Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1102 Exam Dumps - CompTIA A+ Certification Core 2 Exam

Question # 4

Which of the following editions of Windows 10 requires reactivation every 180 days?

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Full Access
Question # 5

A company acquired a local office, and a technician is attempting to join the machines at the office to the local domain. The technician notes that the domain join option appears to be missing. Which of the following editions of Windows is MOST likely installed on the machines?

A.

Windows Professional

B.

Windows Education

C.

Windows Enterprise

D.

Windows Home

Full Access
Question # 6

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

A.

Configure the firewall.

B.

Restore the system from backups.

C.

Educate the end user

D.

Update the antivirus program.

Full Access
Question # 7

A technician receives a call (rom a user who is having issues with an application. To best understand the issue, the technician simultaneously views the user's screen with the user. Which of the following would BEST accomplish this task?

A.

SSH

B.

VPN

C.

VNC

D.

RDP

Full Access
Question # 8

A customer called the help desk to report that a machine that was recently updated is no longer working. The support technician checks the latest logs to see what updates were deployed, but nothing was

deployed in more than three weeks. Which of the following should the support technician do to BEST resolve the situation?

A.

Offer to wipe and reset the device for the customer.

B.

Advise that the help desk will investigate and follow up at a later date.

C.

Put the customer on hold and escalate the call to a manager.

D.

Use open-ended questions to further diagnose the issue.

Full Access
Question # 9

A BSOD appears on a user's workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?

A.

Stop code

B.

Event Mewer

C.

Services

D.

System Configuration

Full Access
Question # 10

A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the following tools should the technician use to resolve this issue?

A.

taskschd.msc

B.

eventvwr.msc

C.

de vmgmt. msc

D.

diskmgmt.msc

Full Access
Question # 11

A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items?

A.

msinfo32

B.

perfmon

C.

regedit

D.

taskmgr

Full Access
Question # 12

A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?

A.

Keylogger

B.

Cryptominers

C.

Virus

D.

Malware

Full Access
Question # 13

A technician needs to remotely connect to a Linux desktop to assist a user with troubleshooting. The technician needs to make use of a tool natively designed for Linux. Which of the following tools will the technician MOST likely use?

A.

VNC

B.

MFA

C.

MSRA

D.

RDP

Full Access
Question # 14

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?

A.

Power user account

B.

Standard account

C.

Guest account

D.

Administrator account

Full Access
Question # 15

Which of the following is the proper way for a technician to dispose of used printer consumables?

A.

Proceed with the custom manufacturer's procedure.

B.

Proceed with the disposal of consumables in standard trash receptacles.

C.

Empty any residual ink or toner from consumables before disposing of them in a standard recycling bin.

D.

Proceed with the disposal of consumables in standard recycling bins.

Full Access
Question # 16

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

A.

System

B.

Devices

C.

Personalization

D.

Accessibility

Full Access
Question # 17

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

A.

Recalibrating the magnetometer

B.

Recalibrating the compass

C.

Recalibrating the digitizer

D.

Recalibrating the accelerometer

Full Access
Question # 18

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

A.

Licensing agreements

B.

Chain of custody

C.

Incident management documentation

D.

Data integrity

E.

Material safety data sheet

F.

Retention requirements

Full Access
Question # 19

A technician, who is working at a local office, has found multiple copies of home edition software installed on computers. Which of the following does this MOST likely violate?

A.

EULA

B.

Pll

C.

DRM

D.

Open-source agreement

Full Access
Question # 20

A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

A.

System

B.

Indexing Options

C.

Device Manager

D.

Programs and Features

Full Access
Question # 21

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

A.

Privacy

B.

Indexing Options

C.

System

D.

Device Manager

Full Access
Question # 22

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

Full Access
Question # 23

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?

A.

Have the user consider using an iPad if the user is unable to complete updates

B.

Have the user text the user's password to the technician.

C.

Ask the user to click in the Search field, type Check for Updates, and then press the Enter key

D.

Advise the user to wait for an upcoming, automatic patch

Full Access
Question # 24

The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Calibrate the phone sensors.

B.

Enable the touch screen.

C.

Reinstall the operating system.

D.

Replace the screen.

Full Access
Question # 25

A technician is installing RAM in a new workstation and needs to protect against electrostatic discharge. Which of the following will best resolve this concern?

