Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam Exam Practice Test

Page: 1 / 76
Total 763 questions

CompTIA A+ Certification Core 2 Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

A technician discovers a user’s PC has a "No OS found" error message. Which of the following steps should the technician take next?

Options:

A.

Remove external storage and reboot the PC.

B.

Replace the SSD and run disk defragmenter.

C.

Start up in safe mode and roll back the latest security updates.

D.

Back up personal data and rebuild the user profile.

Question 2

Due to special job responsibilities, an end user needs the ability to edit the properties of Windows system files. The user has already been granted local administrator privileges. Which of the following Control Panel utilities should be used to provide easy access to the files?

Options:

A.

File Explorer Options

B.

Ease of Access

C.

Indexing Options

D.

Administrative Tools

Question 3

A technician is creating a Windows splash screen that details login expectations. Which of the following should the technician most likely use?

Options:

A.

End-user license agreement

B.

Non-disclosure agreement

C.

Regulatory compliance

D.

Acceptable use policy

Question 4

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

Options:

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Question 5

A user is unable to open personal files on a PC on a home network. An on-screen message indicates the files are encrypted and demands payment to access the files. Which of the following should a technician recommend the user do first?

Options:

A.

Reinstall the OS.

B.

Run the System Restore feature.

C.

Disconnect the PC from the network.

D.

Pay the amount demanded.

E.

Scan the PC with an anti-malware program.

Question 6

A user's smartphone screen is not rotating. The technician confirms the rotation lock is deactivated. Which of the following steps should the technician perform next?

Options:

A.

Remove the screen protector.

B.

Update the smartphone’s software.

C.

Restart the smartphone.

D.

Replace the smartphone.

Question 7

A client recently upgraded their Windows 10 machine to Windows 11. The client reports the following message displays when turning the computer on: "Error loading operating system." Which of the following should a technician do first to troubleshoot this issue?

Options:

A.

Disable the Secure Boot feature.

B.

Use the automated startup recovery.

C.

Format the drive.

D.

Resize the boot partition.

Question 8

An administrator's change was approved by the change management review board. Which of the following should the administrator do next?

Options:

A.

Perform risk analysis.

B.

Assign a change coordinator.

C.

Implement the change.

D.

Verify testing results.

Question 9

The camera and microphone on an iPhone user's device are activating without any user input. The user’s friend recently modified the device to allow applications to be installed outside the normal App Store. Which of the following is the issue?

Options:

A.

The user connected a counterfeit Lightning cable to the iPhone.

B.

The device is unenrolled from Mobile Device Management.

C.

The device was jailbroken to remove internal security protections.

D.

The iPhone has an out-of-date operating system.

Question 10

A user is unable to access the company's network. A technician learns the user's account became inaccessible after multiple unsuccessful login attempts. The user also changed their password before the issue started. Which of the following steps should the technician take to resolve the issue?

Options:

A.

Escalate the user’s issue to the network team.

B.

Reset the user's password.

C.

Unlock the user's account.

D.

Verify the user's login and password.

Question 11

Which of the following is a preventive physical security control?

Options:

A.

Video surveillance system

B.

Bollards

C.

Alarm system

D.

Motion sensors

Question 12

A user connected a smartphone to a coffee shop’s public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity. A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do immediately to best address these security and privacy concerns? (Select two).

Options:

A.

Enable airplane mode.

B.

Stay offline when in public places.

C.

Uninstall recently installed applications.

D.

Schedule an antivirus scan.

E.

Reboot the device.

F.

Install all application updates.

Question 13

A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company's application portal but cannot access a specific SaaS-based tool. Which of the following would the technician most likely suggest as a next step?

Options:

A.

Reenroll the user's mobile device to be used as an MFA token.

B.

Use a private browsing window to avoid local session conflicts.

C.

Bypass single sign-on by directly authenticating to the application.

D.

Reset the device being used to factory defaults.

Question 14

A technician needs to configure a newly installed SSD. Which of the following tools should the technician use? (Select two).

Options:

A.

regedit.exe

B.

resmon.exe

C.

gpedit.msc

D.

diskmgmt.msc

E.

dfrgui.exe

F.

diskpart.msc

Question 15

A developer installed a new software package that has stopped all file server access. Which of the following change management practices should have been followed?

Options:

A.

End-user acceptance

B.

Staff delegation

C.

Appropriate scoping

D.

Sandbox testing

Question 16

A proxy server is required for internet access from a corporate network. Which of the following should a technician perform to manually configure a Windows 10 device for internet access?

Options:

A.

Add the proxy server's URL and IP address to the computer's hosts file under C:\windows\System32\drivers\etc.

B.

Enable the use of a proxy server and enter an address for it under Control Panel > Internet Options > Connections > LAN settings.

C.

Open a command prompt and run ipconfig /release, followed by ipconfig /renew.

D.

Set the proxy server as the default gateway under the computer's network connection IP settings by selecting Manual, then entering the proxy server's IP address under Gateway.

Question 17

A user downloaded a 64-bit version of a new software program, but the installation failed due to an error. Which of the following most likely caused the error?

Options:

A.

The OS version is incompatible.

B.

The user needs to enable ActiveX.

C.

The .NET Framework needs to be updated.

D.

The user needs administrator privileges.

Question 18

After a user recently installs a new scanner and the associated software on a computer, they notice the computer is now starting up very slowly. Which of the following is the best tool to troubleshoot this issue?

Options:

A.

Resource Monitor

B.

Task Manager

C.

Device Manager

D.

Windows Update

E.

