 years after decommissioning. What is necessary for this?

Certificate of destruction

what statement accurately describes Chrome OS?

Chrome OS is optimized for use with web apps

You want to configure your computer so that a password is required before the operating system will load. What should you do?

Configure a user password in the BIOS/UEFI.

A user reports that she cannot connect to the FTP server at ftp.company1.com using her FTP client software on a computer running Windows 10. She can connect using Internet Explorer. How can you resolve the problem?

Create a program exception for the FTP client software in Windows Firewall.

A company wants to configure its computers to prevent any programs from launching automatically when a CD is inserted in the CD drive. All company computers run Windows 7 Professional or later. The solution must minimize administrative effort. What should be used to configure this?

Create a script modifying a registry entry

You're about to begin an upgrade of a Windows 7 workstation to Windows 10. What should you do before beginning?

Create a system backup of the hard drive prior to running the upgrade.

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application?

Create a virtual computer that runs Windows 7. Run the virtual computer each time the application runs. Run the application in Compatibility Mode.

Alice recently purchased a new cell phone. After her vacation, Alice wanted to transfer her holiday photos to her computer to do some touchup work before sending the pictures to her children. When Alice attached her phone to her computer, she saw that Windows detected her phone and tried to load the applicable software to give her access to her phone. Unfortunately, after trying for several minutes, Windows displayed a message indicating that it was unsuccessful. When Alice explored her available drives, her phone was not listed. Which of the following would be the BEST administrative tool to help Alice gain access to her phone?

Device Manager

Alice recently purchased a new cell phone. After her vacation, Alice wanted to transfer her holiday photos to her computer, where she could do some touchup work before sending the pictures to her children. When Alice attached her phone to her computer, she saw that Windows detected her phone and tried to load the applicable software to give her access to her phone. Unfortunately, after trying for several minutes, Windows displayed a message indicating that it was unsuccessful. When Alice explored her available drives, her phone was not listed. Which of the following would be the BEST administrative tool to help Alice gain access to her phone?

Device Manager

A technician removes a virus from an infected computer and wants to help the users prevent future infections. What is the final stepin the process?

Educate the user.

A user complains that his USB scanner no longer works. You check Device Manager and see an icon with a black down arrow on it. What should you do?

Enable the device in Device Manager.

Which of the following features is supplied by WPA2 on a wireless network?

Encryption Authentication

What is your top priority when responding to emergencies and hazardous situations?

Ensure the safety of people in the area.

What is the recommended size of the paging file under normal circumstances on a Windows 10 system with 8 GB of RAM installed?

Equal to the amount of physical RAM.

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?

Establish a Remote Assistance connection and watch what the user is doing.

A computer running Windows 8 is experiencing spontaneous shutdowns. You are trying to determine if there is any pattern as to when the shutdowns are occurring. What should you use?

Event Viewer

You have just purchased a new USB drive that you want to use to troubleshoot the computers in your company as well as other network devices, such as printers and projectors. You need to format this new drive with a file system that will be recognized and used on all devices. When formatting your USB drive, which of the following file system types would meet MOST, if not all, of your needs?

FAT32

Which keyword should you use to create a loop in a Windows batch file?

FOR

You have a computer that runs Windows 7, and you want to install Windows 10. You are not concerned about keeping any of the existing data currently on the drive, and you want to do a clean install. After placing the Windows 10 installation DVD in the optical drive, you restart the computer, but it does not boot to the DVD, and you are unable to install Windows. Which of the following are the BEST methods for installing Windows from the DVD?

From the UEFI or BIOS firmware, change the boot order. While the computer is rebooting, press the boot menu function key.

A user has complained about not being able to remove a program that is no longer needed on a computer. The Programs option is not available in Control Panel. You suspect that a policy is enabled that hides this option from the user. But after opening the Local Group Policy Editor, you see that the policy to hide Programs is not configured. You know that other users in this domain can access the Programs option. To determine whether the policy is enabled, where should you look next?

GPOs linked to organizational units that contain this user's object.

Centralized Active Directory object management and configuration infrastructure

Group Policy

On a Windows system, which of the following is true of groups?

Group members have the access rights assigned to the group.

A technician is assisting a user with rebooting a frozen laptop that does not respond to keystrokes or mouse clicks. Which of the following is the SIMPLEST way to power down the laptop?

Hold down the power button for several seconds.

Your organization is frequently visited by sales reps. While on-site, they frequently plug their notebook systems into any available wall jack, hoping to get internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. Which of the following would BEST protect you from guest malware infection?

Implement MAC address filtering. Implement static IP addressing.

You are implementing a wireless network. You want to provide the best security during data transmission. What should you do?

Implement WPA2.

There are two main types of firewalls that you should be familiar with. Which of the following describes a feature of a network-based firewall?

Inspects traffic as it flows between networks.

Documentation for a new network includes the drawing in the exhibit. What type of diagram does this represent?

Network topology diagram

ou have booted your Windows workstation into Safe Mode and enabled Boot Logging. To which log file is the boot logging information now being written?

Ntbtlog.txt

Which of the following are antenna types that are commonly used in wireless networks?

Omnidirectional antenna Directional antenna

Which of the following terms refers to a network resource sharing model that uses access control lists saved on each computer?

Peer-to-peer

There is no sound coming out of a smartphone's internal speaker. The device's user has: *Verified that the volume is turned all the way up *Cycled power on the device *Called the device The user was able to hear the phone's ring tone from the speaker, but other than that, cannot get any sound out of the speaker. What should the user do next?

Plug headphones into the jack and remove them multiple times.

Which term refers to the portion of the hard drive where print jobs are stored before going to the print device?

Print queue

You have a workstation running Windows Vista Business edition that you would like to upgrade to Windows 10 Enterprise edition. You want to perform the upgrade with the least amount of effort and cost. Which of the following would BEST meet your needs?

Purchase a full version of Windows 10 and perform a custom installation.

You have discovered that a system on your network has been infected with a worm. Your top priority is to prevent the worm from spreading to other systems while you work on removing the worm. Which of the following is the BEST next step to take?

Quarantine the computer

A company wants a record of employees entering and leaving a secure area. The solution should minimize the need for employee interaction. What ype of physical security device should you use?

RFID Key Fob

Which two attack types are specifically designed to compromise user passwords?

Rainbow table Brute force

A customer calls concerned that he received a message that his computer was detected doing something il legal. The customer's web browser will not let him navigate away from the page displaying a message. The Customer is informed that he must pay a fine to regain access to his PC. This is an example of what type of attack?

Ransomware

A user is unable to read their computer files. A pop-up explains that the files have been encrypted and gives instructions on how to purchase a decryption key. Which of the following BEST describes this malware?

Ransomware

A customer calls with a problem. When the customer started upa laptop computer, a screen appeared stating that unless a payment of $100 is made within 48 hours, the computer will be erased. The customer cannot get past the screen to get to Windows. What type of attack does this describe?

Rasomware

Your wireless network is secured using WEP. You need to improve data encryption to minimize the chance that data transmissions might be compromised. What should you do?

Reconfigure the network to use WPA2.

The customer creates a restore point and a system image before installing the application. The customer discovers a problem two days later and wants to recover the system to the state it was in before the application's installation. The customer needs to avoid losing data created since the application was installed and applications that were already installed on the computer, if possible. The customer has a recov- ery disk available and there is a recovery partition on the computer's hard disk. What should you recommend?

Recover from the restore point.

Your company has decided to hire a full-time video editor. You have been asked to find a system with the level of display quality needed by someone who will be working with video all day. Which of the following video related specifications will have the greatest impact on display quality?

Refresh rate Resolution

Which tool lets you view and directly edit the registry?

Regedit

You are trying to correct a problem with a third-party application on a computer running Microsoft Win- dows 8.1. You need to edit the registry. What utility should you use?

Regedit

A company uses a large number of company-supplied mobile devices. The company is concerned about the risk of undiscovered vulnerabilities in the devices. What is the company's best defense against this risk?

Regularly install current OS updates.

You have configured your Windows systems to automatically back up user data every night at midnight. You also take a system image backup once per month. What else should you do to ensure that you are protected from data loss?

Regularly test restoration procedures. Store a copy of all backups off-site.

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware corrupted the boot block. Based on your suspicions, which of the following actions would you MOST likely take to correct the problem?

Reimage the machine. Boot from the Windows installation DVD and use the Recovery Environment to run a startup repair.

Which of the following is the process of fixing problems detected by anti-virus software so that the computer is restored to its original state?

Remediation

Which of the following remote access mechanisms on a Windows system lets you watch what a user is doing and, if necessary, take control of the user's desktop to perform configuration tasks?

Remote Assistance

A company has employees who travel to remote sites for data collection. The company wants to ensure that the data is not lost if an employee's mobile device is lost or stolen. What should the company use?

Remote backup application

A company is concerned about unauthorized users being able to log onto workstations. Workstations in- clude a mix of computer that run Linux and Windows. The company wants to make it more difficult for someone to guess passwords. What should you recommend? (Choose two.)

Require strong passwords. Configure failed login lockout.

For the past few days, a mobile phone has stopped functioning and will not respond to touchscreen input. A soft reset no longer returns functionality. Which of the following is the BEST step the user can take to fix this problem?

Reset to factory default

On Windows 10, using Storage Spaces eliminates the need for which of the following tasks?

Resizing volumes Repartitioning drives

You work for a company that provides technical support for customers. One customer calls wanting to know how to adjust their monitor so they can have the sharpest and most detailed images, words, and icons. Which Control Panel setting should you adjust to BEST meet the customer's needs?

Resolution

Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?

Resource Monitor

You had to order a part from the manufacturer to repair a customer's printer. You told the customer that you should be able to get the part within two weeks. You also told the customer that you would let him know as soon as you get a firm delivery date from the manufacturer. After about a week, the customer sends an impatient e-mail asking when the printer is going to be fixed. What should you do?

Respond to the customer's e-mail and tell the customer that you do not have a delivery date yet, but you will contact him as soon as you get one from the manufacturer

A customer brings a laptop in to be checked. The laptop is running Windows 8.1. The customer reports that he received a pop-up with a Windows Security Alert. When he clicked to close the pop-up, it opened again. He restarted the computer and since then it keeps displaying intermittent pop-ups with security alerts and prompts to download various security applications. You identify the problem as a fake Windows Security Alert You download and update additional antimalware on the customer's computer. What should you do next?

Restart Windows into Safe Mode.

You are an IT technician for your company. Fred calls you complaining that every time he opens his internet browser, the default home page has been changed to a site he is not familiar with. You suspect this change is being caused by a malware infection on his system. However, after you run antimalware and antivirus software on Fred's system, it is still having the same issue. Which of the following would be the next BEST way to remove the malware?

Restore Fred's computer back to a previous restore point.

The chain of custody is used for what purposes?

Retaining evidence integrity by identifying people coming into contact with evidence

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware has infected the system. Based on your suspicions, which of the following actions would you MOST likely take to correct the problem?

Revert the system to a restore point created before the malware infection occurred. Use an anti-malware scanner to scan for and remove the infection.

A customer wants to copy files from an internal hard disk to an external USB drive. The customer wants to filter the files copied based on attribute flags set on the files. What command should the customer use?

RoboCopy

A technician is unable to remove a virus from a computer. The technician has: * Disabled System Restore *Updated antivirus software *Started computer in Safe Mode The technician ran multiple virus scans and also tried using a different antivirus program. The technician needs to return the computer to unaffected and usable state. What should the technician do?

Run a clean install of Windows.

While browsing the internet, a pop-up browser window is displayed warning you that your system is infected with a virus. You are directed to click a link to remove the virus. Which of the following are the next BEST actions to take?

Run a full system scan using the anti-malware software installed on your system. Update the virus definitions for your locally-installed anti-malware software.

A customer brings in a computer for repair. The computer runs MicrOsoft Windows 8.1. The computer acts as if some system files are either corrupted or have been deleted. You try recovering to a restore point, but the problems persist. You want to get the computer running properly as quickly as possible You want to minimize the risk of los- ing data or installed applications. What should you do?

Run a push-button reset and choose to refresh the PC.

A technician is writing a Windows batch file that is used to configure a computer to prepare it for an applic- ation that was developed in house. The technician needs to declare the environmental variable %myenv% with a value of "configured". Which keyword should the technician use to declare the environmental variable?

SETX

A customer was having AC power problems at home and brought a computer in for you to check for pos- sible problems from the power issues. The computer is running Windows 8. You want to see if any system files are corrupted before running a full backup. What should you use?

SFC

You need to open a secure command prompt connected to a remote server. All communication over the connection should be encrypted. What should you use?

SSH

Which of the following tools allow remote server management?

SSH Telnet

A technician finds that after restoring the operating system on a mobile device, the touch screen operates unpredictably. This happens in both the default orientation or when the screen is rotated. Which of the following would BEST correct the problem?

Screen calibration

Joe, an executive, receives an email that appears to be from the financial institution that provides his company credit card. The text of the email includes Joe's name and the company name and states that there is a problem with Joe's credit card. The email provides a link to verify the credit card, but when Joe hovers over the link, he thinks the web address seems strange. Which of the following BEST describes this type of attack?

Social engineering

You are running Windows 10 Professional. You attempt to reboot your computer, but the operating system will not load. You suspect a corrupt system file. You need to repair the computer but want to minimize the risk of data loss. What should you select in Advanced Options in the Troubleshooting menu?

Startup Repair

You are trying to boot a Windows 7 computer and receive a message indicating that BOOTMGR is missing. You boot from the installation DVD to System Recovery Options. You need to correct the problem but min- imize any other changes to the computer. What option should you select?

Startup Repair

Your job functions have recently changed. As a result, you find that you are needing to work with more running programs on your Windows 10 computer at a time. Although you haven't seen these in the past, you are now starting to receive error messages warning you of low virtual memory. However, no additional RAM can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages?

System

As you are working on your Windows 10 computer during a fierce thunder storm, lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools is MOST likely to rectify this issue?

System File Checker (SFC)

A new computer has been added to the Sales department and needs to be joined to the CorpNet domain. Which of the following System Properties settings MUST be used to make the change?

System Properties > Computer Name

You want to perform a Windows update on your Windows 10 computer. Before doing so, you want to make sure you can easily go back to the state it was in prior to the update. Which of the following Control Panel utilities is BEST to enable and use prior to the update?

System protection

Your company has a Windows software program that can only be used by one person at a time. When you try to run the program, you are shown a message that indicates that the program is in use and is not available. It is critical that you get access to this program as soon as possible. Therefore, you would like to know who is currently logged on to the computer so you can find out who is using the program. After you connect to the remote computer using a remote desktop connection, which of the following would be the BEST utility to use?

Task Manager

Your computer has a quad-core processor that supports multithreading installed. Given that the system is running Windows, how can you verify whether multithreading has been enabled?

Task Manager can display CPU utilization graphs for eight processors.

Which option, used with the copy command, makes sure that all copied files are written correctly after they have been copied?

The copy /v command verifies files after they are copied.

A user is browsing multiple websites researching an issue. The user accesses the Internet through the com- pany network. The user's computer runs Windows 8.1 and has antimalware software installed. A message appears in the browser screen that the computer is infected with multiple critical viruses. The user is prompted to download an antivirus program to remove the infection. What does this most likely indicate?

The user was redirected to a rogue antivirus site.

