Part 4
A user lives in a location that experiences frequent lightning storms. Which of the following would be the LEAST expensive solution to protect the user's computer hardware? A. A surge protector B. Grounding C. A power generator D. An uninterruptible power supply
A. A surge protector
Which of the following would BEST support an 8TB hard drive with one partition? A. GPT B. FAT16 C. FAT32 D. EFS
A. GPT
A technician needs to connect to a server using a secure terminal application. The technician must be able to reboot the server quickly and restart all the daemons with this application. Which of the following methods will the technician MOST likely use? (Choose two.) A. SSH B. Telnet C. Putty D. HTTPS E. Remote Assistance F. RDP
A. SSH F. RDP
Which of the following Windows versions introduced using applications in the Metro interface? A. Windows 7 B. Windows 8 C. Windows 8.1 D. Windows 10
B. Windows 8
Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications? A. Create a static DNS entry on the server for the PC B. Change her NIC IP address to dynamic C. Create a new exception on her local firewall D. Make sure the PC's IP is in the management VLAN
C. Create a new exception on her local firewall
Which of the following extensions identify files that are typically implemented as scripts? (Choose two.) A. .vbs B. .txt C. .exe D. .zip E. .bat F. .xlsx
A. .vbs E. .bat
A technician is creating a network topology diagram. Which of the following would be the MOST appropriate to include? (Choose two.) A. A list of network addresses for each device B. A list of the ports on each device and what they are connected to C. Technical specifications and performance ratings for the devices D. Settings, configuration details, and notes on proper operations E. A list of devices that need replacement within the next 6-12 months F. The MAC address and serial number of each device on the network
A. A list of network addresses for each device B. A list of the ports on each device and what they are connected to
A remotely managed self-checkout machine in a retail store runs Windows 10. The image contains drivers for locally attached third-party hardware (i.e., receipt printers), third-party applications, and proprietary applications made by the company's IT department. The self-checkout machine is experiencing errors, and the store employees are instructed to reload the OS. Which of the following would be the BEST option to restore full functionality to this machine with the least administrative effort? A. CD-RW B. BD-R C. Thin client D. Network boot
A. CD-RW
When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site? A. Certificates B. Software tokens C. Firewall D. Port security
A. Certificates
A Chief Executive Officer (CEO) is giving a presentation at an industry conference but forgot to bring a laptop. The company has emailed several large presentation files and the links to several videos that will be streamed during the presentation. While showing the last video, it starts to buffer, times out, and will not display. The CEO restarts the phone that is being used for the presentation and verifies there is enough free storage space, but the video still will not play. Which of the following is MOST likely causing the issue? A. Data transmission over limit B. Unauthorized account access C. Resource over use D. Unintended Bluetooth pairing
A. Data transmission over limit
A technician receives the Chief Executive Officer's (CEO's) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario? (Choose three.) A. Disconnect the device from the network B. Identify and research the symptoms C. Restore the computer to the previous checkpoint D. Scan and use removal techniques E. Create a restore point F. Educate the end user G. Schedule scans and run updates
A. Disconnect the device from the network B. Identify and research the symptoms D. Scan and use removal techniques
An end user reports a Windows computer is infected with a virus. Which of the following should be the technician's FIRST troubleshooting step? A. Identify malware symptoms B. Disable System Restore C. Run Windows Update D. Educate the end user
A. Identify malware symptoms
A technician is monitoring a network and notices an outage has occurred that could potentially cause a major disruption to the business workflow. Which of the following should the technician do NEXT? A. Identify the issue and its impact to the business B. Report the incident to the proper teams or management for awareness C. Start a root cause analysis and create documentation D. Create an action plan and implement the solution
A. Identify the issue and its impact to the business
A technician is updating a Windows computer to the latest OS version. The customer does not want to lose any settings or have to reinstall any programs. Which of the following installation types should a technician use to meet the customer's requirements? A. In-place B. Unattended C. Clean D. Repair
A. In-place