Event Viewer

Question 19

A technician needs to implement password requirements that apply to all domain-joined computers. Which of the following commands should the technician most likely run?

Options:

A.

gpugdate

B.

devmgmt

C.

regedit

D.

resmon

Question 20

A Windows user wants a filesystem that protects confidential data from attackers who have physical access to the system. Which of the following should the user choose?

Options:

A.

ext

B.

APFS

C.

FAT

D.

EFS

Question 21

A user asks a technician for recommendations to back up desktop data from a Windows OS. The technician recommends implementing daily full backups, but the user is concerned about having enough space. Which of the following additional backup methods should the technician recommend?

Options:

A.

Transaction log

B.

Incremental

C.

Synthetic

D.

Differential

Question 22

A technician is reusing several hard drives to increase local storage on company workstations. The drives contain PII that is no longer needed. Which of the following should the technician do to prevent unauthorized access to the data?

Options:

A.

Degauss the drives

B.

Drill through the drives

C.

Wipe the drives

D.

Reimage the drives

Question 23

A user is unable to log in to a workstation. The user reports an error message about the date being incorrect. A technician reviews the date and verifies it is correct, but the system clock is an hour behind. The technician also determines this workstation is the only one affected. Which of the following is the most likely issue?

Options:

A.

Time drift

B.

NTP failure

C.

Windows Update

D.

CMOS battery

Question 24

A technician is installing a new SOHO wireless router and wants to ensure it is secure and uses the latest network features. Which of the following should the technician do first?

Options:

A.

Disable the unused ports.

B.

Enable DHCP reservations.

C.

Update the firmware.

D.

Disable the guest account.

Question 25

A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially. Which of the following considerations was overlooked?

Options:

A.

OS compatibility

B.

Quality of service

C.

32- vs. 64-bit architecture

D.

Storage requirements

Question 26

A technician is troubleshooting a PC that will not run Windows Defender. Windows Defender has been disabled and no other antivirus is installed on the PC. Which of the following would have caused this issue?

Options:

A.

Ransomware

B.

Rootkit

C.

Spyware

D.

Keylogger

Question 27

A customer needs to purchase a desktop capable of rendering video. Which of the following should the customer prioritize?

Options:

A.

NIC

B.

USB

C.

GPU

D.

HDMI

Question 28

A customer is configuring on an old desktop an inexpensive file server to share photos and videos and wants to avoid complicated licensing. Which of the following operating systems should the technician most likely recommend?

Options:

A.

Chrome OS

B.

Linux

C.

macOS

D.

Windows

Question 29

A technician assigns the equivalent of root-level permissions to a user to perform a task. Which of the following user roles within the Windows OS should the technician choose?

Options:

A.

Power

B.

Default

C.

Administrator

D.

Superuser

Question 30

A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do next?  

Options:

A.

Remove the HDD and then send the computer for repair.

B.

Check corporate policies for guidance.

C.

Delete the sensitive information before the computer leaves the building.

D.

Get authorization from the manager.  

Question 31

An employee utilizes a personal smartphone to work remotely. The employee is unable to reach the portal using the company-provided VPN service. Which of the following describes the cause of the issue?

Options:

A.

The application must be purchased by the company.

B.

The smartphone is not on the latest OS version.

C.

The smartphone is not enrolled in MDM service.

D.

The application fails to install and launch.

Question 32

A user reported that Windows has crashed several times during the day. A technician needs to check error messages to determine whether the issue pertains to the hardware or an application. Which of the following tools should the technician use?

Options:

A.

Event Viewer

B.

Resource Monitor

C.

Performance Monitor

D.

Device Manager

Question 33

Which of the following filesystems supports journaling?

Options:

A.

NTFS

B.

exFAT

C.

HFS

D.

ext2

Question 34

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

Options:

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

Question 35

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

Options:

A.

Golden image

B.

Remote network install

C.

In-place upgrade

D.

Clean install

Question 36

A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?

Options:

A.

PIN-based login

B.

Quarterly password changes

C.

Hard drive encryption

D.

A physical laptop lock

Question 37

Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).

Options:

A.

.mac

B.

.Pkg

C.

.deb

D.

.dmg

E.

.msi

F.

.appx

G.

.app

Question 38

A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?

Options:

A.

Enabling System Restore

B.

Educating the user

C.

Booting into safe mode

D.

Scheduling a scan

Question 39

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

Options:

A.

Windows Enterprise Edition

B.

Windows Professional Edition

C.

Windows Server Standard Edition

D.

Windows Home Edition

Question 40

A user is unable to access a website, which is widely used across the organization, and receives the following error message:

The security certificate presented by this website has expired or is not yet valid.

The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?

Options:

A.

Reboot the computer.

B.

Reinstall the OS.

C.

Configure a static 12

D.

Check the computer's date and time.

Question 41

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

Options:

A.

ipconfig

B.

ifconfig

C.

arpa

D.

ping

Question 42

A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?

Options:

A.

NTFS

B.

APFS

C.

ext4

D.

exFAT

Question 43

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

Options:

A.

Use a network share to share the installation files.

B.

Save software to an external hard drive to install.

C.

Create an imaging USB for each PC.

D.

Install the software from the vendor's website

Question 44

A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely make this change?

Options:

A.

Registry Editor

B.

Task Manager

C.

Event Viewer

D.

Local Users and Groups

Question 45

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

Options:

A.

Rearranging the monitor's position in display settings

B.

Swapping the cables for the monitors

C.

Using the Ctrl+AIt+> to correct the display orientation

D.

Updating the display drivers for the video card

Question 46

A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.

Which of the following should a technician do to remediate the issue?