You work for a large company that has over 1000 computers. Each of these computes uses a wireless mouse and keyboard. Therefore, your company goes through a lot of alkaline batteries. When these batteries can no longer power the intended device, you must decide what to do with them. Unless otherwise dictated by your local authorities, which of the following would be the EASIEST way to deal with these batteries?

They can be thrown in the trash.

Your company has a plan in place to upgrade each employee's laptop computer to a newer model every three years. As a result, you often have old laptop batteries. Unless otherwise dictated by your local authorities, which of the following is the BEST way to deal with these types of batteries?

They must be recycled.

A technician installs a new hard drive in a BlOS-based computer running Windows 7. The technician uses Disk Management to configure the drive as a basic disk. Which partitioning configuration is supported?

Three primary partitions and one extended partition.

You are an IT technician for your company. One of your employees calls and tells you that every time they turn their computer on, they hear three beeps. Which of the following BEST describes an accurate reply to this employee?

Three repeated beeps may mean different things. First, we need to check the motherboard documentation.

An employee who works outside of the office reports intermittent problems with data speeds. The user primarily uses an Android mobile device and works either from a home office or customer locations. The user connects to the Internet through a WIFl connection when in the home office and uses a 4G cellular connection at customer sites. The employee has not experienced problems while using 46. Most months, at some point during the month, the user's data rates while working from home drop off sig8 nificantly. The problem seems to correct itself at the end of the month. This problem does not occur when working from customer sites. What is this most likely related to?

Throttling

Applications for mobile devices fall into two categories. Some have been reviewed, approved, and signed with a certificate by the app service, and some have not. Which category do apps fall into if they have been signed with a certificate?

Trusted

Which security measure can be used to generate and store cryptographic keys?

Trusted Platform Module (TPM)

You have just finished installing Windows on a system that contains four physical hard disks. The installation process has created a system volume and a C: volume on the first disk (Disk 0). The installation process also initialized the second disk (Disk 1) and the third disk (Disk 2), but did not create any volumes on these disks. Which of the following would you expect to see as the status of Disk 1 and Disk 2?

Unallocated

You have been asked to install Windows 10 on 30 different computers for a new branch office your company is setting up. The computers have been purchased from different companies and have different hardware. Which method should you use to reduce the installation time and the effort you need to spend?

Unattended

A user reports that after installing a new application, one of his other applications will not load. The userr's computer is running Windows 10 Professional. You tell the user to uninstall the new application, but the problem is not corrected. You need to help the user correct the problem with minimal data loss. What should you tell the user to ry next?

Use System restore

Your computer's hard drive is currently formatted as FAT32, but you want to take advantage of the features offered to NFTS drives. Which of the following steps would MOST likely allow you to do this without losing the existing data?

Use the convert command at a command prompt.

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

A user travels frequently to various factory and warehouse sites. Which type of mobile broadband network should you set up on a computer running Microsoft Windows 10 for that user?

WWAN

From your laptop, you have been working on a large project that has required you to open a lot of items (programs, files, etc.). It is time to leave the office and make the two-hour journey home. You will be working on this project a bit more when you arrive at home. Your computer's battery is failing and only has a very short life span (about one hour) before your computer loses power. When you arrive home and open the lid of your laptop, nothing happens. After plugging in your computer and powering it on, you find that all of your programs and files have been closed. To troubleshoot this, you open Control Panel and navigate to the settings that control what your computer will do when the laptop lid is closed. Which of the following power settings MUST you choose to prevent the same problem in the future?

When I close the lid: Hibernate

what was the first Windows professional pro edition to include support for BitLocker?

Windows 8 pro

A customer is setting up a laptop with Windows 8.1 that will be used primarily when on the road for busi- ness. The customer wants to store user name and password information to make it easier to log onto the company Web site and to a technical reference site. Both use Kerberos authentication. The customer needs to know where to enter this information. What should you recommend that the customer use? (Choose two.)

Windows CardSpace Credential Manager

An attack targets a previously unknown vulnerability in a data processing application.

Zero-day

Which of the following is an example of a strong password? A strong password should not contain dictionary words or any part of the login name. They should include upper- and lower-case letters, numbers, and symbols. In addition, longer passwords are stronger than shorter passwords.

a8bT11$yi

You're using a Linux distribution that uses Debian Package Manager (dpkg) for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

apt-get install httpd

Which type of authentication would require a user fingerprint or facial recognition for a user to get past the screen lock on a mobile device and gain access to the device?

biometric authentication

Which of the following utilities checks the disk for bad clusters?

chkdsk

Which of the following utilities would you use to correct cross-linked clusters within the file system on a Windows workstation?

chkdsk

While troubleshooting a Windows workstation, you find that the computer has several cross-linked clusters within the file system. Which of the following utilities would MOST likely fix this issue?

chkdsk

Windows 10 features a storage solution called Storage Spaces. What is the name of the Storage Spaces feature that allows you to allocate space for redundant information using options that include two-way mirroring, three-way mirroring, and parity?

data resiliency

Which of the following Windows command line utilities would you use to realign the file structure on the disk to optimize performance?

defrag

You have a hard disk that has a single primary partition and has been assigned D: as the drive letter. Which tool would you use to configure the drive to use the FAT32 file system?

format

You are an IT administrator troubleshooting a Windows-based computer. After a while, you determine that you need to refresh the group policy on that computer. Rather than rebooting the computer, you open a command prompt from which the refresh can manually be completed. Which of the following is the BEST command line tool to run to accomplish this task?

gpupdate

A user calls in-house support to report that a computer running Linux is infected with malware. What should the support technician do first?

ldentify and verify the virus symptoms.

You have had several employees call the help desk where you work, complaining that they are not able to reach the www.widgets.com server. To help troubleshoot this issue, you decide to run a variety of commands. Which of the following commands is MOST likely to return the IP address of the desired server?

ping www.widgets.com nslookup www.widgets.com tracert www.widgets.com

Which command would you use to display a simple list of all processes running on a Linux distribution that uses either RPM or dpkg for package management?

ps -e

Which command lets you delete subdirectories in addition to files in the current directory?

rd /s

You need to duplicate a large number of files from your PC to a network server. Due to the number of files, you start the process and go home for the evening. When you return the next day, you find that only part of the files were duplicated to the server due to the router being temporarily unplugged by the janitor while cleaning. To prevent this type of glitch from happening again, which of the following Windows command line tools would have been BEST to use?

robocopy

You need to install Windows 7 on a computer which does not have a DVD drive. You want to install so Windows 7 using a USB device. what should You do?

run disk part and clean the USB device

Which of the following refers to a situation where two files try to claim the same cluster on the hard disk?

Cross-linked clusters

You connect your computer to a wireless network available at the local library. You find that you can't access several websites you need to on the internet. Which of the following is the MOST likely cause of this problem?

A proxy server is filtering access to websites.

Joe, a mobile device user, is allowed to connect his personally owned tablet to a company's network. Which of the following policies defines how company data is protected on Joe's tablet?

BYOD policy

A technician is assisting Ann, who reports that the display on her company-issued smartphone is too dim to read in a dark room, even after she adjusts the brightness setting. Which of the following actions should the technician perform FIRST?

Adjust the adaptive or automatic brightness control. Adjust the battery saver setting.

You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?

Administrators

Joe, a frequent visitor to a branch office, attempts to connect his tablet to the office wireless network, but is unable to connect to the internet, even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot, but is still unable to connect to the internet. Which of the following is the MOST likely cause of this issue?

Airplane mode has been set on the tablet.

Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential C:\PublicReports You configure NTFS permissions on the C:\Confidential folder and deny the Read permission to the Users group. For the C:\PublicReports folder, you allow Full Control permission to the Users group. You have not configured any permissions other than the defaults on any other folders or files. You take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Allow Full Control to both

Which of the following describes a man-in-the-middle attack?

An attacker intercepts communications between two network hosts by impersonating each host.

which operating systems are open source?

Android and Linux

A company needs to upgrade its network infrastructure to improve performance and reliability. This will in- clude both hardware and software upgrades. An outside team is brought in to coordinate the process and allocate roles to company staff. What is the primary role of management in the change process?

Approving the plan and budget.

What is the role of a software token in computer and network security?

As part of a two-factor authentication system

Which of the following are safe methods of lifting heavy objects?

Bend your knees with your back straight. Lift with your legs.

What do biometrics use to authenticate identity?

Biological attributes

A user has configured his mobile device to unlock using facial recognition. Which of the following methods for securing a mobile device is being used?

Biometric authentication

Employees currently access a data center using RFID badges. The company is concerned that an unauthorized person could gain access using a lost or stolen badge. Which of the following could be implemented to increase the physical security?

Biometric locks

Who needs to approve a change before it is initiated?

Change board Client or end user

Which of the following disk maintenance utilities optimizes the performance of your hard drive by verifying the file system integrity of a hard disk and fixing the errors it detects?

Check Disk

A technician receives notification from a SOHO router manufacturer of a specific vulnerability that allows attackers to exploit SNMP traps to take over the router. The technician verifies the settings outlined in the notification. Which of the following actions should the technician take NEXT?

Check for and apply firmware updates

If a printer is connected directly to a Windows workstation, what can be done to allow other workstations on the same network to send print jobs to this printer?

Configure the printer to be a shared printer.

Which of the following terms describes the difference between white and black in an LCD monitor?

Contrast ratio

Which of the following functions are performed by the TPM?

Create a hash based on installed system components.

You have used your computer for several years, resulting in a lot of data stored on your hard disk. Lately, your computer's functions have slowed. Which of the following tools is LIKELY to help speed up your computer?

Defragmentation

You have implemented a wireless LAN that uses the 802.11n protocol in your office. You want to ensure that users outside the company cannot see your wireless LAN in the list of available wireless networks. What should you do?

Disable SSID broadcasting

Your company has issued you a new laptop computer that contains a lot of memory and two very large hard disks. Since your computer at home is old and slow, you want to use your work computer for personal use as well. To keep your applications and files totally separate from the company's, you have been told you can run more than one version of Windows on the same computer, one for work, and one for personal use. Which of the following technologies would BEST meet your needs?

Dual boot

A user has a file that contains sensitive data. Which of the following can be used to encrypt a single file?

EFS

Which of the following security solutions would prevent a user from reading a file which she did not create?

EFS

Since it has no moving parts, a CPU will usually work properly for several years. Which of the following is a common factor that MIGHT cause a CPU to fail prematurely?

Electrostatic discharge (ESD)

What are the most common means of virus distribution?

Email Malicious websites

You work at the IT help desk in your company. An employee calls to report a problem with her workstation, and a service ticket is assigned to you. You respond to the service ticket immediately and arrive at the employee's workstation within minutes. When you say hello, she responds in Spanish. You realize that she only speaks Spanish, and you only speak English. What should you do?

Find an interpreter.

A user reports intermittent wireless connectivity on a new mobile phone. Other users do not report any is- sues using mobile devices connected to three access points in the office. The protocol in use is WPA2/AES. What is the most likely cause?

Firmware or drivers on the phone

You have four volumes on a basic hard disk. You convert the disk to dynamic. After the conversion, which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors?

Healthy

You have four volumes on a basic hard disk. Which of the following are you MOST likely to see as the status of the fourth volume if it is valid and has no errors?

Healthy (Logical Drive)

You have implemented a regular backup schedule for a Windows system, backing up data files every night and creating a system image backup once a week. For security reasons, your company has decided to not store a redundant copy of the backup media at an offsite location. Where would be the next best place to keep your backup media?

In a locked fireproof safe.

What type of documentation is used as follow-up after recovery from a serious network security event?

Incident documentation

Which of the following actions directly improves system security on a Windows workstation?

Install the latest updates.

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet?

L2TP PPTP

Which of the following display technologies require backlighting?

LCD LED

A company is moving into a new office building. The building has a separate server room with separate in- coming power and its own dedicated HvAC. If AC power is lost, the server room and HVAC are powered by a generator. The company needs to ensure that sensitive electronic equipment is protected against power spikes, brownouts, and variations in live voltage frequency. What should the company use?

Line conditioner

A company is preparing to change out several computers. They have asked for your help in developing a safe disposal plan. They are concerned about disposing of environmentally hazardous components. What is the best source of information for safe disposal?

MSDS

Susan has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Which of the following will MOST likely correct the problem?

Make Manuel the owner of the file.

A smartphone's screen has gradually had slower response and sometimes freezes for a short time before starting to work again spontaneously. What is this most likely related to?

Memory

You have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next?

Modify the NTFS permissions on the folder.

You would like to upgrade the processor in your system to a 64-bit processor. Which of the components will you most likely need to upgrade as well to take full advantage of the new processor?

Operating system

Hierarchical container that can hold Active Directory objects

Origanizational Unit

You have a computer with a 64-bit dual-core processor that runs the 32-bit version of Windows 7 Professional edition. You would like to upgrade to the 64-bit version of Windows 10 Professional. You want to perform the upgrade with the least amount of effort possible. Which of the following steps are required to accomplish this?

Perform a clean installation. Get 64-bit drivers for all hardware.

Which fraudulent practice tries to obtain the personal details of a user, such as passwords or bank account numbers, via e-mail?

Phishing

You have purchased new computers and will be disposing of your old computers. These computers were previously used for storing highly-sensitive customer order information, including credit card numbers. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Physically destroy the hard drives with a hammer.

Users complain that they cannot connect with any Internet websites. They can connect with a web server deployed in the local perimeter network. Technicians verify the problem by attempting to pinga known good site by URL, and the attempt fails. They get the same result from multiple network client computers. What should technicians try next?

Ping an lnternet site by IP address.

A user wants to download a utility from an unfamiliar website to a laptop computer. The utility is a free ware demo. What is the greatest possible risk?

Potential malware

A technician needs to uninstall an application installed on a computer running Microsoft Windows 8.1. Which Control Panel utility should the technician use?

Programs and Features

A user spends a lot of time traveling to provide sales support to customers. The user is concerned about protecting data stored on a tablet from disclosure while traveling. What should the user avoid while traveling? (Choose two.)

Public charging stations Public hot spots

Which of the following are likely symptoms of malware infection?

Renamed system files Changed file permissions

You have a computer that runs Windows 10. Where would you go to verify that the system has recognized the anti-malware software installed on the system?

Security and Maintenance

Which of the following are common forms of social engineering attacks?

Sending hoax virus information emails.

While organizing a storage cabinet, a technician discovers a box of hard drives that are incompatible with current hardware and may contain sensitive data. Which of the following is the BEST method for disposing of these drives?

Shredding

You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to BEST prevent extracting data from the discs?

Shredding

A security technician is conducting a forensic analysis. Which of the following actions is MOST likely to destroy critical evidence?

Shutting down the system

Which of the following will help reduce the threat of static discharge when working on computer hardware?

Store unused components in static shielding bags. Remain in physical contact with the server chassis at all times.

What are the disadvantages of plasma display technology

The gasses inside the cells are sensitive to air pressure fluctuations. They generate much more heat than other display types.

Which of the following is most helpful in keeping a computer cool?

Verify that cooling fans are not circulating air in the wrong directions. Vacuum dust from the system regularly.

Which of the following provides the BEST security for wireless networks?

WPA2

You want to force devices connecting to an access point to provide an alphanumeric key value for authentication and data encryption.

WPA2

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?

WPA2 and AES

Microsoft edge replaced Internet explorer as the default web browser in which Windows version?

