CompTIA 220-902 Exam (171-180), CompTIA 220-902 Exam (161-170), CompTIA 220-902 Exam (151-160), CompTIA 220-902 Exam (141-150), CompTIA 220-902 Exam (131-140), CompTIA 220-902 Exam (121-130), CompTIA 220-902 Exam (111-120), CompTIA 220-902 Exam (101-...

Ace your homework & exams now with Quizwiz!

A company has subscribed to a cloud service, paying monthly for a block of services and being billed incrementally when they exceed the monthly fee. Which of the following cloud concepts does this represent? A. Measured service B. Rapid elasticity C. On-demand D. Resource pooling

A

A customer has made several trouble calls to the help desk and is very irate. The technician that receives the call has learned that the issue has not yet been resolved. The technician politely asks the customer to explain the issue, and learns that the problem needs to be escalated. Which of the following should the technician do once the problem has been escalated? A. Communicate status with customer and ensure successful call transfer B. Remain on the line until the issue has been resolved C. Inform the customer that the issue cannot be resolved at this level D. Tell customer that patience will be needed

A

A customer is experiencing issues with email and calls the help desk. The technician determines it would help clarify the issue if the customer agrees to share their desktop. Prior to establishing a Remote Desktop Assistance connection with a customer, a technician should ask the customer to: A. Close any items of a personal nature B. Reboot the computer and log back in C. Capture a screen-shot of the error message D. Take steps to reproduce the error

A

A customer reports very slow wireless connection speeds in the new office. Which of the following tools should a technician use to troubleshoot the issue? A. WiFi analyzer B. Loopback plug C. Signal booster D. Packet sniffer

A

A manager suspects a user has obtained movies protected by copyright using a torrent client. An incident response technician responds and verifies the use has indeed been violating company policy. Which of the following would be the next BEST step for this technician to perform? A. Secure the workstation in a limited access factory B. Document the incident, purge all policy violating materials C. Immediately delete all unauthorized materials D. Reprimand the user and apply a content filter to their profile

A

A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue? A. The PC's Windows firewall is misconfigured B. The PC has an incorrect IP address configured C. The PC is on the wrong wireless network D. The PC does not have remote assistance turned on

A

A technician has decided to upgrade all users' iPhones to the latest model. Which of the following is the FIRST thing the technician should advise the users to do with the old phones before turning them in? A. Back up the mobile data with a cloud backup service B. Enable remote wipe to clear all personal and corporate data C. Go into the device settings to remove personal customizations D. Factory reset the old phones to ensure the data is no longer on the device

A

A technician has just fixed a user's PC and successfully removed a virus and malware from the machine. Which of the following is the LAST thing the technician should do? A. Educate the user regarding Internet browsing best practices B. Update the anti-malware software on the user's PC C. Schedule scans and run updates D. Enable system restore and create restore point

A

A technician installs a new application and restarts the computer. After signing in to Windows, an error message appears stating that the application did not start automatically as intended. After confirming the software has installed correctly, which of the following tolls would be used to troubleshoot this problem? A. msconfig B. appwiz.cpl C. gpedit D. regsrv32

A

A technician is installing a wireless network and wants to limit the signal available outside the building. Which of the following would help accomplish this? A. Place directional antennas B. Use omni-directional antennas C. Enable MAC filtering D. Disable SSID broadcast

A

A technician is onsite troubleshooting a user's issue and receives a call from another customer. Which of the following is the BEST course of action for the technician to take in this situation? A. Let the call go to voicemail and respond when time permits B. Leave the current appointment to assist the calling customer C. Ignore the call and continue with the scheduled itinerary D. Apologize to the customer and answer the call

A

A technician is tasked to change the number of CPU cores available to the OS to enhance productivity. Which of the following tools would allow the technician to perform this task? A. msconfig B. perfmon C. taskmgr D. dxdiag

A

A technician is tasked to install a 4TB SATA hard disk. Which of the following partitioning technologies should the technician use to satisfy these requirements? A. GPT B. Logical C. MBR D. Extended

A

A technician opens a customer's computer and sees large amounts of accumulated dust. Which of the following is the BEST method of removing the dust from the computer? A. Use compressed air to free the dust from the components and remove it with an ESD vacuum B. Dampen an ESD cloth with denatured alcohol and use it to gently wipe the dust away C. Use a shop vacuum with enough power to ensure all dust has been removed D. Remove as much dust as possible by hand and use compressed air to blow the rest out