Options:

A.

Roll back the updates.

B.

Increase the page file.

C.

Update the drivers.

D.

Rebuild the profile.

Question 47

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the

users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

Options:

A.

acceptable use policy.

B.

regulatory compliance requirements.

C.

non-disclosure agreement

D.

incident response procedures

Question 48

A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?

Options:

A.

Dock

B.

Spotlight

C.

Mission Control

D.

Launchpad

Question 49

Which of the following should be done NEXT?

Options:

A.

Send an email to Telecom to inform them of the issue and prevent reoccurrence.

B.

Close the ticket out.

C.

Tell the user to take time to fix it themselves next time.

D.

Educate the user on the solution that was performed.

Question 50

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?

Options:

A.

Rebuild the Windows profiles.

B.

Restore the computers from backup.

C.

Reimage the computers.

D.

Run the System File Checker.

Question 51

Which of the following is MOST likely contained in an EULA?

Options:

A.

Chain of custody

B.

Backup of software code

C.

Personally identifiable information

D.

Restrictions of use

Question 52

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

Question 53

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?

Options:

A.

Enable multifactor authentication.

B.

Increase the failed log-in threshold.

C.

Remove complex password requirements.

D.

Implement a single sign-on with biometrics.

Question 54

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Options:

A.

Avoid distractions

B.

Deal appropriately with customer's confidential material .

C.

Adhere to user privacy policy

D.

Set and meet timelines

Question 55

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

Options:

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

Question 56

Which of the following is a consequence of end-of-lite operating systems?

Options:

A.

Operating systems void the hardware warranty.

B.

Operating systems cease to function.

C.

Operating systems no longer receive updates.

D.

Operating systems are unable to migrate data to the new operating system.

Question 57

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

Options:

A.

Drilling

B.

Degaussing

C.

Low-level formatting

D.

Erasing/wiping

Question 58

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

Options:

A.

The UEFI settings need to be changed.

B.

The RAM has compatibility issues with Windows 10.

C.

Some of the RAM is defective.

D.

The newly installed OS is x86.

Question 59

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Options:

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

Question 60

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

Options:

A.

Installer_x64.exe

B.

Installer_Files.zip

C.

Installer_32.msi

D.

Installer_x86.exe

E.

Installer_Win10Enterprise.dmg

Question 61

After a company installed a new SOHO router customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?

Options:

A.

Port forwarding

B.

Firmware updates

C.

IP filtering

D.

Content filtering

Question 62

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

Options:

A.

Zero day

B.

Vishing

C.

DDoS

D.

Evil twin

Question 63

A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the user do to resolve the issue?

Options:

A.

Turn off airplane mode while at the register.

B.

Verify that NFC is enabled.

C.

Connect to the store's Wi-Fi network.

D.

Enable Bluetooth on the phone.

Question 64

A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?

Options:

A.

The instructions from the software company are not being followed.

B.

Security controls will treat automated deployments as malware.

C.

The deployment script is performing unknown actions.

D.

Copying scripts off the internet is considered plagiarism.

Question 65

A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on. The technician attempts to boot the computer via the NIC to image the computer, but this method does not work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging system via the network?

Options:

A.

The computer's CMOS battery failed.

B.

The computer's NIC is faulty.

C.

The PXE boot option has not been enabled

D.

The Ethernet cable the technician is using to connect the desktop to the network is faulty.

Question 66

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

Options:

A.

Power off the machine.

B.

Run a full antivirus scan.

C.

Remove the LAN card.

D.

Install a different endpoint solution.

Question 67

A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform?

Options:

A.

Change the DNS address to 1.1.1.1

B.

Update Group Policy

C.

Add the site to the client's exceptions list

D.

Verity the software license is current.

Question 68

Which of the following Wi-Fi protocols is the MOST secure?

Options:

A.

WPA3

B.

WPA-AES

C.

WEP

D.

WPA-TKIP

Question 69

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

Options:

A.

Encrypt the files

B.

Clone any impacted hard drives

C.

Contact the cyber insurance company

D.

Inform law enforcement

Question 70

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).

Options:

A.

Prevent a device root

B.

Disable biometric authentication

C.

Require a PIN on the unlock screen

D.

Enable developer mode

E.

Block a third-party application installation

F.

Prevent GPS spoofing

Question 71

A department has the following technical requirements for a new application:

The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?

Options:

A.

CPU

B.

Hard drive

C.

RAM

D.

Touch screen

Question 72

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

Options:

A.

resmon exe

B.

msconfig.extf

C.

dfrgui exe

D.

msmfo32.exe

Question 73

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO)

Options:

A.

Enable multifactor authentication for each support account

B.

Limit remote access to destinations inside the corporate network

C.

Block all support accounts from logging in from foreign countries

D.

Configure a replacement remote-access tool for support cases.

E.

Purchase a password manager for remote-access tool users

F.

Enforce account lockouts after five bad password attempts

Question 74

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

Options:

A.

MDM

B.

EULA

C.

IRP

D.

AUP

Question 75

An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT?

Options:

A.

Verify all third-party applications are disabled

B.

Determine if the device has adequate storage available.

C.

Check if the battery is sufficiently charged

D.

Confirm a strong internet connection is available using Wi-Fi or cellular data

Question 76

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

Options:

A.

Privacy

B.

Indexing Options

C.

System

D.

Device Manager

Question 77

A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).

Options:

A.

Utilizing an ESD strap

B.

Disconnecting the computer from the power source

C.

Placing the PSU in an antistatic bag

D.

Ensuring proper ventilation

E.

Removing dust from the ventilation fans

F.