A technician successfully removed malware from a user's computer, and recent scans do not report any infections. However, the computer has begun experiencing issues accessing websites with Internet Explorer after a few hours of use. Some remote websites return error messages, and other sites do not display properly. Which of the following options should the technician utilize NEXT to troubleshoot this issue? A. Internet Options - Advanced B. System - Remote Settings C. Folder Options - View Options D. Display Settings - Resolution
A. Internet Options - Advanced
Ann, an employee, has been trying to use a company-issued mobile device to access an internal fileshare while traveling abroad. She restarted the device due to a mobile OS update, but she is now unable to access company information. Ann calls the help desk for assistance, and a technician verifies she can make calls and access websites. Which of the following should the technician suggest NEXT to try to fix the issue? A. Navigate to the VPN profile in the device settings, delete the pre-shared key, and restart the device B. Instruct Ann to open the company's MDM application to ensure proper functionality C. Navigate to the corporate intranet page and use hyperlinks to access the fileshare D. Instruct Ann to disable TLS 1.0 in the device settings
A. Navigate to the VPN profile in the device settings, delete the pre-shared key, and restart the device
Which of the following standards controls the processing of credit cards? A. PCI B. PHI C. PGP D. PII
A. PCI
Ann, a technician, is dispatched to a corporate customer that has reported a malware infection. Upon arrival, Ann notices the system is shut off, and she is able to start the computer without incident. Ann also notices numerous pop-ups appear when the web browser is opened. Which of the following should Ann do NEXT? A. Report the incident to the appropriate contact B. Clear the system logs and browser history C. Take a screenshot of the pop-ups D. Advise the customer to use the browser in private mode
A. Report the incident to the appropriate contact
A customer's smartphone has been overheating frequently and becoming unresponsive since installing an OS update. A technician has already performed a soft reboot of the device. Which of the following should the technician perform NEXT? (Choose two.) A. Roll back the OS update B. Update the PRL C. Force stop running applications D. Enable airplane mode E. Perform a factory reset F. Run application updates G. Reset network settings
A. Roll back the OS update F. Run application updates
A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT? A. Roll back the video card device drivers for all computers and escalate the issue to the video card vendor. B. Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed. C. Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video card vendor. D. Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.
A. Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.
A technician needs to connect securely to a Linux-based network appliance in a remote datacenter. Which of the following will the technician MOST likely use? A. SSH B. SFTP C. RDP D. Telnet
A. SSH
A security team recommends a disaster recovery plan with the following requirements: Recent backups should be readily available. Only long-term backups should be stored off premises. There should be minimum expenditure on hardware. Which of the following satisfies all of these requirements? A. Store 30 days of backups on premises and then age the backups to the public cloud B. Store backups on premises and burst to the public cloud if needed C. Store backups both on premises and in a public cloud infrastructure D. Store all the backups in a public cloud with no on-premises backup storage
A. Store 30 days of backups on premises and then age the backups to the public cloud
A Mac user needs to configure a network device using a serial connection to enable a remote network connection. Which of the following utilities would MOST likely be used to make the necessary changes? A. Terminal B. Disk maintenance C. iCloud D. Image recovery
A. Terminal
A user moves a file from one NTFS disk to another NTFS disk. Which of the following describes the changes to the file permissions? A. The file has both the source and destination permissions B. The file keeps the source permissions C. The file permissions have to be set manually D. The file receives the destination permissions
A. The file has both the source and destination permissions
An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers? A. Uninterruptible power supply B. Voltage regulator C. Surge suppressor D. Generator
A. Uninterruptible power supply
A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use? A. netstat B. net use C. nslookup D. ping
A. netstat
A desktop technician is responsible for the OS migration of 300 end users. As part of the migration, the technician must save the end users' data to a temporary shared drive. The data must include any hidden files to ensure 100% of the data is retained. Which of the following commands will achieve this result by default? A. robocopy B. copy C. xcopy D. cp
A. robocopy