A

A user calls the help desk because a folder containing critical business files is missing from the local drive. The user is adamant that the folder was there the previous day, and cannot understand why it is gone. The technician views the properties of the parent folder and sees a back up listed on the "Prior Versions" tab. According to the theory of troubleshooting, which of the following is the technician's NEXT step? A. Establish a theory of probable cause B. Establish a plan of action and implement the solution' C. Document findings, actions and outcomes D. Verify full system functionality and implement preventive measures

A

A user calls the helpdesk reporting that when accessing the company portal, it redirects to an unfamiliar website. Which of the following steps would the technician take to resolve this issue using best practices? A. Identify symptoms, quarantine infected system, and create restore point. B. Quarantine infected system, identify symptoms, and create restore point C. Identify symptoms, educate end user, and create restore point D. Create restore point, identify symptoms, and quarantine infected system

A

A user frequently travels with a Windows laptop and connects to several wireless networks. At a new location, the user reports that the locally shared printers are not available on the wireless connection. Which of the following would be causing the issue? A. The location profile is set to public B. Workgroup is disabled C. The proxy settings are misconfigured D. Remote assistance is not configured

A

A user has a new web email account and asks a technician for help with setting up email on a tablet. The user would like for the email to only be stored on this tablet. Which of the following server setting types would the technician use to accomplish this task? A. POP3 B. IMAP C. S/MIME D. SMTP

A

A user is configuring the email settings on a smartphone. Which of the following configurations will allow the user to synchronize email from multiple devices? A. IMAP B. S/MIME C. POP3 D. SMTP

A

A user needs their email set up on their iOS device. The email needs to synchronize all changes made with the server and the PC. Which of the following would technician use accomplish this? A. IMAP B. SMTP C. SMNP D. POP3

A

A user notices the social media apps are constantly updated with the user's precise location. The user is worried about privacy and would like to keep this information from being broadcast online. Which of the following features should the user adjust in order to accomplish this? A. Geotracking B. Filtering C. WiFi D. Teathering

A

A user reports unexpected icons appearing on the desktop. The technician identifies that the symptoms point to a malware infection. Which of the following procedures would be performed NEXT? A. Quarantine infected system B. Schedule scans and run updates C. Report the issue to the information security officer D. Disable System Restore (in Windows) E. Educate end user

A

A user, Ann, receives a phone call from the company's mail administrator who indicates her email account has been disabled due to high volumes of emails being sent in a very short period of time. Which of the following types of attack has the user experienced? A. Virus infection B. Man-in-the-middle attack C. Phishing attack D. Malware infection

A

An IT manager needs to reimage 30 computers in a lab. The image has already been created and is ready to be deployed via the network. Which of the following tasks should be completed FIRST? A. Boot from PXE B. Install Windows using DVD C. Reboot computers with USB drive D. Pressing F8 while rebooting

A

An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the user? A. Power user B. Administrator C. Standard D. Guest

A

An end user calls the company's IT service desk to report an inability to open encrypted emails on a mobile device. Which of the following is the BEST represents a possible cause? A. A valid certificate suitable for S/MIME is not installed B. Emails received by the user lack suitable digital signatures C. SSL/TLS certificates stored on the device are expired D. The sender did not have the addressee's public certificate

A

An office manager mistakenly uninstalled a valuable application. Which of the following utilities may allow the manager to correct this issue? A. System Restore B. Computer Management C. Disk Management D. System Configuration

A

Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slow performance after a couple of hours and that the problem worsens as the day goes by. If Ann restarts the device, it works fine for a couple of hours and then starts to run slow again, Which of the following is the BEST action to troubleshoot this problem? A. Check running apps B. Reset to factory default C. Disable cloud syncing D. Replace the device's battery

A

Ann, a user, states that after installing an update on her iPhone, the WiFi starts to malfunction. The WiFi icon is displaying that it has connectivity but she is still unable to browse. Which of the following could be the issue? A. PRAM needs to be reset B. iCloud is corrupted C. The router needs to be rebooted D. The upgrade needs to be uninstalled

A

When dealing with a difficult customer, which of the following is the BEST way to handle the situation? A. Do not argue with the customer and/or be defensive B. Use technical terms to assure customer confidence C. Escalated the customer's issue to a supervisor D. Sympathize with the customer about the issue

A

Which of the following features is being used when a smartphone is used to purchase a product at a retail kiosk? A. NFC B. Virtual assistance C. SDK D. Bluetooth

A

Which of the following is a risk of implementing a BYOD policy? A. Introducing malware onto the network B. DHCP may fail due to incompatibility C. Different encryption technology D. Higher risk of phishing attacks