Ensuring equipment is grounded

Question 78

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Options:

Question 79

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

Options:

A.

Full

B.

Non-parity

C.

Differential

D.

Incremental

Question 80

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?

Options:

A.

Continue researching the issue

B.

Repeat the iterative processes

C.

Inform the CEO the repair will take a couple of weeks

D.

Escalate the ticket

Question 81

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

Options:

A.

Encryption at rest

B.

Account lockout

C.

Automatic screen lock

D.

Antivirus

Question 82

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

Options:

A.

End user acceptance

B.

Perform risk analysis

C.

Communicate to stakeholders

D.

Sandbox testing

Question 83

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Options:

A.

Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never

B.

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never

C.

Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never

D.

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Question 84

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

Options:

A.

Have the user provide a callback phone number to be added to the ticket

B.

Assign the ticket to the department's power user

C.

Register the ticket with a unique user identifier

D.

Provide the user with a unique ticket number that can be referenced on subsequent calls.

Question 85

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:

Options:

A.

set AirDrop so that transfers are only accepted from known contacts

B.

completely disable all wireless systems during the flight

C.

discontinue using iMessage and only use secure communication applications

D.

only allow messages and calls from saved contacts

Question 86

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

Options:

A.

Uninstall and reinstall the application

B.

Reset the phone to factory settings

C.

Install an alternative application with similar functionality

D.

Clear the application cache.

Question 87

A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?

Options:

A.

Removed all jewelry

B.

Completed an inventory of tools before use

C.

Practiced electrical fire safety

D.

Connected a proper ESD strap

Question 88

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

Options:

A.

Ransomware

B.

Failed OS updates

C.

Adware

D.

Missing system files

Question 89

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?

Options:

A.

Consoltf

B.

Disk Utility

C.

Time Machine

D.

FileVault

Question 90

A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Options:

A.

Data-in-transit encryption

B.

File encryption

C.

USB drive encryption

D.

Disk encryption

Question 91

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?

Options:

A.

Brute force

B.

Zero day

C.

Denial of service

D.

On-path

Question 92

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

Options:

A.

Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

B.

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

C.

Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

D.

Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

Question 93

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?

Options:

A.

RDP

B.

VNC

C.

SSH

D.

VPN

Question 94

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?

Options:

A.

Changing channels

B.

Modifying the wireless security

C.

Disabling the SSIO broadcast

D.

Changing the access point name

Question 95

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

Options:

A.

Run sfc / scannow on the drive as the administrator.

B.

Run clearnmgr on the drive as the administrator

C.

Run chkdsk on the drive as the administrator.

D.

Run dfrgui on the drive as the administrator.

Question 96

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

Options:

A.

Lock all devices in a closet.

B.

Ensure all devices are from the same manufacturer.

C.

Change the default administrative password.

D.

Install the latest operating system and patches

Question 97

Which of the following is a proprietary Cisco AAA protocol?

Options:

A.

TKIP

B.

AES

C.

RADIUS

D.

TACACS+

Question 98

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

Options:

A.

Application updates

B.

Anti-malware software

C.

OS reinstallation

D.

File restore

Question 99

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

Options:

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

Question 100

Which of the following commands can a technician use to get the MAC address of a Linux distribution?

    net use

Options:

A.

ifconfig

B.

netstat

C.

ping

Question 101

A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?

Options:

A.

Disable System Restore.

B.

Remediate the system.

C.

Educate the system user.

D.

Quarantine the system.

Question 102

A Windows computer is experiencing slow performance when the user tries to open programs and files. The user recently installed a new software program from an external website.

Various websites are being redirected to an unauthorized site, and Task Manager shows the CPU usage is consistently at 100%. Which of the following should the technician do first?

Options:

A.

Uninstall the new program.

B.

Check the HOSTS file.

C.

Restore from a previous backup.

D.

Clear the web browser cache.

Question 103

A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).

Options:

A.

Examine the event logs.

B.

Connect to the network.

C.

Document the findings.

D.

Update the definitions.

E.

Reimage the computer.

F.

Enable the firewall.

Question 104

Which of the following file extensions should a technician use for a PowerShell script?

Options:

A.

.ps1

B.

.py

C.

.sh

D.

.bat

E.

.cmd

Question 105

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?

    Group Policy

Options:

A.

User accounts

B.

Access control lists

C.

Authenticator applications

Question 106

Which of the following would allow physical access to a restricted area while maintaining a record of events?

Options:

A.

Hard token

B.

Access control vestibule

C.

Key fob

D.

Door Lock

Question 107

A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?

    Color Management

Options:

A.

System

B.

Troubleshooting

C.

Device Manager

D.

Administrative Tools

Question 108

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

Options:

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

Question 109

Which of the following operating systems would most likely be used to run the inventory management system at a factory?

Options:

A.

Windows

B.

Chrome OS

C.

Android

D.

iOS

Question 110

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems?

    Turn off the machine.

Options:

A.

Run a full antivirus scan.

B.

Remove the LAN card.

C.

Install a different endpoint solution.

Question 111

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

    Run an antivirus and enable encryption.

Options:

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

Question 112

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

    Run an antivirus and enable encryption.

Options:

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

Question 113

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?

Options:

A.

Educate the end user on best practices for security.

B.

Quarantine the host in the antivirus system.

C.

Investigate how the system was infected with malware.

D.

Create a system restore point.

Question 114

After a security event, a technician removes malware from an affected laptop and disconnects the laptop from the network. Which of the following should the technician do to prevent the operating system from automatically returning to an infected state?

Options:

A.

Enable System Restore.