Windows 10

Your system administrator shared a USB laser printer connected to your Windows 10 system so other users on the network can send jobs to it. A network user has sent a large job to the printer, but the print job has stalled. You try to delete the print job, but can't. Which of the following BEST describes the reason you cannot delete the print job?

You do not have the Manage documents permission.

You are troubleshooting network connectivity issues on a Windows workstation. Which command would you use to view the MAC address of the network adapter?

ipconfig /all

Which command would you use to have a workstation stop using an IP address that it obtained from a DHCP server?

ipconfig /release

On a Linux system, what is the name of the directory where you will find a text file called devices that contains information about the devices that are configured on the system?

/proc

Which port must be opened in the firewall of a Windows system so that a Remote Desktop connection can be established?

3389

what is the maximum amount of physical RAM supported by 32-bit installation of Windows 7 pro?

4 gigs

what is the maximum amount of physical RAM that a 32-bit operating system can address?

4 gigs

A company plans to move to a new office building. The building includes a secure server room with a dedic- ated AC power source. The company needs to provide environmental requirements for the room. What is the recommended percentage range for ambient humidity?

40 to 60

You want to build a new system that supports 6 GB of memory. Which of the following will be the MOST important consideration when building the computer?

64-bit processor

A public library has purchased a new laptop computer to replace their older desktop computers and is concerned that they are vulnerable to theft. Which of the following laptop features should be used to physically secure the laptop?

A cable lock

Which is the best description of a knowledge base?

A complex collection of structured and unstructured data accessible to multiple persons

Your laser printer prints a vertical black line on every page. You change the toner cartridge, but the problem does not go away. What is the MOST likely problem?

A corona wire is dirty.

A technician is unable to starta Windows 10 computer in Safe Mode. Which problem will prevent a Win- dows 10 computer from starting up in Safe Mode?

A corrupt master boot record

A Customer recently purchased a new Computer for a home office. The customer wants to set up the exist- ing computer for family use. The customer wants to return the computer to its original factory settings. The Customer wants to make sure this is possible. What does the customer need to accomplish this?

A recovery partition

When assisting users, a technician often uses the Mac OS Force Quit functions and the Linux kill command. Which of the following situations would require their use?

A runaway application does not respond to user input.

You are the owner of a small startup company consisting of only five employees. Each employee has their own computer. Due to the type of services your company offers, you don't foresee the employee count increasing much in the next year or two. As a startup company, you want to keep costs low and facilitate easier file sharing, internet access, printers, and other local network resources. Which of the following would be the BEST implementation for your business?

A workgroup

Where is information about file and folder permissions that are assigned to users and groups maintained on a Windows system?

Access Control List

Which partition type identifies the partition as one that holds the boot loader program used to start the operating system?

Active

If you want to boot from a hard drive, what must it have?

Active partition

Ben, an employee in the legal department, has created several sensitive documents on his computer that must be made available to all members of the executive staff working in the same building. Due to the sensitive nature of these document, Ben not only wants to restrict access to the files, but also make it impossible for anyone else in the company to even know where they are stored unless specifically told. Which of the following would MOST likely fulfil Ben's needs?

Administrative share

A user works primarily in your organization's production area. However, she frequently needs to access data stored on her Windows 10 desktop system in her office while on the production floor. She would like to be able to use a system in the production area to remotely access her desktop system using a network connection. Which groups on her desktop system could you make her user account a member of to enable this configuration?

Administrators Remote Desktop Users

A customer wants to increase the amount of virtual memory configured on a computer running Windows 7. Where does the customer need to click to accomplish this?

Advanced

Which tool would you use to configure the paging file location and size on a Windows system?

Advanced System Settings in Control Panel

While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches you have performed. What is this an example of?

Adware

Alice has received several calls from her friends informing her that they are receiving strange emails containing content that seems odd coming from her. Which of the following MOST likely happened on Alice's computer?

Alice's email account was hijacked.

A network engineer has given you a username and password to a new network switch and asked you to shut down all unused ports. What is the most likely reason for taking this action?

All unused portsS are to be shut down for security reasons.

You are developing standards for the organization for protecting user computers from malware. Which standard would you implement?

All users must regularly update their virus signatures.

Which of the following security practices are the BEST example of the principle of least privilege?

All users on a Windows workstation are limited users except for one user, who is responsible for maintaining the system.

You manage two folders in your computer as follows: C:\Confidential D:\PublicReports Both the C:\ and D:\ drives are formatted with the NTFS file system. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the D:\PublicReports folder?

Allow Full Control to both.

You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP address from the DHCP server so you configure it to obtain IP and DNS information automatically. When he's working from home, the laptop must use IP and DNS information that connects with his home network. Which IP addressing method can you use to make sure he gets a network connection at home?

Alternate IP configuration

Bob calls and complains that he has suddenly started getting a lot of unwanted email. Which of the following is the BEST type of software to install to help solve Bob's problem?

Anti-spam

A company executive has just bought a new Android mobile device. She wants you to help her make sure it is protected from malware threats. What options are available and important to use to protect Android devices? (Select TWO.)

Anti-virus apps are available for purchase from Android app stores. App reviews and ratings will help you choose an effective anti-virus app.

A company executive has just bought a new Android mobile device. She wants you to help her make sure it is protected from malware threats. What options are available and important to use to protect Android devices?

App reviews and ratings will help you choose an effective anti-virus app. Anti-virus apps are available for purchase from Android app stores.

A technician suspects that data is being leaked from a tablet. Which of the following is the BEST tool to troubleshoot this issue?

App scanner

You are unable to understand a customer's description of a problem's symptoms. What should you do first?

Ask clarifying questions.

While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer. Which of the following is the MOST professional way to handle the situation?

Ask the customer if it is okay to take the call, and then step into the hallway to briefly talk on the phone.

You are at a customer site to repair a printer with poor print quality. A document with dark vertical streaks is sitting on the printer. The document appears to contain personal information about the customer. What should you do? (Choose the BEST answer.)

Ask the customer to print a different document as a sample.

One of your users suspects that the battery in their notebook computer is failing. You test it by using a known good power adapter to plug it in long enough to receive a full charge. The battery reads that it is fully charged in Windows. You then disconnect the laptop from its power source and wait to see how long the battery lasts. The battery dies after only about 15 minutes. Which of the following actions would MOST likely cix this problem?

Assume the battery is failing and replace it.

HDMI cables are able to carry both video and audio signals; however, most video cards send only a video signal. Which of the following techniques can be used to send an audio signal through the video card?

Audio pass-through Using a graphics card with an onboard audio processor

A customer with an Android phone calls for advice. He often gets additional charges on his monthly bill for excessive data usage. The customer would like suggestions for how to prevent this from happening. What should you recommend? (Choose two.)

Avoid applications that stream data. Set a hard data limit.

As you arrive on-site to fix an issue, you are met by a frantic employee who immediately details how critical the issue is and how important it is to fix it as quickly as possible. Having seen this same issue many times, you say to the customer, "Stop worrying. I know what I'm doing." Which of the following professionalism principles is the technician failing to follow?

Avoid dismissing customer problems

You are an IT technician for your company. A coworker calls your department and asks for help fixing his malfunctioning internal Blu-ray drive, which he installed himself. When you arrive, you unplug and then open the employee's computer. As you begin to examine his computer, the employee begins to describe the steps he has taken to install and troubleshoot the issue on his own. You examine all of the connectors and discover that the employee forgot to connect the Blu-ray drive's power cable. Your initial thought is, "How stupid can this guy be?" but you restrain from making any comments. At that moment, another coworker calls your cell phone. The ringing of the phone distracts your thoughts, and while the owner of the computer is still explaining the troubleshooting steps already completed, you quickly connect the power to the device and close the computer. A quick test determines that the device is now working. Which of the following professionalism principles is the technician failing to follow?

Avoiding being judgmental Actively listening

A mobile device has poor performance and is slow to respond to screen inputs. After troubleshooting, a technician decides to perform a factory reset. Which of the following actions should a technician take before doing so?

Back up all data to an attached computer or a cloud backup service.

You work as the IT administrator for a small startup company. Lily's computer has two internal hard drives and runs Windows 10. She is concerned that she may accidently delete a file or that her primary hard disk may fail at some future time. She has come to you for suggestions about how to protect her files. Due to the size and revenue of this startup company, resources are somewhat limited. Which of the following would BEST protect Lily's files?

Back up her files using File History.

You have a computer with a removable disk drive formatted with NTFS. You want the drive to use FAT32 so it is compatible with more operating systems. The drive is currently configured using drive letter D:. Which of the following MUST you complete to accomplish this task?

Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

You have a computer with a removable disk drive that has been formatted with NTFS. You want the drive to use FAT32 to be compatible with more operating systems. The drive is currently configured using drive letter D:. Which of the following actions MUST you complete to make the desired changes?

Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

You are filling out a change order form. Toward its end, you explain how you will return affected hardware and software to its original state if the change fails. What is this plan called?

Backout plan

An enterprise network has several locations spread across multiple countries. The company reviews its dis- aster prevention policies and determines that it might be advisable to update its backup policies, specific- ally backup storage locations. The company compares options for local versus cloud-based backup solutions. What are two advantages of cloud-based backups?

Backup files are readily available from nearly any location. The storage solution can scale rapidly in response to changing requirements.

You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which of the following is the BEST method for achieving your goals?

BitLocker

A user stores sensitive data on a USB flash drive. Which of the following can be used to encrypt the data on this drive?

Bitlocker To Go

Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NTFS permissions to the WeeklyReport.xls file. Bob is also a member of the Everyone group, which has been given the Full Control permission to the WeeklyReport.xls file. Which of the following statements MOST correctly describes Bob's ability to access the WeeklyReport.xls file?

Bob can open, read, and write changes to the file.

A customer wants to be able to run both Windows 7 and Mac OS X on his Mac computer. Which tool should he use?

Boot Camp

You are attempting to start a Windows 7 computer and receive the following error message: File: 1Boot\BCD Status: 0xcO000034 Info: The Windows Boot Configuration Data file is missing required information What should you do?

Boot from the Windows 7 installation disc, click Repair your computer, and click Startup Re- pair.

Your antivirus program identifies an infected file on a computer running Windows 8.1 but cannot remove it because it is in use. You need to remove the infected file. What should you do?

Boot into Safe Mode and run the viruS Scan again.

Your anti-malware software has detected a virus on your Windows 10 system. However, the anti-malware software is unable to remove it. When you try to delete the files, you can't because they are in use. Which of the following actions would be BEST to try first?

Boot into Safe Mode and try removing the malware

A customer brings a computer in for repair. He updated a computer running Windows 8.1. After the up- date, he restarted the computer. The computer hangs immediately after login. You need to repair the com- puter as quickly as possible. What should you do first?

Boot into Safe Mode.

You suspect that a computer running Microsoft Windows 7 is experiencing intermittent memory errors. You want to run a memory diagnostic to verify. What should you do first?

Boot into Windows RE.

One day, while trying to start your Windows 10 computer, the system displays the following error: Windows could not start. Could not read from the selected boot disk. Check boot path and disk hardware. Which of the following will most likely fix the problem?

Boot into the recovery environment and run the bootrec /rebuildbcd command.

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?

Boot the computer from the Windows installation disc and run Startup Repair.

Rodney, a user in the research department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot. Now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent Rodney from using the TV until you can install an updated driver. What should you do?

Boot the system into Safe Mode. Disable the TV tuner driver in Device Manager.

You are preparing a computer with UEFI firmware for a customer. The customer wants to be able to take advantage of UEFI features on the computer. The computer currently has one hard disk configured as a ba sic disk. You boot the computer in UEFI mode and start up from a Windows 8.1 installation DVD. You receive an er- ror message that Windows cannot be installed on the disk. What should you do? Select the steps necessary to install Windows. Place your selections in the order in which they should be performed.

Boot to DVD in UEFI mode. Select a Custom installation. Delete the existing partitions. Let Windows Setup partition the drive. Finish the installation.

You have decided to install a new Ethernet network adapter in your Windows 10 desktop computer. After installing the card and booting to Windows, you notice that you have no network connection. After looking in Device Manager, you see that the new network card was detected, but Windows doesn't know what it is. After doing a quick search on the internet, you find what looks like the correct driver and install it. A reboot of Windows is performed, but almost immediately after logging on, your computer crashes. Thinking this must be a fluke, you reboot again with the same result. Which of the following is the BEST tool to get Windows to load properly?

Boot to Safe Mode and uninstall the network driver.

A user reports that her Windows 7 computer reports an invalid disk error when she tries to start it. You need to correct the problem and keep data loss to a minimum. What should you try first?

Boot to the Recovery Environment (RE) and run Bootrec.exe.

A virus on a computer running Microsoft Windows 7 has altered the master boot record (MBR) and the computer will no longer boot. Before you can remove the virus, you must fix the MBR so the computer will boot. What utilities should you use to repair the MBR? (Choose two.)

Bootrec.exe Startup Repair

Your company provides testing services that help customers identify and resolve performance issues with their software and e-commerce sites before they go live. To perform accurate testing, a large number of computers are required, sometimes numbering in the hundreds. Recently, you have noticed that the lights in the testing lab seem dimmer than normal and sometimes flicker. Which of the following electrical terms BEST describes the condition you are most likely experiencing?

Brownout

You have a friend who is offering to sell the monitor and video card from his gaming system along with several PC games. The games have fast-moving graphics, and you want to be able to play them on your own home system. The monitor he is selling is an LCD TN with a 144-Hz refresh rate. The video card he is selling supports a max refresh rate of 144 Hz. You're sure you want to buy the games, but you have a couple of other choices when it comes to the monitor and the video card. The monitor in your current system has a 60 Hz refresh rate. The video card has a max refresh rate of 75 Hz. This configuration has always worked fine for watching videos. You're also looking at new 60-Hz LCD IPS monitors and several high-end video cards with max refresh rates of up to 240 Hz. Which of the following will MOST likely allow you to play the games on your home system with the best gaming experience possible?

Buy your friend's games, monitor, and video card. Swap out both your video card and monitor.

Document that describes who has had access to a hard disk used in evidence and where and how the disk has been stored

Cahin of custody

You replaced the print cartridge on an inkjet printer. What should you do next?

Calibrate the printer.

A technician installs a new touch screen on a laptop. Directly touching on an on-screen button doesn't depress or activate the button, but touching near the button does. Which of the following actions will correct the misalignment?

Calibrate the touchscreen.

While troubleshooting a problem with a printer, the customer tells you that he has already tried the step that you are about to try. What should you do?

Calmly tell the customer that you need to go through each step, even if the customer has already been through that step.

You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type of document is this?

Chain of custody

A customer is receiving responses to emails that he did not send out, but the responses are coming back to his email account. What should you have the customer do first?

Change his email password.

A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device: They use an 802.11n wireless network. The wireless network is broadcasting the SID Linksys. The wireless network uses WPA2 with AES security. Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security?

Change the SSID to something other than the default.

You have installed a new Wireless router in your company. Which steps should you take first to configure it?

Change the SsID name and password. Change the default administrator lD and password.

A company's network is configured as a wireless LAN (WLAN) with two 802.11n access points (APs), AP1 and AP2, as shown in the exhibit, operating on the 2.4 GHz band. The APs are configured for WPA2-Personal and both have the same pre-shared key (PSK). Users near the center of the office experience intermittent connectivity and slow data transfers. All user devices show strong signals. What should the company do to repair the intermittent connectivity and slow data transfer problems?

