Operating Systems Final (3, 5, 7, 9, 10)
Typically uses TKIP for encryption.
WPA
Which of the following is a wireless Internet connectivity method that utilizes cellular technology?
3G
Current encryption algorithm used today.
AES
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure. What makes WPA2 more secure than WPA?
AES
What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?
Accelerometer
Which of the following security settings can best help minimize brute force attacks on local user account passwords?
Account lockout threshold
A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should the technician configure?
Address reservation
Which of the following operating systems can be modified and the source code redistributed?
Android
A technician is troubleshooting a mobile device that is experiencing very slow performance, and the decision has been made to perform a factory reset. Which of the following actions should the technician take before starting the reset process?
Back up all user data.
An administrator is assigning Windows user accounts to user groups based on the user's role and notices the built-in Power Users group. What is the purpose of the Power Users group in Windows 7 and later?
Backward compatibility for legacy operating systems and applications.
You need to secure your Windows 7 computer in a way that prevents access to the entire HDD even if the drive is moved to another system. Which solution will you implement?
BitLocker
A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device, and it operates for another day or so. This problem has been occurring for several weeks. Which of the following steps should the user take next to resolve this issue?
Check for OS updates.
A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file's permissions but cannot locate where to make the change. Which of the following steps should the technician take to make this change?
Click the Advanced button to open Advanced Security Settings for the file.
A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades. Which of the following is the best action to take to resolve this issue?
Close or disable all unused running apps.
Derek is planning a camping trip and wants to be able to listen to music at the campsite. Derek currently has a smartphone but does not like the sound coming from the speakers. What will help Derek improve the sound coming from his smartphone's speakers while he is at the campsite?
Connect to a Bluetooth speaker.
A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at his new home-based business. Which of the following SOHO router features will simplify IP address configuration on the private network for both wired and wireless clients?
DHCP server
Which of the following will use an RJ-11 connector for connectivity?
DSL
Which of the following symptoms is most likely related to leaked personal files/data on a mobile device?
Data transmission over limit
Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?
Disable AutoRun.
Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet. What can Dennis do that will allow the children to watch a video on the Internet while in the car?
Enable a hotspot on his smartphone.
You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control various shipping machines because the computers are not booting when powered. Each time a technician resolves the booting issue the boot order is changed in the firmware. Each computer is required to have the USB ports disabled in the firmware to keep employees from connecting rogue devices. Which of the following steps should be taken to eliminate these trouble tickets?
Enable the supervisor password in the BIOS/UEFI setup.
What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?
End-of-life
Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device. What is the next step in the Bluetooth connection process?
Enter the pin code.
A Mac computer is reporting problems with the HDD, and the user wants to run a check for errors. Which of the following is a disk management tool built into macOS that is useful for finding and repairing disk problems?
First Aid
Which of the following wireless networking protocols uses LTE technology with a maximum speed of up to 1 Gbps?
Fourth-generation cellular
A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. Which of the following is the best solution to accomplish the request from the manager while not limiting access to other websites?
Implement a blacklist on the firewall and add the site the users are visiting.
Which of the following is best practice to minimize the chance of infecting your mobile device with malware?
Install apps only from trusted sources.
You have been tasked with training end users in security best practices and have observed a trend among users in which many are writing down their passwords. Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?
Lengthen the time period between forced password changes.
John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same. What type of cable will John need to purchase to replace the iPad's charger cable?
Lightning
A bootable Linux USB flash drive or CD that can be used to repair system issues is known by what term, respectively?
Live USB or CD
A mobile phone user in your company is experiencing dropped phone calls. While interviewing the user, you determine the problem started after she checked her email this morning. No other mobile devices in the organization are dropping calls. Which of the following is the most likely reason for the dropped calls?
Malware is interfering with the calls.
John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices' security certificates. What type of security does the cloud-base service employ?
Mutual authentication
A technician needs to boot macOS over the network using an image stored on a server. What Apple technology will best assist the technician?
NetBoot
Cathy wants to connect to her wireless LAN at home but is not sure where to change the setting so that she can connect. Where in the Windows Control Panel will Cathy find her computer's network connection settings?
Network and Sharing Center
The touch screen on a mobile device is not responding to input. Which of the following is the best step to take to resolve this issue?
Perform a factory reset on the device.
Which of the following is a major advantage to using SSH over Telnet for remotely accessing a Linux system?
SSH is a secure, encrypted alternative to Telnet.
Sara wants to set up her lights to turn on when she arrives home. She has heard that she might be able to do this using IoT. What should Sara be concerned about when setting up her IoT lights?
