Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

During an enterprise rollout of a new application, a technician needs to validate compliance with an application's EULA while also reducing the number of licenses to manage. Which of the following licenses would best accomplish this goal?

A.

Personal use license

B.

Corporate use license

C.

Open-source license

D.

Non-expiring license

Full Access
Question # 5

A new employee is having difficulties using a laptop with a docking station The laptop is connected to the docking station, and the laptop is closed. The external monitor works for a few seconds, but then the laptop goes to sleep. Which of the following options should the technician configure in order to fix the Issue?

A.

Hibernate

B.

Sleep/suspend

C.

Choose what closing the lid does

D.

Turn on fast startup

Full Access
Question # 6

A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?

A.

Network and Sharing Center

B.

net use

C.

User Accounts

D.

regedit

E.

Group Policy

Full Access
Question # 7

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

A.

Full

B.

Differential

C.

Off-site

D.

Grandfather-father-son

Full Access
Question # 8

Which of the following protects a mobile device against unwanted access when it is left unattended?

A.

PIN code

B.

OS updates

C.

Antivirus software

D.

BYOD policy

Full Access
Question # 9

Which of the following file extensions should a technician use for a PowerShell script?

A.

.ps1

B.

.py

C.

.sh

D.

.bat

E.

.cmd

Full Access
Question # 10

A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method

A.

Reinstalling Windows

B.

Performing a quick format

C.

Using disk-wiping software

D.

Deleting all files from command-line interface

Full Access
Question # 11

A technician assigns the equivalent of root-level permissions to a user to perform a task. Which of the following user roles within the Windows OS should the technician choose?

A.

Power

B.

Default

C.

Administrator

D.

Superuser

Full Access
Question # 12

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

A.

The system is missing updates.

B.

The system is utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates

Full Access
Question # 13

After a user recently installs a new scanner and the associated software on a computer, they notice the computer is now starting up very slowly. Which of the following is the best tool to troubleshoot this issue?

A.

Resource Monitor

B.

Task Manager

C.

Device Manager

D.

Windows Update

E.

Event Viewer

Full Access
Question # 14

A user reports that a system is performing unusually and is sending requests to an unfamiliar IP address every five minutes. Which of the following should the technician check first to troubleshoot the issue?

A.

Application logs

B.

Running processes

C.

Antivirus scans

D.

Recent system updates

Full Access
Question # 15

A technician is creating a Windows splash screen that details login expectations. Which of the following should the technician most likely use?

A.

End-user license agreement

B.

Non-disclosure agreement

C.

Regulatory compliance

D.

Acceptable use policy

Full Access
Question # 16

Which of the following authentication types is the most secure?

A.

WPA3

B.

WEP

C.

RADIUS

D.

TACACS+

E.

WPS

Full Access
Question # 17

Which of the following attacks can a hacker use to execute code on a user's computer when the user visits a specially prepared, malicious website?

A.

DoS

B.

Spoofing

C.

XSS

D.

SQL injection

Full Access
Question # 18

A user recently accessed several websites that required log-in credentials. During subsequent visits, the user noticed that the log-in credential fields were already filled in. Which of the following is a way to prevent the browser from remembering the credentials for future visits?

A.

Disabling the password manager

B.

Removing the secure connections

C.

Clearing the browser cache

D.

Deleting the trusted sources

Full Access
Question # 19

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

A.

Configure the network as private

B.

Enable a proxy server

C.

Grant the network administrator role to the user

D.

Create a shortcut to public documents

Full Access
Question # 20

A user's workstation was infected with a newly discovered virus that the AV system detected. After a full virus scan and a workstation reboot, the virus is still present in the OS. Which of the following actions should the user take to remove the virus?

A.

Enable the system firewall.

B.

Use bootable antivirus media to scan the system.

C.

Download software designed to specifically target the virus.

D.

Run the operating system update process.

Full Access
Question # 21

A technician is updating the OS on a number of Windows workstations. After successfully updating several workstations, the technician receives an error indicating that the upgrade takes more space than is available on one of the PCs. Which of the following should the technician do to proceed with the upgrade? (Select two).

A.

Unplug the extra hardware.

B.

Delete unnecessary files.

C.

Update the driver software.

D.

Restore the system files.

E.

Uninstall unused desktop applications.

F.

Add additional memory.

Full Access
Question # 22

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?

A.

Multifactor authentication will be forced for Wi-Fi

B.

All Wi-Fi traffic will be encrypted in transit

C.

Eavesdropping attempts will be prevented

D.

Rogue access points will not connect

Full Access
Question # 23

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

A.

Encryption at rest

B.

Account lockout

C.

Automatic screen lock

D.

Antivirus

Full Access
Question # 24

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

A.

All updated software must be tested with alt system types and accessories

B.

Extra technician hours must be budgeted during installation of updates

C.

Network utilization will be significantly increased due to the size of CAD files

D.

Large update and installation files will overload the local hard drives.

Full Access
Question # 25

A technician finds that a new company security policy has broken an application in use at a branch office. Which of the following should the technician do to ensure that the application is fixed and prevent the issue from reoccurring?

A.

Request a policy exception be put in place while the application requirements are addressed

B.

Reinstall the affected software using local administrative rights for each computer

C.

Remove the new security settings and change the administrative accounts on the branch office computers to prevent the settings from being reapplied

D.

Research and procure a replacement application that is not adversely affected by the new policy

Full Access
Question # 26

A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

A.

Data-in-transit encryption

B.

File encryption

C.

USB drive encryption

D.

Disk encryption

Full Access
Question # 27

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

A.

Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never

B.

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never

C.

Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never

D.

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Full Access
Question # 28

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?

A.

RDP

B.

VNC

C.

SSH

D.

VPN

Full Access
Question # 29

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?

A.

WPA2 with TKIP

B.

WPA2 with AES

C.

WPA3withAES-256

D.