Change the channel on one or both APs.

A technician is installing a new SOHO wireless router. Which of the following is the FIRST thing the technician should do to secure the router?

Change the router's default password

You have purchased an LED monitor and connected it to the DVI-I port on your computer using a DVI-D cable. You configure the screen resolution to 1440 x 900 with 32-bit color. The display on the screen seems to be pixilated. Which of the following solutions is MOST likely to fix this problem?

Change the screen resolution to the native resolution of the monitor.

You are installing a new wireless router in a small office. You need to mitigate the risk that an attacker will change the security settings of the router. What should you do?

Change the username and password to non-default values.

You've just finished installing a wireless access point for a client. Which action best protects the access point from unauthorized tampering with its configuration settings?

Changing the default administrative password

You want to make sure that you always have the latest patches installed on your workstation for an order entry application created by DataComLink corporation. What should you do?

Check the DataComLink Website regularly for patches and updates to the software. Configure the application to automatically download and install updates as they are released.

One of your customers is still using an old dot matrix printer. While printing, the customer noticed that the text was light or faint. A new print head was installed, but the documents are still faint. Which of the following should you do to troubleshoot the MOST likely cause?

Check the gap between the printer head and the paper.

Joe has been issued a company-owned tablet. He finds that the performance decreases after a few hours of use. After he power-cycles the tablet, performance returns, but the tablet begins to slow again after an hour of use. Which of the following is the BEST action to troubleshoot the problem?

Check the number apps that are running

A technician is tasked with configuring a user's personal tablet to connect to the corporate network. Which of the following should be performed before configuring access?

Check the tablet for unauthorized root access.

You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections, and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted. Which of the following BEST describes the next step you should perform?

Check the vendor's website for an updated driver.

A technician receives an "Insufficient disk space" error when attempting to install an application on a com- puter that runs Windows 10. What should the technician have done before starting the installation?

Checked the application's system requirements.

A technician needs to verify that the hard disk on a Windows 7 Computer does not have any bad sectors. What tool should the technician use?

Chkdsk

A Company does research and analySIS for other organizations. Ihe company has a main office in Los Angeles and several small offices around the country. Some employees work primarily from the road rather than from an office. The company needs to ensure that data files are protected as they are created. The data should be readily accessible to the Los Angeles office. The company wants to back up and restore files as quickly as possible. What type of backup should the company use?

Cloud file backup

You have just installed a new video card in Mark's computer. When you power on the computer, Windows automatically detects the new device and tries to locate an applicable device driver. Unfortunately, Windows cannot locate the required driver. Which of the following would be the BEST administrative tool to fix Mark's computer?

Computer Management

Your netvwork is configured as an Active Directory Domain Services (AD DS) domain. You download and install the Remote Desktop (RD) client for Android. You enable Remote Desktop connec tions on a computer named Client10 that runs Windows 10. The solution should support always connecting to Client10 only and not support connections to other computers. What else do you need to do to support connections between the Android RD client and Client10?

Configure Client10 with a static IP address.

Following your Windows installation, you enabled the built-in Administrator account. You remove the password for this account. You enable Remote Desktop on your computer using the default settings. From home, you try to access your computer using Remote Desktop using the Administrator account, but you are unable to log on. Which of the following MUST be completed before you can access your computer using Remote Desktop?

Configure a password for the Administrator account.

Nate, an employee in your organization, has started to work from home two days a week. Nate uses the same company laptop while working in the office and working at home. Nate's laptop automatically connects to the wireless network in the office, but does not automatically connect to his home wireless network. Nate would like the laptop to connect automatically at home and at work. Which of the following would BEST allows this to happen?

Configure an alternate TCP/IP configuration on the laptop's wireless adapter to use a static IP address that is compatible with the home network.

Several users are receiving large amounts of spam through their company email. The company maintains its own mail server. Company technicians need to correct the problem. What should the technicians do?

Configure email filters.

What can be done to prevent excessive data downloads from causing additional fees to be charged by a smartphone provider?

Configure hard data limits on the phone.

A user complains about receiving a large volume of spam and phishing emails and has asked technicians for advice. What should technicians recommend to the user? (Choose two.)

Configure mail client filters. Delete the emails without opening.

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take when implementing this configuration?

Configure the VPN connection to use IPsec Configure the browser to send HTTPS requests through the VPN connection.

Jose, a medical doctor, has a mobile device that contains sensitive patient information. He is concerned about unauthorized access to the data if the device is lost or stolen. Which of the following is the BEST option to prevent this from happening?

Configure the device to remote wipe as soon as it reported lost

Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. Which of the following are the BEST solutions for securing Joe's workstation?

Configure the screen saver to require a password. Configure the screen lock to be applied after short period of nonuse.

To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would BEST prevent this scenario from occurring again?

Configure the software to automatically download the definition file updates as soon as they become available

What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster?

Configure your device to remotely back up important data to the Cloud.

Which of the following methods can be used to connect a printer to a network?

Connect your printer to an external print server device that is connected to the network. Plug an Ethernet cable into the network port in the printer.

You work for a company that offers their services through the internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial of service attack. As a first responder, which of the following is the next BEST step to perform?

Contain the issue.

DRM is Cconcerned with what?

Controlling what a purchaser can and cannot do with hardware and media.

Your computer has a single hard disk with a single volume used by the C:\ drive. You have previously upgraded the disk to a dynamic disk. The disk has run out of disk space. You need to add more space to the C:\ volume. You add a new hard disk to the computer. Which of the following is the BEST step to complete while adding space to the C:\ drive?

Create a mount point using space on the second disk.

A company's web site crashes due to extremely high levels of incoming traffic. The traffic is coming from multiple sources around the Internet. What type of attack is occurring?

DDoS

Restrictions placed on a mobile app so that it can be used on a specific provider's phones only

DRM

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords. Which default GPO contains a policy you can enable to guard all computers in the domain against this security breach?

Default Domain Policy

A company is decommissioning several computers. It needs to ensure that the data on the hard disks cannot be recovered. The company is not planning to reuse the hard disks. What method should the company use? (Choose two.)

Degaussing Shredding

The D:\ drive in your computer has been formatted with NTFS. The Rachel user account has been assigned the following permissions: Allow Full Control to the D:\Reports folder. Deny Full Control to the D:\Sales folder. Deny Full Control to the D:\Reports\2010reports.doc file. Allow Full Control to the D:\Sales\2010sales.doc file. Which of the following BEST describes the effective permissions Rachel will have for both files?

Deny Full Control to D:\Reports\2010reports.doc; Allow Full Control to D:\Sales\2010sales.doc.

Your computer has a single NTFS partition used for the C: drive with the following folders: C:\Confidential C:\PublicReports In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc The C:\PublicReports folder allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions. You then take the following actions: Move Reports.doc from C:\Confidential to C:\PublicReports. Copy Costs.doc from C:\Confidential to C:\PublicReports. Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder?

Deny Read to Reports.doc; Allow Full Control to Costs.doc.

Users have been experiencing periodic system lockups that generate the same error message. After checking Microsoft's website, you find that a hotfix is available to address the issue. What should you do next?

Deploy the hotfix on a test computer.

Nathan, a long-time Mac user, has been using his Mac computer for some time now with no issues. Recently, however, he reported that his cursor turns into a pinwheel and he can't do anything. Which of the following would be the BEST first step for troubleshooting this issue?

Determine if the problem is caused by software or hardware.

A technician is troubleshooting a company cell phone that is overheating. Which of the following is the FIRST action the technician should perform?

Determine whether the battery is warped or swollen.

As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is installed on most of the machines in your department. You have a copy of the latest driver on a USB flash drive. Which Windows utility will allow you to manually update this new driver?

Device Manager

Which system utility would you use to troubleshoot hardware devices, examine and control the resources used by specific devices, and install updated device drivers?

Device Manager

A network monitor detects a series of random words sent as password attempts to a server.

Dictionary

Which of the following measures will make your wireless network less visible to the casual attacker?

Disable SSID broadcast

A computer running WindowS 10 showS symptoms of a malware infection. The technician quarantines the Computer. What two actions should the technician take before scanning and removing the infection? (Choose two.)

Disable System Restore.

A customer often makes long drives through urban and rural areas for work. He noticed that his phone in- termittently prompts for a password to connect to a hot spot. What can he do to prevent this?

Disable Wi-Fi.

One of the Windows workstations you manage has three user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likely increase the security of this system?

Disable autorun on the system

Employees in a small business have a habit of transferring files between computers using a USB flash drive and often bring in files from outside the company. Recently, a computer was infected with malware from a USB flash drive even though the employee did not access any files. Which of the following options would prevent this issue in the future?

Disable autorun.

A customer complains that his mobile phone tends to overheat. The customer has tried stopping all applic- ations that are not being used, but the problem continues. What should you suggest?

Disable background functions.

A user needs advice on extending battery life on an Android smartphone. What two things should the user do? (Choose two.)

Disable haptic feedback. Use WIFI instead of cellular connections when possible.

A user is concerned about unauthorized location tracking of an Android smartphone. What can the user do to minimize this risk?

Disable the GPD radio

A home office user employs a technician to secure a Windows computer. To secure the local accounts, which of the following actions should the technician perform?

Disable the Guest Account. Rename the Administrator account.

One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has been disabled on the system. Which of the following actions is MOST likely to increase the security of this system?

Disable the Guest account.

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations would you MOST likely make to this organization to increase their security?

Disable the switch ports connected to the network jacks in the reception area.

Which of the following disk maintenance utilities optimizes the performance of your hard drive by joining parts of files that are in different locations on your hard drive into a single location?

Disk Defragmenter

Which tool would you use to create and delete partitions on hard drives?

Disk Management

You have physically installed a new hard disk drive in your computer and configured the disk in the BIOS using the CMOS setup program. You try to access the hard disk drive in Windows Explorer, but the drive is not displayed. Which of the following utilities will you MOST likely use to solve the problem?

Disk Management

While configuring a computer, you find that you need to create, format, and manage the partitions and volumes on your hard drives. Which of the following is the BEST command line utility to use?

DiskPart

You have a computer running Windows 10 Home. You need to access the contents of a flash drive. The flash drive has been formatted with the exFAT file system. You want to read the flash drive on your computer as quickly as possible with the least amount of effort. What should you do?

Do nothing. Windows 10 can natively access exFAT file systems.

A company plans to use change management to manage updating server and client operating systems. What should you include in the last step in the change management process?

Document changes

A technician was able to stop a security attack on a user's computer. When conducting a forensic investigation, which of the following actions should be performed FIRST?

Document what's on the screen

Logical group of network objects stored in the same Active Directory database

Domain

You have just connected a new USB device to your Windows system. You used the installation disc that came with the device to install the drivers needed to support the device. Since the installation, the system frequently crashes when you try to access the new device. Which of the following steps would MOST likely resolve this issue?

Download and install the latest driver from the manufacturer's website.

You've just installed a new video card in a user's Windows workstation. When the system is powered on, the screen is displayed in 16 colors at 640x480 resolution. Which of the following will BEST resolve this problem?

Download and install the latest driver from the video card manufacturer's website.

A customer who uses a Windows computer recently purchased an inkjet printer from your store. She is now calling to complain that the colors in the photos she printed on her new printer don't match the colors in the original photos created by the photo shop. Which of the following actions will MOST likely resolve the issue?

Download and install the latest printer drivers. Use the Color Management tab of the printer driver to calibrate the driver's color settings.

After using your computer for a few months, you have decided it is best to install anti-malware software. After the software has been installed, you want to ensure that there are no existing files on your system that are infected. Which of the following is the BEST next step?

Download the latest definition files. Run a full scan.

You have just installed a new device in your Windows system. After installation, you can't use the device. You check Device Manager and find an icon for the device with a yellow exclamation mark over it. What should you do?

Download the latest driver from the manufacturer's website.

To improve the safety of your location and to comply with regulations regarding work environments with hazardous materials, you have been assigned to assemble Material Safety Data Sheets (MSDS) for all chemicals used in your shop. How should you obtain these documents?

Download them from the chemical manufacturer's websites.

You have a computer running Windows 7. Antivirus software is installed on the computer. The system is running extremely slow. You suspect that your computer has been infected with a virus. What should you do first?

Download up-to-date virus definitions.

A technician upgrades the hard drive on a computer in the accounting department and decides to donate the old drive to a local trade school. Which of the following is the BEST method to ensure that the accounting data can't be recovered?

Drive wipe

Which of the following are examples of social engineering?

Dumpster diving Shoulder surfing

You are a trainer for your company and often teach courses in a classroom located on-campus or in a hotel conference room. In your office, which is separate from the classroom, you have two external monitors connected to your laptop, and you are able to display different content on each monitor. However, when teaching, you only have your laptop and a projection unit. To make teaching easier, you want the same content to show on both the laptop monitor and the projection screen. Which of the following multiple display options would be BEST to select when teaching?

Duplicate these displays.

You want to install Windows on a mirrored disk array. You run the motherboard disk configuration utility and create the RAID 1 array, then configure the system to boot from the Windows installation disc. The Windows installation starts, but does not detect the RAID array. Which of the following will MOST likely allow the RAID array to be detected?

During the installation, browse to and select the appropriate driver for your RAID controller when prompted.

You work for a store that sells and repairs computers. Due to the room's layout, while repairing computers, you must walk from one side of the carpeted room to the other frequently. Which of the following would BEST protect you from static electricity buildup?

ESD wrist strap

Where can you find information about how software can and cannot be used, as well as limits to the manufacturer's liability?

EUAL

Agreement between an indivIdual purchaser and software manufacturer that describes how the software can and cannot be used

EULA

You have just set up a new laser printer for the company president on her Windows workstation. You have installed the printer and the drivers. What should you do next?

Edit the printer properties to configure device-specific settings.

You've just set up a color laser printer on a customer's Windows workstation. You've connected it to the workstation using a USB cable and have loaded the appropriate drivers. Which of the following are the BEST steps to take next?

Edit the printer properties to configure paper tray and other device-specific settings. Verify that it is working correctly by printing a test page.

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Full Control to the D:\Sales folder. The Rachel user account is a member of the Sales group. Which of the following will BEST prevent Rachel from accessing the D:\Sales\2010sales.doc file (1 without affecting her ability to access any other files in that folder and (2 without affecting the abilities of any other users?

Edit the properties for the file; assign Rachel the Deny Full Control permission.

Employees complain to the company IT division that they are spending considerable time and effort discarding unwanted junk email. Which of the following should be implemented?

Email filtering

A technician is installing a new SOHO wireless router in a home office. The customer wants to secure the wireless network so only a smartphone, tablet, and laptop can connect. Which of the following router settings should the technician change?

Enable MAC filtering

A user telecommutes three days a week using a laptop computer that runs Windows 7 and uses the same computer at work. The user's home Internet Service Provider requires the computer to be configured with a static IP address, subnet mask, and DNS server setting The company network assigns addresses using DHCP. You need to configure the user's computer so that the user can access the Internet when at home and the corporate network when at the office. The effort required by the user to support the solution should be kept to a minimum. What should you do?

Enable automatic configuration. Add the 1SP-defined settings to the Alternate Configuration tab.

A technician is installing a SOHO router at an after-school community center. The customer would like to keep children from accessing inappropriate while browsing the web. Which of the following actions would help accomplish this goal?

