Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam Exam Practice Test

Page: 1 / 76
Total 756 questions

CompTIA A+ Certification Core 2 Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product?

Options:

A.

AUP

B.

EULA

C.

EOL

D.

UAC

Question 2

The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do next to troubleshoot the issue?

Options:

A.

Calibrate the phone sensors.

B.

Enable the touch screen.

C.

Reinstall the operating system.

D.

Replace the screen.

Question 3

Windows updates need to be performed on a department's servers. Which of the following methods should be used to connect to the server?

Options:

A.

FIP

B.

MSRA

C.

RDP

D.

VPN

Question 4

Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?

Options:

A.

A forgotten keychain password

B.

An employee's Apple ID used on the device

C.

An operating system that has been jailbroken

D.

An expired screen unlock code

Question 5

While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?

Options:

A.

SSL key

B.

Preshared key

C.

WPA2 key

D.

Recovery key

Question 6

A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?

Options:

A.

The device does not have enough free space lo download the OS updates.

B.

The device needs domain administrator confirmation to update to a major release.

C.

The device is not compatible with the newest version of the OS.

D.

The device is restricted from updating due to a corporate security policy.

Question 7

The battery life on an employee's new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check first to troubleshoot this issue? (Select two).

Options:

A.

Screen resolution

B.

Screen zoom

C.

Screen timeout

D.

Screen brightness

E.

Screen damage

F.

Screen motion smoothness

Question 8

Which of the following would most likely be used in a small office environment?

Options:

A.

Print server

B.

Virtualization

C.

Domain access

D.

Workgroup

Question 9

A user's permissions are limited to read on a shared network folder using NTFS security settings. Which of the following describes this type of security control?

Options:

A.

SMS

B.

MFA

C.

ACL

D.

MDM

Question 10

Which of the following common security vulnerabilities can be mitigated by using input validation?

Options:

A.

Brute-force attack

B.

Cross-site scripting

C.

SQL injection

D.

Cross-site request forgery

Question 11

A systems administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. Which of the following should the administrator do to resolve this issue?

Options:

A.

Rebuild user profiles.

B.

Roll back the updates.

C.

Restart the services.

D.

Perform a system file check.

Question 12

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer; thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?

Options:

A.

Document the date and time of the change.

B.

Submit a change request form.

C.

Determine the risk level of this change.

D.

Request an unused IP address.

Question 13

Which of the following would most likely be used to extend the life of a device?

Options:

A.

Battery backup

B.

Electrostatic discharge mat

C.

Proper ventilation

D.

Green disposal

Question 14

A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the Issue?

Options:

A.

Screen-sharing software

B.

Secure shell

C.

Virtual private network

D.

File transfer software

Question 15

A technician is installing RAM in a new workstation and needs to protect against electrostatic discharge. Which of the following will best resolve this concern?

Options:

A.

Battery backup

B.

Thermal paste

C.

ESD strap

D.

Consistent power

Question 16

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?

    Document the date and time of the change.

Options:

A.

Submit a change request form.

B.

Determine the risk level of this change.

C.

Request an unused IP address.

Question 17

A salesperson's computer is unable to print any orders on a local printer that is connected to the computer Which of the following tools should the salesperson use to restart the print spooler?

Options:

A.

Control Panel

B.

Processes

C.

Startup

D.

Services

Question 18

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

Options:

A.

Quarantine the host in the antivirus system.

B.

Run antivirus scan tor malicious software.

C.

Investigate how malicious software was Installed.

D.

Reimage the computer.

Question 19

An administrator is designing and implementing a server backup system that minimizes the capacity of storage used. Which of the following is the BEST backup approach to use in conjunction with synthetic full backups?

Options:

A.

Differential

B.

Open file

C.

Archive

D.

Incremental

Question 20

A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

Options:

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

Question 21

Which of the following macOS features can help a user close an application that has stopped responding?

Options:

A.

Finder

B.

Mission Control

C.

System Preferences

D.

Force Quit

Question 22

A Windows administrator is creating user profiles that will include home directories and network printers for several new users. Which of the following is the most efficient way for the technician to complete this task?

Options:

A.

Access control

B.