A user has changed the MAC address of a laptop to gain access to a network. This is an instance of: A. spoofing B. brute force C. man-in-the-middle D. a botnet
A. spoofing
When hackers execute code against a vulnerability in the hope that it has not yet been addressed, this is known as a: A. zero-day attack B. spoofing attack C. DDoS attack D. brute force attack
A. zero-day attack
A customer built a computer with the following specifications: Single hexa-core processor 8GB DDR4 memory 256GB SSD drive Built-in graphics card 32-bit Windows OS Audio editing software The computer seems to be working, but the OS reports only 3.5GB of RAM is available. Which of the following would correct the issue? A. 16GB DDR4 memory B. 64-bit Windows OS C. Dual hexa-core processors D. 512GB SSD drive
B. 64-bit Windows OS
A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access. Which of the following policies is needed? A. Password policy B. Acceptable use policy C. Regulatory policy D. Compliance policy
B. Acceptable use policy
After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users. Which of the following is the BEST way for the technician to perform this security feature? A. Push a group policy B. Assign a local security policy C. Create a network login script D. Update the AUP
B. Assign a local security policy
Joe, a technician, is configuring advanced security settings on a SOHO router. Joe cannot locate the settings he intends to change, but the online vendor documentation has instructions for configuring those settings. Which of the following should the technician perform? A. Configure content filtering B. Check for a firmware update C. Disable the SSID broadcast D. Change the firewall settings
B. Check for a firmware update
An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application? A. Network-based B. Client/server C. Application streaming D. Peer-to-peer
B. Client/server
Joe, a technician, recently installed drivers for a webcam, but he is now experiencing issues when trying to operate it. Which of the following should Joe check NEXT to troubleshoot the issue? A. Services B. Device Manager C. Event Viewer D. Programs and Features
B. Device Manager
A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which of the following filesystem types would the customer's drive require? A. NTFS B. Ext4 C. HFS D. FAT32
B. Ext4
A technician is restoring files, which were deleted more than one month ago, from a backup on Mac OS X. Using the available GUI utility, which of the following utilities should the technician launch to accomplish this task? A. Dock B. Finder C. Keychain D. Boot Camp
B. Finder
A customer is having trouble opening several files on a computer. The customer renames one of the files, but then the correct program will no longer open it. Which of the following settings is a solution to the issue? A. Set the view options to detail B. Hide the extensions C. Utilize Credential Manager D. View the system files
B. Hide the extensions
A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.) A. Inventory management policy B. Knowledge base articles C. End-user acceptance document D. Acceptable use policy E. Incident documentation F. Network diagrams
B. Knowledge base articles D. Acceptable use policy
Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.) A. LCD monitor B. Power supply C. Laptop screen D. CRT monitor E. Motherboard F. Tablet
B. Power supply D. CRT monitor
A user installed an application that now requires a license key to enable full functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user. Which of the following will support this task? A. SSH B. RDP C. FTP D. Telnet
B. RDP
A new policy requires all users to log on to their corporate workstations using smart card authentication. Which of the following best practices should be implemented to further secure access to workstations? A. Data encryption B. Screen lock timeouts C. Required screensavers D. Strong passwords
B. Screen lock timeouts
A company is implementing multifactor authentication and requires a solution that utilizes TCP. Which of the following will the company MOST likely select? A. SNMP B. TACACS+ C. DHCP D. RADIUS E. Kerberos
B. TACACS+
Joe, a user, is unable to log into a laptop using his proper network credentials because of an incorrect username or password. However, Joe is able to log in without issue to a coworker's PC using his credentials. Which of the following is the MOST likely cause of the issue? A. The administrator account was disabled during the installation of the OS B. The laptop was not joined to the domain when the OS was installed C. The laptop's hard drive was formatted with FAT32 during the OS installation D. The OS was not installed with the correct drivers for the laptop's input devices
B. The laptop was not joined to the domain when the OS was installed
A user recently connected a Windows laptop to a free WiFi hotspot. After returning to the office, the user cannot access network shares. Which of the following is the MOST likely cause? A. Remote access has been disabled B. The local firewall settings are incorrect C. Location-based settings are not turned on D. The network shares are hidden