A

Which of the following is a security threat that disguises itself as legitimate software? A. Trojan B. Worm C. Virus D. Spyware

A

Which of the following security threats happens when another person enters a secured area with an authorized person? A. Tailgating B. Shoulder surfing C. Spoofing D. Phishing

A

Which of the following tasks is automatically added to the task scheduler in Windows to keep hard disk performance up? A. defrag B. chkdsk C. cleanmgr D. diskpart

A

Which of the following would a technician use to search for a specific string within a file name? A. grep B. chmod C. wget D. sudo

A

Joe, a user, has connected a tablet to his personal mobile hot-spot in a public location for Internet access. The device display indicates there are two connections instead of just one. Which of the following actions can he perform to prevent this unauthorized access to the device immediately? (Select TWO) A. Change the SSID to a different broadcast name B. Add the intruding device to a blocked access list C. Access the intruder's device and shut it down D. Shut down the device until the intruder is no longer in the area E. Set up a WiFi analyzer to identify the intruding device

AB

A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower. Which of the following options may improve performance in the host operating system? (Select TWO) A. Install more physical memory B. Increase the size of the virtual hard drive C. Install a different hypervisor D. Reduce physical memory allocated to the VM E. Clear temporary files in the VM F. Install Additional physical hard drives

AD

A technician would like to remove the dust inside of a desktop computer. Which of the following should the technician use to MINIMIZE exposure to the dust while protecting internal hardware components? (Select TWO) A. Mask B. ESD mat C. ESD strap D. Antistatic bag E. Safety goggles F. Rubber gloves

AE

A Windows workstation is suspected of having malicious software that created an infected start-up item or service. Which of the following tools would a technician use to test this theory? A. chkdsk B. msconfig C. dxdiag D. ipconfig

B

A customer is reporting a burning smell from a CRT monitor. Which of the following should be taken into consideration before attempting to resolve the customer's issue? A. Disconnect power before inspecting the CRT power supply B. CRT monitors should be serviced by qualified personnel C. Have compressed air available to clear out the debris D. Wear safety goggles to protect from the cathodes

B

A customer's Windows 7 Home Premium computer displays a stop error and automatically reboots. Which of the following system utilities can a support technician use to find more information about the cause of the error? A. Action Center B. Event Viewer C. File Explorer D. Disk Management

B

A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. Which of the following is the BEST step the user can take to fix this problem? A. Perform a force stop B. Reset to factory default C. Upgrade to a larger battery D. Close running apps

B

A new help desk technician receives a trouble call from a user. The issue is something the technician has never encountered before, and does not know where to begin troubleshooting. The FIRST course of action is for the technician to: A. Tell the customer the issue needs to be escalated to a higher tier technician B. Ask the customer if they would mind holding for no more than two minutes to check resources C. Tell the customer this is the first time encountering the issue and to please be patient D. Ask the customer to please hold while a senior technician is consulted regarding the issue

B

A recent data breach has revealed that compromised files contained employee photos, names, and addresses. This information is sensitive because it is considered to be: A. a detriment to employer/employee relations B. personally identifiable information C. a violation of information access policies D. proof of employee corporate affiliation

B

A technician has just installed a video card in a PC. The video card is not working, although it was working fine on the test bench. Which of the following Windows tools should the technician use to start troubleshooting the problem? A. Task Manager B. Device Manager C. System Configuration D. Computer Management

B

A technician is noticing extremely slow performance on a computer and would like to see what application is consuming resources. Which of the following tools should the technician use to view the system performance? A. msconfig B. Task Manager C. Event Viewer D. netmon

B

A technician is working a trouble ticket for a user. After addressing the issue, the technician asks the user verify functionality. The user confirms the system is functioning, but the computer's speakers now emit an irritating noise. The technician states this is a byproduct of the solution, and the user will eventually get used to the noise. Which of the following professionalism principles is the technician failing to address? A. Avoiding being judgmental. B. Avoiding dismissal of the customer's problems. C Avoiding an argument with the customer. D. Maintaining a positive attitude.