A.

Battery backup

B.

Thermal paste

C.

ESD strap

D.

Consistent power

Full Access
Question # 26

A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times. Which of the following should the technician use?

A.

DHCP reservation

B.

Port forwarding

C.

DNS A record

D.

NAT

Full Access
Question # 27

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

A.

Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin

B.

Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run

C.

Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup

D.

Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

Full Access
Question # 28

An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT?

A.

Verify all third-party applications are disabled

B.

Determine if the device has adequate storage available.

C.

Check if the battery is sufficiently charged

D.

Confirm a strong internet connection is available using Wi-Fi or cellular data

Full Access
Question # 29

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

A.

Application updates

B.

Anti-malware software

C.

OS reinstallation

D.

File restore

Full Access
Question # 30

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

A.

Full

B.

Non-parity

C.

Differential

D.

Incremental

Full Access
Question # 31

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

A.

Acceptable use

B.

Chain of custody

C.

Security policy

D.

Information management

Full Access
Question # 32

A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?

A.

The smartphone's line was not provisioned with a data plan

B.

The smartphone's SIM card has failed

C.

The smartphone's Bluetooth radio is disabled.

D.

The smartphone has too many applications open

Full Access
Question # 33

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

A.

Configure the network as private

B.

Enable a proxy server

C.

Grant the network administrator role to the user

D.

Create a shortcut to public documents

Full Access
Question # 34

Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).

A.

Biometric lock

B.

Badge reader

C.

USB token

D.

Video surveillance

E.

Locking rack

F.

Access control vestibule

Full Access
Question # 35

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

A.

Uninstall and reinstall the application

B.

Reset the phone to factory settings

C.

Install an alternative application with similar functionality

D.

Clear the application cache.

Full Access
Question # 36

A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason?

A.

The domain's processor compatibility is not met

B.

The laptop has Windows 10 Home installed

C.

The laptop does not have an onboard Ethernet adapter

D.

The Laptop does not have all current Windows updates installed

Full Access
Question # 37

After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:

The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?

A.

Update the browser's CRLs

B.

File a trouble ticket with the bank.

C.

Contact the ISP to report the CFCs concern

D.

Instruct the CFO to exit the browser

Full Access
Question # 38

A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method

A.

Reinstalling Windows

B.

Performing a quick format

C.

Using disk-wiping software

D.

Deleting all files from command-line interface

Full Access
Question # 39

A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

Full Access
Question # 40

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

A.

Lock all devices in a closet.

B.

Ensure all devices are from the same manufacturer.

C.

Change the default administrative password.

D.

Install the latest operating system and patches

Full Access
Question # 41

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

A.

VPN

B.

MSRA

C.

SSH

D.

RDP

Full Access
Question # 42

An implementation specialist is replacing a legacy system at a vendor site that has only one wireless network available. When the specialist connects to Wi-Fi. the specialist realizes the insecure network has open authentication. The technician needs to secure the vendor's sensitive data. Which of the following should the specialist do FIRST to protect the company's data?

A.

Manually configure an IP address, a subnet mask, and a default gateway.

B.

Connect to the vendor's network using a VPN.

C.

Change the network location to private.

D.

Configure MFA on the network.

Full Access
Question # 43

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?

A.

Multifactor authentication will be forced for Wi-Fi

B.

All Wi-Fi traffic will be encrypted in transit

C.

Eavesdropping attempts will be prevented

D.

Rogue access points will not connect

Full Access
Question # 44

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

A.

Home

B.

Pro for Workstations

C.

Enterprise

D.

Pro

Full Access
Question # 45

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

A.

Encrypt the files

B.

Clone any impacted hard drives

C.

Contact the cyber insurance company

D.

Inform law enforcement

Full Access
Question # 46

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?

A.

Changing channels

B.

Modifying the wireless security

C.

Disabling the SSIO broadcast

D.

Changing the access point name

Full Access
Question # 47

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?

A.

Scan and remove the malware

B.

Schedule automated malware scans

C.

Quarantine the system

D.

Disable System Restore

Full Access
Question # 48

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

Full Access
Question # 49

Which of the following Is a package management utility for PCs that are running the Linux operating system?

A.

chmod

B.

yum

C.

man

D.

grep

Full Access
Question # 50

A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?