B.

Disable System Restore.

C.

Enable antivirus.

D.

Disable antivirus.

E.

Educate the user.

Question 115

A technician downloaded a software program to a network share. When the technician attempts to copy the program to the Windows tablet for installation, the technician receives an error. Which of the following is the best procedure for the technician to use to complete the assignment?

    Copy the program file to a USB drive and install.

Options:

A.

Burn the program file to a CD and install.

B.

Format the HDD and then do the installation.

C.

Replace the HDD and then do the installation.

Question 116

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?

Options:

A.

Disable the browser from sending notifications to the Action Center.

B.

Run a full antivirus scan on the computer.

C.

Disable all Action Center notifications.

D.

Move specific site notifications from Allowed to Block.

Question 117

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

    Standard operating procedure

Options:

A.

Acceptable use policy

B.

Security protocols

C.

Data flow diagram

Question 118

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

Options:

A.

Investigate the firewall logs.

B.

Isolate the machine from the network.

C.

Inspect the Windows Event Viewer.

D.

Take a physical inventory of the device.

Question 119

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

Options:

A.

.bat

B.

.dll

C.

.ps1

D.

.txt

Question 120

Which of the following items require special e-waste recycling? (Select two).

    Solid-state drive

Options:

A.

A/C adapter

B.

Surge protector

C.

Laptop battery

D.

CRT monitor

E.

Power supply

Question 121

A technician is moving a Windows workstation from the accounting department to the sales department and needs to update the IP and gateway settings. Which of the following Control Panel utilities should the technician use?

Options:

A.

Programs and Features

B.

Network and Sharing Center

C.

User Accounts

D.

Device Manager

Question 122

Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team

implement?

Options:

A.

SSH

B.

VNC

C.

VPN

D.

RDP

Question 123

A network technician is deploying a new machine in a small branch office that does not have a DHCP server. The new machine automatically receives the IP address of 169.254.0.2 and is unable to communicate with the rest of the network. Which of the following would restore communication?

    Static entry

Options:

A.

ARP table

B.

APIPA address

C.

NTP specification

Question 124

A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?

Options:

A.

Degaussing

B.

Standard formatting

C.

Low-level wiping

D.

Deleting

Question 125

As a corporate technician, you are asked to evaluate several suspect email messages on

a client's computer. Corporate policy requires he following:

. All phishing attempts must be reported.

. Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the

following within the email:

. Classify the emails

. Identify suspicious items, if applicable, in each email

. Select the appropriate resolution

Options:

Question 126

When visiting a particular website, a user receives a message stating, "Your connection is not private." Which of the following describes this issue?

Options:

A.

Certificate warning

B.

Malware

C.

JavaScript error

D.

Missing OS update

Question 127

A technician is modifying the default home page of all the workstations in a company. Which of the following will help to implement this change?

Options:

A.

Group Policy

B.

Browser extension

C.

System Configuration

D.

Task Scheduler

Question 128

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?

Options:

A.

To determine which party had the machine and when.

B.

To remotely wipe sensitive data from the machine.

C.

To gather the information needed to replace the machine.

D.

To alert the owner that the password needs to be changed.

Question 129

Which of the following is command options is used to display hidden files and directories?

Options:

A.

-a

B.

-s

C.

-lh

D.

-t

Question 130

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

Options:

A.

Valid license

B.

Data retention requirements

C.

Material safety data sheet

D.

Chain of custody

Question 131

Which of the following combinations meets the requirements for mobile device multifactor authentication?

Options:

A.

Password and PIN

B.

Password and swipe

C.

Fingerprint and password

D.

Swipe and PIN

Question 132

A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?

Options:

A.

Delete the browser cookies and history.

B.

Reset all browser settings.

C.

Change the browser default search engine.

D.

Install a trusted browser.

Question 133

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

Options:

A.

DHCP

B.

SMTP

C.

DNS

D.

RDP

Question 134

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

Options:

A.

Implementing password expiration

B.

Restricting user permissions

C.

Using screen locks

D.

Disabling unnecessary services

Question 135

Which of the following often uses an SMS or third-party application as a secondary method to access a system?

Options:

A.

MFA

B.

WPA2

C.

AES

D.

RADIUS

Question 136

A company acquired a local office, and a technician is attempting to join the machines at the office to the local domain. The technician notes that the domain join option appears to be missing. Which of the following editions of Windows is MOST likely installed on the machines?

Options:

A.

Windows Professional

B.

Windows Education

C.

Windows Enterprise

D.

Windows Home

Question 137

A new employee was hired recently. Which of the following documents will the new employee need to sign before being granted login access to the network?

Options:

A.

MSDS

B.

EULA

C.

UAC

D.

AUP

Question 138

A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?

Options:

A.

Boot order

B.

Malware

C.

Drive failure

D.

Windows updates

Question 139

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

Options:

A.

Licensing agreements

B.

Chain of custody

C.

Incident management documentation

D.

Data integrity

E.

Material safety data sheet

F.

Retention requirements

Question 140

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

Options:

A.

apt-get

B.

CIFS

C.

Samba

D.

greP

Question 141

A technician is working on a way to register all employee badges and associated computer IDs. Which of the following options should the technician use in order to achieve this objective?

Options:

A.

Database system

B.

Software management

C.

Active Directory description

D.

Infrastructure as a Service

Question 142

A technician is troubleshooting a mobile device that was dropped. The technician finds that the screen (ails to rotate, even though the settings are correctly applied. Which of the following pieces of hardware should the technician replace to resolve the issue?

Options:

A.

LCD

B.

Battery

C.