B

A technician is working on a home theater PC in a location where the electrical system may not be properly grounded. As the technician is finishing the installation, which of the following should the computer technician do before connecting a cable TV line to a TV tuner card? A. Perform self-grounding B. Unplug the computer power cable C. Use an ESD strap D. Require the electrical system be brought up to code

B

A technician troubleshooting a computer finds a faulty video card and needs to replace it. Which of the following safety procedures should be used to prevent damaging the new part? A. Ground the computer and remove jewelry B. Self ground and handle the new card by the edges C. Place the computer on an ESD mat D. Attach an ESD strap to the new card during handling

B

A user in a corporate environment needs to have a laptop device repaired and takes the device to the appropriate technician. Which of the following should the technician offer to the user in order to maintain professionalism? A. Ask to user to wait in the area while repairs are being made. B. Offer a temporary loaner laptop for the user to work on. C. Inform the user that it will be ready "sometime" and to come back later. D. Ask the user to bring the laptop back when the department is less busy.

B

A user is experiencing a software application error. The user contacts a technician for support. Which of the following will allow the user to issue an invitation to the technician in this scenario? A. Remote desktop B. Remote assistance C. telnet D. FTP

B

A user needs to connect securely to the company network while working from a hotel room. Which of the following would the user need available to accomplish this? A. AES B. VPN C. UTM D. WPA2

B

A user needs to shrink the partition size of a hard drive encrypted with BitLocker. Which of the following is the BEST option to modify the size of the partition? A. Credential Manager B. Computer Management C. Device Manager D. TPM Manager

B

A user reports several technicians have been unable to solve a problem and requests that the technician on the phone comes out to fix the problem because the user is unable to work. After the technician has effectively communicated a willingness to help, which of the following is the NEXT step? A. Allow the user to speak with a supervisor B. Identify the problem C. Establish a theory D. Immediately go for the user's office

B

An IPS appliance is installed on the network. Which of the following is the purpose of the IPS? A. To check the network for unwanted activity B. To check and stop unwanted activity C. To provide connectivity to the network D. To test the resilience of the network

B

Ann, a customer, reports that when she occasionally works in the office basement, her smartphone battery drains faster than normal and she has poor cellular reception. Which of the following is the reason for the fast battery drain? A. Unpaired Bluetooth B. Weak Signal C. Defective SD card D. Malware

B

Which of the following Windows OS capabilities allows modern Windows versions to run applications written for older versions natively? A. Microsoft Virtual PC B. Compatibility mode C. Hyper-V D. Virtual XP mode

B

Which of the following Windows utilities would MOST likely be used to identify system errors? A. System Restore B. Event Viewer C. Security Center D. Windows Defender

B

Which of the following is the BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment? A. Commercial license B. Enterprise license C. Seat license D. Open source license

B

While navigating a Windows machine through command prompt, h=which of the following commands will a technician use to display the contents of the current folder? A. cd B. dir C. md D. rd

B

A user's personal laptop was hacked. A technician troubleshooting the issue discovers the user used the numbers 123456789 as their account password. The user has not changed the password in two years. Which of the following best practices should the technician recommend the user implement to prevent future hacking? (Select TWO) A. Configure screen save B. Set a strong password C. Set login time restrictions D. Use a more secure browser E. Change the password frequently

BE

A company is concerned about users tailgating into restricted areas. In order to prevent unauthorized users from following others, which of the following should be implemented? A. Biometric locks B. CCTV C. Mantraps D. Badge readers

C

A network administrator notices a new WiFi connection has appeared as a wireless network choice and is always at the top of the list. As a result, users are constantly trying to connect to the wrong network. Which of the following should the administrator do to correct the issue? A. Adjust the wireless router antennas to 90 degrees clockwise from the current position B. Ask the new wireless network owner to adjusts the radio power level so it is listed below the company's network C. Set all of the WiFi users' wireless profiles to automatically connect to the company network D. Change the company's channel to a lower number than the new network's channel

C

A technician has just upgraded REM on a user's workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings. Which of the following should be entered for the "Min" portion of the page file setting if using these best practices? A. 4096Mb B. 8192Mb C. 12288Mb D. 16328MB

C

A technician is in need of a device that would give the BEST network protection within a single device. Which of the following devices would the technician use? A. NLX B. IDS C. UTM D. ATX

C

A technician is tasked with analyzing computer settings managed by Microsoft Group Policy configuration. The technician wants to print a report to an HTML file for offline review. Which of the following Windows command line tools would allow the technician to accomplish this task?\ A. gpedit.msc B. gpupdate C. gpresult D. gpmc.msc

C

A technician needs to install a clean Windows OS on several laptops in the office. The office is running a 100Base-T network. The owner would like the installations completed as soon as possible. Which of the following installation methods should the technician use? A. FireWire External Hard Drive B. PXE-based Network Installation C. USB 3.0 Flash Drive D. DVD-ROM

C

A technician receives a call regarding a PC's slow performance. The client states that most applications are slow to respond; boot up and shutdown take much longer than they used to. Hard drive diagnostics pass, but there are error messages in the event viewer stating that the file system is corrupt. Which of the following should the technician do NEXT? A. Reload the OS using FAT32 instead of NTFS. B. Change the disk from basic to dynamic. C. Run chkdsk with the /r switch and reboot the PC. D. Open the defrag utility and run a drive analysis.