Authentication application

C.

Group Policy

D.

Folder redirection

Question 23

A user installed a new computer game. Upon starting the game, the user notices the frame rates are low. Which of the following should the user upgrade to resolve the issue?

Options:

A.

Hard drive

B.

Graphics card

C.

Random-access memory

D.

Monitor

Question 24

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence. Which of the following was MOST likely violated during the investigation?

Options:

A.

Open-source software

B.

EULA

C.

Chain of custody

D.

AUP

Question 25

Which of the following allows access to the command line in macOS?

Options:

A.

PsExec

B.

command.com

C.

Terminal

D.

CMD

Question 26

A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?

Options:

A.

Network and Sharing Center

B.

net use

C.

User Accounts

D.

regedit

E.

Group Policy

Question 27

A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server Is consistently communicating with an IP address that is traced back to a company that awards digital currency for solving hash algorithms. Which of the following was MOST likely used to compromise the server?

Options:

A.

Keylogger

B.

Ransomware

C.

Boot sector virus

D.

Cryptomining malware

Question 28

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?

Options:

A.

Biometrics

B.

Full disk encryption

C.

Enforced strong system password

D.

Two-factor authentication

Question 29

A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to most likely resolve the issue?

Options:

A.

Install the software in safe mode.

B.

Attach the external hardware token.

C.

Install OS updates.

D.

Restart the workstation after installation.

Question 30

Every time a user tries to open the organization's proprietary application on an Android tablet, the application immediately closes. Other applications are operating normally. Which of the following troubleshooting actions would MOST likely resolve the Issue? (Select TWO).

Options:

A.

Uninstalling the application

B.

Gaining root access to the tablet

C.

Resetting the web browser cache

D.

Deleting the application cache

E.

Clearing the application storage

F.

Disabling mobile device management

Question 31

A company is looking lot a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select?

Options:

A.

Off-site

B.

Synthetic

C.

Full

D.

Differential

Question 32

During a network outage, a technician discovers a new network switch that was not listed in the support documentation. The switch was installed during a recent change window when a new office was added to the environment. Which of the following would most likely prevent this type of mismatch after next month's change window?

    Performing annual network topology reviews

Options:

A.

Requiring all network changes include updating the network diagrams

B.

Allowing network changes once per year

C.

Routinely backing up switch configuration files

Question 33

A company's assets are scanned annually. Which of the following will most likely help the company gain a holistic view of asset cost?

Options:

A.

Creating a database

B.

Assigning users to assets

C.

Inventorying asset tags

D.

Updating the procurement account owners

Question 34

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

Options:

A.

Installer_x64.exe

B.

Installer_Files.zip

C.

Installer_32.msi

D.

Installer_x86.exe

E.

Installer_Win10Enterprise.dmg

Question 35

A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially

infect the network systems. Which of the following is the MOST effective method for dealing with this Issue?

Options:

A.

Adjusting the spam gateway

B.

Updating firmware for the spam appliance

C.

Adjusting AV settings

D.

Providing user training

Question 36

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?

Options:

A.

Rebuild the Windows profiles.

B.

Restore the computers from backup.

C.

Reimage the computers.

D.

Run the System File Checker.

Question 37

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file

extension Which pf the following actions is the FIRST step the technician should take?

Options:

A.

Runa live disk clone.

B.

Run a full antivirus scan.

C.

Use a batch file to rename the files-

D.

Disconnect the machine from the network

Question 38

Which of the following is a data security standard for protecting credit cards?

Options:

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Question 39

Before leaving work, a user wants to see the traffic conditions for the commute home. Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.?

Options:

A.

taskschd.msc

B.

perfmon.msc

C.

lusrmgr.msc

D.

Eventvwr.msc

Question 40

Which of the following is the STRONGEST wireless configuration?

Options:

A.

WPS

B.

WPA3

C.

WEP

D.

WMN

Question 41

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

Options:

A.

RDP through RD Gateway

B.

Apple Remote Desktop

C.

SSH access with SSH keys

D.

VNC with username and password

Question 42

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

Question 43

Which of the following should be used to control security settings on an Android phone in a domain environment?