WPA3 with AES-128

Full Access
Question # 30

A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

Full Access
Question # 31

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

A.

Have the user provide a callback phone number to be added to the ticket

B.

Assign the ticket to the department's power user

C.

Register the ticket with a unique user identifier

D.

Provide the user with a unique ticket number that can be referenced on subsequent calls.

Full Access
Question # 32

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?

A.

VNC

B.

RMM

C.

RDP

D.

SSH

Full Access
Question # 33

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

A.

System

B.

Network and Sharing Center

C.

User Accounts

D.

Security and Maintenance

Full Access
Question # 34

A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

A.

Proceed to the site.

B.

Use a different browser.

C.

Report the error to the bank.

D.

Reinstall the browser.

Full Access
Question # 35

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

A.

Default gateway

B.

Host address

C.

Name server

D.

Subnet mask

Full Access
Question # 36

A technician is investigating an employee's smartphone that has the following symptoms

• The device is hot even when it is not in use.

•Applications crash, especially when others are launched.

• Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.

Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Select TWO).

A.

Turn on autorotation

B.

Activate airplane mode.

C.

Close unnecessary applications

D.

Perform a factory reset

E.

Update the device's operating system

F.

Reinstall the applications that have crashed.

Full Access
Question # 37

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

A.

Uninstall and reinstall the application

B.

Reset the phone to factory settings

C.

Install an alternative application with similar functionality

D.

Clear the application cache.

Full Access
Question # 38

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

A.

resmon exe

B.

msconfig.extf

C.

dfrgui exe

D.

msmfo32.exe

Full Access
Question # 39

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?

A.

Scan and remove the malware

B.

Schedule automated malware scans

C.

Quarantine the system

D.

Disable System Restore

Full Access
Question # 40

Which of the following OS types provides a lightweight option for workstations thai need an easy-to-use browser-based interface?

A.

FreeBSD

B.

Chrome OS

C.

macOS

D.

Windows

Full Access
Question # 41

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

A.

Reset the phone to factory settings

B.

Uninstall the fraudulent application

C.

Increase the data plan limits

D.

Disable the mobile hotspot.

Full Access
Question # 42

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

A.

MDM

B.

EULA

C.

IRP

D.

AUP

Full Access
Question # 43

A user receives a message on a PC stating it has been infected by malware. A technician runs a full scan on the user's machine and detects no malware. Later that day, the same message reappears. Which of the following steps should the technician take to restore the system to regular functionality?

A.

Check for Windows updates.

B.

Reimage the computer.

C.

Enable Windows Firewall.

D.

Run System File Checker.

Full Access
Question # 44

A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?

A.

Disk Management

B.

Device Manager

C.

Disk Cleanup

D.

Disk Defragmenter

Full Access
Question # 45

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

A.

Spyware

B.

Cryptominer

C.

Ransormvare

D.

Boot sector virus

Full Access
Question # 46

Which of the following best describes when to use the YUM command in Linux?

A.

To add functionality

B.

To change folder permissions

C.

To show documentation

D.

To list file contents

Full Access
Question # 47

A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times. Which of the following should the technician use?

A.

DHCP reservation

B.

Port forwarding

C.

DNS A record

D.

NAT

Full Access
Question # 48

A help desk technician needs to remotely access and control a customer's Windows PC by using a secure session that allows the technician the same control as the customer. Which of the following tools provides this type of access?

A.

FTP

B.

RDP

C.

SSH

D.

VNC

Full Access
Question # 49

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

A.

Language

B.

System

C.

Personalization

D.

Ease of Access

Full Access
Question # 50

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

A.

A system patch disabled the antivirus protection and host firewall.

B.

The system updates did not include the latest anti-malware definitions.

C.

The system restore process was compromised by the malware.

D.

The malware was installed before the system restore point was created.

Full Access
Question # 51

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

A.

Installing a VPN

B.

Implementing location tracking

C.

Configuring remote wipe

D.

Enabling backups

Full Access
Question # 52

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.

Which of the following security measures should the user take to ensure security and privacy?

A.

Only accept calls from known people.

B.

Disregard any suspicious emails.

C.

Update the antivirus software.

D.

Enable two-factor authentication.

E.

Install a malware scanner.

Full Access
Question # 53

A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

Full Access
Question # 54

Which of the following editions of Windows 10 requires reactivation every 180 days?

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Full Access
Question # 55

A technician is investigating options to secure a small office's wireless network. One requirement is to allow automatic log-ins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature?

A.

RADIUS

B.

AES

C.

EAP-EKE

D.

MFA

Full Access
Question # 56

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

A.

Licensing agreements

B.

Chain of custody

C.

Incident management documentation

D.

Data integrity

E.

Material safety data sheet

F.

Retention requirements

Full Access
Question # 57

A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).

A.

Utilizing an ESD strap

B.

Disconnecting the computer from the power source

C.

Placing the PSU in an antistatic bag

D.

Ensuring proper ventilation

E.

Removing dust from the ventilation fans

F.

Ensuring equipment is grounded

Full Access
Question # 58

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?

A.

Run one scan and schedule future scans.

B.

Back up the uninfected files and reimage the computer.

C.

Restore the clean backup copies of the infected files.

D.

Run repeated remediation scans until the malware is removed.

Full Access
Question # 59

A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor’s performance?

A.

Amount of system RAM

B.

NIC performance

C.

Storage IOPS

D.

Dedicated GPU

Full Access
Question # 60

Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs?

A.

TACACS+

B.

Kerberos

C.

Preshared key

D.

WPA2/AES

Full Access
Question # 61

A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?

A.

The device does not have enough free space lo download the OS updates.

B.

The device needs domain administrator confirmation to update to a major release.

C.

The device is not compatible with the newest version of the OS.

D.

The device is restricted from updating due to a corporate security policy.