A.

Multifactor authentication

B.

Encryption

C.

Increased password complexity

D.

Secure password vault

Full Access
Question # 51

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Full Access
Question # 52

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

A.

diskpart

B.

chown

C.

gpupdate

D.

netstat

Full Access
Question # 53

A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?

A.

Reviewing System Information

B.

Running Disk Cleanup

C.

Editing the Registry

D.

Checking the Performance Monitor

E.

Increasing the memory

Full Access
Question # 54

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Full Access
Question # 55

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

A.

Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

B.

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

C.

Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

D.

Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

Full Access
Question # 56

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Full Access
Question # 57

A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

A.

Anti-malware

B.

Remote wipe

C.

Locator applications

D.

Screen lock

Full Access
Question # 58

A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?

A.

Removed all jewelry

B.

Completed an inventory of tools before use

C.

Practiced electrical fire safety

D.

Connected a proper ESD strap

Full Access
Question # 59

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

A.

Run sfc / scannow on the drive as the administrator.

B.

Run clearnmgr on the drive as the administrator

C.

Run chkdsk on the drive as the administrator.

D.

Run dfrgui on the drive as the administrator.

Full Access
Question # 60

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

A.

MSRA

B.

VNC

C.

VPN

D.

SSH

Full Access
Question # 61

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?

A.

Encryption

B.

Wi-Fi channel

C.

Default passwords

D.

Service set identifier

Full Access
Question # 62

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

A.

MDM

B.

EULA

C.

IRP

D.

AUP

Full Access
Question # 63

A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?

A.

Bridge the LAN connection between the laptop and the desktop.

B.

Set the laptop configuration to DHCP to prevent conflicts.

C.

Remove the static IP configuration from the desktop.

D.

Replace the network card in the laptop, as it may be defective.

Full Access
Question # 64

Which of the following is the STRONGEST wireless configuration?

A.

WPS

B.

WPA3

C.

WEP

D.

WMN

Full Access
Question # 65

A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the user do to resolve the issue?

A.

Turn off airplane mode while at the register.

B.

Verify that NFC is enabled.

C.

Connect to the store's Wi-Fi network.

D.

Enable Bluetooth on the phone.

Full Access
Question # 66

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?

A.

Run the virus scanner in an administrative mode.

B.

Reinstall the operating system.

C.

Reboot the system in safe mode and rescan.

D.

Manually delete the infected files.

Full Access
Question # 67

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

A.

A new IT policy requires users to set up a lock screen PIN.

B.

A user is overseas and wants to use a compatible international SIM Card.

C.

A user left the phone at home and wants to prevent children from gaining access to the phone.

D.

A user traded in the company phone for a cell carrier upgrade by mistake.

E.

A user cannot locate the phone after attending a play at a theater.

F.

A user forgot the phone in a taxi, and the driver called the company to return the device.

Full Access
Question # 68

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

A.

Golden image

B.

Remote network install

C.

In-place upgrade

D.

Clean install

Full Access
Question # 69

A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?

A.

The GPS application is installing software updates.

B.

The GPS application contains malware.

C.

The GPS application is updating its geospatial map data.

D.

The GPS application is conflicting with the built-in GPS.

Full Access
Question # 70

A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?

A.

Dock

B.

Spotlight

C.

Mission Control

D.

Launchpad

Full Access
Question # 71

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

Full Access
Question # 72

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a

ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods

would BEST meet the requirements?

A.

A daily, incremental backup that is saved to the corporate file server

B.

An additional, secondary hard drive in a mirrored RAID configuration

C.

A full backup of the data that is stored of site in cold storage

D.

Weekly, differential backups that are stored in a cloud-hosting provider

Full Access
Question # 73

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

A.

The system is missing updates.

B.

The system is utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates

Full Access
Question # 74

All the desktop icons on a user's newly issued PC are very large. The user reports that the PC was working fine until a recent software patch was deployed. Which of the following would BEST resolve the issue?

A.

Rolling back video card drivers

B.

Restoring the PC to factory settings

C.

Repairing the Windows profile

D.

Reinstalling the Windows OS

Full Access
Question # 75

Which of the following script types is used with the Python language by default?

A.

.ps1

B.

.vbs

C.

.bat

D.

.py

Full Access
Question # 76

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

A.