Accelerometer

D.

Digitizer

Question 143

An implementation specialist is replacing a legacy system at a vendor site that has only one wireless network available. When the specialist connects to Wi-Fi. the specialist realizes the insecure network has open authentication. The technician needs to secure the vendor's sensitive data. Which of the following should the specialist do FIRST to protect the company's data?

Options:

A.

Manually configure an IP address, a subnet mask, and a default gateway.

B.

Connect to the vendor's network using a VPN.

C.

Change the network location to private.

D.

Configure MFA on the network.

Question 144

Which of the following is the default GUI and file manager in macOS?

Options:

A.

Disk Utility

B.

Finder

C.

Dock

D.

FileVault

Question 145

A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?

Options:

A.

Settings > Personalization

B.

Control Panel > Credential Manager

C.

Settings > Accounts > Family and Other Users

D.

Control Panel > Network and Sharing Center

Question 146

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the

available RAM?

Options:

A.

The system is missing updates.

B.

The systems utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates.

Question 147

A technician is in the process of installing a new hard drive on a server but is called away to another task. The drive has been unpackaged and left on a desk. Which of the following should the technician perform before leaving?

Options:

A.

Ask coworkers to make sure no one touches the hard drive.

B.

Leave the hard drive on the table; it will be okay while the other task is completed.

C.

Place the hard drive in an antistatic bag and secure the area containing the hard drive.

D.

Connect an electrostatic discharge strap to the drive.

Question 148

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

Options:

A.

The system is missing updates.

B.

The system is utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates

Question 149

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

Options:

A.

A system patch disabled the antivirus protection and host firewall.

B.

The system updates did not include the latest anti-malware definitions.

C.

The system restore process was compromised by the malware.

D.

The malware was installed before the system restore point was created.

Question 150

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

Options:

A.

The Windows 10 desktop has Windows 10 Home installed.

B.

The Windows 10 desktop does not have DHCP configured.

C.

The Windows 10 desktop is connected via Wi-Fi.

D.

The Windows 10 desktop is hibernating.

Question 151

A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

Options:

A.

File Explorer

B.

Startup Folder

C.

System Information

D.

Programs and Features

E.

Task Scheduler

F.

Device Manager

Question 152

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

Options:

A.

Remote Assistance

B.

Remote Desktop Protocol

C.

Screen Sharing

D.

Virtual Network Computing

Question 153

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

Options:

A.

Access control list

B.

Acceptable use policy

C.

Incident report

D.

Standard operating procedure

Question 154

A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?

Options:

A.

Keylogger

B.

Cryptominers

C.

Virus

D.

Malware

Question 155

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

Options:

A.

VPN

B.

MSRA

C.

SSH

D.

RDP

Question 156

A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock. Which of the following options in the Windows settings should the technician use?

Options:

A.

Ease of Access

B.

Privacy

C.

Personalization

D.

Update and Security

Question 157

After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?

Options:

A.

Device Manager

B.

Administrator Tools

C.

Programs and Features

D.

Recovery

Question 158

A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

Options:

A.

System

B.

Indexing Options

C.

Device Manager

D.

Programs and Features

Question 159

A neighbor successfully connected to a user's Wi-Fi network. Which of the following should the user do after changing the network configuration to prevent the neighbor from being able to connect again?

Options:

A.

Disable the SSID broadcast.

B.

Disable encryption settings.

C.

Disable DHCP reservations.

D.

Disable logging.

Question 160

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

Options:

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Question 161

A data center is required to destroy SSDs that contain sensitive information. Which of the following is the BEST method to use for the physical destruction of SSDs?

Options:

A.

Wiping

B.

Low-level formatting

C.

Shredding

D.

Erasing

Question 162

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

Options:

A.

Security groups

B.

Access control list

C.

Group Policy

D.

Login script

Question 163

Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).

Options:

A.

Multifactor authentication

B.

Badge reader

C.

Personal identification number

D.

Firewall

E.

Motion sensor

F.

Soft token

Question 164

A BSOD appears on a user's workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?

Options:

A.

Stop code

B.

Event Mewer

C.

Services

D.

System Configuration

Question 165

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

Options:

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Question 166

Which of the following physical security controls can prevent laptops from being stolen?

Options:

A.

Encryption

B.

LoJack

C.

Multifactor authentication

D.

Equipment lock

E.

Bollards

Question 167

A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor. Which of the following procedures should the technician perform?

Options:

A.

Boot into safe mode.

B.

Perform a malware scan.

C.

Restart the machine.

D.

Reinstall the browser

Question 168

A technician receives a help desk ticket from a user who is unable to update a phone. The technician investigates the issue and notices the following error message: Insufficient storage space

While analyzing the phone, the technician does not discover any third-party' applications or photos. Which of the following is the best way to resolve the issue?

Options:

A.

Exchange the device for a newer one.

B.

Upgrade the onboard storage

C.

Allocate more space by removing factory applications

D.

Move factory applications to external memory.

Question 169

A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to Investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?

Options:

A.

Resource Monitor

B.

Performance Monitor

C.

Command Prompt

D.

System Information

Question 170

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?

    Document the date and time of the change.

Options:

A.

Submit a change request form.

B.

Determine the risk level of this change.

C.

Request an unused IP address.

Question 171

Which of the following operating systems is considered closed source?

Options:

A.

Ubuntu

B.

Android

C.

CentOS

D.

OSX

Question 172

A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?

Options:

A.

Disk Management

B.

Device Manager

C.

Disk Cleanup

D.

Disk Defragmenter

Question 173

While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?

Options:

A.