Enable content filtering

A user of a computer running OS X wants the Safari broWser on all of his devices to remember his usernames, passwords, and credit card numbers. What should he do?

Enable iCloud Keychain.

You configure a computer running Windows 10 to share a printer. Users report that they are unable to access the printer when the computer is not in use. The computer is configured to use the Power Saver power management plan. You need to ensure that users can always print to the printer. Your solution should use the least amount of power possible. What should you do?

Enable the Allow this device to wake the computer option on the network adapter's configura- tion properties.

You use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do?

Enable the Erase Data option. Disable the Simple Passcode option.

Hibernate saves the state of your computer to the hard disk and completely powers off your computer. When the devices resumes, the saved state is restored to RAM, and you can pick up where you left off. Sleep, suspend, and standby are all different terms that have been used for various versions of Windows. Regardless of which option is available for your version of Windows, when selected, these do not turn off your computer. Instead, they put the computer and all peripherals on a low power consumption mode. Since your battery is not very good and can only power your computer for a short time, these options run the risk of the computer losing power, resulting in the closure of your programs and files. Shut down will close all files and programs, and all power is terminated.

Enough free hard drive space

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What should you do?

Establish a Remote Desktop connection and update the driver.

A user visits a website daily to check email. The user receives a message that the site's certificate is not from a trusted source and is given option to exit or continue to the site. The user has not previously seen this message. The user users Internet Explorer as a web browser. What should the user do?

Exit the web site.

A user asks you to perform a task that you do not know how to do and is not in the scope of your job duties. What is the BEST way to respond to this situation?

Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task.

Your network is configured as an Active Directory Domain Services (AD DS) domain. You need to ensure that domain user Alice does not have read access to the folder named Graphics. The Graphics folder is shared to the network from the server named FSO. The disk partition on which Graphics is located is formatted as NTFS. Your solution should not impact other users. What should you do?

Explicitly deny read access to the folder to Alice through local access security.

Which of the following techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites?

Exploiting DHCP servers to deliver the IP address of poisoned DNS servers Changing the hosts file of a user's computer

You have added two new hard disks to a Windows computer. The disks are configured as basic disks. Which of the following could be configured on these disks?

Extended partitions with logical drives Primary partitions

A company recently updated its BYOD policy. The original policy required users to use a PIN for mobile device authentication. The policy has been changed to require multifactor authentication. What additional authentication method would qualify?

Face scan

Your U.S.-based company has recently purchased an old office building where employees are being assigned to work. As you are setting up the employees' desktop computers, you come to one location where the nearest wall outlet has only two prongs. All of the metal-enclosed desktop computers have three-prong cords. Which of the following is the BEST way to proceed with that particular desktop computer?

Find a different outlet that uses three prongs.

What is the most common type of biometric security?

Fingerprint scanner

Which of the following security measures is a form of biometrics?

Fingerprint scanner

A user can't make an RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection?

Firewall

Which of the following is the BEST device to deploy to protect your private network from a public, untrusted network?

Firewall

When you print from your laser printer, the paper contains faint images from previous printouts. Which of the following components is MOST likely the cause?

Fluorescent lamp Rubber scraper

A customer wants to converta disk partition that is currently formatted as NTFS to FAT32. What command should the customer run?

Format

You have just purchased a used laptop, and you want to configure it to hibernate when you press the power button. You edit the Power Options settings and enable hibernation, then you configure the power button to trigger hibernation. Everything works fine for several weeks. However, one day when you press the power button, the laptop does not hibernate. Which of the following will BEST resolve this issue?

Free up disk space.

If a folder exists on an NTFS partition, which permission does a user need to set security permissions on the folder?

Full Control

You are helping a customer design a backup schedule for servers running Windows Server 2008 and Win- dows Server 2012 R2. You configure the backups with the Faster backup performance option. What types of backups will run under this option?

Full and incremental backups

A mobile device user is comparing methods for securing the device. Which of the following methods for securing a mobile device can affect the device's performance?

Full device encryption

You are installing Windows 10 on a drive that was previously used for Windows 8.1. This drive has one primary partition. While installing Windows, you want to ensure that the old files are deleted and any bad sectors are located and marked as bad. To achieve your desired goal, which of the following is the BEST option to run?

Full format

After removing the printed paper from your laser printer, the toner smudges and can be wiped off in places. Which of the following is the MOST likely problem?

Fuser rollers

You need to create a custom image for a Microsoft Windows deployment. Which steps should you perform on the reference computer on which you are building the image? (Choose four.)

Generalize the reference computer. Install and customize Windows 7.

A PC technician knows he will be late to an appointment with a customer. Which of the following actions should the technician take?

Give a realistic timeframe for your arrival. Contact the customer and apologize.

You help support an Active Directory Domain Services (AD DS) domain. All domain clients run Microsoft Windows 8.1 or Windows 10. The network administrator has updated Group Policy settings that impact network clients. You need to en- sure that these are applied to the clients. You want to avoid restarting the client computers. What should you run?

Gpupdate

A network with several geographic locations is configured as an Active Directory Domain Services (AD DS) domain. All domain clients run Windows 7, Windows 8.1, or Windows 10. You need to distribute an application to all domain clients. You want to accomplish this as quickly as pos- sible and with minimal user interaction. What should you use?

Group Policy

A user calls to report a problem. She is trying to install an application on her new Windows 10 system, but cannot. Her user account is a member of the Users group on the system. What do you suspect is causing the installation issue?

Her group membership does not allow her to install new software.

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis?

Hotfix

Which of the following protocols establish a secure connection and encrypt data for a VPN?

IPSec L2TP PPTP

Which of the following protocols provides authentication and encryption services for VPN traffic?

IPsec

Two employees are unable to access any websites on the internet, but can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. Which of the following actions would BEST resolve this issue?

Identify the proxy server name and port number in Internet Options.

Why is it important to have your mobile device charger plugged in while it is receiving an operating system update?

If the battery dies during the update, the operating system could become corrupted.

If a printer is not Wi-Fi capable, how can it be set up to provide the most reliable wireless printing?

If the printer is Ethernet capable, it can be connected to the network through a wireless router.

You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update. Which of the following BEST describes what would happen to your iPad if you disconnect it before the operating system update is complete?

If you disconnect during the update, the operating system could become corrupted.

You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She accidentally left a report open next to her computer. It states that a friend of yours in accounting will be submitted for review if their poor work performance continues. Which of the following is the BEST action to take?

Ignore the paper and tell no one of its contents.

You are an IT administrator for a large company that is doing very well in their business endeavors. As a result, the company is hiring new employees on a regular basis. In addition to your normal workload, you have been asked to install and configure the new employees' computers with a Windows operating system and the applications your company uses to do their business. To make this process easier, you only give new employees the choice of one of two laptops. Which of the installation types would make the BEST use of your time installing and configuring these laptops?

Image deployment

A small company hires a technician to review their wireless security. The technician discovers that the wireless signal is available outside of the building. Which of the following could the technician recommend to correct this problem?

Implement a directional antennae. Decrease radio power levels

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?

Implement a virtual firewall within the hypervisor.

A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following: They use an 802.11a wireless network. The wireless network SSID is set to BWLAN. The wireless network is not broadcasting the network SSID. The wireless network uses WPA2 with AES security. Omnidirectional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security?

Implement directional access points.

Which of the following paths opens the Computer Management tool in Windows 10?

In the Control Panel, open System and Security > Administrative Tools and then double-click the Computer Management icon. Right-click the Windows icon and select Computer Management.

You want to configure Power Plans on your Windows 10 laptop computer. Which of the following can do this?

In the Notification Area, double-click the battery icon. Click Power Options. Go to Settings > System > Power & sleep.

You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. Which of the following steps would BEST meet your requirements?

Include the D:\Reports folder in the library.

A company replaces several older laptops with new laptops. The old laptops ran Windows 7 and the new laptops run Windows 10. Many of the old laptops ran a legacy data analysis application that was originally written for Windovws XP. The company needs to run this data analysis application on the new laptops. What is the potential problem?

Incompatibility with Windows 10

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet using the default subnet mask. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 Which of the following is the MOST likely cause of the problem?

Incorrect default gateway

Your monitor is displaying images in strange colors. Which of the following is MOST likely the solution to this problem?

Increase the color depth.

What are the steps required for repairing a Windows 7 installation while still retaining your files and settings? Select the steps you should take to repair a Windows 7 installation. Place your selections in the order in which you should take them. You may not need to use all of the steps.

Insert the installation disc for the ex- isting OS. Run Setup. Click Install Now. Click Upgrade.

A Company sets up a closet as a server room. The company uses servers in separate enclosures rather than rack mounted servers. The company is concerned about dust building up inside the servers and needs to identify an effective solu- tion. What should the company do?

Install HEPA filters on the enclosures.

You need to install Windows 10 on a new computer system that uses a SATA SSD device to store data. Which of the following is the BEST method for installing Windows 10 on this system?

Install Windows the same way you would a system that uses a standard hard disk drive.

You have installed a new computer with a quad-core 64-bit processor, 6 GB of memory, and a PCIe video card with 512 MB of memory. After installing the operating system, you see less than 4 GB of memory showing as available in Windows. Which of the following actions would MOST likely rectify this issue?

Install a 64-bit version of the operating system.

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority. Which of the following is the BEST course of action in this situation?

Install a WorkGroup to allow each device to control what is shared and with whom.

You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Which of the following would MOST likely increase the security of this system?

Install a privacy filter on the monitor. Secure the computer system to the desk with a cable lock.

A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older network laser printer that is shared by everyone in her department. When she picked up the output, only the top half of each page was printed, and the bottom half was blank. Which of the following will MOST likely rectify this issue?

Install additional memory in the printer.

You have recently had an issue where a user's Windows computer was infected with a virus. After removing the virus from the computer, which of the following is the NEXT step you should take?

Install all OS updates.

Several of a company's user computers have recently been infected by malware. You have been able to de- termine that the cause is unauthorized software downloaded and installed from the Internet. What should you recommend? (Choose two.)

Install antivirus software. Provide user education.

A customer would like you to install a high-end video card suitable for gaming. Your installation and configuration SHOULD include which of the following?

Install new the video drivers from CD and then install updated drivers from the internet. Ensure that the video card is compatible with the expansion slot. Configure the PC to use the integrated graphics if available and needed.

Your supervisor recently purchased 100 desktop computer systems and 100 new Windows 10 licenses for your organization's accounting department. She received a single Windows 10 installation disc with the licenses. Which of the following would be the BEST installation methods to use?

Install one system and image it to the other systems. Use a network installation.

You have a computer with a dual-core 64-bit processor that uses the x86-x64 instruction set. You want to install the 32-bit application on the computer. Which of the following BEST describes the action you should perform?

Install the application normally.

You have an existing computer running Windows 10 Enterprise. You want to configure a RAID 5 array in the computer. You install three new SATA drives and then use the RAID controller integrated into the motherboard to define a RAID 5 array using them. When you boot the computer, Windows does not show the logical RAID drive you just created. What should you do?

Install the drivers for the motherboard RAID controller.

You are a PC technician for a company. An employee needs you to install some software on his computer over his lunch break. When you log on to the computer, you notice the employee's desktop has so many shortcuts and files that you can hardly see the desktop background. Which of the following actions should you take?

Install the software and leave the employee's computer exactly how you found it.

You are the network administrator for a small company. You purchase eight copies of Windows 10 at a local retail outlet. You successfully install Windows on eight computers in the office. A month later, you start receiving calls from those who have used those copies of Windows saying that they are no longer able to log on to their computers. Which of the following will BEST resolve this issue?

Instruct the employees to activate their Windows installation.

Don is an accountant in the Finance department. For the last several months, he has been testing an online accounting program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. Don downloads the application and tries to install it, but the operating system will not allow him to. Out of frustration, he calls the help desk. The help desk sends a technician to Don's machine while Don is out to lunch. The technician installs the application without issue. Which of the following is the most likely reason Don could not install the application?

Insufficient permissions

A company is looking for ways to improve efficiencies in a newly deployed cloud-based datacenter. The cloud-based solution replaced an on-premises datacenter which has since been deprecated. Who has primary responsibility for identifying the specific changes to be made?

Internal IT personnel

While researching a fix to a system file issue, you find that using the ATTRIB command should resolve the issue you are experiencing. The instructions you found said to run the following command: attrib +s +r -a myfile.dll Which of the following BEST describes the function of this command?

It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute for myfile.dll.

You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. Which of the following BEST describes what happened to the file?

It has been moved to a folder on your computer.

Which of the following best describes spyware?

It monitors the actions you take on your machine and sends the information back to its originating source

Why are plasma displays smaller than 32 inches not typically sold?

It would be too cost prohibitive to manufacture plasma screens under 32 inches.

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus?

Keep the operating system up to date. Lock the screen with some form of authentication.

An employee working from home accesses the company network using a VPN connection. When connecting, the employee is prompted for a PIN that changes at predetermined intervals. Which of the following will the employee MOST likely use to obtain the PIN?

Key fob

You need to protect computers, peripherals and related devices in the main office from over- and under-voltage conditions.

Line conditioner

Which of the following is the MOST likely symptom of a dirty drum or roller in a laser printer?

Lines or splotches repeated at regular intervals on the print job.

When you arrive ata customer's location for a service call, what should you do as the customer describes the problem?

Listen closely, make eye contact, and ask clarifying questions.

You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store. Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor

Which of the following will improve the security of sensitive information on your device if it is lost or stolen?

Locator applications A screen lock Remote wipe

A user discovers that his iPhone is either lost or stolen. He had previously enabled Find my iPhone on the device. He logs onto iCloud from his Windows laptop. Which action should he take first?

Lock the phone

Of the following choices, which action could be most physically harmful to you?

Looking into the end of a fiber optic cable.

You are in the process of preparing a storage device and must determine which file system to use. Which of the following BEST describes the advantage of using the exFAT file system rather than NTFS?

Lower memory and processor resource use

You want to restrict the devices able to connect to a wireless access point based on a unique value that is encoded in each device.

MAC Address filtering

You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms. Which of the following features lets you allow or reject client connections by hardware address?

MAC address filtering

A technician wants to allow only specific wireless clients to access a WLAN. What should the technician implement?

Mac Filtering

which operating systems are currently only available in 64-bit versions?

Mac OS x and Windows server 2016

You want to upgrade your Windows 7 system to Windows 10. You want to keep your personal settings intact and complete the upgrade as quickly as possible. You purchase an upgrade version of Windows and perform an in-place upgrade. Which of the following is the BEST next step?

Make sure that all installed applications run correctly.

Maisy reports that her machine is behaving erratically. She suspects something is wrong because a firewall alert keeps indicating that some programs are trying to access the internet. In addition, several files have disappeared or have been renamed. Which of the following is the MOST likely cause of Maisy's computer problems?

Malware infection

Which printer permission would you assign to a user so that she can pause the printer?

Manage this printer

You have installed a new router in your company, which is shown in the exhibit. Which tab will most likely provide an option to upgrade the firmware?

Management

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following BEST describes the type of attack that just occurred?

Masquerading

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?

Mesh

You have implemented an ad hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?

Mesh

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network.

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device.

To prevent ESD when replacing internal computer components, you attach an anti-static wrist strap to your wrist. Where should the other end be fastened?

Metal area on the computer case Anti-static mat

You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least five days before changing it again. Which of the following policies are BEST to configure?

Minimum password age Enforce password history

You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which of the following policies are BEST to configure?