B. The local firewall settings are incorrect
Which of the following steps should a technician perform when the included Windows driver for a video card does not have the needed features? A. Install the third-party driver from the manufacturer's website B. Update the included Windows driver from Windows Update C. Flash the firmware on the BIOS to the latest version D. Replace the video card with one that is supported by Windows natively
B. Update the included Windows driver from Windows Update
Which of the following wireless security protocols supports the use of a 40-bit encryption key? A. TKIP B. WEP C. WPA D. WPA2
B. WEP
A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory". Which of the following commands would BEST accomplish this? A. grep -d mandatory * B. grep -i mandatory * C. grep mandatory file D. grep mandatory *
B. grep -i mandatory *
A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use? A. apt-get B. iwconfig C. sudo D. ifconfig
B. iwconfig
A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help desk team recommend the user do in this situation? A. After granting these permissions, disable the camera and GPS B. Install the application and change the permissions later C. Cancel installation of the application and report it to the application source D. Accept these permission requests and install the application
C. Cancel installation of the application and report it to the application source
An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue? A. Increase the amount of RAM B. Reboot the server C. Check the system logs D. Perform disk defragmentation
C. Check the system logs
A technician is adding a folder to a structure that is several levels down from the top level. The technician wants to make sure the new folder will have the same permissions as the top level. Which of the following should the technician configure? A. Attributes B. Shares C. Inheritance D. Replication
C. Inheritance
Which of the following installation methods allows a technician to install Windows from a remote location? A. USB B. NetBoot C. PXE D. CD-ROM
C. PXE
A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC? A. Download and apply the security patch that addresses the vulnerability that was exploited B. Use System Restore to bring the PC back to a previous restore point C. Reimage the computer and update it with all the latest patches D. Download another antivirus software that will quarantine the virus
C. Reimage the computer and update it with all the latest patches
While preparing a computer that will be issued to a new user, the technician discovers the computer's former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed? A. Reimage the machine from a network share B. Change the boot order and boot to an external drive C. Remove and then replace the CMOS battery D. Use the BIOS user password to reset the supervisor password
C. Remove and then replace the CMOS battery
A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business? A. Plan for the change B. Scope of the change C. Risk analysis of the change D. Documentation of the change
C. Risk analysis of the change
A customer's computer was turned off overnight. When the customer restarts the computer, an advanced startup menu is displayed. The startup repair option is unsuccessful and causes the computer to reboot repeatedly until the advanced startup screen reappears. Which of the following should a technician attempt FIRST? A. Go back to the previous build B. Refresh the PC C. Run System Restore D. Perform System Image Recovery E. Reset the PC
C. Run System Restore
A customer recently lost data because it was accidentally deleted. The customer calls a technician and asks to have a Windows backup solution installed. The customer needs to ensure all company data is backed up and quickly recoverable every time a change is made. Which of the following solutions would the technician MOST likely recommend? (Choose two.) A. File level B. Bare metal C. Snapshot D. Shadow Copy E. Critical applications F. Image level
C. Snapshot D. Shadow Copy
Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system? A. WPA2-PSK B. AES C. TACACS D. TKIP
C. TACACS
Which of the following social engineering vulnerabilities occurs when someone follows a technician into a server room without using a key card? A. Shoulder surfing B. Man-in-the-middle C. Tailgating D. Impersonation
C. Tailgating
A technician is troubleshooting a network connectivity issue on a Linux workstation. Which of the following commands would help the technician gain information about the network settings on the machine? A. chmod B. grep C. ifconfig D. sudo
C. ifconfig
A user is unable to access a network share but can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST? A. ping B. nslookup C. net use D. ipconfig
C. net use