Full Access
Question # 62

Which of the following script types is used with the Python language by default?

A.

.ps1

B.

.vbs

C.

.bat

D.

.py

Full Access
Question # 63

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

A.

Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.

B.

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.

C.

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.

D.

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Full Access
Question # 64

A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

A.

System

B.

Indexing Options

C.

Device Manager

D.

Programs and Features

Full Access
Question # 65

A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?

A.

Inform the customer that the issue is not within the scope of this department.

B.

Apologize to the customer and escalate the issue to a manager.

C.

Ask the customer to explain the issue and then try to fix it independently.

D.

Respond that the issue is something the customer should be able to fix.

Full Access
Question # 66

A Windows user recently replaced a computer The user can access the public internet on the computer; however, an internal site at https7/companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?

A.

Default gateway settings

B.

DHCP settings

C.

IP address settings

D.

Firewall settings

E.

Antivirus settings

Full Access
Question # 67

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

A.

Remote Assistance

B.

Remote Desktop Protocol

C.

Screen Sharing

D.

Virtual Network Computing

Full Access
Question # 68

A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service?

A.

Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service

B.

Flashing the BIOS, reformatting the drive, and then reinstalling the OS

C.

Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS

D.

Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus

Full Access
Question # 69

An application is not performing well and will occasionally shut down with no error provided. Which of the following Task Manager tabs should be used to troubleshoot the application while it is active?

A.

Users

B.

Services

C.

Performance

D.

Startup

Full Access
Question # 70

A developer receives the following error while trying to install virtualization software on a workstation:

VTx not supported by system

Which of the following upgrades will MOST likely fix the issue?

A.

Processor

B.

Hard drive

C.

Memory

D.

Video card

Full Access
Question # 71

A technician is selling up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Full Access
Question # 72

Which of the following is used as a password manager in the macOS?

A.

Terminal

B.

FileVault

C.

Privacy

D.

Keychain

Full Access
Question # 73

A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?

A.

Enable promiscuous mode.

B.

Clear the browser cache.

C.

Add a new network adapter.

D.

Reset the network adapter.

Full Access
Question # 74

A user's Windows computer seems to work well at the beginning of the day. However, its performance degrades throughout the day, and the system freezes when several applications are open. Which of the following should a technician do to resolve the issue? (Select two).

    Install the latest GPU drivers.

A.

Reinstall the OS.

B.

Increase the RAM.

C.

Increase the hard drive space.

D.

Uninstall unnecessary software.

E.

Disable scheduled tasks.

Full Access
Question # 75

Which of the following filesystem formats would be the BEST choice to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems?

A.

APFS

B.

ext4

C.

CDFS

D.

FAT32

Full Access
Question # 76

A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?

A.

Internet-based upgrade

B.

Repair installation

C.

Clean install

D.

USB repair

E.

In place upgrade

Full Access
Question # 77

Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).

A.

Biometric lock

B.

Badge reader

C.

USB token

D.

Video surveillance

E.

Locking rack

F.

Access control vestibule

Full Access
Question # 78

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

A.

UAC

B.

MDM

C.

LDAP

D.

SSO

Full Access
Question # 79

A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?

A.

msinfo32.exe

B.

dxdiag.exe

C.

msconfig.exe

D.

regedit.exe

Full Access
Question # 80

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

A.

User account status

B.

Mobile OS version

C.

Data plan coverage

D.

Network traffic outages

Full Access
Question # 81

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

A.

VPN

B.

MSRA

C.

SSH

D.

RDP

Full Access
Question # 82

Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).

A.

Multifactor authentication

B.

Badge reader

C.

Personal identification number

D.

Firewall

E.

Motion sensor

F.

Soft token

Full Access
Question # 83

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?

A.

Changing channels

B.

Modifying the wireless security

C.

Disabling the SSIO broadcast

D.

Changing the access point name

Full Access
Question # 84

A Windows computer is experiencing slow performance when the user tries to open programs and files. The user recently installed a new software program from an external website.

Various websites are being redirected to an unauthorized site, and Task Manager shows the CPU usage is consistently at 100%. Which of the following should the technician do first?

A.

Uninstall the new program.

B.

Check the HOSTS file.

C.

Restore from a previous backup.

D.

Clear the web browser cache.

Full Access
Question # 85

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Full Access
Question # 86

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

Full Access
Question # 87

Windows updates need to be performed on a department's servers. Which of the following methods should be used to connect to the server?

A.

FIP

B.

MSRA

C.

RDP

D.

VPN

Full Access
Question # 88

A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor. Which of the following procedures should the technician perform?

A.

Boot into safe mode.

B.

Perform a malware scan.

C.

Restart the machine.

D.

Reinstall the browser

Full Access
Question # 89

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

A.

Cryptominers

B.

Rootkit

C.

Spear phishing

D.

Keylogger

Full Access
Question # 90

Which of the following threats will the use of a privacy screen on a computer help prevent?

A.

Impersonation

B.

Shoulder surfing

C.

Whaling

D.

Tailgating

Full Access
Question # 91

Which of the following Is a package management utility for PCs that are running the Linux operating system?

A.

chmod

B.

yum

C.

man

D.

grep

Full Access
Question # 92

A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?

A.

Disable System Restore.

B.

Educate the end user.

C.

Install the latest OS patches.

D.

Clean the environment reinstallation.

Full Access
Question # 93

An Internet cafe has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?

A.

Spyware is redirecting browser searches.

B.

A cryptominer is verifying transactions.

C.

Files were damaged from a cleaned virus infection.

D.

A keylogger is capturing user passwords.

Full Access
Question # 94

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

A.

Quarantine the computer.

B.

Disable System Restore.

C.

Update the antivirus software definitions.

D.

Boot to safe mode.

Full Access
Question # 95

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

A.

Temperature levels

B.

Location of the servers

C.

Humidity levels

D.

Noise levels

E.

