A+ 252 -300

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

D. exFAT

QUESTION 279 A technician installs Windows 7 on a 4TB hard drive. Which of the following should the technician choose when initializing the drive for the machine to access all the disk space? A. GPT B. FAT32 C. MBR D. exFAT

A. Configure remote desktop connection B. Configure BIOS to enable Wake-on-LAN

QUESTION 281 A technician has been tasked with remotely imaging a computer tab. The imaging process is failing because there is no response from the computers over the network. Which of the following should the technician perform to resolve the issue? (Choose two.) A. Configure remote desktop connection B. Configure BIOS to enable Wake-on-LAN C. Configure BIOS to enable SSH D. Configure automatic updates E. Configure startup applications F. Configure BIOS to enable PXE boot

B. Screen lock timeouts

QUESTION 297 A new policy requires all users to log on to their corporate workstations using smart card authentication. Which of the following best practices should be implemented to further secure access to workstations? A. Data encryption B. Screen lock timeouts C. Required screensavers D. Strong passwords

A. spoofing

A user has changed the MAC address of a laptop to gain access to a network. This is an instance of: A. spoofing B. brute force C. man-in-the-middle D. a botnet

E. mkdir

An administrator needs to create a new folder on a Windows PC. Which of the following commands should the administrator use? A. cd B. md C. sc D. ftp E. mkdir

A. Administrator

An employee installed a new application on a shared Windows 10 PC. The next day, it becomes the employee who installed the application is the only one who has access to the application. Which of the following types of user accounts does the employee MOST likely have? A. Administrator B. Guest C. Super user D. Standard user E. Limited user

A. Ransomware

QUESTION 252 Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key. Which of the following is MOST likely the cause? A. Ransomware B. Cryptomining C. Rootkit D. Keylogger

A. keys

QUESTION 253 A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange: A. keys B. passwords C. root CA D. tokens

D. ps and kill

QUESTION 254 A Linux user reports that an application will not open and gives the error. Only one instance of the A root administrator logs on to the device and opens a application may run at one time. terminal. Which of the following pairs of tools will be needed to ensure no other instances of the software are currently running? A. pad and chmod B. sudo and vi C. ls and chown D. ps and kill E. cp and rm

C. Update the SATA controller driver from the manufacturer's website

QUESTION 255 A technician responds to a report that a user's desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue? A. Roll back the OS upgrade. Continue using the older version of Windows B. Reset the PC to its factory conditions. Perform the OS upgrade again C. Update the SATA controller driver from the manufacturer's website D. Perform a full backup and replace the hard drive

A. Communicate the findings to the client and offer replacement options.

QUESTION 256 A client reports a laptop does not power on after a lightning storm. The technician diagnoses the problem as being a faulty motherboard. after replacing the motherboard and booting the laptop, the screen remains black, although the laptop displays an image on an external monitor. Which of the following would be the technician's NEXT step? A. Communicate the findings to the client and offer replacement options. B. Explain how to use the laptop with an external monitor and offer to set it up. C. Contact the sales department and provide a quote for a new motherboard. D. Document the repair process and provide a detailed report to the client.

B. Trojan

QUESTION 257 The general manager installed a popular archive utility. Antivirus software flagged the software because it was also exhibiting malicious behavior. This is an example of which of the following? A. Rootkit B. Trojan C. Spyware D. Worm

B. Multifactor authentication D. Trusted software sources

QUESTION 258 Which of the following provide the MOST security for PCs and mobile devices? (Choose two.) A. Access control lists B. Multifactor authentication C. Organizational unit D. Trusted software sources E. Pre-shared key

C. EFS

QUESTION 259 A folder is displayed in green in the tree of the local hard drive. Which of the following would describe what type of folder this is? A. Compressed B. PII C. EFS D. Hidden

D. Ensure the surge suppressors and devices are unplugged from the power sockets

QUESTION 260 A technician starts hard drive transfers in a SOHO that will take up to 16 hours to complete. Immediately after starting the transfers, the technician gets warning of a hurricane that will occur overnight. Which of the following is the BEST action to complete before leaving the office? A. Turn off the monitors and printers so they do not overheat B. Unplug the computers, but keep the hard drive transfer running C. Call the power company to turn off any power coming to the office D. Ensure the surge suppressors and devices are unplugged from the power sockets