C

A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplies test tools. However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer. Which of the following is the MOST likely cause of this issue? A. Unsupported operating system B. Unacceptable CPU type and speed C. Insufficient airflow and cooling D. Inadequate video RAM amount

C

A user reports the Internet connection is not working on the corporate network. After running through the troubleshooting steps, the administrator finds the computer has a valid IP address, can connect to network shares, and can view local intranet pages in the web browser. The administrator tries navigating to a public Internet page and it times out. Which of the following should the technician configure next? A. Hosts files B. IPv6 settings C. Proxy settings D. Lmhosts files

C

A user updates the video driver on the computer and it requests a restart after installation. The computer never gets past the loading Windows page without rebooting. Which of the following should the technician use to resolve this issue without losing any vital files or programs? A. Emergency Repair Disk B. Restore from OEM image C. System Recovery D. Restore from backup

C

An administrator must upgrade multiple workstations with a new image being deployed using Windows Deployment Services. Which of the following client-side boot methods initiates the deployment of the new image? A. USB flash drive B. CD-ROM C. PXE D. GRUB

C

Ann, an end user, receives a call from someone claiming to be from the help desk asking for her username and password to prevent her email box from being deleted immediately Which of the following BEST describes this type of attack? A. Shoulder surfing B. Man-in-the-middle C. Social engineering D. Ransomware

C

Data on full disk encrypted drives using BitLocker is MOST secure from loss when combined with which of the following technologies? A. USB authentication token B. Filesystem access controls C. Trusted platform module D. Fingerprint reader

C

Joe, a technician, arrives onsite at a customer's home. Upon entering the home, Joe notices an unpleasant odor. In response to this. Joe pinches his nose and holds his breath. After Joe leaves, the customer reports the behavior yo Joe's supervisor. The supervisor decides the issue must be addressed. Which of the following topics would the supervisor be MOST likely to cover? A. Maintaining good communications with the customer. B. Maintaining good personal hygiene. C. Avoiding being judgmental. D. Avoid dismissing the customer's problems.

C

They system administrator is tasked with installing Windows to 100 computers over the network. The system administrator needs to remove system-specific identifiers. Which of the following would the system administrator use to accomplish this? A. Windows Deployment Services B. Remote Installation Services C. System Preparation Tool D. Unattended installation

C

Which of the following file formats does Android use for application installation? A. .ipa B. .api C. .apk D. .exe E. .sdk

C

Which of the following is the BEST option to prevent data breaches on lost mobile devices? A Install a locator application on the mobile device so that it can be traced B. Apply a restriction to lock the device after a certain number of failed login attempts C. Configure the device to remote wipe as soon as it is reported lost D. Utilize the fingerprint scanner and passcode for multifactor authentication

C

Which of the following is the FASTEST way for a user to syncronize data between an iPhone and a work PC? A. Transfer data via WiFi Direct to the user's laptop B. Use Bluetooth to share data from the phone C. Connect the iPhone's USB cable and use iTunes D. Copy the data from the phone to a MicroSD card

C

Which of the following commands are used from a Linux command line interface to elevate a user's access level to administrative privilege? (Select TWO) A. chmod B. passwd C. sudo D. su E. runas F. pwd

CD

A PC technician has been asked to verify certain Group Policies applied on a workstation. Which of the following commands should be run on the workstation? A. extract B. tasklist C. gpupdate D. gpresult E. chkdsk

D

A computer was recently infected by malware after a flash drive was plugged in. The user, Ann, indicates she never opened any files or folders from the flash drive. A technician needs to prevent this from occurring in the future. Which of the following would accomplish this? A. BitLocker To Go B. Set strong password C. Disable usermin D. Disable AutoRun

D

A customer calls the help desk to report an issue. The customer suggests that the problem is hardware related, but the technician knows from the description that this is not the case. Which of the following is the BEST course of action for the technician? A. Follow the customer's prescribed course of action. B. Convince the customer to take a better course of action to resolve the issue C. Explain why the customer's prescribed course of action is incorrect D. Acknowledge the customer's input, but follow another course of action