Lighting levels

F.

Cable management

Full Access
Question # 96

A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the following tools should the technician use to resolve this issue?

A.

taskschd.msc

B.

eventvwr.msc

C.

de vmgmt. msc

D.

diskmgmt.msc

Full Access
Question # 97

A technician needs to provide recommendations about how to upgrade backup solutions for a site in an area that has frequent hurricanes and an unstable power grid. Which of the following should the technician recommend implementing?

A.

High availability

B.

Regionally diverse backups

C.

On-site backups

D.

Incremental backups

Full Access
Question # 98

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Full Access
Question # 99

Which of the following should be used to secure a device from known exploits?

A.

Encryption

B.

Remote wipe

C.

Operating system updates

D.

Cross-site scripting

Full Access
Question # 100

While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?

A.

Evil twin

B.

Impersonation

C.

Insider threat

D.

Whaling

Full Access
Question # 101

A new employee was hired recently. Which of the following documents will the new employee need to sign before being granted login access to the network?

A.

MSDS

B.

EULA

C.

UAC

D.

AUP

Full Access
Question # 102

An implementation specialist is replacing a legacy system at a vendor site that has only one wireless network available. When the specialist connects to Wi-Fi. the specialist realizes the insecure network has open authentication. The technician needs to secure the vendor's sensitive data. Which of the following should the specialist do FIRST to protect the company's data?

A.

Manually configure an IP address, a subnet mask, and a default gateway.

B.

Connect to the vendor's network using a VPN.

C.

Change the network location to private.

D.

Configure MFA on the network.

Full Access
Question # 103

A technician wants to install Developer Mode on a Windows laptop but is receiving a "failed to install package" message. Which of the following should the technician do first?

A.

Ensure internet connectivity.

B.

Check for Windows updates.

C.

Enable SSH.

D.

Reboot computer.

Full Access
Question # 104

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?

A.

Private-browsing mode

B.

Invalid certificate

C.

Modified file

D.

Browser cache

Full Access
Question # 105

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

A.

Requiring employees to enter their usernames and passwords

B.

Setting up facial recognition for each employee

C.

Using a PIN and providing it to employees

D.

Requiring employees to use their fingerprints

Full Access
Question # 106

A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the user do to resolve the issue?

A.

Turn off airplane mode while at the register.

B.

Verify that NFC is enabled.

C.

Connect to the store's Wi-Fi network.

D.

Enable Bluetooth on the phone.

Full Access
Question # 107

Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?

A.

APFS

B.

FAT32

C.

NTFS

D.

ext4

Full Access
Question # 108

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?

A.

Privacy

B.

Advanced

C.

Content

D.

Connections

E.

Security

Full Access
Question # 109

Which of the following is the best reason for sandbox testing in change management?

    To evaluate the change before deployment

A.

To obtain end-user acceptance

B.

To determine the affected systems

C.

To select a change owner

Full Access
Question # 110

An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices?

    Devices and Printers

A.

Ease of Access

B.

Programs and Features

C.

Device Manager

Full Access
Question # 111

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

A.

Reinstall the application on the smartphone.

B.

Update the smartphone's OS.

C.

Reset the smartphone to factory settings.

D.

Reboot the smartphone.

Full Access
Question # 112

A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?

A.

Respond to calls and text messages while on site but not when working directly with personnel.

B.

Respond to calls and text messages only from family.

C.

Respond to calls and text messages only when an emergency situation requires a response.

D.

Respond to calls and text messages discreetly while on site.

Full Access
Question # 113

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

A.

Investigate the firewall logs.

B.

Isolate the machine from the network.

C.

Inspect the Windows Event Viewer.

D.

Take a physical inventory of the device.

Full Access
Question # 114

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?

    SSID

A.

DHCP

B.

Firewall

C.

SSD

Full Access
Question # 115

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

Which of the following should be done NEXT?

A.

Educate the user on the solution that was performed.

B.

Tell the user to take time to fix it themselves next time.

C.

Close the ticket out.

D.

Send an email to Telecom to inform them of the Issue and prevent reoccurrence.

Full Access
Question # 116

A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?

A.

Password-protected Wi-Fi

B.

Port forwarding

C.

Virtual private network

D.

Perimeter network

Full Access
Question # 117

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?

A.

Encrypting File System

B.

FileVault

C.

BitLocker

D.

Encrypted LVM

Full Access
Question # 118

A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).

A.

Examine the event logs.

B.

Connect to the network.

C.

Document the findings.

D.

Update the definitions.

E.

Reimage the computer.

F.

Enable the firewall.

Full Access
Question # 119

A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue?

    msconfig

A.

chkdsk

B.

sfc

C.

diskpart

D.

mstsc

Full Access
Question # 120

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Full Access
Question # 121

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

A.

ipconfig

B.

ifconfig

C.

arpa

D.

ping

Full Access
Question # 122

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Full Access
Question # 123

A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?

A.

cat

B.

chmod

C.

pwd

D.

cacls

Full Access
Question # 124

A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements?

A.

PIN

B.

Username and password

C.

SSO

D.

Fingerprint

Full Access
Question # 125

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)

A.

Scan the computer with the company-provided antivirus software

B.

Install a new hard drive and clone the user's drive to it

C.

Deploy an ad-blocking extension to the browser.

D.

Uninstall the company-provided antivirus software

E.

Click the link in the messages to pay for virus removal

F.

Perform a reset on the user's web browser

Full Access
Question # 126

A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend?

A.

Corporate

B.

Open-source

C.

Personal

D.

Enterprise

Full Access
Question # 127

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?

A.

To determine which party had the machine and when.

B.

To remotely wipe sensitive data from the machine.

C.

To gather the information needed to replace the machine.

D.

To alert the owner that the password needs to be changed.