Options:

A.

MDM

B.

MFA

C.

ACL

D.

SMS

Question 44

A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?

Options:

A.

The GPS application is installing software updates.

B.

The GPS application contains malware.

C.

The GPS application is updating its geospatial map data.

D.

The GPS application is conflicting with the built-in GPS.

Question 45

A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).

Options:

A.

Encryption

B.

Antivirus

C.

AutoRun

D.

Guest accounts

E.

Default passwords

F.

Backups

Question 46

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

Options:

A.

Drilling

B.

Degaussing

C.

Low-level formatting

D.

Erasing/wiping

Question 47

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the technician should take to resolve the issue?

Options:

A.

Run the antivirus scan.

B.

Add the required snap-in.

C.

Restore the system backup

D.

use the administrator console.

Question 48

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

Options:

A.

Put on an ESD strap

B.

Disconnect the power before servicing the PC.

C.

Place the PC on a grounded workbench.

D.

Place components on an ESD mat.

Question 49

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

Options:

A.

Device Manager

B.

System

C.

Ease of Access Center

D.

Programs and Features

Question 50

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?

Options:

A.

WPS

B.

TKIP

C.

WPA3

D.

WEP

Question 51

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

Options:

A.

Power off the machine.

B.

Run a full antivirus scan.

C.

Remove the LAN card.

D.

Install a different endpoint solution.

Question 52

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

Options:

A.

Use a network share to share the installation files.

B.

Save software to an external hard drive to install.

C.

Create an imaging USB for each PC.

D.

Install the software from the vendor's website

Question 53

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

Options:

A.

The UEFI settings need to be changed.

B.

The RAM has compatibility issues with Windows 10.

C.

Some of the RAM is defective.

D.

The newly installed OS is x86.

Question 54

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?

Options:

A.

Enable multifactor authentication.

B.

Increase the failed log-in threshold.

C.

Remove complex password requirements.

D.

Implement a single sign-on with biometrics.

Question 55

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

Options:

A.

Use a key combination to lock the computer when leaving.

B.

Ensure no unauthorized personnel are in the area.

C.

Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D.

Turn off the monitor to prevent unauthorized visibility of information.

Question 56

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

Options:

A.

The SNTP server is offline.

B.

A user changed the time zone on a local machine.

C.

The Group Policy setting has disrupted domain authentication on the system,

D.

The workstations and the authentication server have a system clock difference.

Question 57

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

Options:

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Question 58

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

Question 59

A help desk technician runs the following script: Inventory.py. The technician receives the following error message:

How do you want to Open this file?

Which of the following is the MOST likely reason this script is unable to run?

Options:

A.

Scripts are not permitted to run.

B.

The script was not built for Windows.

C.

The script requires administrator privileges,

D.

The runtime environment is not installed.

Question 60

An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly?

Options:

A.

incineration

B.

Resale

C.

Physical destruction

D.

Dumpster for recycling plastics

Question 61

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

Options:

A.

Device Manager

B.

Indexing Options

C.

File Explorer

D.

Administrative Tools

Question 62

A user is unable to access a website, which is widely used across the organization, and receives the following error message:

The security certificate presented by this website has expired or is not yet valid.

The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?

Options:

A.

Reboot the computer.

B.

Reinstall the OS.

C.

Configure a static 12

D.

Check the computer's date and time.

Question 63

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

Options:

A.

Rearranging the monitor's position in display settings

B.

Swapping the cables for the monitors

C.

Using the Ctrl+AIt+> to correct the display orientation

D.

Updating the display drivers for the video card

Question 64

While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue?

Options:

A.

A bad antivirus signature update was installed.

B.

A router was misconfigured and was blocking traffic.

C.

An upstream internet service provider was flapping.

D.

The time or date was not in sync with the website.

Question 65

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

Options:

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Question 66

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

Options:

A.

ipconfig /all

B.

hostname

C.

netstat /?

D.

nslookup localhost

E.

arp —a

F.

ping:: 1

Question 67

Which of the following attacks can a hacker use to execute code on a user's computer when the user visits a specially prepared, malicious website?

Options:

A.

DoS

B.