SSL key

B.

Preshared key

C.

WPA2 key

D.

Recovery key

Question 174

Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs?

Options:

A.

TACACS+

B.

Kerberos

C.

Preshared key

D.

WPA2/AES

Question 175

A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor’s performance?

Options:

A.

Amount of system RAM

B.

NIC performance

C.

Storage IOPS

D.

Dedicated GPU

Question 176

A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software, and the PC begins performing extremely slow. Which of the following steps should the technician take to resolve the issue?

Options:

A.

Uninstall one antivirus software program and install a different one.

B.

Launch Windows Update, and then download and install OS updates

C.

Activate real-time protection on both antivirus software programs

D.

Enable the quarantine feature on both antivirus software programs.

E.

Remove the user-installed antivirus software program.

Question 177

A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?

Options:

A.

Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.

B.

Redeem the included activation key card for a product key.

C.

Insert a Windows USB hardware dongle and initiate activation.

D.

Activate with the digital license included with the device hardware.

Question 178

A user installed a new computer game. Upon starting the game, the user notices the frame rates are low. Which of the following should the user upgrade to resolve the issue?

Options:

A.

Hard drive

B.

Graphics card

C.

Random-access memory

D.

Monitor

Question 179

Which of the following allows access to the command line in macOS?

Options:

A.

PsExec

B.

command.com

C.

Terminal

D.

CMD

Question 180

A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Select two).

    Implementing data-at-rest encryption

Options:

A.

Disabling AutoRun

B.

Restricting user permissions

C.

Restricting log-in times

D.

Enabling a screen lock

E.

Disabling local administrator accounts

Question 181

A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?

Options:

A.

Disabling UAC

B.

Restricting local administrators

C.

Enabling UPnP

D.

Turning off AutoPlay

Question 182

A new employee is having difficulties using a laptop with a docking station The laptop is connected to the docking station, and the laptop is closed. The external monitor works for a few seconds, but then the laptop goes to sleep. Which of the following options should the technician configure in order to fix the Issue?

Options:

A.

Hibernate

B.

Sleep/suspend

C.

Choose what closing the lid does

D.

Turn on fast startup

Question 183

A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools should the technician use?

Options:

A.

Disk Cleanup

B.

Resource Monitor

C.

Disk Defragment

D.

Disk Management

Question 184

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen Immediately before network use is authorized?

Options:

A.

Document the date and time of the change.

B.

Submit a change request form

C.

Determine the risk level of this change

D.

Request an unused IP address.

Question 185

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection. Which of the following should the technician check NEXT?

Options:

A.

Windows updates

B.

DNS settings

C.

Certificate store

D.

Browser plug-ins

Question 186

A Windows administrator is creating user profiles that will include home directories and network printers for several new users. Which of the following is the most efficient way for the technician to complete this task?

Options:

A.

Access control

B.

Authentication application

C.

Group Policy

D.

Folder redirection

Question 187

A user wants to back up a Windows 10 device. Which of the following should the user select?

Options:

A.

Devices and Printers

B.

Email and Accounts

C.

Update and Security

D.

Apps and Features

Question 188

Which of the following best describes when to use the YUM command in Linux?

Options:

A.

To add functionality

B.

To change folder permissions

C.

To show documentation

D.

To list file contents

Question 189

A change advisory board authorized a setting change so a technician is permitted to Implement the change. The technician successfully implemented the change. Which of the following should be done next?

Options:

A.

Document the date and time of change

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document the findings of the sandbox test,

Question 190

A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer's BEST choice for this environment?

Options:

A.

Workgroup network

B.

Public network

C.

Wide area network

D.

Domain network

Question 191

A PC is taking a long time to boot. Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

Options:

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

Question 192

A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost. the gateway, and known IP addresses on the interne! and receive a response. Which of the following Is the MOST likely reason tor the Issue?

Options:

A.

A firewall is blocking the application.

B.

The wrong VLAN was assigned.

C.

The incorrect DNS address was assigned.

D.

The browser cache needs to be cleared

Question 193

A company is experiencing a ODDS attack. Several internal workstations are the source of the traffic Which of the following types of infections are the workstations most likely experiencing? (Select two)

Options:

A.

Zombies

B.

Keylogger

C.

Adware

D.

Botnet

E.

Ransomvvare

F.

Spyware

Question 194

A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?

Options:

A.

Disable System Restore.

B.

Educate the end user.

C.

Install the latest OS patches.

D.

Clean the environment reinstallation.

Question 195

A systems administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. Which of the following should the administrator do to resolve this issue?

Options:

A.

Rebuild user profiles.

B.

Roll back the updates.

C.

Restart the services.

D.

Perform a system file check.

Question 196

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?

Options:

A.

Biometrics

B.

Full disk encryption

C.

Enforced strong system password

D.

Two-factor authentication

Question 197

A company's assets are scanned annually. Which of the following will most likely help the company gain a holistic view of asset cost?

Options:

A.

Creating a database

B.

Assigning users to assets

C.

Inventorying asset tags

D.

Updating the procurement account owners

Question 198

A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server Is consistently communicating with an IP address that is traced back to a company that awards digital currency for solving hash algorithms. Which of the following was MOST likely used to compromise the server?

Options:

A.

Keylogger

B.

Ransomware

C.

Boot sector virus

D.

Cryptomining malware

Question 199

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

Options:

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Question 200

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

Options:

Question 201

A technician is following the ticketing system’s best practices when handling user support requests. Which of the following should the technician do first when responding to a user support request that contains insufficient information?

Options:

A.

Ask the user for clarification.

B.