Security
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The coworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use. Which of the following tabs will you suggest to the coworker?
Security tab
A technician needs to configure a Windows 10 computer to start a background service automatically each time the computer is booted. Which of the following tools should the technician use?
Services Console
James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files. How can James select what to synchronize from his phone to Google storage?
Settings app
Spencer would like to purchase a wearable device that allows him to make phone calls and send text messages. Which type of wearable device should Spencer purchase?
Smart watch
Which of the following are natively supported by the Windows, Mac, and Linux operating systems?
Support for reading and writing to FAT32 partitions
Your mobile device appears to be contacting a remote server to upload your personal data. Which of the following should be performed first to protect your personal data?
Switch to airplane mode.
A technician mistakenly uninstalled an application that is crucial for the productivity of the user. Which of the following utilities will allow the technician to correct this issue?
System Restore
A technician is attempting to use System Restore to restore a Windows 10 system to a point in the recent past; however, the option to choose a restore point is not available. Which of the following is the most likely reason for this issue?
System Restore is turned off.
Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure
TKIP
Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not accessed in the event a hard drive is lost or stolen?
TPM
What Windows utility can be used to find out what processes are launched at startup?
Task Manager
Your company wants to purchase a device that will allow it to give customers a 3D tour of its facility. What kind of device would you recommend for this type of 3D tour?
Tethered VR headset
The back cover of a mobile device is warmer than usual, and the battery seems to lose its charge much quicker than normal. The user has scanned for malware, closed unused apps, and decreased the brightness level of the screen, but the symptoms persist. Which of the following is the most likely cause for this behavior?
The battery is going bad.
A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message?
The command needs to be preceded by sudo.
Your mobile device has gone over its subscribed data limit the past two months. During this time, you have noticed that the device runs hotter than normal and data speeds seem slower than usual. Which of the following should you consider as a cause for these issues?
The device is infected with malware.
A Windows 10 user is copying a file from the C:\data folder to the E:\data folder. The C: drive is formatted with NTFS, and the D:drive is formatted with FAT32. What happens to the permissions of the file on the D:\ drive when copied?
The file will lose all permissions.
A technician removed several instances of malware from a customer's Windows PC. Now when the user double-clicks .doc files to open them, an error message appears asking what program to use to open the files. Which of the following is the most likely cause for this error?
The malware removal process changed the file association for the .doc file type.
A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer's technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors. How can the technician retrieve the requested information from the user's device?
The method for retrieval is dependent on the specific app or device's operating system.
A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode, but does not function when Windows is loaded normally. Which of the following is the most likely reason for this issue?
The operating system or driver is causing the issue.
Jordan likes to use his smartphone in his car. He uses it as a navigation device and connects it via Bluetooth to listen to music. He has purchased accessories that allow him to see his smartphone while he is driving. On a very cold day, and after driving for several minutes, Jordan receives a warning from his smartphone that it is overheating and needs to shut down. When he touches his smartphone, it is hot. What might cause Jordan's smartphone to overheat?
The smartphone is located too close to the car's heat vent.
A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department from accessing folders assigned to the accounting department. The technician is having difficulty achieving acceptable results. Which of the following is the most likely reason the technician is having difficulties?
The technician should be setting NTFS permissions instead of using Group Policy.
A technician is troubleshooting a Windows computer experiencing slow startup. Which of the following steps should the technician take first to determine whether startup processes are responsible for the slow startup?
The technician should measure the time it takes to start the system using a normal boot and compare that time against the time it takes for the system to perform a clean boot.
A user is attempting to launch a Windows utility from a command prompt but is receiving a message stating the user must be an administrator in order to use the utility. Which of the following best explains the reason the user is receiving the message?
The user must run the command using an elevated command prompt.
A user is asking her smartphone to recommend a restaurant, but the app cannot seem to find where the user is located. The device's cellular service is active and functioning. What is the first thing the user should check?
The user should verify location services is enabled on the smartphone.
A user contacted you to report that an unwanted Windows application is launched each time her computer is booted. How can you permanently resolve this issue?
Uninstall the application.
George is concerned that his children might somehow be exposed to things on the Internet that they are not mature enough to handle. He wants a way to limit their ability to view content on the Internet. What will you recommend to George?
Use Parental Controls.
How can you eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers?
Use a third-party remote access app that uses a browser.
A Windows computer stopped printing to a directly connected printer, and the technician suspects a service may be at fault. Which of the following steps can the technician take to verify her suspicion?