Full Access
Question # 128

A customer called the help desk to report that a machine that was recently updated is no longer working. The support technician checks the latest logs to see what updates were deployed, but nothing was

deployed in more than three weeks. Which of the following should the support technician do to BEST resolve the situation?

A.

Offer to wipe and reset the device for the customer.

B.

Advise that the help desk will investigate and follow up at a later date.

C.

Put the customer on hold and escalate the call to a manager.

D.

Use open-ended questions to further diagnose the issue.

Full Access
Question # 129

A Linux technician needs a filesystem type that meets the following requirements:

. All changes are tracked.

. The possibility of file corruption is reduced.

· Data recovery is easy.

Which of the following filesystem types best meets these requirements?

    ext3

A.

FAT32

B.

exFAT

C.

NTFS

Full Access
Question # 130

A user visits a game vendor's website to view the latest patch notes, but this information is not available on the page. Which of the following should the user perform before reloading the page?

A.

Synchronize the browser data.

B.

Enable private browsing mode.

C.

Mark the site as trusted.

D.

Clear the cached file.

Full Access
Question # 131

A desktop technician has received reports that a user's PC is slow to load programs and saved files. The technician investigates and discovers an older HDD with adequate free space. Which of the following should the technician use to alleviate the issue first?

A.

Disk Management

B.

Disk Defragment

C.

Disk Cleanup

D.

Device Manager

Full Access
Question # 132

A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?

A.

Escalating the issue to Tier 2

B.

Verifying warranty status with the vendor

C.

Replacing the motherboard

D.

Purchasing another PC

Full Access
Question # 133

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?

A.

USB drive

B.

DVD Installation media

C.

PXE boot

D.

Recovery partition

Full Access
Question # 134

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?

A.

Preserving chain of custody

B.

Implementing data protection policies

C.

Informing law enforcement

D.

Creating a summary of the incident

Full Access
Question # 135

Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and Its files. Which of the following will MOST likely allow all users to access the new folders?

A.

Assigning share permissions

B.

Enabling inheritance

C.

Requiring multifactor authentication

D.

Removing archive attribute

Full Access
Question # 136

A remote user is experiencing issues with Outlook settings and asks a technician to review the settings. Which of the following can the technician use to access the user's computer remotely?

A.

VPN

B.

RDP

C.

RMM

D.

SSH

Full Access
Question # 137

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence. Which of the following was MOST likely violated during the investigation?

A.

Open-source software

B.

EULA

C.

Chain of custody

D.

AUP

Full Access
Question # 138

A payroll workstation has data on it that needs to be readily available and can be recovered quickly if something is accidentally removed. Which of the following backup methods should be used to provide fast data recovery in this situation?

A.

Full

B.

Differential

C.

Synthetic

D.

Incremental

Full Access
Question # 139

Which of the following macOS features can help a user close an application that has stopped responding?

A.

Finder

B.

Mission Control

C.

System Preferences

D.

Force Quit

Full Access
Question # 140

A company's assets are scanned annually. Which of the following will most likely help the company gain a holistic view of asset cost?

A.

Creating a database

B.

Assigning users to assets

C.

Inventorying asset tags

D.

Updating the procurement account owners

Full Access
Question # 141

A technician receives a help desk ticket from a user who is unable to update a phone. The technician investigates the issue and notices the following error message: Insufficient storage space

While analyzing the phone, the technician does not discover any third-party' applications or photos. Which of the following is the best way to resolve the issue?

A.

Exchange the device for a newer one.

B.

Upgrade the onboard storage

C.

Allocate more space by removing factory applications

D.

Move factory applications to external memory.

Full Access
Question # 142

A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?

A.

Disabling UAC

B.

Restricting local administrators

C.

Enabling UPnP

D.

Turning off AutoPlay

Full Access
Question # 143

A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?

A.

Expired certificate

B.

False alert

C.

Missing system files

D.

OS update failure

Full Access
Question # 144

A technician needs to configure a computer for a user to work from home so the user can still securely access the user’s shared files and corporate email. Which of the following tools would best accomplish this task*?

A.

MSRA

B.

FTP

C.

RMM

D.

VPN

Full Access
Question # 145

Which of the following operating systems were designed for smartphones? (Select two).

A.

Ubuntu

B.

CentOS

C.

macOS

D.

Chrome OS

E.

iOS

F.

Android

Full Access
Question # 146

A user's company phone has several pending software updates. A technician completes the following steps:

•Rebooted the phone

•Connected to Wi-Fi

•Disabled metered data

Which of the following should the technician do next?

A.

Restore the factory settings.

B.

Clean the browser history.

C.

Uninstall and reinstall the applications.

D.

Clear the cache.

Full Access
Question # 147

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).

A.

Degauss

B.

Delete

C.

Incinerate

D.

Recycle

E.

Format

F.

Shred

Full Access
Question # 148

A user's company phone was stolen. Which of the following should a technician do next?

A.

Perform a low-level format.

B.

Remotely wipe the device.

C.

Degauss the device.

D.

Provide the GPS location of the device.

Full Access
Question # 149

Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team

implement?

A.

SSH

B.

VNC

C.

VPN

D.

RDP

Full Access
Question # 150

A technician is modifying the default home page of all the workstations in a company. Which of the following will help to implement this change?

A.

Group Policy

B.

Browser extension

C.

System Configuration

D.

Task Scheduler

Full Access
Question # 151

Which of the following involves sending arbitrary characters in a web page request?

A.

SMS

B.

SSL

C.

XSS

D.

VPN

Full Access
Question # 152

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

A.

.bat

B.

.dll

C.

.ps1

D.

.txt

Full Access
Question # 153

A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next?

    Restart the phone.

A.

Reimage the OS.

B.

Reinstall the application.

C.

Clear the cache.

Full Access
Question # 154

A technician needs administrator access on a Windows workstation to facilitate system changes without elevating permissions. Which of the following would best accomplish this task?

A.

Group Policy Editor

B.