SFTP

B.

SSH

C.

VNC

D.

MSRA

Full Access
Question # 77

A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping, all functioning devices also turned off. In case of a future power failure, the customer wants to have the most time available to save cloud documents and shut down the computer without losing any data.

Full Access
Question # 78

Which of the following is the MOST basic version of Windows that includes BitLocker?

A.

Home

B.

pro

C.

Enterprise

D.

Pro for Workstations

Full Access
Question # 79

Which of the following change management documents includes how to uninstall a patch?

A.

Purpose of change

B.

Rollback plan

C.

Scope of change

D.

Risk analysis

Full Access
Question # 80

A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?

A.

Enabling System Restore

B.

Educating the user

C.

Booting into safe mode

D.

Scheduling a scan

Full Access
Question # 81

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

A.

Zero day

B.

Vishing

C.

DDoS

D.

Evil twin

Full Access
Question # 82

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

A.

Encrypt the workstation hard drives.

B.

Lock the workstations after five minutes of inactivity.

C.

Install privacy screens.

D.

Log off the users when their workstations are not in use.

Full Access
Question # 83

Which of the following command-line tools will delete a directory?

A.

md

B.

del

C.

dir

D.

rd

E.

cd

Full Access
Question # 84

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Full Access
Question # 85

While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?

A.

Send a quick message regarding the delay to the next customer.

B.

Cut the current customer's lime short and rush to the next customer.

C.

Apologize to the next customer when arriving late.

D.

Arrive late to the next meeting without acknowledging the lime.

Full Access
Question # 86

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Full Access
Question # 87

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

A.

Use a key combination to lock the computer when leaving.

B.

Ensure no unauthorized personnel are in the area.

C.

Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D.

Turn off the monitor to prevent unauthorized visibility of information.

Full Access
Question # 88

Which of the following is a data security standard for protecting credit cards?

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Full Access
Question # 89

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

A.

RDP through RD Gateway

B.

Apple Remote Desktop

C.

SSH access with SSH keys

D.

VNC with username and password

Full Access
Question # 90

Which of the following is a consequence of end-of-lite operating systems?

A.

Operating systems void the hardware warranty.

B.

Operating systems cease to function.

C.

Operating systems no longer receive updates.

D.

Operating systems are unable to migrate data to the new operating system.

Full Access
Question # 91

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

Full Access
Question # 92

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

A.

Device Manager

B.

Indexing Options

C.

File Explorer

D.

Administrative Tools

Full Access
Question # 93

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

A.

UEFI password

B.

Secure boot

C.

Account lockout

D.

Restricted user permissions

Full Access
Question # 94

Which of the following is an example of MFA?

A.

Fingerprint scan and retina scan

B.

Password and PIN

C.

Username and password

D.

Smart card and password

Full Access
Question # 95

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the

computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?

A.

Services in Control Panel to check for overutilization

B.

Performance Monitor to check for resource utilization

C.

System File Checker to check for modified Windows files

D.

Event Viewer to identify errors

Full Access
Question # 96

A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal?

A.

Security and Maintenance

B.

Network and Sharing Center

C.

Windows Defender Firewall

D.

Internet Options

Full Access
Question # 97

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

A.

The SNTP server is offline.

B.

A user changed the time zone on a local machine.

C.

The Group Policy setting has disrupted domain authentication on the system,

D.

The workstations and the authentication server have a system clock difference.

Full Access
Question # 98

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file

extension Which pf the following actions is the FIRST step the technician should take?

A.

Runa live disk clone.

B.

Run a full antivirus scan.

C.

Use a batch file to rename the files-

D.

Disconnect the machine from the network

Full Access
Question # 99

Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?

A.

Professional

B.

Home

C.

Enterprise

D.

Embedded

Full Access
Question # 100

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

A.

The user is in a poor signal area.

B.

The user has too many processes running.

C.

The smartphone has malware on it.

D.

The smartphone has been jailbroken.

Full Access
Question # 101

A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?

A.

Disable System Restore.

B.

Remediate the system.

C.

Educate the system user.

D.

Quarantine the system.

Full Access
Question # 102

A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).

A.

Examine the event logs.

B.

Connect to the network.

C.

Document the findings.

D.

Update the definitions.

E.

Reimage the computer.

F.

Enable the firewall.