Spoofing

C.

XSS

D.

SQL injection

Question 68

A user is unable to access the company's network. A technician learns the user's account became inaccessible after multiple unsuccessful login attempts. The user also changed their password before the issue started. Which of the following steps should the technician take to resolve the issue?

Options:

A.

Escalate the user’s issue to the network team.

B.

Reset the user's password.

C.

Unlock the user's account.

D.

Verify the user's login and password.

Question 69

A user is unable to log in to a workstation. The user reports an error message about the date being incorrect. A technician reviews the date and verifies it is correct, but the system clock is an hour behind. The technician also determines this workstation is the only one affected. Which of the following is the most likely issue?

Options:

A.

Time drift

B.

NTP failure

C.

Windows Update

D.

CMOS battery

Question 70

The camera and microphone on an iPhone user's device are activating without any user input. The user’s friend recently modified the device to allow applications to be installed outside the normal App Store. Which of the following is the issue?

Options:

A.

The user connected a counterfeit Lightning cable to the iPhone.

B.

The device is unenrolled from Mobile Device Management.

C.

The device was jailbroken to remove internal security protections.

D.

The iPhone has an out-of-date operating system.

Question 71

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

Options:

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Question 72

After a computer upgrade at an imaging lab. the upgraded computers are not able to obtain an IP address. Which of the following is most likely the issue?

Options:

A.

TheswitchIs only providing IPv6 addresses.

B.

TheOS must be updated to be compatible with the imaging software.

C.

Theswitchhas port security enabled.

D.

Theswitchdoes not support multicast traffic.

Question 73

During a routine check, a systems administrator discovers that a user's PC is running slowly and CPU utilization is at 100%. Further investigation shows a large amount of resource usage. Which of the following is the most likely cause of the high resource usage?

Options:

A.

Firewall activities

B.

Botnet attack

C.

DDoS attack

D.

Keylogger attack

Question 74

A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Options:

A.

Data-in-transit encryption

B.

File encryption

C.

USB drive encryption

D.

Disk encryption

Question 75

Which of the following documents in criminal proceedings must be updated every time a piece of evidence is touched or transferred in order for the evidence to be considered valid?

Options:

A.

Licensing agreement

B.

Regulatory compliance

C.

Incident documentation

D.

Chain of custody

Question 76

A technician is assisting a customer who is having difficulty accessing the company’s website. Which of the following should the technician do first?

Options:

A.

Ask the customer for their log-in credentials.

B.

Check the company's internal knowledge base for solutions.

C.

Refer the customer to a more experienced technician.

D.

Record the details of the issue in the company’s ticketing system.

Question 77

Which of the following types of malware is designed to enable administrative access to a computer?

Options:

A.

Rootkit

B.

Trojan

C.

Worm

D.

Ransomware

Question 78

A user reports the following issues:

•Their computer is constantly running slowly.

•The default home page of the web browser has changed to a suspicious search engine.

•They have been receiving pop-up ads on the screen.

Which of the following should a technician do first to address these issues?

Options:

A.

Update the antivirus program and run a full system scan.

B.

Uninstall the suspicious search engine and reset the home page.

C.

Install the latest updates for the operating system.

D.

Block the pop-up ads using the web browser settings.

Question 79

Employees want their Windows 10 laptops to wirelessly connect when they take them home. Which of the following should the employees configure so the laptops can automatically connect wirelessly?

Options:

A.

Network and Internet settings

B.

Windows Firewall settings

C.

Devices and Printers

D.

Personalization settings

Question 80

Which of the following best describes XFS?

Options:

A.

A filesystem used by the Linux OS

B.

A filesystem used by iOS

C.

A filesystem used by the Windows OS

D.

A filesystem used by macOS

Question 81

A user downloads an application with a plug-in that is designed to automatically prompt for an OTP when the user browses to a specific website. The plug-in installs without any warnings or errors. The first time the user goes to the site, the prompt does not open, and the user cannot access the site. Which of the following browser settings should the user configure?

Options:

A.

Extensions/add-ins

B.

Certificate validity

C.

Proxy settings

D.