Local Users and Groups

C.

Device Manager

D.

System Configuration

Full Access
Question # 155

Which of the following protocols supports fast roaming between networks?

A.

WEP

B.

WPA

C.

WPA2

D.

LEAP

E.

PEAP

Full Access
Question # 156

Which of the following is an example of MFA?

A.

Fingerprint scan and retina scan

B.

Password and PIN

C.

Username and password

D.

Smart card and password

Full Access
Question # 157

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

A.

Zero day

B.

Vishing

C.

DDoS

D.

Evil twin

Full Access
Question # 158

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?

A.

Rebuild the Windows profiles.

B.

Restore the computers from backup.

C.

Reimage the computers.

D.

Run the System File Checker.

Full Access
Question # 159

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

A.

Degaussing

B.

Low-level formatting

C.

Recycling

D.

Shredding

Full Access
Question # 160

An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT?

A.

Perform a risk analysis.

B.

Implement the deployment.

C.

Verify end user acceptance

D.

Document the lessons learned.

Full Access
Question # 161

A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?

A.

Delete the browser cookies and history.

B.

Reset all browser settings.

C.

Change the browser default search engine.

D.

Install a trusted browser.

Full Access
Question # 162

Which of the following is a data security standard for protecting credit cards?

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Full Access
Question # 163

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

A.

Access control list

B.

Acceptable use policy

C.

Incident report

D.

Standard operating procedure

Full Access
Question # 164

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

A.

The SNTP server is offline.

B.

A user changed the time zone on a local machine.

C.

The Group Policy setting has disrupted domain authentication on the system,

D.

The workstations and the authentication server have a system clock difference.

Full Access
Question # 165

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

Full Access
Question # 166

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

A.

ipconfig /all

B.

hostname

C.

netstat /?

D.

nslookup localhost

E.

arp —a

F.

ping:: 1

Full Access
Question # 167

Before leaving work, a user wants to see the traffic conditions for the commute home. Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.?

A.

taskschd.msc

B.

perfmon.msc

C.

lusrmgr.msc

D.

Eventvwr.msc

Full Access
Question # 168

While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue?

A.

A bad antivirus signature update was installed.

B.

A router was misconfigured and was blocking traffic.

C.

An upstream internet service provider was flapping.

D.

The time or date was not in sync with the website.

Full Access
Question # 169

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Full Access
Question # 170

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

A.

Put on an ESD strap

B.

Disconnect the power before servicing the PC.

C.

Place the PC on a grounded workbench.

D.

Place components on an ESD mat.

Full Access
Question # 171

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the

computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?

A.

Services in Control Panel to check for overutilization

B.

Performance Monitor to check for resource utilization

C.

System File Checker to check for modified Windows files

D.

Event Viewer to identify errors

Full Access
Question # 172

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

A.

Drilling

B.

Degaussing

C.

Low-level formatting

D.

Erasing/wiping

Full Access
Question # 173

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

A.

The UEFI settings need to be changed.

B.

The RAM has compatibility issues with Windows 10.

C.

Some of the RAM is defective.

D.

The newly installed OS is x86.

Full Access
Question # 174

A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially

infect the network systems. Which of the following is the MOST effective method for dealing with this Issue?

A.

Adjusting the spam gateway

B.

Updating firmware for the spam appliance

C.

Adjusting AV settings

D.

Providing user training

Full Access
Question # 175

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

A.

Installer_x64.exe

B.

Installer_Files.zip

C.

Installer_32.msi

D.

Installer_x86.exe

E.

Installer_Win10Enterprise.dmg

Full Access
Question # 176

A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping, all functioning devices also turned off. In case of a future power failure, the customer wants to have the most time available to save cloud documents and shut down the computer without losing any data.

Full Access
Question # 177

A help desk technician runs the following script: Inventory.py. The technician receives the following error message:

How do you want to Open this file?

Which of the following is the MOST likely reason this script is unable to run?

A.

Scripts are not permitted to run.

B.

The script was not built for Windows.

C.

The script requires administrator privileges,

D.

The runtime environment is not installed.

Full Access
Question # 178

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

A.

Avoid distractions

B.

Deal appropriately with customer's confidential material .

C.

Adhere to user privacy policy

D.

Set and meet timelines

Full Access
Question # 179

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

A.

Encrypt the workstation hard drives.

B.

Lock the workstations after five minutes of inactivity.

C.

Install privacy screens.

D.

Log off the users when their workstations are not in use.

Full Access
Question # 180

A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?

A.

Enabling System Restore

B.

Educating the user

C.

Booting into safe mode

D.

Scheduling a scan

Full Access
Question # 181

A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?

A.

Remove the microphone from the USB hub and plug it directly into a USB port on the PC.

B.

Enable the microphone under Windows Privacy settings to allow desktop applications to access it.

C.

Delete the microphone from Device Manager and scan for new hardware,

D.

Replace the USB microphone with one that uses a traditional 3.5mm plug.

Full Access
Question # 182

Which of the following data is MOST likely to be regulated?

A.

Name in a Phone book

B.

Name on a medical diagnosis

C.

Name on a job application

D.

Name on a employer's website

Full Access
Question # 183

A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

A.

Turn off the monitor.

B.

Remove the power cord.

C.

Remove the PSU.

D.

Remove the RAM modules.

Full Access
Question # 184

A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?

A.

Internet connection

B.

Product key

C.

Sufficient storage space

D.

UEFI firmware

E.

Legacy BIOS

Full Access
Question # 185

Which of the following features can be used to ensure a user can access multiple versions of files?

A.

Multiple desktops

B.

Remote Disc

C.

Time Machine

D.

FileVault

Full Access
Question # 186

A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed optional Windows updates. Which of the following is best way to resolve the issue?

A.

Enable System Restore.

B.

Roll back the device drivers.

C.