B. gpresult

QUESTION 261 A technician creates a GPO, tests it in a test environment, and deploys it company-wide. After deployment, the accounting department does not seem to be receiving the GPO. The technician suspects another GPO that was specifically deployed to the accounting department is overriding the newly deployed GPO. Which of the following command line tools should the technician use to verify this suspicion in this situation? A. nbtstat B. gpresult C. nslookup D. gpupdate E. tasklist

B. Document the findings D. Identify the problem

QUESTION 262 A customer has just experienced a blue screen and the PC will not boot. A technician is dispatched to the customer's site. Which of the following are the FIRST and LAST steps the technician should take? (Choose two.) A. Test the theory to determine the cause B. Document the findings C. Establish a plan of action to resolve the problem and implement a solution D. Identify the problem E. Verify full system functionality and implement applicable preventive measures F. Establish a theory of probable cause

D. Unauthorized root access

QUESTION 263 A user purchases a new Android smartphone. After downloading an application from a third-party app store, the user consults a technician about additional applications that have installed automatically. Which of the following BEST explains what has happened? A. Unauthorized location tracking B. Unauthorized camera activation C. Unauthorized account access D. Unauthorized root access

B. Cell tower analyzer

QUESTION 264 A user's smartphone is getting a very weak signal from the service provider. One day the user notices the phone has full bars and the signal strength has inexplicably increased. Which of the following tools should be used to verify the user is connecting to a legitimate signal from the phone service provider? A. WiFi analyzer B. Cell tower analyzer C. Spectrum analyzer D. Packet analyzer

A. Terminate the running processes

QUESTION 265 A technician is troubleshooting a PC that has been running slow. The technician looks at the resource utilization and notices the user has many programs open. When attempting to open another program, the technician receives a message indicating there are insufficient resources. Which of the following should the technician do to troubleshoot the issue? A. Terminate the running processes B. Increase the page file size C. Renew the network connection D. Run chkdsk

B. PaaS

QUESTION 266 A company has a web application that is in the cloud on a multi-tenant server. The web application is connected to a database that is also in the cloud. Which of the following cloud computing concepts does this describe? A. IaaS B. PaaS C. SaaS D. DaaS

B. Change the antenna placement D. Change the radio power level

QUESTION 267 A small office owner has asked a technician to ensure all users in the office have the ability to access the wireless network but that the network is not accessible outside the building. Which of the following should the technician recommend? (Choose two.) A. Change the static IP addresses B. Change the antenna placement C. Change the default SSID D. Change the radio power level E. Change the encryption type F. Change the content filtering settings

C. Validate OS security patches in a test environment before pushing them to user machines

QUESTION 268 A technician for an enterprise company is determining the best method to keep the organization's Windows PCs up to date with OS security patches. Which of the following options would be MOST appropriate to deploy? A. Invest in a server solution to deploy virtual hosted desktops for all users B. Enable Windows updates to be installed manually by users C. Validate OS security patches in a test environment before pushing them to user machines D. Outsource OS security patch management to a third-party solution provider

A. Windows 7

QUESTION 269 A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1.7GHz processor. Which of the following Oss should the technician recommend to ensure the BEST performance on this computer? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10

C. sudo

QUESTION 270 A technician is troubleshooting an application install on a Linux PC and cannot install the application. Which of the following would be the BEST tool for the technician to use to install the application? A. pwd B. su C. sudo D. ls E. sfc

B. Enable MAC filtering

QUESTION 271 The network administrator is investigating latency on a WiFi network. The administrator discovers a number of unidentified devices connected and wishes to limit access to only authorized users. Which of the following will BEST meet the requirement? A. Assign static IP addresses B. Enable MAC filtering C. Disable SSID broadcast D. Limit the DHCP scope

B. To reduce the likelihood of identity theft

QUESTION 273 Which of the following is the MAIN reason that corporate policies protect access to PII? A. To protect proprietary company data B. To reduce the likelihood of identity theft C. To maintain the integrity of knowledge management systems D. To limit access to those who "need to know"