Trusted sources

Question 82

A user downloaded a 64-bit version of a new software program, but the installation failed due to an error. Which of the following most likely caused the error?

Options:

A.

The OS version is incompatible.

B.

The user needs to enable ActiveX.

C.

The .NET Framework needs to be updated.

D.

The user needs administrator privileges.

Question 83

Which of the following Windows 10 editions is the most cost-effective and appropriate for a single user who needs to access their computer remotely?

Options:

A.

Education

B.

Pro

C.

Enterprise

D.

Home

Question 84

The following error is displayed on a user's computer screen:

No operating system found

Which of the following is the first troubleshooting step a technician should complete?

Options:

A.

Disconnect external storage

B.

Flash the BIOS

C.

Replace the SATA cable

D.

Turn on the device in safe mode

Question 85

A user with a disability needs to be able to press the Ctrl+Alt+Del keyboard sequence one key at a time. Which of the following turns on this Ease of Access feature?

Options:

A.

Press the Shift key five times in a row.

B.

Press Ctrl+Alt+Esc simultaneously.

C.

Press Ctrl+Alt+Tab simultaneously.

D.

Press the Windows key+Tab.

Question 86

Which of the following languages would a technician most likely use to automate the setup of various services on multiple systems?

Options:

A.

SQL

B.

HTML

C.

PowerShell

D.

C#

Question 87

A technician assigns the equivalent of root-level permissions to a user to perform a task. Which of the following user roles within the Windows OS should the technician choose?

Options:

A.

Power

B.

Default

C.

Administrator

D.

Superuser

Question 88

A technician is setting up a wireless network in a small, crowded office and wants to minimize Wi-Fi access. Which of the following security settings should the technician enable?

Options:

A.

Port forwarding

B.

Unused ports

C.

SSID broadcast

D.

Allow list

Question 89

Which of the following is the most practical method to reduce the number of clicks on phishing emails for a public-facing organization?

Options:

A.

Providing user awareness education

B.

Introducing a BYOD policy

C.

Setting up SMTP filtering rules

D.

Restricting emails from personal email addresses

Question 90

A user's laptop is shutting down every time the laptop lid is closed, which is leading to frequent work interruptions. Which of the following should a help desk specialist do to remediate the issue?

Options:

A.

Configure the sleep settings.

B.

Disablehibernation.

C.

Edit thepower plan.

D.

Turn onfast startup.

Question 91

Which of the following is a preventive physical security control?

Options:

A.

Video surveillance system

B.

Bollards

C.

Alarm system

D.

Motion sensors

Question 92

A company wants to reduce the negative ecological impacts of its business and has decided to hire an e-waste company to dispose of equipment. Which of the following should the e-waste company provide the business7

Options:

A.

Non-disclosure agreement

B.

Certification of destruction

C.

Low-level formatting

D.

Shredding/drilling

Question 93

A user receives a message on a PC stating it has been infected by malware. A technician runs a full scan on the user's machine and detects no malware. Later that day, the same message reappears. Which of the following steps should the technician take to restore the system to regular functionality?

Options:

A.

Check for Windows updates.

B.

Reimage the computer.

C.

Enable Windows Firewall.

D.

Run System File Checker.

Question 94

A user is unable to open personal files on a PC on a home network. An on-screen message indicates the files are encrypted and demands payment to access the files. Which of the following should a technician recommend the user do first?

Options:

A.

Reinstall the OS.

B.

Run the System Restore feature.

C.

Disconnect the PC from the network.

D.

Pay the amount demanded.

E.

Scan the PC with an anti-malware program.

Question 95

After a failed attempt to open an email attachment for an unexpected overdue invoice, a smartphone user experiences abnormal performance when using their mobile browser and other applications. The user restarts the device, but the issue persists. Which of the following actions should the user take next?

Options:

A.

Shut down and cold start the smartphone

B.

Delete the email containing the attachment

C.

Wipe the device and reset it to factory defaults

D.

Uninstall and reinstall the mobile browser

Question 96

A user asks a technician for recommendations to back up desktop data from a Windows OS. The technician recommends implementing daily full backups, but the user is concerned about having enough space. Which of the following additional backup methods should the technician recommend?