Minimum password length Account lockout threshold

You have an executive user who keeps sensitive information about the company on a company-owned mobile device. You want to be prepared to keep company information secure if he loses this device or if it gets stolen. Which of the following solutions should you use?

Mobile device management software that performs remote wipes.

Mary and Pablo share a customer support workstation. Mary works in the morning, and Pablo works in the evening. One day Mary is helping a customer with a support issue. Because her shift is over, she creates a Word document with details about the customer she is helping. She saves it to the C:\Customer folder on the computer. When Pablo comes in, he is unable to open the file. Which of the following will MOST likely allow Pablo to open the file?

Modify the permissions on the document.

You are troubleshooting a computer running Windows 8.1. Yu want to force the computer to boot into Safe Mode when it restarts. What should you use?

Msconfig

Which utility allows you to choose Selective Startup in Windows?

Msconfig (System Configuration)

Which tool can you use to view (but not modify) hardware and configuration information for your computer?

Msinfo32

You are just starting to troubleshoot the computer. The customer provided vague symptoms. You want to start with a summary view of the hardware and software environment

Msinfo32

After entering a user id and password, an online banking user must enter a PIN that was sent as a text message to the user's mobile phone. Which of the following digital security methods is being used?

Multifactor authentication

Which of the following networking devices or services is LEAST likely to be compatible with VPN connections?

NAT

What is required to control access to the file system using file and folder permissions on a Windows-based computer?

NTFS-formatted partition

Which of the following are common tools used to physically clean the inside of a computer?

Natural bristle brush Compressed air

What is the least secure place to locate an omnidirectional access point when creating a wireless network?

Near a window

Which of the following locations will contribute the greatest amount of interference for a wireless access point?

Near backup generators Near cordless phones

A technician needs to troubleshoot the network connection on a Windows 7 computer. What utility in Con- trol Panel should the technician use first?

Network and Sharing Center

Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office managers in her building must read. She would like to make locating these files simple and maintain them as little as possible. It is important that no other users are permitted to view these documents. As the IT technician for your company, Jane has asked you to make this possible. Which of the following would MOST likely fulfill Jane's needs?

Network share

A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small middle eastern nation. The user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States. The user responded and was instructed to wire $5,000 to the sender to facilitate the transfer. She complied, but has not heard from the sender since. Which of the following BEST describes the type of attack which as occurred in this scenario?

Nigerian 419 scam

To protect a Windows 10 system, you've configured System Restore to automatically protect your system using restore points. Will this adequately protect the user data on the system?

No, you need to enable File History.

You need to back up user data on a Windows 10 system. The computer has a single SSD storage device installed that contains both the Windows operating system (in C:\Windows) and user profile data (in C:\Users). You plan to do the following: Use Backup and Restore to backup user data. Run the backup automatically every night at 11:00 p.m. Store the backups in the C:\Backups folder. Include a system image in each backup. Will this configuration work?

No. Backups created with Backup and Restore can't be stored on the drive that contains the information being backed up.

To protect user data on a Windows 10 system, you've configured System Restore to automatically create restore points for the C: volume. Given that your user profile data is stored in the default directory (C:\Users), will this strategy adequately protect your users' data?

No. You need to create a backup of your user data as well. No. You need to enable File History.

Which of the following components requires special disposal procedures to comply with environmental guidelines?

Notebook battery

You have been called in to a customer's site to troubleshoot and fix one of their computers. From the description you received on the phone (prior to coming to their office), you have already given the customer an idea of which component may need to be replaced and how much it would cost to repair. You have been given permission to fix that component at the cost you quoted. When you open the computer and begin troubleshooting, you notice that what you suspected was broken was, instead, working perfectly. The real issue is soon discovered. After checking with your suppliers, you find that the replacement component is less than the component you had intended to fix. Which of the following is the BEST course of action?

Obtain authorization before repairing the broken component.

Device manufacturers are constantly finding bugs, vulnerabilities, or better ways for their devices to communicate with the operating system. Because of this, which of the following is the BEST practice to do before installing a new device?

Obtain the latest driver from the manufacturer's website.

You have a computer with a single hard disk configured as a basic disk with a single partition formatted with NTFS. The computer runs Windows 10. The disk has run out of space. You need to add space to the disk. You install a new hard drive and start Disk Management. Which of the following is a required task to add space to the existing volume?

On the new hard disk, create a new partition without a drive letter.

You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file?

On the system volume

You have a workstation running Windows 10, 64-bit edition. A local printer connected to a USB port is shared so that other users can print to that printer. Users running 32-bit versions of Windows report that they can't install the driver for the shared printer. Users running a 64-bit version of Windows do not have any problems. Which of the following actions will MOST likely fix this problem?

On your computer, add the x86 drivers. Manually install the correct driver on each computer that is having a problem.

When should a company use WEP to secure a wireless network?

Only when required by legacy equipment

License agreement under which you can modify and redistribute software source Code

Open Source

You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. Which of the following is the BEST solution to your problem?

Open the firewall port for the Remote Desktop protocol.

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

You are an IT administrator for your company. You have been tasked with the assignment of installing 300 copies of Windows 10. You need to finish this task as quickly and efficiently as possible. Which of the following boot methods would be the BEST method for installing Windows under these circumstances?

PXE

Which of the following is a firewall function?

Packet filtering

You want to set restrictions on when specific devices are allowed to access the internet through an access point

Parental Internet Control

A customer complains that his mobile phone's touch screen is completely unresponsive. The customer has tried removing and then replacing the battery, but after he turned the phone back on, the screen was still unresponsive. What should you recommend the customer try next?

Perform a hard reset.

A customer is concerned that personal data has been leaked from his mobile phone. He suspects that this has been going on for some time. You run a malware scan on the customer's phone, but the scan does not find anything that it identifies as malware. The customer wants to stop the data leak as quickly as possible. What should you do?

Perform a hard reset.

You are an IT technician for your company. Jodie, a receptionist, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Jodie's computer, perhaps a malfunctioning application. To help troubleshoot Jodie's computer, you run Task Manager. Which of the following tabs would be the MOST helpful for getting an overall view of how Jodie's computer is running? (Select TWO).

Performance Processes

System performance is severely degraded during disk-intensive operations. You want to collect and view statistics about disk activity.

Performance Monitor

You suspect that a computer does not have enough memory to support the applications that the user typ- ically has running. You need to check memory usage over time. What should you use?

Performance Monitor

You manage two folders in your computer as follows: C:\Confidential D:\PublicReports The C:\ drive is formatted with NTFS, and the D:\ drive is formatted with FAT32. In the C:\Confidential folder, you edit the properties for the following two files and assign the Deny Read permission to the Users group: Reports.doc Costs.doc You then take the following actions: Move Reports.doc from C:\Confidential to D:\PublicReports. Copy Costs.doc from C:\Confidential to D:\PublicReports. Which of the following BEST describes what happens to the permissions for both files as they are created in the D:\PublicReports folder?

Permissions are removed from both files.

A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small African nation. The user was offered a 25 percent share of this account if she would help the sender transfer it to a bank in the United States. The user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used the information to drain her bank account. What type of attack occurred?

Phishing

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL. Which of the following security threats does this describe?

Phishing

Several users have forwarded you an email stating that your company's health insurance provider has just launched a new website for all employees. To access the site, they are told to click a link in the email and provide their personal information. Upon investigation, you discover that your company's health insurance provider did not send this email. Which of the following BEST describes the type of attack that just occurred?

Phishing

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

Phishing

A technician is installing a network-enabled smart home control system in a SOHO. To access the system from the internet, which of the following configurations is MOST likely required on the SOHO router?

Port forwarding

A Android smartphone's screen responds inaccurately to touch. What should be tried first to correct the problem?

Power off and back on.

Management is concerned about the time required to recover from a recent malware infection that spread through the network. Management identifies a team that will be specifically responsible for responding as quickly as possible. What is the first step in optimizing the response and recovery process in advance of a malware infection?

Prepare response policies and procedures.

You've just opened a text file in the vi editor, and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode. Which of the following key-press sequences will get you into Replace Mode?

Press the S key and then press Insert Press the 'i' key and then press Insert Press Insert and then press Insert again

A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database. Which of the following security practices was violated?

Principle of least privilege

Which printer management components would you use to view the port a printer uses?

Print server properties Printer properties

Which of the following virtual printing options allows you to convert a Word document into a .jpg file?

Print to Image

Which printer management component would you use to view the drivers used by a printer?

Printer properties

During an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information. Which of the following would make it difficult for other passengers to view this information on the laptop display?

Privacy filter

A company often has unaccompanied visitors in its offices. The company needs to prevent the potential risk of visitors seeing sensitive information on employee's computer screens. The company wants to min- imize the impact on the ability of employees to do their jobs. What should the company use?

Privacy screens

Which documents are generally finished and approved before a project begins?

Project plan Resource allocation documentation Budget

You are helping set up an office for a small business. Most of the equipment being used, computers and multifunction printers, is refurbished. The owner is safety conscious and wants to avoid the risk of electric shock in case of equipment failure. What is most important thing to provide?

Properly grounded circuit

You have a workstation running a 64-bit version of Windows 8.1 Professional that you would like to upgrade to Windows 10 Professional. You want to perform the upgrade with the lowest cost and least effort. Which of the following would be the BEST way to install Windows 10?

Purchase a 64-bit upgrade version of Windows 10 and perform an in-place upgrade.

A customer has noticed that his phone's battery often discharges very quickly during the day. This seems to happen most often when he travels extensively on mass transit and other public transportation. Trips often take him out of his service area. From the standpoint of time, most trips are relatively short. He is looking for ways to have the phone stay charged while traveling What should you suggest the customer do while traveling?

Put the phone in airplane mode.

You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the next BEST step that should be taken?

Quarantine Vivian's computer.

A networked computer running WindoWs 8.1 starts showing unusual symptoms. You determine that the computer is infected with a virus. The network is configured asa routed wide area network (WAN). The infected computer is in a branch office What should you do next?

Quarantine the computer.

While running a full system scan using your anti-malware software, three files have been identified as possible problems. You want to keep the files intact so you can review them later, but you also need to ensure they can't harm anything else on your computer. Which of the following is the BEST next step?

Quarantine the files.

You suspect that a user's computer has been infected by malware you have not seen before. What should you do first?

Quarantine the user's computer.

You support a small trade school. The school has a computer lab that is used for practicing various proced- ures. The next class will practice installing an operating system on blank disk drives. You need to create a batch file that will prepare the disk drives for students to run a full Windows operating system installation. The batch file needs to prepare the computers as quickly as possible. What should you have the batch file do?

Quick Formate

A company acquires additional office space and wants to deploy a wireless LAN (WLAN) to serve the new space. The company decides to use WPA2-Enterprise. What should the company use for authentication?

RADIUS

You are writing a Windows batch script file. You need to insert the following as a comment: Testing new executable What is the correct syntax for adding this comment? (Choose two.)

REM Testing new executable :: Testing new executable

You are helping a company design its BYOD policy. The company is concerned about sensitive information being exposed if a personal mobile device is lost or stolen. You want to be able to protect the device as soon as the loss is discovered. What should be included in BYOD policy to help prevent this?

Remote wipe

You have purchased a used computer from a computer liquidator. When you boot the computer, you find that there has been a password set on the BIOS. You need to clear the password so that you can edit the CMOS settings. What should you do?

Remove the motherboard battery for a few seconds.

Micka, a tech-savvy employee, tried to upgrade her computer from Windows 7 to Windows 10 from the internet. Something went wrong during the upgrade, and Micka's computer will no longer boot to Windows. She has brought her computer to the IT department for you to repair. You have tried to repair the computer, but you are unable to get it to boot to Windows. Which of the following methods would be the QUICKEST way to get Micka's computer back to its original Windows 7 operating system?

Restore her system using the recovery partition.

A user installs a new graphics application on her Windows system. During the installation process, the application prompts the user to load a custom video driver that has been optimized for the application. She does so and then completes the installation. Several days later, the user reports that her display doesn't seem to be working properly under some conditions. To fix the problem, you need to reload the old video driver. Which of the following actions are the BEST choices?

Revert the system to a restore point prior to installing the video driver. Use Device Manager to roll back the video driver.

Some software on Rachel's computer is telling her that her computer is at risk and that she needs to purchase an upgrade for the software before the risk can be removed. Confused, Rachel calls you (the IT specialist) for advice. After meeting with Rachel, you discover that the pop-up warnings only began after she installed a plug-in for her internet browser. Which of the following is the MOST likely cause of these warning messages?

Rogue antivirus

It takes a long time for your computer running Windows 7 to start up. You want to minimize the number of applications that automatically load at startup. You need some applications to load, but you want to pre vent others from loading. What should you do?

Run MSConfig and select the Startup tab.

A user complains that a computer is crashing intermittently with Stop errors. The computer runs Windows 10. After the error, the computer is able to successfully restart. The user does not remember making any recent changes to the computer. A technician uses the Windows Action Center to troubleshoot the problem but does not receive any useful information. The technician needs to correct the problem as quickly as possible. What should the technician try next?

Run a Sytem restore

A technician suspects that an app on a tablet device may be surreptitiously using the camera without permission. Which of the following would be the BEST way to troubleshoot this issue?

Run an anti-malware scan.

A Customer brings a computer in for repair. The customer complains about problems trying to print. The customer also brings in an external hard disk with two backups, one made two weeks ago and the other made immediately before the computer was brought in for repair. You remove a virus from the computer. You determine that the printer driver has been overwritten. You suspect that other device drivers have been overwritten as well. You want to fix the system as quickly as possible and with minimum data loss. What should you run?

SFC

An Internet-facing router deployed in a remote office runs the Linux operating system. You need to open a secure command prompt to the router from your main office. What should you use?

SSH

What is name of the utility that is (1 similar to Telnet and (2 used to establish a secure remote server management session?

SSH

You need to boot a Windows 10 system into Safe Mode. Which steps will accomplish this task?

Select Start > Settings > Update & Security > Recovery > Advanced startup > Restart Now. Run the msconfig.exe utility and specify the boot mode.

Marcus was attempting to tweak the way his Windows 10 workstation boots when he inadvertently corrupted his system boot files. It will now no longer boot to a logon prompt. He boots the system from the Windows installation disc and accesses the Recovery Environment. What should he do next?

Select Troubleshoot > Advanced Options > Startup Repair

A computer running Microsoft Windows 8.1 cannot access network or Internet resources. You see that the listing for the network adapter in Device Manager has an icon with an arrow that is pointing down. You need to solve the user's problem with the network adapter. What should you do?

Select the device and choose Enable from the Action menu.

Anna, a home office user, employs a technician to check the security on a computer that was hacked. The technician discovers that the user's password is the name of Anna's dog and hasn't been changed in over a year. Which of the following security best practices should the technician recommend?

Set a password expiration period. Require a strong password.

You are the PC technician for a company. You received the following email from an employee: My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think that the email program has ever worked well. When you arrive at the employee's desk, you observe how the employee accomplishes normal email tasks. You quickly determine that the problem is not with the email program, but that the employee needs to learn how to use the program. You have several high-priority tasks that need to be completed by the end of the day. What is the BEST way for you to respond?

Set an appointment to train the employee on how to complete common email tasks.

A small business hires an after-hours cleaning service that is known to have a high turnover of employees. They want to prevent unauthorized access to their computers, but do not want to spend money on new hardware. Which of the following is the BEST solution?