Keep the user updated on the progress.

C.

Document the root cause.

D.

Follow the system’s escalation process.

Question 202

Which of the following environmental controls is most important to maintain the safety of a data center?

Options:

A.

Temperature control

B.

Humidity control

C.

Fire suppression control

D.

Power managementcontrol

Question 203

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

Options:

A.

Configure MAC filtering.

B.

Disable DHCP.

C.

Configure port forwarding.

D.

Disable guest access.

Question 204

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

Options:

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Question 205

A user reports that an Android mobile device takes a long time to boot, and all applications crash when launched. The user installed the applications from a third-party website. Which of the following steps should the technician complete to diagnose the issue?

Options:

A.

Scan the system for malware.

B.

Clear the web browser cache.

C.

Enroll the device in an MDM system.

D.

Confirm the compatibility of the applications with the OS.

Question 206

Which of the following best describes a rollback plan?

Options:

A.

A developer configures a process to return to the starting state upon completion.

B.

A user asks to remove an unneeded fileshare.

C.

An administrator applies new settings to a computer after the previous settings failed.

D.

A technician reverts the system to a previous state following a failed upgrade.

Question 207

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

Options:

A.

Replacing non-mobile users' laptops with wired desktop systems

B.

Increasing the wireless network adapter metric

C.

Adding wireless repeaters throughout the building

D.

Upgrading the current mesh network to support the 802.11 n specification

Question 208

A technician wants to harden Windows workstations after a recent security audit indicated the company is vulnerable to brute-force attacks. Which of the following features should the technician implement to mitigate such attacks?

Options:

A.

System screen lock

B.

Failed log-in lockout

C.

Restricted user permissions

D.

Data-at-rest encryption

Question 209

A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Select two).

Options:

A.

Uninstall the game application.

B.

Perform a factory reset of the device.

C.

Connect the device to an external charger.

D.

Install the latest security patches.

E.

Clear the application's cache.

F.

Enable the device's built-in anti-malware protection.

Question 210

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

Options:

A.

Trojan

B.

Boot sector virus

C.

Spyware

D.

Rootkit

Question 211

A user is experiencing the following issues with Bluetooth on a smartphone:

•The user cannot hear any sound from a speaker paired with the smartphone.

•The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?

Options:

A.

Restart the smartphone.

B.

Reset the network settings.

C.

Unpair the Bluetooth speaker.

D.

Check for system updates.

Question 212

A company wants to take advantage of modern technology and transition away from face-to-face meetings. Which of the following types of software would benefit the company the most? (Select two).

Options:

A.

Videoconferencing

B.

File transfer

C.

Screen-sharing

D.

Financial

E.

Remote access

F.

Record-keeping

Question 213

A technician is upgrading the Microsoft Windows 10 OS. Which of the following are required for the technician to safely upgrade the OS? (Select two).

Options:

A.

Release notes

B.

Antivirus software

C.

Backup of critical data

D.

Device drivers

E.

Word processing software

F.

Safe boot mode

Question 214

An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?

Options:

A.

Configuring firewall settings

B.

Implementing expiration policies

C.

Defining complexity requirements

D.

Updating antivirus definitions

Question 215

Which of the following combinations meets the requirements for mobile device multifactor authentication?

Options:

A.

Password and PIN

B.

Password and swipe

C.

Fingerprint and password

D.

Swipe and PIN

Question 216

A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?

Options:

A.

Internet connection

B.

Product key

C.

Sufficient storage space

D.

UEFI firmware

E.

Legacy BIOS

Question 217

A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?

Options:

A.

Network & Internet

B.

System

C.

Personalization

D.

Accounts

Question 218

A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?

Options:

A.

Security groups

B.

Folder redirection

C.

Organizational unit structure

D.

Access control list

Question 219

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

Options:

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Question 220

A user's company phone has several pending software updates. A technician completes the following steps:

•Rebooted the phone

•Connected to Wi-Fi

•Disabled metered data

Which of the following should the technician do next?

Options:

A.

Restore the factory settings.

B.

Clean the browser history.

C.

Uninstall and reinstall the applications.

D.

Clear the cache.

Question 221

A technician receives a high-priority ticket about sensitive information collected from an end user’s workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

Options:

A.

Reimage the workstation.

B.

Inform the user of the investigation.

C.

Recover and secure the workstation.

D.

Back up the workstation

Question 222

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

Options:

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Question 223

An organization wants to deploy a customizable operating system. Which of the following should the organization choose?

Options:

A.

Windows 10

B.

macOS

C.

Linux

D.

Chrome OS

E.

iOS

Question 224

A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?

Options:

A.

Acceptable use policy

B.

Incident report

C.

End user license agreement

D.

Standard operating procedures

Question 225

A user's Windows desktop has low disk space. A technician thinks some upgrade files were never removed. Which of the following tools should the technician use to correct the issue?

Options:

A.

devmgmt.msc

B.

cleanmgr.exe

C.

dfrgui.exe

D.

diskmgmt.mac

Question 226

A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?

Options:

A.

Perform a safe mode boot.

B.

Run the System Restore wizard.

C.

Start the computer in the last known-good configuration.

D.

Reset the BIOS settinqs.

Question 227

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

Options:

A.

Spam filtering

B.

Malware preventionsoftware

C.

End user education

D.

Stateful firewall inspection

Question 228

A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to make sure the printer stays connected in the future and is available on all the computers in the house. Which of the following should the technician configure on the printer?

Options:

A.

DNS settings

B.

Static IP

C.

WWAN

D.

Meteredconnection

Page: 1 / 76
Total 763 questions