Full Access
Question # 103

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?

A.

Risk analysis

B.

Sandbox testing

C.

End user acceptance

D.

Lessons learned

Full Access
Question # 104

A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?

A.

Event Viewer

B.

System Configuration

C.

Device Manager

D.

Performance Monitor

Full Access
Question # 105

A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?

A.

Respond to calls and text messages while on site but not when working directly with personnel.

B.

Respond to calls and text messages only from family.

C.

Respond to calls and text messages only when an emergency situation requires a response.

D.

Respond to calls and text messages discreetly while on site.

Full Access
Question # 106

A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further?

A.

ipconfig

B.

arp

C.

nslookup

D.

pathping

Full Access
Question # 107

A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?

A.

cat

B.

chmod

C.

pwd

D.

cacls

Full Access
Question # 108

Which of the following operating systems is most commonly used in embedded systems?

A.

Chrome OS

B.

macOS

C.

Windows

D.

Linux

Full Access
Question # 109

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?

A.

Disable the browser from sending notifications to the Action Center.

B.

Run a full antivirus scan on the computer.

C.

Disable all Action Center notifications.

D.

Move specific site notifications from Allowed to Block.

Full Access
Question # 110

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

A.

Isolate the machine from the network.

B.

Scan the system for hidden files.

C.

Disable unused ports.

D.

Install antivirus software.

E.

Reconfigure the firewall.

Full Access
Question # 111

A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?

A.

c: \minutes

B.

dir

C.

rmdir

D.

md

Full Access
Question # 112

A Linux technician needs a filesystem type that meets the following requirements:

. All changes are tracked.

. The possibility of file corruption is reduced.

· Data recovery is easy.

Which of the following filesystem types best meets these requirements?

A.

ext3

B.

FAT32

C.

exFAT

D.

NTFS

Full Access
Question # 113

A user's company phone was stolen. Which of the following should a technician do next?

A.

Perform a low-level format.

B.

Remotely wipe the device.

C.

Degauss the device.

D.

Provide the GPS location of the device.

Full Access
Question # 114

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?

A.

Educate the end user on best practices for security.

B.

Quarantine the host in the antivirus system.

C.

Investigate how the system was infected with malware.

D.

Create a system restore point.

Full Access
Question # 115

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?

A.

To determine which party had the machine and when.

B.

To remotely wipe sensitive data from the machine.

C.

To gather the information needed to replace the machine.

D.

To alert the owner that the password needs to be changed.

Full Access
Question # 116

Which of the following environments allows for the testing of critical systems without the risk of them being negatively impacted by changes?

A.

Regression

B.

Cloud

C.

Production

D.

Sandbox

Full Access
Question # 117

A technician is unable to completely start up a system. The OS freezes when the desktop background appears, and the issue persists when the system is restarted. Which of the following should the technician do next to troubleshoot the issue?

A.

Disable applicable BIOS options.

B.

Load the system in safe mode.

C.

Start up using a flash drive OS and run System Repair.

D.

Enable Secure Boot and reinstall the system.

Full Access
Question # 118

A user's application is unresponsive. Which of the following Task Manager tabs will allow the user to address the situation?

A.

Startup

B.

Performance

C.

Application history

D.

Processes

Full Access
Question # 119

A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and has no subnet mask. Which of the following should the technician check next?

A.

Internal antenna connections

B.

Static IP settings

C.

Airplane mode

D.

Digitizer calibration

Full Access
Question # 120

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

A.

Devices and Printers

B.

Administrative Tools

C.

Network and Sharing Center

D.

Programs and Features

Full Access
Question # 121

Which of the following languages is used for scripting the creation of Active Directory accounts?

A.

Bash

B.

SQL

C.

PHP

D.

PowerShell

Full Access
Question # 122

Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).

A.

Multifactor authentication

B.

Badge reader

C.

Personal identification number

D.

Firewall

E.

Motion sensor

F.

Soft token

Full Access
Question # 123

A Windows user recently replaced a computer The user can access the public internet on the computer; however, an internal site at https7/companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?

A.

Default gateway settings

B.

DHCP settings

C.

IP address settings

D.

Firewall settings

E.

Antivirus settings

Full Access
Question # 124

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

A.

Access control list

B.

Acceptable use policy

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 125

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.