Use the Services Console to stop and start the Spooler service
Which of the following Task Manager tabs on a Windows system is used to display the processes owned by each signed-in user?
Users
A remote worker wants to connect his computer to his corporation's private trusted network over the Internet. Which of the following will need to be configured?
VPN tunnel
A group of wireless devices are using each other as relays to share a network connection across a large area. Which of the following network categories is being used?
WMN
Typically uses AES for encryption.
WPA2
You are tasked with configuring a wireless SOHO router for a customer. Which of the following settings will be the most secure with the least effort and cost to the customer?
WPA2-PSK, AES
A Windows 10 Home user is attempting to encrypt the contents of a folder on a volume formatted with NTFS. The user contacted you to ask why the option to encrypt the folder is disabled. What is the most likely reason the encryption option is disabled?
Windows Home editions do not support EFS.
A corporate user is attempting to connect to the company's Windows domain server on the local network with her new laptop through a wired connection. Which of the following is required for the user to successfully sign in to the Windows domain?
Windows domain user name and password
What is the value of X and what is the condition of the Do...Loop when execution ends in the following pseudo code? X = 1 Do ' This is a comment Print X; Loop
X = 1, the Do...Loop is endless.
Several of the contacts in your mobile device are responding to test messages that you sent them. However, you don't remember sending any of the messages. Which of the following is the reason for this behavior?
Your device is sending spam messages to your contacts.
Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.)
a. DSL modem e. Cable modem
Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own. What extra wireless security should Jacob employ in on his wireless router?
c. MAC filtering
Match the scripting term to the description. $X 9 Loop "sample text" "Press any Key" %TEMP% 1424 #Start
c. Variable b. Integer f. Executes the same commands until a condition is met a. String a. String d. Windows environment variable b. Integer e. PowerShell comment
Which of the following 802.11 wireless networking standards support transfer rates of over 54 Mbps? (Select TWO.)
d. 802.11n e. 802.11ac
A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to create a custom console containing only the tools she regularly launches and then distribute this custom console to each computer. Which of the following Windows tools will allow the technician to configure a custom console?
mmc.exe
Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. Which Microsoft command-line command should Henry use to check whether he can connect to the server?
ping
Which of the following best meets the requirements of a strong password?
t*M&2.zY7
You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best solve this issue without losing data in the folder?
. Take ownership of the folder and then change permissions.
What is the value of X when execution ends in the following pseudocode? Set X As Integer For X = 100 to 0 Step -1 ' This is a comment Next X X = 100
100
A user is experiencing problems connecting to a SOHO Wi-Fi network via her mobile device. Which of the following is the first step a technician should take in resolving this issue?
Determine if any other devices are experiencing the same issue.
Your computer has a single HDD formatted with NTFS with the following data folders: C:\Documents C:\Pictures You create a new child folder under the C:\Documents folder. What term describes the permissions the new folder automatically attains from the C:\Documents folder?
Inherited permissions
A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text message with a unique PIN that must be entered before she is granted access to the account. Which of the following describes the security method being used?
Multifactor authentication
In Windows 10, what Task Manager tab shows running processes organized by Apps, Background processes, and Windows processes?
Processes
The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and Internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016. Which of the following is the first step in implementing this data share?
Share the folder or volume on the file server that will store the shared data files.
A manager in your company wants to standardize all mobile device applications across different operating systems. Some users have Android mobile devices, some users have iOS devices, and some users have Windows Mobile devices. How can you best answer the manager in regard to his request?
Some apps will work on different OS platforms, but many will not.
Sam cannot figure out why he can't get sound from his tablet's internal speakers and calls you asking for advice. You ask him to check to see if anything is stuck in the aux port. Sam assures you nothing is in the aux port. He also checks to make sure the sound is not muted. What might prevent Sam from getting sound from his tablet?
The audio output is being directed to a Bluetooth speaker.
A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained?
Updates are found in the App Store.
Randy is concerned about his company's data security on the Internet. Because cellular signals are not encrypted, he is concerned that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet. What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal?
VPN
What is the correct order of network types when categorized by their size or the physical area they cover, from largest to smallest?
WAN, MAN, LAN, PAN
No longer considered secure because the key used for encryption doesn't change.
WEP
A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successfully removed the malware responsible for the attacks and need to better secure the passwords assigned to the user accounts without limiting the system's usability. Which of the following should be included in securing the user accounts? (Select THREE.)
a. Require user account passwords. b. Set failed logon restrictions. d. Require strong passwords.
Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone. What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)
b. Enable MAC filtering. d. Disable SSID broadcasting. e. Lower radio power levels.
Your mobile device is displaying messages informing you that your device is infected with malware. The instructions tell you to install another app to properly remove the malware. What should you do?
. Disregard the message and check for a compromised app.
Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode. What solution does Apple provide that will help Jennifer recover the passcode for her iOS device? es.
. Reset the device and restore the data from iCloud or iTunes.
In Linux, where are the commands required for system administration stored?
/sbin
Which of the following best describes a variable when implemented in a script?
A container for storing data values that can be assigned, referenced, and manipulated.
Tracy is in a meeting with an important client and wants to know how she can keep her smartphone from interrupting the meeting. She does not want to receive notifications, emails, text messages, or phone calls, but would like to leave her phone on so that she can take notes on the phone. What setting can Tracy use on her phone to make sure she is not interrupted during the meeting?
Airplane mode.
You want a method of authentication for company-owned mobile devices in which users are required to use two-step authentication. Which of the following will best assist you in meeting this requirement?
Authenticator apps
A client is requesting an Internet connection type that is not affected by atmospheric conditions and is always on. Which of the following will meet these requirements?
Cable
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network. What is the first step Derek should perform to secure the wireless router?
Change default user name and password.
A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless devices. The technician is required to protect the customer's private network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step for the technician to take in securing the router to meet this requirement?
Change the router's default administrative password
A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled live wallpapers, and restarted the device in an attempt to get the app to install. Which of the following steps should the user take next?
Check for sufficient available storage space.
Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the same script file each time they sign in to Windows. How can the settings be configured with the least effort by the admin?
Configure Group Policy to run a logon script.
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours. Which of the following steps can be taken to limit access to the computers?
Configure logon time restrictions.
You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft.com, the browser does not go to the site. Instead, you receive an error message saying that the address cannot be resolved. What network setting should you check to see the address of the server being used to resolve this address?
DNS
You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task?
Demilitarized zone
On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service?
Details
You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks. What is best practice for the remaining unused account?
Disable the account until the employee is ready to use it.
A user is complaining that her mobile device is too dim to read when in a dimly lit room. Which of the following actions should you take first?
Disable the auto-brightness option.
Mary, a remote user, connects her Windows 10 laptop to the corporate network by way of the Internet using a VPN tunnel. Which of the following is often configured as a required step for a user each time she attempts to use the VPN connection?
Enter the same user name and password used on the corporate network
Which of the following describes the macOS feature that lets you use finger motions to perform functions, for example, spreading two fingers to zoom in?
Gestures
Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone. Which commercial email provider should Angela use for her new Android phone?
Gmail
Which of the following user accounts are created automatically and disabled by default when Windows is installed? (Select TWO.)
Guest Administrator
Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his needs. He wants it to be connected to his Google account. Which smart speaker would you recommend?
Home
Mark has been asked to set up several smartphones to connect to his company's email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices. What protocol should Mark use to set up the company smartphones?
IMAP
Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?
In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet.
You opened a batch file in Notepad and are observing the following lines. (The line numbers are for reference only.) 1- ECHO This batch file deletes the temp files 2- DEL %TEMP%\*.* /Q 3- REM The temp files were deleted 4- PAUSE Which of the lines is a comment?
Line 3
A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its particular requirements. Which of the following operating systems will be the best choice for the users?
Linux
A customer has several mobile device users who have a habit of misplacing their devices during the workday. Which of the following security methods will most benefit these users?
Locator applications
A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?
Mobile hotspot
Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for payments made at a retail checkout counter. The technology also allows the marketing team to share data quickly. What technology is set up on the marketing team's phones?
NFC
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable. What term best describes this method of printer connectivity?
Network printer
A Windows user is attempting to exit a locked up desktop application that is not responding to mouse or keyboard input. Which of the following steps can be taken to end the application process without exiting other open applications?
Open Task Manager and end the process associated with the application.
What Windows utility is particularly useful in identifying software and hardware bottlenecks, and provides the ability to monitor in real time?
Performance Monitor
Which of the following Windows tools is used to measure how well software and hardware are performing by displaying statistics in real time?
Performance Monitor
Dillion's company has decided it wants to find a way to do a better job of tracking clothing inventories. Dillon has been asked to research ways to use the wireless network and IoT devices to help when tracking the clothing inventories. What should Dylan recommend to his company to help track the inventories?
RFID tags
You have received an escalated trouble ticket for a Windows workstation that displays an error message each time the user signs in to Windows. The previous technician logged the error in the ticketing system and made a note that she was not familiar with the error message the system was displaying. What is the first step you should take in resolving this issue?