C. Reconfigure the default program for the file type

QUESTION 274 A technician performs an in-place upgrade from Windows 7 to 8.1. After the upgrade is complete, a user reports that a frequently used file will not open. Instead, the user is prompted to search the Windows Store for an appropriate program to open the file. Which of the following should the technician do FIRST? A. Install the most recent Windows updates B. Verify the USMT worked properly C. Reconfigure the default program for the file type D. Perform System Restore E. Reinstall the program that is usually used to open the file

D. eventvwr

QUESTION 275 A technician is working on a computer when the PC suddenly experiences a blue screen and restarts before the technician can note the error message. The computer boots up normally, and the technician now wants to know which error message was displayed. Which of the following should the technician use to help troubleshoot the issue? A. sfc B. msconfig C. regedit32 D. eventvwr E. msinfo32

B. Utilize a different antivirus program and scan method

QUESTION 277 A home user reports the PC is running slow, and pop-up advertisements are appearing on screen. The user can access the Internet and performs an antivirus scan. A technician is now troubleshooting the problem and cannot update the antivirus to the latest definitions or navigate to the vendor's support website. Which of the following is the BEST next step to resolve this issue? A. Uninstall the antivirus program and apply operating system patches B. Utilize a different antivirus program and scan method C. Format and reinstall D. Reinstall the antivirus program from a shared executable

A. Key fob B. RFID badge F. Smartphone

QUESTION 278 Which of the following are examples of possession authentication? (Choose three.) A. Key fob B. RFID badge C. Passphrase D. PIN E. Passwords F. Smartphone G. Fingerprint reader

D. pwd

QUESTION 282 A technician is attempting to troubleshoot a Linux home folder issue, but does not remember which directory is current. Which of the following tools should the technician use to find the current directory? A. dir B. sudo C. cd D. pwd

B. PC backup and system image deployment

QUESTION 283 A technician needs to upgrade 20 PCs that have the same hardware specifications. The PCs must be configured with identical settings tailored for the network. Which of the following provides the BEST solution with the LEAST administrative effort? A. PC backup and multiboot setup B. PC backup and system image deployment C. PC backup and OS upgrade D. PC backup and clean install

A. Multiheaded client

QUESTION 284 A client has requested a workspace environment configuration that will allow employees to work in a virtual space for specific projects, but when working on other projects, allow them to work locally. Which of the following is the BEST solution for this virtual configuration? A. Multiheaded client B. Thin client C. Zero client D. Thick client

C. Unattended installation

QUESTION 285 A technician was told that 50 new computers were delivered. The company's standard Windows image needs to be installed on all of them. Which of the following would be the MOST efficient way to get the image on all 50 computers? A. Multiboot installation B. Repair installation C. Unattended installation D. Clean installation

B. Hybrid

QUESTION 286 A company wants to leverage a cloud infrastructure that allows it to keep confidential information away from other companies outside its industry while allowing data to be shared with other companies in the same field. Which of the following is the BEST option to accomplish this task? A. Public B. Hybrid C. Community D. Private

E. grupdate /sync

QUESTION 287 A domain administrator has applied a Group Policy that restricts the installation of USB devices. The technician has asked the domain administrator to exempt this policy for a computer that needs to have a USB digital camera installed. Once the domain administrator has exempted the computer from the policy, which of the following is the BEST command for the technician to run locally on the computer so the digital camera can be installed without waiting? A. grupdate /? B. grupdate /bootings C. grupdate /force D. grupdate /logoff E. grupdate /sync

B. Hard reset the cell phone

QUESTION 288 A user reports that a cell phone application is loading slowly and not functioning properly. Which of the following should a technician do FIRST to remedy this issue? A. Remove and reinstall the application B. Hard reset the cell phone C. Reconnect the wireless network connection D. Close all running applications

B. Run Startup Repair

QUESTION 289 A technician is troubleshooting a computer that has been infected with a virus. Upon rebooting, the computer states that NTLDR is missing. The computer cannot boot into safe mode, and reinstalling the OS is not an option. Which of the following is the BEST option to use to restore the machine to a bootable state? A. Remove the CMOS battery B. Run Startup Repair C. Format the C drive D. Repair the MBR and then reboot