D

A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair? A. The technician should replace the power supply B. The technician should review disposal regulations C. The technician should check the environment D. The technician should remove jewelry

D

A technician has been informed by IT security manager that a vulnerability has been discovered in the wireless router. The vulnerability could allow an attacker to take remote control of the device. Which of the following should the technician perform to address the issue? A. Power off the device B. Install an add-on card C. Update the WiFi antenna D. Update Frimware

D

A technician has purchased a new surge protector to protect equipment in the production environment. The surge protector's features safeguard the connected equipment by directing surges to the: A. Path of shortest conductance B. Path of lowest inductance C. Path of highest voltage D. Path of least resistance

D

A technician is called into the office during a thunderstorm. Users are reporting that machines are intermittently powering off. Which of the following will BEST prevent user lost data? A. Auto save B. A surge protector C. An ESD mat D. A USP

D

A technician is tasked with removing a virus file that created a customer service. The technician has located the file to be removed using an antivirus scanner, but the scanner did not successfully remove the file. When the technician attempts to manually remove the file, an error message appears that says, "The file is in use by another program." Which of the following tolls would be the BEST to use to correct the issue? A. Terminal B. SFC C. Event Viewer D. Services Console E. Recovery Console

D

A technician is using a domain account to access files located on a server at the path \\computername\C$. The technician receives an "Access denied" error message. Which of the following is most likely the cause of the error? A. The server is no longer accepting connections since reaching its limit of open shares. B. The password is incorrect, requiring the user to reset it before authentication will proceed. C. The username should be prefixed by the domain, followed by a backslash (e.g.,domain\username). D. The account does not have local administrative permissions to access the server share.

D

A user is having issues with a Windows computer. Upon loading the operating system, several messages appear referring to a DLL file that cannot be found. Which of the following would be the BEST course of action for the technician to perform NEXT? A. Copy the DLL file from a working PC and use the resvr32 command to load the file B. Run the Windows Update utility to manually reinstall the DLL file C. Run the defrag utility to correct any fragmentation that may have damaged the file D. Research the DLL file to identify the application it corresponds to before continuing

D

A user reports browsing the Internet is slow and an icon with a picture of a person with a headset keeps asking them to "click here for help." The user has clicked on the icon to try to resolve the slowness but all that happens is the computer redirects them to a website to purchase software. Which of the following should be performed FIRST to resolve the issue? A. Create a restore point B. Run O/S updates C. Train the user of malicious software D. Identify the type of malware

D

A user wants to be able to access email from all devices. Which of the following formats should be used to allow this synchronization? A. SMTP B. iCal C. POP3 D. IMAP

D

An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contact the IT department and report a violation of which of the following policies? A. DRM B. EULA C. IRP D. PII

D

In preparation for an operating system upgrade, a technician is tasked with installing additional memory modules in a computer. Which of the following safety steps should be performed FIRST? A. Use safety goggles B. Remove jewelry C. Put on an ESD strap D. Disconnect power

D

Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device. He now notices the battery is rapidly draining. Which of the following can Joe MOST likely do to resolve the issue without a loss of data? A. Restart the mobile device B. Update the device's firmware C. Uninstall the GPS-enabled app D. Readjust the location settings

D

The technician is installing Windows 7 on a computer with a previously used hard drive. After receiving an error, the technician realizes the hard drive does not support this install. Which of the following tasks should the technician perform? A. Partition the hard drive in Extended format B. Use Windows Update to download the appropriate driver C. Enable Multiboot in the BIOS D. Convert the file system to NTFS

D

Which of the following explains why it is important to secure Personally Identifiable Information(PII)? A. So phinsing attacks are not launched against employees of the organization B. So sensitive information, such as corporate passwords, is not stolen C. So man-in-the-middle attacks are not launched against the organization D. So sensitive information, such as social security numbers, is not stolen

D

A technician has imported a .dll to fix a missing .dll issue on a PC. The application still does not run correctly and is reporting that the .dll is missing. Which of the following tools would the technician use to complete the import of the .dll? A. gpresult B. msconfig C. regedit D. gpupdate E. regsrv32

E

A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take? A. Identify the problem B. Document findings, actions, and outcome C. Verify full system functionality D. Establish a theory of probable cause E. Test the theory to determine cause

E


Related study sets

Operations and Supply Chain Management - C720

View Set

Chapter 8 Workers Compensation Insurance

View Set

Assist Systems - Overview (X0012E-US.TTB)

View Set

operations management chapter 14

View Set

Human Biology: Body Organization and Homeostasis

View Set