Options:

A.

Transaction log

B.

Incremental

C.

Synthetic

D.

Differential

Question 97

A technician is configuring a workstation's security settings, and the following options are available:

    Account lockout policy

    Group policy

    Two-factor authentication

    Password complexity requirements

    Firewalls

    User accounts

    Access control lists

    Antivirus software

Which of the following settings should the technician configure to deploy strong password enforcement across the enterprise?

Options:

A.

Account lockout policy

B.

Group policy

C.

Two-factor authentication

D.

Access control lists

Question 98

Which of the following environmental effects can be the result of using virtualization?

Options:

A.

Greater energy consumption

B.

Noise pollution

C.

Reduced space requirements

D.

Fewer maintenance needs

Question 99

A technician thinks that a computer on the network has been infected with malware. The technician attempts several times to use a malware removal tool, but the issue persists. Which of the following should the technician do next?

Options:

A.

Restore the computer from the last known-good backup

B.

Reboot the computer into safe mode

C.

Purchase a new endpoint protection tool

D.

Use system recovery to prevent further infection

Question 100

A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?

Options:

A.

cat

B.

chmod

C.

pwd

D.

cacls

Question 101

A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?

Options:

A.

Phishing

B.

Dumpster diving

C.

Tailgating

D.

Evil twin

Question 102

A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?

Options:

A.

msinfo32.exe

B.

dxdiag.exe

C.

msconfig.exe

D.

regedit.exe

Question 103

A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?

Options:

A.

Event Viewer

B.

System Configuration

C.

Device Manager

D.

Performance Monitor

Question 104

Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware?

Options:

A.

Run System Restore.

B.

Place in recovery mode.

C.

Schedule a scan.

D.

Restart the PC.

Question 105

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

Options:

A.

Installing a VPN

B.

Implementing location tracking

C.

Configuring remote wipe

D.

Enabling backups

Question 106

A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?

Options:

A.

Content filter

B.

Screened subnet

C.

Port forwarding

D.

Access control list

Question 107

A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

Options:

A.

Turn off the monitor.

B.

Remove the power cord.

C.

Remove the PSU.

D.

Remove the RAM modules.

Question 108

Which of the following operating systems would most likely be used to run the inventory management system at a factory?

Options:

A.

Windows

B.

Chrome OS

C.

Android

D.

iOS

Question 109

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

Options:

A.

Configure the firewall.

B.

Restore the system from backups.

C.

Educate the end user

D.

Update the antivirus program.

Question 110

A user is unable to access a remote server from a corporate desktop computer using the appropriate terminal emulation program. The user contacts the help desk to report the issue. Which of the following clarifying questions would be most effective for the help desk technician to ask the user in order to understand the issue?

Options:

A.

What is the error message?

B.

Does the program work on another computer?

C.

Did the program ever work?

D.

Is anyone else having this issue?

Question 111

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

    Run an antivirus and enable encryption.

Options:

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

Question 112

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

Options:

A.

To maintain an information security policy

B.

To properly identify the issue

C.

To control evidence and maintain integrity

D.

To gather as much information as possible

Question 113

Which of the following should be documented to ensure that the change management plan is followed?

Options:

A.

Scope of the change

B.

Purpose of the change

C.

Change rollback plan

D.

Change risk analysis

Question 114

Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?

Options:

A.

Professional

B.

Home

C.

Enterprise

D.

Embedded

Question 115

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?

Options:

A.

Privacy

B.

Advanced

C.

Content

D.

Connections

E.

Security

Question 116

When a user is in the office, the user's mobile phone loads applications and web browses very slowly on a cellular connection. Which of the following is the best way to fix this issue?

    Connect to the company's Wi-Fi network.

Options:

A.

Change the settings on the phone to connect to a different cellular tower.

B.

Install a cellular repeater at the office for this user.

C.

Update all applications on the phone.

Question 117

A user's antivirus software reports an infection that it is unable to remove. Which of the following is the most appropriate way to remediate the issue?

Options:

A.

Disable System Restore.

B.

Utilize a Linux live disc.

C.

Quarantine the infected system.

D.

Update the anti-malware.