D. Power saving mode

QUESTION 290 A user reports the screen on a mobile device frequently dims even when the device settings are not being changed. Which of the following is MOST likely the cause? A. Faulty backlight B. High contrast mode C. Auto-brightness D. Power saving mode

A. DHCP reservations

QUESTION 291 To implement additional security on a small office wireless network, the administrator disables the DHCP server on the wireless router. To ensure traffic from specific network interfaces is able to traverse the router, which of the following should be used to limit traffic? A. DHCP reservations B. SSID broadcast deactivation C. MAC filtering D. Two-factor authentication

B. Remove the malware and recover the files from a backup

QUESTION 292 A user reports personal files have been renamed and are undecipherable. Images have been to the user's folder that request payment to unlock the files. The technician has quarantined the infected system and disabled System Restore. Which of the following should the technician do to unlock the user's files? A. Perform a clean installation of Windows B. Remove the malware and recover the files from a backup C. Initialize and repartition the hard drive to recover the files D. Run safe mode to decrypt the user's files

A. Do nothing

QUESTION 293 A user wants to connect a Windows notebook computer to an external desktop monitor, keyboard, and mouse. However, each time the user closes the notebook lid, the computer shuts down automatically. Which of the following options in the Power Settings menu should the technician select to prevent the automatic shutdown? A. Do nothing B. Sleep C. Hibernate D. Shut down

C. Asset ID, MAC

QUESTION 294 A client wants a technician to create a PC naming convention that will make the client's PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow? A. Domain name, location, IP address B. Domain name, location, asset ID C. Asset ID, MAC, Address D. Location, RFID

C. DNS server

QUESTION 295 Users are reporting web browsers are not working. A technician confirms that the end users can navigate to websites using the site's IP address. Which of the following is MOST likely causing this issue? A. Proxy server B. DHCP server C. DNS server D. SMTP server

B. Perform a malware scan in safe mode

QUESTION 296 A help desk technician receives a call from a user stating a program was installed and now random pop- ups are appearing on the computer. The technician notices a lot of suspicious network traffic generated by the user's computer. The technician quarantines the computer and disables System Restore. Which of the following is the NEXT step technician should take? A. Update the anti-malware software B. Perform a malware scan in safe mode C. Set up scheduled scans and updates D. Educate the end user on best practices

C. TPM

QUESTION 298 A technician wants to deploy a solution that will detect and prevent sensitive information from being saved on external storage. Which of the following should the technician implement? A. IPS B. FTPS C. TPM D. DLP

A. The technician did not disable the System Restore utility

QUESTION 299 A technician recently removed a malware infection from a client's computer. After removing the computer from the network, the technician used an approved customized tool to remove the malware, then updated the antivirus suite, and performed a scan that reported the system was clean. A week later, the client reports the same malware infection has returned. Which of the following is MOST likely the cause of the reinfection? A. The technician did not disable the System Restore utility B. The technician ran the malware remover before the antivirus scan C. The technician did not install a second antivirus suite to complement the first suite D. The technician did not put the computer back onto the network

C. System Restore

QUESTION 300 When starting a computer, a technician notices the computer displays a blue screen and reboots after POST. The technician completed several updates prior to encountering the blue screen. Which of the following tools would the technician use to resolve this issue? A. Disk Management B. Secure Boot C. System Restore D. msconfig E. fixboot

C. Data encryption

QUESTION 301 The office of admissions at a university has requested that all staff desktops be replaced with laptops. The staff members frequently go off-site for recruitment purposes and handle sensitive information. The technician is concerned about data leaks if a laptop is stolen. Which of the following is the BEST practice to use in this scenario? A. Cable locks B. Biometric security C. Data encryption D. Login time restriction E. LoJack


संबंधित स्टडी सेट्स

Other Operating Systems and Technologies

View Set

Lesson 110 Homework: Voltage Drop, Cable, Conduit, and Tubing

View Set

Introduction to Human Physiology Chapter 6 Practice Questions

View Set