Reinstall the OS.

D.

Update the BIOS.

Full Access
Question # 187

A technician receives a high-priority ticket about sensitive information collected from an end user’s workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

A.

Reimage the workstation.

B.

Inform the user of the investigation.

C.

Recover and secure the workstation.

D.

Back up the workstation

Full Access
Question # 188

A company wants to take advantage of modern technology and transition away from face-to-face meetings. Which of the following types of software would benefit the company the most? (Select two).

A.

Videoconferencing

B.

File transfer

C.

Screen-sharing

D.

Financial

E.

Remote access

F.

Record-keeping

Full Access
Question # 189

A technician receives a call (rom a user who is having issues with an application. To best understand the issue, the technician simultaneously views the user's screen with the user. Which of the following would BEST accomplish this task?

A.

SSH

B.

VPN

C.

VNC

D.

RDP

Full Access
Question # 190

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

A.

Power off the machine.

B.

Run a full antivirus scan.

C.

Remove the LAN card.

D.

Install a different endpoint solution.

Full Access
Question # 191

A user is unable to access a website, which is widely used across the organization, and receives the following error message:

The security certificate presented by this website has expired or is not yet valid.

The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?

A.

Reboot the computer.

B.

Reinstall the OS.

C.

Configure a static 12

D.

Check the computer's date and time.

Full Access
Question # 192

Which of the following is the STRONGEST wireless configuration?

A.

WPS

B.

WPA3

C.

WEP

D.

WMN

Full Access
Question # 193

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?

A.

resmon_exe

B.

dfrgui_exe

C.

msinf032exe

D.

msconfig_exe

Full Access
Question # 194

Which of the following is a consequence of end-of-lite operating systems?

A.

Operating systems void the hardware warranty.

B.

Operating systems cease to function.

C.

Operating systems no longer receive updates.

D.

Operating systems are unable to migrate data to the new operating system.

Full Access
Question # 195

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

A.

Golden image

B.

Remote network install

C.

In-place upgrade

D.

Clean install

Full Access
Question # 196

A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?

A.

The user is not connected to the VPN.

B.

The file server is offline.

C.

A low battery is preventing the connection.

D.

The log-in script failed.

Full Access
Question # 197

Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).

A.

.mac

B.

.Pkg

C.

.deb

D.

.dmg

E.

.msi

F.

.appx

G.

.app

Full Access
Question # 198

A technician is upgrading the Microsoft Windows 10 OS. Which of the following are required for the technician to safely upgrade the OS? (Select two).

A.

Release notes

B.

Antivirus software

C.

Backup of critical data

D.

Device drivers

E.

Word processing software

F.

Safe boot mode

Full Access
Question # 199

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?

A.

Thegraphics card driver needs to beupdated

B.

Theapplication installer is 64-bit.

C.

Theinstallation requires administrative rights.

D.

Thedisk space is inadequate.

Full Access
Question # 200

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:

"This site cannot be reached."

A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?

A.

HTTPS

B.

VLAN

C.

DNS

D.

SMTP

Full Access
Question # 201

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Full Access
Question # 202

A technician is installing a new copy of Windows on all computers in the enterprise Given the following requirements:

• The install phase must be scripted to run over the network • Each computer requires a new SSD as the system drive, • The existing HDD should remain as a backup drive.

Which of the following command-line tools should the technician use to install the drive and transfer the installation files from the network share? (Select three).

A.

net use

B.

robocopy

C.

winver

D.

diskpart

E.

sfc

F.

r.etstat

G.

ping

Full Access
Question # 203

A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?

A.

Security groups

B.

Folder redirection

C.

Organizational unit structure

D.

Access control list

Full Access
Question # 204

Which of the following languages is used for scripting the creation of Active Directory accounts?

A.

Bash

B.

Structured Query Language

C.

Hypertext Preprocessor

D.

PowerShell

Full Access
Question # 205

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Full Access
Question # 206

A technician is troubleshooting a Windows system that is having issues with the OS loading at startup. Which of the following should the technician do to diagnose the issue?

A.

Enable boot logging on the system.

B.

Launch the last known-good configuration.

C.

Check the system resource usage in Task Manager.

D.

Run the sfc /scannow command.

E.

Use the Event Viewer to open the application log

Full Access
Question # 207

A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with?

A.

Device

B.

Business

C.

Network

D.

Operation

Full Access
Question # 208

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?

A.

SSH

B.

MDM

C.

RDP

D.

SFTP

Full Access
Question # 209

Which of the following environmental controls is most important to maintain the safety of a data center?

A.

Temperature control

B.

Humidity control

C.

Fire suppression control

D.

Power managementcontrol

Full Access
Question # 210

A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and has no subnet mask. Which of the following should the technician check next?

A.

Internal antenna connections

B.

Static IP settings

C.

Airplane mode

D.

Digitizer calibration

Full Access
Question # 211

A user reports that an Android mobile device takes a long time to boot, and all applications crash when launched. The user installed the applications from a third-party website. Which of the following steps should the technician complete to diagnose the issue?

A.

Scan the system for malware.

B.

Clear the web browser cache.

C.

Enroll the device in an MDM system.

D.

Confirm the compatibility of the applications with the OS.

Full Access
Question # 212

A user's Windows desktop has low disk space. A technician thinks some upgrade files were never removed. Which of the following tools should the technician use to correct the issue?

A.

devmgmt.msc

B.

cleanmgr.exe

C.

dfrgui.exe

D.

diskmgmt.mac

Full Access
Question # 213

An organization wants to deploy a customizable operating system. Which of the following should the organization choose?

A.

Windows 10

B.

macOS

C.

Linux

D.

Chrome OS

E.

iOS

Full Access
Question # 214

A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

A.

Install antispyware

B.

Reimage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

Full Access
Question # 215

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Full Access
Question # 216

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

A.

Trojan

B.