Research the error message on the web.
You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets. Which of the following is the first step you will take to resolve this issue? .
Reset the network settings in the mobile device Settings app.
A user wants to adjust the number of horizontal and vertical pixels displayed on a monitor screen. What display setting will the user adjust?
Resolution
Your company has asked you to do research how it can provide smartphones to its employees. The company wants to give employees access to OneDrive in order to synchronize data. What type of synchronization will you recommend to the company?
Synchronization to the cloud
A technician, who was signed in to a Windows 10 computer as local administrator, accessed the Local Security Policy console and changed the Lock Screen timeout from 10 minutes to 60 minutes. After the technician completed the change, the user signed in to AD and discovered that the setting had reverted to 10 minutes. What can the technician do to keep the setting from reverting from 60 minutes to 10 minutes?
The Lock Screen timeout setting needs to be made in the AD OU GPO.
A user called the help desk to report that her mobile device has apps on it that she does not remember installing. Several times throughout the day, she receives alerts in the notification bar from apps she does not recognize asking for permission to download and upload data. Which of the following is the most likely cause for this behavior?
The mobile device has malware on it.
You are preparing to give a presentation at a client's location using your mobile device and a large screen TV. You have successfully connected to the company's guest Wi-Fi network, and you tap the screen mirroring option on your device but cannot locate an available TV, monitor, or projector. The previous presenter finished her presentation a few minutes earlier and had no issues using the TV. Which of the following is the most likely reason for this behavior?
The mobile device is on a different Wi-Fi network than the TV.
While performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. The user's computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share. Which of the following best describes this situation?
The principle of least privilege was not followed.
A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next to the desired app launches instead. When the user types a text message, every word in the message is misspelled. What is the most likely cause for this behavior?
The screen protector is interfering with touch response.
A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD. Which of the following describes the most likely reason for the lost data files?
The user had previously encrypted her data files and folders using EFS.
A user is following the instructions of a help desk technician and is attempting to launch System File Checker from the command-line interface. Each time the user types sfc /scannow and presses Enter, the utility fails to run, and an error appears stating the command must be run using an elevated command prompt. Which of the following best describes the reason for this issue?
The user must open the command-line interface using Run as administrator.
A Windows computer is experiencing a problem accessing the Internet. The network patch cable and network interface card have been tested and verified to be working properly. What step should be considered next to resolve this problem?
Update network settings.
A technician is troubleshooting a Windows computer and needs to stop the explorer.exe process. Multiple attempts to open Task Manager have failed. The technician can successfully open a command prompt. Which of the following steps should the technician take next?
Use the tasklist utility to locate the PID for the explorer.exe process.
Jerry recently purchased a new iPad. He needs guidance on setting it up and wants to find documentation to help with the setup. Where can Jerry find detailed steps on how to connect to a network, configure email, update the OS, sync, and back up settings and data, as well as what to do when things go wrong with his iPad or an iPhone?
User guide for the device
A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device. Which of the following steps should the user take first?
Wait a few minutes for the phone to automatically unlock.
Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz RF band. The company also wants the device to be at least 50 meters away from the base station. What type of device should the company purchase?
Z-Wave
Which of the following are closed source, proprietary operating systems? (Select TWO.)
a. Mac OS X High Sierra d. Windows 10 Home
Which of the following steps can be taken to resolve limited or no network connectivity issues on a Windows computer? (Select TWO.)
b. Verify the network cable between the computer and router is connected and not damaged. e. Verify the SOHO router is powered on and the port LEDs indicate connectivity.
A technician is logged in to a Linux computer as johnd and needs to reset group ownership for the file report.txt in the johnd home directory. Which of the following commands will perform this function?
chown
Which of the following is the current Linux file system used to hold the operating system?
ext4
A Linux user needs to find all instances of the word admin in /var/log/auth.log. Which of the following commands will perform this function?
grep
Sally has just purchased a new iPad. She wants to save all the pictures and files that she creates with her new iPad on the Internet. What service should Sally use to save her pictures and files seamlessly on the Internet?
iCloud
A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?
macOS Recovery
A technician is troubleshooting a Windows BSOD error. The technician wants to check the memory installed in the system. Which of the following tools is used to launch the Windows Memory Diagnostic tool?
mdsched.exe
A user is complaining about sluggish performance on her Linux system, and the technician suspects a running process is consuming excessive processor resources. Which of the following commands will the technician most likely use to locate the offending process?
ps