A customer brings an old PC to a computer repair shop and asks for advice with regard to its repair or replacement. The PC has numerous errors during the boot process and is running a very outdated operating system. Which of the following should the technician do? A. Ask if the customer would like to donate the PC to a school B. Offer to sell a slightly newer computer to the customer C. Work on the computer and bill the customer for the time D. Advise the customer that the cost of repair is more than a new PC
D. Advise the customer that the cost of repair is more than a new PC
A technician is securing a server room by implementing a two-factor authentication solution. Which of the following should the technician implement to provide the BEST security for the server room? A. Door lock and mantrap B. Server lock and badge reader C. Security guard and entry control roster D. Biometric lock and hardware token
D. Biometric lock and hardware token
A user browses to a company's intranet page and receives an invalid certificate message. A technician discovers the certificate has expired. A new certificate is put in place and installed on the user's computer; however, the user still receives the same message when going to the intranet page. The technician tries with a third-party browser and connects without error. The technician needs to make sure the old certificate is no longer used in Internet Explorer. Which of the following Internet Options should the technician use to ensure the old certificate is removed? A. Advanced B. Clear SSL state C. Publishers D. Certificates
D. Certificates
An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for subscribing to an organization's mailing list. Which of the following should be performed to remove and prevent any further emails from this organization? A. Click the "Unsubscribe" button on each unwanted email B. Send the unwanted items to the spam or junk folder C. Deploy an email address whitelist D. Create domain-based filters
D. Create domain-based filters
A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue? A. exFAT security B. Ext3 security C. HFS security D. EFS security E. CDFS security
D. EFS security
A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar. To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented? A. Remote wipe B. Device encryption C. Biometric authentication D. Enterprise sandbox
D. Enterprise sandbox
A technician is scheduled to upgrade a grocery store's network equipment at 11:00 p.m. There are only a few shoppers in the store; therefore, the store manager wants the technician to start the upgrade early. Which of the following is the NEXT step the technician should perform? A. Create a back-out plan for the store B. Review the change request document C. Draft the new network diagrams D. Get approval from the Change Advisory Board
D. Get approval from the Change Advisory Board
A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem. Which of the following should the technician do FIRST? A. Contact the application vendor support staff for more information B. Boot into safe mode, and then load the ERD and restore the most recent files C. Boot the PC, run msconfig, check the safe boot box under the Boot tab, and then restart D. Log in as an administrative user and determine if the problem persists
D. Log in as an administrative user and determine if the problem persists
A technician must manually modify the HOSTS system file in order to resolve a website address to a specified local destination. Which of the following utilities should the technician use to BEST accomplish the task? A. Regedit B. services.msc C. Msinfo32 D. Notepad E. MMC
D. Notepad
Which of the following attack types exploits vulnerabilities in human nature? A. Zero-day B. Man-in-the-middle C. Spoofing D. Phishing
D. Phishing
A user is unable to print to the office's networked laser printer from a Windows desktop. A technician attempts to print a test page, but nothing comes out of the printer. The technician tries to print from a label printer, which is connected via USB, but there is no output from that printer either. Which of the following actions are MOST likely to restore printing functionality to both printers? (Choose two.) A. Restart the wired AutoConfig service B. Restart the Windows Firewall service C. Power cycle the label printer D. Power cycle the desktop E. Power cycle the laser printer F. Restart the print spooler service
D. Power cycle the desktop F. Restart the print spooler service
A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation? A. Enable System Restore on the file server and make frequent restore points. B. Disable full disk encryption on the file server. C. Install a next-generation firewall at the network edge. D. Use a host-based intrusion detection system and continuously monitor filesystem changes. E. Use granular file permissions on the share and follow the principle of least privilege.
D. Use a host-based intrusion detection system and continuously monitor filesystem changes.
A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.) A. Reboot into safe mode B. Clear the application data C. Contact the application's developer D. Reinstall the application E. Do a force stop F. Clear the application cache
E. Do a force stop F. Clear the application cache