Set login time restrictions

You are setting up a PC as a floor demonstration model. The computer runs Windows 10. You want to pre- vent anyone from being able to boot the computer unless they have a password. What should you do?

Set the UEFI user password.

You have purchased an LED monitor and connected it to the HDMI port on your computer using an HDMI cable. You configure the screen resolution to 1280 x 1024 with 32-bit color. The geometry of the images displayed on the screen appear to be distorted. What should you do to correct the problem?

Set the display resolution to the native resolution of the monitor.

You recently upgraded a client's older workstation from Windows 7 to Windows 10. The client has called to complain that the interface is very slow. For example, after clicking on the Start button, the Start Menu slowly appears on the screen. Which of the following will MOST likely fix this problem without requiring a hardware upgrade?

Set the visual effects for best performance.

One employee tries to discover another employee's password by watching when it is typed in.

Shoulder surfing

You want to set up a Windows system to also be able to boot to Linux. To be able to dual boot, the system needs a partition on which to install Linux. However, you don't have an extra hard disk that can be used for the Linux partition. The existing disk has no unpartitioned space available, but it has about 300 GB of free space. Which of the following disk management operations will BEST prepare your hard disk for dual boot?

Shrink the primary partition.

Travis, a long-haul truck driver, reports that when driving on remote highways, his smartphone battery drains faster than normal, and his phone calls often cut out. Which of the following is the MOST likely reason for the fast battery drain?

Signal drop or weak signal

Which ACPI power state allows a system to start where it left off, but all other components are turned off?

Sleeping

Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?

Spamming

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet. Which of the following BEST describes the type of attack which as occurred in this scenario?

Spoofing

Technicians discover that an unauthorized device is using another computer's IP address to access the network.

Spoofing

After receiving several complaints from the employees in your company, you start to troubleshoot a laser printer. After a short while, you have concluded that the most probable cause is a dirty drum. Which of the following is the MOST logical reasons for this conclusion?

Spots at regular intervals on the page

You discover a program running in the background on several network client computers. The computers run Windows 8.1 or Windows 10. You determine that the program is collecting address and computer name information from your network and sending it to an address on the Internet. This is an example of what kind of threat?

Spyware

Which of the following topologies connects each network device to a central hub?

Star

A security incident is currently occurring on the company network. You discover that the attack involves a computer system that is attached to the network. You're unsure what kind of damage is being done to the network systems or data. Which of the following actions should you take FIRST?

Stop the attack and contain the damage by disconnecting the system from the network.

On a Windows 10 workstation, you want to use the Storage Spaces feature to create a logical drive. Which of the following components are used to configure Storage Spaces?

Storage devices, which are physical drives such as SATA drives or external drives. Storage spaces, which are logically defined units created from a pool of storage. Pools of storage, which are logically created from free space on storage devices.

A company provides company-supplied Android smartphones to all customer sales and support personnel for use while traveling. Employees often find themselves in situations where they need to use public char- ging stations. What should they do to prevent data loss or virus infection?

Supply their own power-only charging cable.

A VPN is used primary for what purpose?

Support secured communications over an untrusted network

Which of the following devices help protect equipment from temporary, above-normal voltages?

Surge protector

You need to prevent the risk of computers and peripherals at remote offices from being damaged by power spikes.

Surge suppressor

A user is choosing a method to secure a mobile device. Which of the following types of screen locks is LEAST secure?

Swipe lock

What device is used to create a physical star topology?

Switch

A computer running Windows 7 reports several services not loading during startup. You need to determine if a service is causing a cascading failure. You want to do this using the most efficient method. What should you use?

Sytem Log

You have been asked to enter an alternate IP configuration for a Windows 8 laptop that will be taken toa remote office. Where can you find the alternate configuration tab?

TCP/IPv4 Properties in the network interface card

A company wants to use BitLocker to encrypt a laptop computer's drive as added protection if the com- puter is lost or stolen. The computer runs Windows 7. The company wants to encrypt operating system files and implement the feature to verify early boot components and boot configuration data. What are the requirements to implement BitLocker in this scenario? Select the requirements for imple- menting BitLocker and arrange them in any order.

TPM version 1.2 or later Two NTFS partitions

As you troubleshoot a problem during a customer appointment, you discover the problem is directly related to the customer's actions. Which of the following is the BEST way to address the situation?

Tactfully explain the problem without accusing or judging the customer.

A mantrap is most effective against which security threat?

Tailgating

An intruder waits near an organization's secured entrance until an employee approaches the entrance and unlocks it with a security badge. The intruder falls in line behind the employee, who assumes the intruder is another employee and holds the door open for her. Which of the following BEST describes the type of attack that just occurred?

Tailgating

An unauthorized person gains access to a secured area by following an authorized person through a door controlled by a badge reader. Which of the following security threats does this sentence describe?

Tailgating

What is a social engineering method through which a user can gain entry to areas protected by locked doors?

Tailgating

A technician is troubleshooting performance issues on a computer running Windows 8.1. The technician needs to configure the computer so that only a select set of applications launch when the computer re- starts. What should the technician use?

Task Manager

After you start the computer, a process IS using most of the available resources. You need to stop the process to free up resources for troubleshooting.

Task Manager

You manage a Windows system. You want to view information about your computer, including the CPU utilization and information about disk I/O operations. Which tools could you use to do this?

Task Manager Performance Monitor

Which Windows tool lets you perform automatic backups at regular times (such as on specific days at specific times)?

Task Scheduler

You are a security consultant. An organization has hired you to review their security measures. The organization is chiefly concerned that it could become the victim of a social engineering attack. Which of the following actions would you MOST likely recommend to mitigate the risk?

Teach users how to recognize and respond to social engineering attacks.

An employee calls you to demand more RAM for her computer to complete her work tasks. However, you know that her department doesn't have a budget for new equipment. Your supervisor is the only one that has authority to allocate department funds. Which of the following is the BEST way to respond?

Tell the employee that her department doesn't currently have a budget for equipment upgrades, but that you will let your supervisor know about the request so it can be properly determined if new RAM can be acquired.

You are an IT technician for your company and would like to be able to: Establish a remote server management session. Send unencrypted (clear text) transmissions to the remote server. Manage specialized industrial and scientific devices. Which of the following utilities would be the BEST to use to accomplish these tasks?

Telnet

As used by Internet service providers (ISPs), an acceptable use policy (AUP) is published as what type of document?

Term of service

Using the Windows OS, Joe transfers a file in his Documents folder to a folder that has been configured to give Ann full control of all files. Instead of copying the files, Joe uses a move operation. Ann can read the file, but can't save any changes to the file. Which of the following is MOST likely the reason that Ann can't update the file?

The Modify and Write permissions for Ann were set to Deny when the file was in Joe's Documents folder.

A user needs to copy a file from an NTFS partition to a FAT32 partition. The file has NTFS permissions and the Read-only (R) and Encryption attributes. When the file is copied, which of the following is true?

The R attribute is retained on the file.

Which of the following is true about primary partitions?

The active partition must be a primary partition.

Sound isn't coming from the internal speaker on a tablet device, even after a user checks its volume settings and makes sure it not muted. Which of the following is MOST likely reason?

The audio output is being directed to a Bluetooth speaker

A user on your network has been moved to another office down the hall. After the move, she calls you to complain that she has only occasional network access through her wireless connection. Which of the following is MOST likely the cause of the problem?

The client system has moved too far away from the access point.

A network intrusion detection system (IDS) sends an alert about a sudden increase in outgoing traffic to the Internet. Technicians identify a small number of computers streaming large volumes of traffic to remote IP address. This appears to have started at the same time on all of the computers. What is the most likely problem?

The computers are infected with malware.

You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed automatically without prompting you to overwrite existing files. Which copy command switch should you use?

The copy /y command will not prompt you before each overwrite operation.

Your system volume is running out of disk space. You need to extend the system volume to give it more space. Which of the following conditions MUST be met to extend the system volume?

The disk must have contiguous free space on the same disk. The system volume must formatted with NTFS.

You have just added a brand new hard disk to your Windows-based computer. When you power on the computer, the disk is not shown in File Explorer. To troubleshoot this issue, you open the Windows Disk Management console and see that the disk is present, but is shown as Unknown. Which of the following disk management steps is MOST likely required first?

The disk needs to be initialized.

A company is decommissioning two file servers. The company is planning to reuse the hard disks. The com- pany wants to degauss the disks to remove any sensitive data from the disks. The disks will be taken toa recycling company to perform the degaussing. What is the potential risk of doing this?

The drives would be unusable after degaussing

A Ccustomer's desktop computer is configured with a Balanced power plan. The customer is using Control Panel settings to configure custom power options. The customer calls for advice because the hibernate op tion is not available. What is most likely wrong? (Choose two.)

The feature is turned off through ystem BIOS. The hybrid sleep option Is turned on.

Your iPad is configured to do remote backups everyday to iCloud. Which conditions are required for the iCloud backup to take place?

The iPad has to be plugged into a power source. The iPad screen has to be locked. The iPad has to have an internet connection.

Your iPad is configured to do remote backups everyday to iCloud. Which conditions are required for the iCloud backup to take place?

The iPad screen has to be locked. The iPad has to be plugged into a power source. The iPad has to have an internet connection.

A customer wants to add an additional video card to her computer so she can play the latest computer games. As a result, this system will now have a multi-GPU configuration. Which of the following statements are true?

The motherboard should support either SLI or CrossFire. For the best performance, both video cards should be identical.

A user calls her organization's help desk to request help connecting to a network server. The Help Desk technician visits her desk to resolve the issue. Once there, the technician uses the user's telephone to call his girlfriend. Even though the technician solves the problem, the call lasts the entire time the technician is at the user's desk. Which of the following mistakes did the technician make?

The technician should not have used the user's telephone for a personal call.

A technician is decommissioning a file server and plans to reuse the hard disk drives. The technician wants to make it as difficult as possible to recover any of the information currently on the hard disks. The techni cian does not have access to additional hardware to accomplish this task. What should the technician do?

The technician should run a disk wipe.

A Help Desk technician receives a call from a user who is unable to download new messages from the company's email server. The technician tells the user to open a command prompt, ping the email server, and check the SMTP and POP3 server IP addresses. Which of the following mistakes did the technician make?

The technician used jargon that the user probably didn't understand.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. Which of the following is the MOST likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor.

You have used a template as the source for a new sales proposal. So as to not overwrite the template, you have saved the file using the Save as feature. Knowing that Mark has been your best editor in the past, you decide to send him this new proposal to review and edit. However, when Mark receives the file, he promptly sends you an email stating that the file cannot be opened. You resend the file again, but Mark still cannot open the file. Which of the following is the MOST likely reason the file will not open on Mark's computer?

The wrong file extension was used when saving the file.

Which of the following is a characteristic of extended partitions?

They are subdivided into logical drives.

A user purchases an external hard disk drive for a computer running OS X. The user needs to set up a system to back up all files on his Mac, including the operating system, user accounts, and user files. What should he use?

Tiem Machine

Which of the following statements are true regarding administrative shares?

To connect to an administrative share, you must use the UNC path. By default, Windows automatically creates an administrative share for every volume.

What is the purpose of an MSDS?

To document how to safely handle and dispose of hazardous materials.

Why should you use an ESD strap when you are removing and replacing components in a computer?

To prevent an electrical discharge from damaging sensitive components

Why should backup media be stored offsite?

To prevent the same disaster from affecting both the system and its associated backup media.

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations are you MOST likely to make to this organization to increase their security?

Train the receptionist to keep her iPad in a locked drawer when not in use. Disable the network jacks in the reception area.

You have just installed anti-malware software on all computers on your company's network. Which of the following additional actions would be BEST to take to help protect systems from malicious software?

Train users to scan removable storage devices before copying files. Configure the software to automatically update its definition files.

Anna, a user, downloaded a free PDF editing application from the internet. Now the laptop constantly displays desktop pop-ups, and several applications won't start. Anna was the victim of which of the following?

Trojan

What is a program that appears to be a legitimate application, utility, game, or screensaver, but performs malicious activities surreptitiously?

Trojan

Which are examples of a strong password? A strong password is one that: Is at least 6 characters long (longer is better) Is not based on a word found in a dictionary Contains both upper-case and lower-case characters Contains numbers Does not contain words that can be associated with you personally Is changed frequently

TuxP3nguinsRn0v3l il0ve2EatIceCr3am

You manage two computers with the following user accounts: Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set; the Admin account does. Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not. You are working from Wrk2 and would like to access a shared folder on Wrk1. Which of the following credentials would BEST allow you to access the shared folder?

Type 'Admin' for the username and specify the password.

A business is converting an enclosed office into a secure server area and wiring closet. The business has had additional environmental controls installed for heat and humidity. The business wants to provide pro- tection against over- and under-voltage conditions. What should the business implement?

UPS

You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 10 PC to the device. How can you connect the device to the PC? (Select TWO. Each option is a complete solution.)

USB cable Wi-Fi wireless connection

For which type of device will you typically install the driver before you connect the device to your system?

USB devices

After Joe, a user, installs a new game app on his mobile phone, downloads and webpage loads become slower than usual. Which of the following actions would BEST address this issue?

Uninstall the new app and scan for malware.

Maria, a smartphone user, has recently installed a new app. She now experiences a weak signal and sometimes a complete signal loss at locations where she had a good cell signal in the past. Her phone battery is fully charged. Which of the following actions would BEST address this issue?

Uninstall the new app and scan for malware.

Joe, a user, is walking through a shopping mall. His phone frequently displays a message that additional information is needed to log in. Which of the following is the MOST likely cause of these messages?

Unintended Wi-Fi connections

Mission-critical servers are physically deployed in a climate-controlled server room. A technician needs to provide power protection for the servers against: *Overvoltage conditions *Under-voltage conditions *AC power loss What type of device should the technician use?

Uninterruptable power supply

You are preparing to install additional RAM in a desktop computer that has been properly shut down. What should you do first?

Unplug the computer.

What category do apps fall into if they have not been reviewed, approved, and signed with a certificate?

Untrusted

A technician verifies that a user's computer is infected with malware. Which action should a service technician take before scanning and removing a malware infection?

Update the computer's antimalware software.

As the IT technician for your company, you have discovered that the anti-malware software being used is not detecting and removing a virus. Which of the following would MOST likely correct this issue?

Updating your malware definitions.

You have an extra disk on your system that has three primary partitions and an extended partition with two logical drives. You want to convert the partitions to simple volumes, preferably without losing any data. Which of the following is the BEST step to perform?

Upgrade the disk to a dynamic disk.

Your motherboard has two memory slots and supports a maximum of 8 GB of RAM. You are using a 32-bit version of Windows. After installing two 4 GB modules and booting your system, you find that Windows only recognizes 3.5 GB of RAM. Which of the following would MOST likely fix this issue?

Upgrade to a 64-bit version of Windows.

You are preparing to install a 64-bit version of Windows 10 on a computer that is currently running a 32-bit version of Windows 7. You perform a hardware inventory on the computer and note the following: Processor = 2.0 GHz Free hard drive space = 200 GB RAM = 1 GB DVD drive = 18x 100 Mbps NIC You need to prepare this computer to ensure that it meets the minimum hardware requirements of Windows 10. What should you do?

Upgrade to at least 2 GB of RAM.

A user cannot locate an Android smartphone. He wants to play a sound at full volume to find it. What should the user do?