Which of the following types of malware is the system MOST likely infected with?

A.

Keylogger

B.

Rootkit

C.

Ransomware

D.

Trojan

Full Access
Question # 126

Which of the following is the default GUI and file manager in macOS?

A.

Disk Utility

B.

Finder

C.

Dock

D.

FileVault

Full Access
Question # 127

After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?

A.

Device Manager

B.

Administrator Tools

C.

Programs and Features

D.

Recovery

Full Access
Question # 128

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

A.

DHCP

B.

SMTP

C.

DNS

D.

RDP

Full Access
Question # 129

A new employee was hired recently. Which of the following documents will the new employee need to sign before being granted login access to the network?

A.

MSDS

B.

EULA

C.

UAC

D.

AUP

Full Access
Question # 130

A technician is in the process of installing a new hard drive on a server but is called away to another task. The drive has been unpackaged and left on a desk. Which of the following should the technician perform before leaving?

A.

Ask coworkers to make sure no one touches the hard drive.

B.

Leave the hard drive on the table; it will be okay while the other task is completed.

C.

Place the hard drive in an antistatic bag and secure the area containing the hard drive.

D.

Connect an electrostatic discharge strap to the drive.

Full Access
Question # 131

A user reports that after a recent software deployment to upgrade applications, the user can no longer use the Testing program.

However, other employees can successfully use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve any issues discovered by selecting the:

  • Index number of the Event Viewer issue
  • First command to resolve the issue
  • Second command to resolve the issue

BSOD

Commands:

Event Viewer:

System Error:

Full Access
Question # 132

A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue?

A.

Reimage the computer.

B.

Replace the system RAM.

C.

Reinstall and update the failing software.

D.

Decrease the page file size.

Full Access
Question # 133

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems?

A.

Turn off the machine.

B.

Run a full antivirus scan.

C.

Remove the LAN card.

D.

Install a different endpoint solution.

Full Access
Question # 134

Which of the following are mobile operating systems used on smartphones? (Select two).

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

Full Access
Question # 135

Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team

implement?

A.

SSH

B.

VNC

C.

VPN

D.

RDP

Full Access
Question # 136

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.

Which of the following security measures should the user take to ensure security and privacy?

A.

Only accept calls from known people.

B.

Disregard any suspicious emails.

C.

Update the antivirus software.

D.

Enable two-factor authentication.

E.

Install a malware scanner.

Full Access
Question # 137

A user's Windows computer seems to work well at the beginning of the day. However, its performance degrades throughout the day, and the system freezes when several applications are open. Which of the following should a technician do to resolve the issue? (Select two).

A.

Install the latest GPU drivers.

B.

Reinstall the OS.

C.

Increase the RAM.

D.

Increase the hard drive space.

E.

Uninstall unnecessary software.

F.

Disable scheduled tasks.

Full Access
Question # 138

A technician wants to improve password security after several users admitted to using very simple passwords. Which of the following is the best way to resolve this issue?

A.

Requiring four character types

B.

Decreasing the password expiration times

C.

Enabling an automatic lock timer

D.

Adding two characters to the minimum password length

Full Access
Question # 139

A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?

A.

Phishing

B.

Dumpster diving

C.

Tailgating

D.

Evil twin

Full Access
Question # 140

Which of the following does MFA provide?

  • Security enhancement

  • Encryption

  • Digital signature

A.

Public key infrastructure

Full Access
Question # 141

A developer receives the following error while trying to install virtualization software on a workstation:

VTx not supported by system

Which of the following upgrades will MOST likely fix the issue?

A.

Processor

B.

Hard drive

C.

Memory

D.

Video card

Full Access
Question # 142

Which of the following filesystem types does macOS use?

A.

ext4

B.

exFAT

C.

NTFS

D.

APFS

Full Access
Question # 143

Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs?

A.

TACACS+

B.

Kerberos

C.

Preshared key

D.

WPA2/AES

Full Access
Question # 144

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence. Which of the following was MOST likely violated during the investigation?

A.

Open-source software

B.

EULA

C.

Chain of custody

D.

AUP

Full Access
Question # 145

A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should the technician use to configure the setting?

A.

System

B.

Power Options

C.

Devices and Printers

D.

Ease of Access

Full Access
Question # 146

Which of the following macOS utilities uses AES-128 to encrypt the startup disk?