Boot sector virus

C.

Spyware

D.

Rootkit

Full Access
Question # 217

Which of the following language types enables the automation of tasks?

A.

Compiled

B.

Scripting

C.

Web

D.

Database

Full Access
Question # 218

A network administrator is setting up the security for a SOHO wireless network. Which of the following options should the administrator enable to secure the network?

A.

NAT

B.

WPA3

C.

802.1X

D.

Static IP

Full Access
Question # 219

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

A.

Replacing non-mobile users' laptops with wired desktop systems

B.

Increasing the wireless network adapter metric

C.

Adding wireless repeaters throughout the building

D.

Upgrading the current mesh network to support the 802.11 n specification

Full Access
Question # 220

A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?

A.

Reviewing System Information

B.

Running Disk Cleanup

C.

Editing the Registry

D.

Checking the Performance Monitor

E.

Increasing the memory

Full Access
Question # 221

Which of the following commands lists running processes in Linux?

A.

top

B.

apt-get

C.

Is

D.

cat

Full Access
Question # 222

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

A.

Application permissions

B.

Available storage space

C.

Battery charge level

D.

Wi-Fi connection speed

Full Access
Question # 223

A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Select two).

A.

Uninstall the game application.

B.

Perform a factory reset of the device.

C.

Connect the device to an external charger.

D.

Install the latest security patches.

E.

Clear the application's cache.

F.

Enable the device's built-in anti-malware protection.

Full Access
Question # 224

Which of the following commands should a technician use to change user permissions?

A.

sudo

B.

chxod

C.

xv

D.

pwd

Full Access
Question # 225

A user's work PC has been the target of multiple phishing attacks. Which of the following is a way for the user to prevent further attacks?

A.

Enabling Windows Firewall

B.

Activating the email spam filter

C.

Using a secure VPN connection

D.

Running vulnerability scans on a schedule

Full Access
Question # 226

A user's computer was infected with a Trojan. The user thinks the Trojan was introduced when clicking on a malicious link in an email. Which of the following actions should the technician take to prevent further damage to the computer?

A.

Ensure anti-malware signatures are up to date.

B.

Enable the firewall.

C.

Scan the system with a rootkit scanner.

D.

Review the proxy settings.

Full Access
Question # 227

A systems administrator finds that a Windows client machine with an address of 169.254.124.24 is unable to access network resources. Which of the following should the administrator do to establish connectivity?

A.

Reinstall the NIC device driver.

B.

Assign a static IP.

C.

Reconfigure DNS settings.

D.

Disable the Windows firewall.

Full Access
Question # 228

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Full Access
Question # 229

Users report that they can log in to the web application during business hours, but none of the application's functions are working properly. Company policy does not allow for the server to be rebooted during business hours. Which of the following should a technician do to fix the web application and follow company policy?

A.

Restart services.

B.

Roll back Windows updates.

C.

Perform a Windows repair.

D.

Add RAM to the server.

Full Access
Question # 230

A user identified that a program installed in a workstation does not have optional features enabled. Which of the following must the technician do to install the optional features?

A.

Goto Programs andFeatures, uninstall the program, and reinstallit.

B.

Goto AdministrativeTools and edit System Configuration.

C.

Goto AdministrativeTools and run Disk Cleanup.

D.

Goto Programs andFeatures, select the program, and click onChange.

Full Access
Question # 231

A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially. Which of the following considerations was overlooked?

A.

OS compatibility

B.

Quality of service

C.

32- vs. 64-bit architecture

D.

Storage requirements

Full Access
Question # 232

A technician needs to configure a computer for a user to work from home so the user can still securely access the user's shared files and corporate email. Which of the following tools would best accomplish this task?

A.

MSRA

B.

FTP

C.

RMM

D.

VPN

Full Access
Question # 233

A developer installed a new software package that has stopped all file server access. Which of the following change management practices should have been followed?

A.

End-user acceptance

B.

Staff delegation

C.

Appropriate scoping

D.

Sandbox testing

Full Access
Question # 234

A technician is troubleshooting an issue on a PC that has low disk space. Which of the following Control Panel utilities should the technician most likely use to investigate and remediate the issue?

A.

Internet Options

B.

System

C.

Programs and Features

D.

Device Manager

Full Access
Question # 235

A technician is troubleshooting a connectivity issue and wants to verify that traffic is flowing to the correct upstream locations. Which of the following commands should the technician use?

A.

net use

B.

nslookup

C.

traceroute

D.

netstat

Full Access
Question # 236

Which of the following is natively used with Active Directory?

A.

Windows 10

B.

macOS

C.

Linux

D.

Chrome OS

Full Access
Question # 237

A technician runs a command and gets the following output:

Ethernet adapter Ethernet 3:

Connection-specific DNS Suffix . :reddog.microsoft.com

Link-local IPv6 Address .......... :fe80::de3d:9283:4f00:856a%5

IPv4 Address.......................:10.203.10.16

Subnet Mask ...................... :255.255.255.0

Default Gateway .................. :10.203.10.1

Which of the following commands did the technician use?

A.

ipconfig

B.

tracert

C.

whoami

D.

net use

Full Access
Question # 238

A user is unable to access the company’s internal network on a separate subnet. A help desk technician verifies the user's credentials, and the user has the appropriate permissions to access the network. The technician checks the network and finds the connection is stable. No other users are having this issue. Which of the following should the technician do next?

A.

Consult with the firewall team to see If the user's IP address Is blocked.

B.

Delete the user’s credentials and create new ones.

C.

Run a virus scan on the user's workstation.

D.

Update the network drivers on the user’s workstation.

Full Access
Question # 239

A technician needs to override DNS and map IP addresses and URLs to different locations. Which of the following should the technician do?

A.

Install signal repeaters.

B.

Edit the hosts file.

C.

Configure the firewall.

D.

Enable port forwarding.

Full Access