Use Find My Device

You have an application that renders videos used in your online business. You want to make sure that the application continues to receive adequate attention from the system CPU, even if you open other applications. How can you adjust the amount of attention given to that application?

Use Task Manager to modify the process priority.

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem?

Use Task Manager to monitor memory utilization. Use Resource Monitor to monitor memory utilization.

You need to connect a monitor that provides an HDMI port and a VGA port to a video adapter in a PC system that uses a DVI-D connector. Which of the following options would provide the BEST display quality at the lowest cost?

Use an adapter to connect the monitor HDMI port to the DVI-D connector on the PC.

While changing the toner cartridge in your laser printer, you accidently spill toner in and around the printer. Which of the following is the BEST method for cleaning up the spilled toner?

Use an anti-static micro-filtering vacuum.

You're conducting scheduled maintenance on a laser printer. You notice that there is a build-up of excess toner inside the interior of the printer. Which of the following is the BEST way to remove the excess toner?

Use an anti-static vacuum.

You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?

Use cable locks to chain the laptops to the desks.

You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. To properly protect the accidental discovery of the company's sensitive information, which of the following steps MUST be completed prior to getting rid of the computers?

Use data wiping software to clear the hard drives

You want to combine storage space from two different hard disks into a single logical storage unit on your Windows computer. Which of the following is the BEST step to perform?

Use dynamic disks and a spanned volume.

You want to scan the integrity of all protected system files on your Windows 10 system, but not repair them. Which command should you use?

Use sfc /verifyonly to scan the integrity of all protected system files, but not repair them.

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which of the following is the FASTEST way to transfer a good file to the computer?

Use the C$ administrative share to copy the file.

How can you keep a Windows 10 system from automatically restarting after a critical system error occurs?

Use the Disable automatic restart after failure option on the Advanced Startup Options menu.

You have just installed a wireless access point (WAP) for your organization's network. You know that the radio signals used by the WAP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. Which of the following steps will BEST protect the wireless network?

Use the WAP's configuration utility to reduce the radio signal strength. Configure the WAP to filter out unauthorized MAC addresses.

You recently purchased a copy of Windows 10 from a retail store. The system you want to install Windows on doesn't have an optical drive. What is the BEST option for installing Windows in this scenario?

Use the Windows USB/DVD Download Tool to copy the installation files to a USB flash drive.

You have a hard disk that is formatted with the FAT32 file system. You would like to implement file and folder permissions on the Design folder that apply when files are accessed both locally and remotely. Which of the following BEST describe the next step you need to perform?

Use the convert command to convert from FAT32 to NTFS and then configure NTFS permissions.

Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories?

Use xcopy /e to copy directories and subdirectories, including empty ones.

What is the best countermeasure against social engineering?

User awareness training

You have installed anti-malware software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. Which of the following should you add to your security measures to help prevent this from happening again?

User awareness training

A company has experienced several malware infections over the last several months. The company has in- stalled antivirus/antimalware software on all network computers. They deployed Windows Server Update Services (WsUs) to manage Windows updates. They have deployed a perimeter network between the in- ternal network and Internet and are using Network Address Transaction (NAT) for client access to the Inter net What else should the company use to help prevent malware infection?

User education

Which of the following is the most common form of authentication?

Username and password

You need to create a user account on a Windows system that can create files, run applications, and install printers when the driver for the printer already exists on the computer. You want the user to have only the minimum rights necessary on the computer. Which group should this user be a member of?

Users

Which of the following statements about an SSL VPN are true?

Uses port 443. Encrypts the entire communication session.

A technician was tasked with implementing a solution that would allow the IT department to push OS updates to mobile devices in order to keep them updated and secure. Which of the following would provide that capability?

Using Mobile Device Management (MDM).

Tlechnology tor creating and maintaining a secure encrypted path across a less secure network

VPN

While on a business trip, an employee accesses the company's internal network and transfer files using an encrypted connection. Which of the following digital security methods is being used?

VPN

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement?

VPN concentrator

A customer calls to tell you that he suspects that a computer has been infected bya virus. The customer has requested procedures for malware removal. What should you recommend? Arrange the entries in the order in which they should be performed. Place the first the first step at the top of the list.

Verify the infection. Quarantine the system. Update antimalware software. Scan and remove infection. Schedule ongoing updates. Enable system restore and create a restore point.

You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent the code from spreading further. Based on the email message, which of the following are the next BEST actions to complete?

Verify the information on well-known malicious code threat management web sites Run a full anti-malware scan

You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent the code from spreading further. Based on the email message, which of the following are the next BEST actions to complete?

Verify the information on well-known malicious code threat management web sites. Run a full anti-malware scan.

Which of the following paper types should not be used in inkjet printers?

Very glossy paper

What is the purpose of the dxdiag tool?

View information related to DirectX operation.

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

Virus

You need to write a batch file that can be scheduled for execution or run on an as-needed basis. The batch file needs to back up a computer running Microsoft Windows Server 2012 R2 and then perform prevent disk maintenance. What command should you use to back up the computer?

Wbadmin

Several desktop computers are used on the manufacturing floor of a small company. All of the computers are extremely dusty. You have been tasked with cleaning the computers. You want to minimize the risk of a health hazard to yourself while cleaning the computers. What should you do?

Wear safety glasses and a respirator.

You are talking witha customer who is having problems printing from an application. Which question, when asked courteously, would be the best first step in gathering information from the customer about the problem?

When did it last work?

You are in the process of preparing a storage device and must determine which file system to use. Under which of the following conditions are you MOST likely to you choose exFAT over FAT32 or NTFS?

When storing files larger than 4 GB in size. When formatting removable flash devices.

You need to give users access to your Active Directory Domain Services (AD DS) domain's Remote Desktop (RD) infrastructure through a web browser using RD web client. You configure your network to support RDp web client access and publish the web client to make it available to client computers. What is the minimum Windows client version supported?

Windows 10

You need to protect the user data on a Windows 10 system. Which tools could you use to do this?

Windows 7 (Backup and Restore) File History

A Customer has a computer deployed on a SOHO perimeter network. The computer has been experiencing internet-based attacks. You are looking for potential security holes

Windows Firewall

which tool provides real-time protection from spyware and the ability to scan and remove spyware on a Windows 7 computer?

Windows defender

You work for a large company as the IT administrator. With the many external attacks being perpetrated in the form of security breaches being found in applications, you are concerned that your Windows 10 computers may be vulnerable. You also want to ensure that Windows is using the latest features. Which of the following would BEST protect your computers?

Windows updates

Which of the following forms of networking is highly susceptible to eavesdropping (data interception) and must be secured accordingly?

Wireless

While using a Windows 10 system, you accidentally downloaded and installed a malware package from a phishing email exploit. You were able to reboot the system into Safe Mode and use System Restore to revert the system to a point in time before the malware infection occurred. Given this information, which of the following are true?

You must reinstall any applications that were installed after the restore point was taken. Your user files were not affected when the system was reverted to the restore point.

In which of the following situations would driver rollback be the BEST tool to use?

You recently installed a new video driver, and now the system behaves erratically.

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision?

You risk losing your job. You expose your company to litigation by violating the software license agreement.

A company deploys a small datacenter in an outlying office to support targeted activities. Most of the data involved falls under various security regulations, including United States security restrictions. The company needs to determine whether to use local or cloud backup. What would justify using local backup? (Choose two.)

You want to control specifically where data is stored. You want to minimize latency related to backups.

In which of the following situations should you install a firewall?

You want to restrict internet users from accessing private data on your network.

Which of the following conditions would prevent you from using a GUID Partition Table (GPT) when setting up a disk drive?

You're setting up the drive to boot Windows 10 on a computer that uses traditional BIOS.

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?

Zombie/botnet

A customer is concerned about security on a computer running Windows 8.1.The customer wants to be able to view it quick summary of security settings status and potential security issues on the computer. which of the customer use?

action center

You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use?

attrib +r -h

You have just received a call from one of your customers. He informs you that after turning his computer on, he received the following error: Error loading operating system BOOTMGR is missing Press Ctrl+Alt+Del to restart Every time he restarts his computer, the same error is shown. Which of the following tools is BEST for fixing this issue?

bootrec

You are troubleshooting a Windows 10 system that won't boot. The system appears to initialize just fine and post completes correctly. However, Windows doesn't load, and an error message is displayed on the screen, indicating the operating system couldn't be found. You determine that the Master Boot Record (MBR) is corrupt. To fix the issue, you do the following: Boot the system from the Windows 10 installation DVD. Access the Recovery Environment. Open a Command window. Enter the command you can run at the command prompt to address this issue.

bootrec /fixmbr

Which command would you use to change the current directory to the immediate parent directory?

cd ..

You have used your computer for several months without any issues. Recently, you have noticed that when you perform specific actions or open certain files, your computer crashes, and programs sometimes freeze. You suspect that hard disk issues are the cause. Which of the following tools would BEST verify and fix disk errors?

chkdsk

You are an IT administrator troubleshooting a computer from within the Windows command prompt. You are trying to execute the chdsk command line tool, but it keeps failing. Which of the following command switches would give you the BEST information or help on how to run this command?

chkdsk /?

A technician attempts to run an executable file on a Linux computer and receives a Permission Denied message. Which of the following command should the technician use?

chmod

One of your customers has called you regarding some issues he is having with his graphics while gaming. After troubleshooting the issue over the phone for a time, you feel it would be helpful to get a detailed report of his system to see if the computer meets the minimum system requirements for the game he is playing. Which of the following is the BEST tool to create the desired report?

dxdiag

You have physically installed a new hard disk drive in your computer, configured the disk in the BIOS using the CMOS setup program, and partitioned the disk. You try to access the hard disk drive in Windows Explorer, but get an error message. Which utility will you most likely use to solve the problem?

format

A technician uses the ps command to find information about a process that is running a browser application on a Linux computer. The technician knows the name of the process, but the list is very long. Which of the following commands would help the technician find and display only the information about the browser process?

grep command is used to search text

Which of the following utilities can you use from the command line on a Linux system to see a list of the installed network interfaces along with their current statuses and configurations?

ifconfig

You need to view detailed IP configuration information on Windows workstation. In addition to the IP address, subnet mask, and default gateway configuration, you need to see the network card's MAC address and the addresses of the DHCP and DNS servers the workstation is communicating with. What command would you enter at the command line to see this detailed information?

ipconfig /all

When you see the address of the DNS server, you realize that this information needs to be updated. Earlier in the day, you implemented a new DNS server with a new IP address. The workstation will update this information in 24 hours. What command can you enter at the command line to update the DNS server information right away?

ipconfig /flushdns

You are the computer specialist in a small business. Your company server is named FS1 and has an IP address of 10.0.0.2. The hardware in your company server started to experience intermittent failures, so you transferred the shares on the server to a spare server and took the main server offline. The spare server has an IP address of 10.0.0.3. You edit the existing A record for FS1 on your company's DNS server and redirect the hostname to the spare server's IP address of 10.0.0.3. Afterward, most users are able to access the shares on the spare server by hostname, but several users cannot. Instead, they see an error message indicating that the FS1 server could not be found. Enter the command you can run from the command prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart.

ipconfig /flushdns

You are troubleshooting network connectivity issues on a workstation. Which command would you use to request new IP configuration information from a DHCP server?

ipconfig /renew

Modifications have been requested by in-house developers to a database used to support business opera- tions. This is a mission-critical database for the company. A technician needs to identify the actions that should be taken before generating a change plan. Which two actions should the technician take? (Choose two.)

ldentify the purpose of the changes. Determine the scope of the changes.

You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. The auth.log file is a plain text, file so you decide to use the cat command to review the file. However, the display fills with text for several pages, and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page?

less /var/log/auth.log more /var/log/auth.log

You are one of the IT administrators for your company. Your coworker, Rachel, says that when she boots her computer, it displays a message saying that one of her programs had an error while loading and is not working. To fix this issue, you would like to see if Windows can provide a log file that may give you a hint about what is failing at boot time. Which of the following Microsoft tools/consoles would MOST likely give you the ability to create such a log file?

msconfig

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will MOST likely confirm your suspicions?

net use

What command lets you see a list of valid command parameters for the net use command?

net use /?

Which utility would you use to view current connections and active sessions and ports on a computer?

netstat

A user is having problems connecting to other computers using hostnames. Which of the following commands will BEST help you troubleshoot this problem?

nslookup

Examine the following output: Server: helicuplar.xct.takro.net Address: 209.53.4.130 Name: westsim.com Address: 64.78.193.84 Which command produced this output?

nslookup

A user tells a help desk technician that their browser is displaying a message that a site can't be reached. When asked, the user tells the technician that other users in the same office can browse to the site. The technician suspects that the web server's name is not being translated to the correct IP address. The technician asks the user to open a command prompt window. Which of the following commands would confirm the technician's assumption?

nslookup ping

Examine the following output: Reply from 64.78.193.84: bytes=32 time=86ms TTL=115 Reply from 64.78.193.84: bytes=32 time=43ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Reply from 64.78.193.84: bytes=32 time=44ms TTL=115 Which utility produced this output?

ping

An end user clams they are unable to connect to the internet and has called the company's help desk for a solution. Having been assigned to this issue, you decide to first test whether or not TCP/IP is working correctly on the local computer. Which of the following is the BEST command to use for this test?

ping 127.0.0.1

You are troubleshooting connectivity between your computer and the www.widgets.com server, whose IP address is 192.168.1.1. Which of the following commands tests connectivity to the device as well as name resolution?

ping www.widgets.com

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes?

robocopy

You are the administrator for a Linux server. Following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?

su -

Frank is running a program called FrameMaker on his Windows computer. While trying to import graphics into this program, he sees a spinning wheel for a long time. When Frank clicks on the application, a message is displayed that indicates that the application is not responding. Which of the following Microsoft command line tools would BEST shut down the application?

taskkill

A service running on your Windows system has hung badly and will not respond when you try to use the Services console to restart it. You run the tasklist command at the command prompt and find that the service's process has a PID of 1234 assigned to it and that it has an image name of telecom.exe. Which commands could you run to shut down the service?

taskkill /F /IM telecom.exe taskkill /F /PID 1234

Examine the following output: 4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [205.171.205.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1] Which command produced this output?

tracert

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. To troubleshoot the routers, which of the following TCP/IP utilities would be BEST to use?

tracert

A technician located at a branch office can't communicate with a company server at the home office. Which of the following commands could be used to determine where the communication is blocked?

tracert ping

After installation, you Windows 10 client systems are joined to the WestSim.com domain. You need to verify that these clients are configured to get time from the correct time provider. Which commands can you use to do this?

w32tm /query /source w32tm /query /status

Your Windows client systems are joined to the WestSim.com domain. To ensure correct time stamps are used, you need to verify that these clients are configured for the appropriate time zone. Which command can you use to do this?

w32tm /tz

Doug reports that Internet Explorer was working fine this morning, but now he is getting a fatal error that causes it to shut down. Which question is the most relevant question to ask to start the troubleshooting process?

was any new hardware or sortware installed since this morning?

You're using a Linux distribution that uses RPM for package management. Which command would you use to install httpd, the Apache HTTP Server package, and all its dependencies?

yum install httpd

You're using a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on this system?

yum list available


Ensembles d'études connexes

7.03 Quiz: The Scientific Revolution

View Set

Forearm, Elbow, and Humerus Positioning

View Set

Which bone articulates with what?

View Set