A.

fdisk

B.

Diskpart

C.

Disk Utility

D.

FileVault

Full Access
Question # 147

A customer has a USB-only printer attached to a computer. A technician is configuring an arrangement that allows other computers on the network to use the printer. In which of the following locations on the customer's desktop should the technician make this configuration?

A.

Printing Preferences/Advanced tab

B.

Printer Properties/Sharing tab

C.

Printer Properties/Security tab

D.

Printer Properties/Ports tab

Full Access
Question # 148

Which of the following security methods supports the majority of current Wi-Fi-capable devices without sacrificing security?

A.

WPA3

B.

MAC filleting

C.

RADIUS

D.

TACACS+

Full Access
Question # 149

A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the following Windows 10 settings should the technician recommend?

A.

Personalization

B.

Apps

C.

Updates

D.

Display

Full Access
Question # 150

A user's iPhone was permanently locked after several tailed login attempts. Which of the following will restore access to the device?

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Secondary account and recovery code

Full Access
Question # 151

A hard drive that previously contained PI I needs to be repurposed for a public access workstation. Which of the following data destruction methods should a technician use to ensure data is completely removed from the hard drive?

A.

Shredding

B.

Degaussing

C.

Low-level formatting

D.

Recycling

Full Access
Question # 152

An Internet cafe has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?

A.

Spyware is redirecting browser searches.

B.

A cryptominer is verifying transactions.

C.

Files were damaged from a cleaned virus infection.

D.

A keylogger is capturing user passwords.

Full Access
Question # 153

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?

A.

USB drive

B.

DVD Installation media

C.

PXE boot

D.

Recovery partition

Full Access
Question # 154

A systems administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. Which of the following should the administrator do to resolve this issue?

A.

Rebuild user profiles.

B.

Roll back the updates.

C.

Restart the services.

D.

Perform a system file check.

Full Access
Question # 155

Which of the following would most likely be used to extend the life of a device?

A.

Battery backup

B.

Electrostatic discharge mat

C.

Proper ventilation

D.

Green disposal

Full Access
Question # 156

A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?

A.

Disk Management

B.

Device Manager

C.

Disk Cleanup

D.

Disk Defragmenter

Full Access
Question # 157

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Full Access
Question # 158

Which of the following macOS features can help a user close an application that has stopped responding?

A.

Finder

B.

Mission Control

C.

System Preferences

D.

Force Quit

Full Access
Question # 159

A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor’s performance?

A.

Amount of system RAM

B.

NIC performance

C.

Storage IOPS

D.

Dedicated GPU

Full Access
Question # 160

A salesperson's computer is unable to print any orders on a local printer that is connected to the computer Which of the following tools should the salesperson use to restart the print spooler?

A.

Control Panel

B.

Processes

C.

Startup

D.

Services

Full Access
Question # 161

A technician is working on a Windows 10 PC that has unwanted applications starting on boot. Which of the following tools should the technician use to disable applications on startup?

A.

System Configuration

B.

Task Manager

C.

Performance Monitor

D.

Group Policy Editor

Full Access
Question # 162

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection. Which of the following should the technician check NEXT?

A.

Windows updates

B.

DNS settings

C.

Certificate store

D.

Browser plug-ins

Full Access
Question # 163

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

A.

Cryptominers

B.

Rootkit

C.

Spear phishing

D.

Keylogger

Full Access
Question # 164

A company recently experienced a security incident in which a USB drive containing malicious software was able to covertly install malware on a workstation_ Which of the following actions should be taken to prevent this Incident from happening again? (Select two).

A.

Install a host-based IDS

B.

Restrict log-in times.

C.

Enable a BIOS password

D.

Update the password complexity

E.

Disable AutoRun.

F.

Update the antivirus definitions.

G.

Restrict user permissions.

Full Access
Question # 165

A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer's BEST choice for this environment?

A.

Workgroup network

B.

Public network

C.

Wide area network

D.

Domain network

Full Access
Question # 166

Which of the following Is used to identify potential issues with a proposed change poor lo implementation?

A.

Request form

B.

Rollback plan

C.

End-user acceptance

D.

Sandbox testing

Full Access
Question # 167

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?

A.

Document the date and time of the change.

B.

Submit a change request form.

C.

Determine the risk level of this change.

D.

Request an unused IP address.

Full Access
Question # 168

Which of the following operating systems is considered closed source?

A.

Ubuntu

B.

Android

C.

CentOS

D.

OSX

Full Access
Question # 169

A user reports being unable to access a sports team's website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?

A.

NDA

B.

AUP

C.

VPN

D.

SOP

Full Access
Question # 170

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Full Access
Question # 171

A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to make sure the printer stays connected in the future and is available on all the computers in the house. Which of the following should the technician configure on the printer?

A.

DNS settings

B.

Static IP

C.

WWAN

D.

Meteredconnection

Full Access
Question # 172

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

A.

Cross-site scripting

B.

SQL injection

C.

Brute-force attack

D.

DDoS attack

Full Access
Question # 173

A technician needs to recommend a way to keep company devices for field and home-based staff up to date. The users live in various places across the country and the company has several national offices that staff can go to for technical support Which of the following methods is most appropriate for the users?

A.

Make office attendance mandatory for one day per week so that updates can be installed.

B.

Ask users to ensure that they run updates on devices and reboot computers on a regular basis.

C.

Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.

D.

Configure cloud-based endpoint management software to automatically manage computer updates.

Full Access
Question # 174

An organization wants to deploy a customizable operating system. Which of the following should the organization choose?

A.

Windows 10

B.

macOS

C.

Linux

D.

Chrome OS

E.

iOS

Full Access
Question # 175

A technician is troubleshooting a Windows system that is having issues with the OS loading at startup. Which of the following should the technician do to diagnose the issue?

A.

Enable boot logging on the system.

B.

Launch the last known-good configuration.

C.

Check the system resource usage in Task Manager.

D.

Run the sfc /scannow command.

E.

Use the Event Viewer to open the application log

Full Access
Question # 176

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?

A.

Request physical media

B.

Mount the ISO file.

C.

Install a third-party software.

D.

Download an appropriate 32-bit/64-bit OS file.

Full Access
Question # 177

A user's company phone has several pending software updates. A technician completes the following steps:

•Rebooted the phone

•Connected to Wi-Fi

•Disabled metered data

Which of the following should the technician do next?

A.

Restore the factory settings.

B.

Clean the browser history.

C.

Uninstall and reinstall the applications.

D.

Clear the cache.

Full Access
Question # 178

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Full Access
Question # 179

A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?

A.

Network & Internet

B.

System

C.

Personalization

D.

Accounts

Full Access
Question # 180

Which of the following best describes a rollback plan?

A.

A developer configures a process to return to the starting state upon completion.

B.

A user asks to remove an unneeded fileshare.

C.

An administrator applies new settings to a computer after the previous settings failed.

D.

A technician reverts the system to a previous state following a failed upgrade.

Full Access
Question # 181

A technician is setting up a new PC in a SOHO. Which of the following should the technician most likely configure on the PC?

A.

VDI

B.

Mapped drives

C.

Wireless WAN

D.

Domain

Full Access
Question # 182

An employee using an Apple MacBook is receiving frequent, random pop-up requests from other Apple devices wanting to share photos and videos and asking whether the user would like to accept the request Which of the following configurations should the technician advise the user to change first"?

A.

Wi-Fi

B.

iCloud

C.

Antivirus

D.

AirDrop

Full Access
Question # 183

An administrator needs to back up the following components of a single workstation:

•The installation of the operating system

•Applications

•User profiles

•System settings

Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?

A.

Differential

B.

Image

C.

Synthetic

D.

Archive

Full Access
Question # 184

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

A.

Replacing non-mobile users' laptops with wired desktop systems

B.

Increasing the wireless network adapter metric

C.

Adding wireless repeaters throughout the building

D.

Upgrading the current mesh network to support the 802.11 n specification

Full Access
Question # 185

Which of the following operating systems was the app file type designed to run under as an application file bundle?

A.

macOS

B.

Chrome

C.

Windows

D.

Linux

Full Access
Question # 186

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

A.

Application permissions

B.

Available storage space

C.

Battery charge level

D.

Wi-Fi connection speed

Full Access
Question # 187

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

A.

Trojan

B.

Boot sector virus

C.

Spyware

D.

Rootkit

Full Access
Question # 188

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

Full Access