Question 118

A network technician is deploying a new machine in a small branch office that does not have a DHCP server. The new machine automatically receives the IP address of 169.254.0.2 and is unable to communicate with the rest of the network. Which of the following would restore communication?

    Static entry

Options:

A.

ARP table

B.

APIPA address

C.

NTP specification

Question 119

A technician was assigned a help desk ticket and resolved the issue. Which of the following should the technician update to assist other technicians in resolving similar issues?

    End user training

Options:

A.

Progress notes

B.

Knowledge base

C.

Acceptable use policy document

Question 120

After a security event, a technician removes malware from an affected laptop and disconnects the laptop from the network. Which of the following should the technician do to prevent the operating system from automatically returning to an infected state?

Options:

A.

Enable System Restore.

B.

Disable System Restore.

C.

Enable antivirus.

D.

Disable antivirus.

E.

Educate the user.

Question 121

A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?

Options:

A.

Network & Internet

B.

System

C.

Personalization

D.

Accounts

Question 122

A technician is moving a Windows workstation from the accounting department to the sales department and needs to update the IP and gateway settings. Which of the following Control Panel utilities should the technician use?

Options:

A.

Programs and Features

B.

Network and Sharing Center

C.

User Accounts

D.

Device Manager

Question 123

A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).

Options:

A.

Examine the event logs.

B.

Connect to the network.

C.

Document the findings.

D.

Update the definitions.

E.

Reimage the computer.

F.

Enable the firewall.

Question 124

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?

Options:

A.

Disable the browser from sending notifications to the Action Center.

B.

Run a full antivirus scan on the computer.

C.

Disable all Action Center notifications.

D.

Move specific site notifications from Allowed to Block.

Question 125

Which of the following are mobile operating systems used on smartphones? (Select two).

Options:

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

Question 126

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

Options:

A.

Temperature levels

B.

Location of the servers

C.

Humidity levels

D.

Noise levels

E.

Lighting levels

F.

Cable management

Question 127

When visiting a particular website, a user receives a message stating, "Your connection is not private." Which of the following describes this issue?

Options:

A.

Certificate warning

B.

Malware

C.

JavaScript error

D.

Missing OS update

Question 128

In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it. The developer states that the management team approved the business use of this software. Which of the following is the best action for the technician to take?

Options:

A.

Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased.

B.

Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process.

C.

Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.

D.

Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software.

Question 129

A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next?

    Restart the phone.

Options:

A.

Reimage the OS.

B.

Reinstall the application.

C.

Clear the cache.

Question 130

A technician is hardening a company file server and needs to prevent unauthorized LAN devices from accessing stored files. Which of the following should the technician use?

Options:

A.

Software firewall

B.

Password complexity

C.

Antivirus application

D.

Anti-malware scans

Question 131

Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team

implement?

Options:

A.

SSH

B.

VNC

C.

VPN

D.

RDP

Question 132

Which of the following combinations meets the requirements for mobile device multifactor authentication?

Options:

A.

Password and PIN

B.

Password and swipe

C.

Fingerprint and password

D.

Swipe and PIN

Question 133

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?

Options:

A.

Encryption

B.

Wi-Fi channel

C.

Default passwords

D.

Service set identifier

Question 134

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

Options:

A.

Advise the user to run a complete system scan using the OS anti-malware application

B.

Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present

C.

Have the user check for recently installed applications and outline those installed since the link in the email was clicked

D.

Instruct the user to disconnect the Ethernet connection to the corporate network.

Question 135

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?

Options:

A.

Time drift

B.

Dual in-line memory module failure

C.

Application crash

D.

Filesystem errors

Question 136

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?

Options:

A.

Encrypting File System

B.

FileVault

C.

BitLocker

D.

Encrypted LVM

Question 137

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Options:

Question 138

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

Options:

A.

resmon exe

B.

msconfig.extf

C.

dfrgui exe

D.

msmfo32.exe

Question 139

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?

Options:

A.

Scan and remove the malware

B.

Schedule automated malware scans

C.

Quarantine the system

D.

Disable System Restore

Question 140

A department has the following technical requirements for a new application:

The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?

Options:

A.

CPU

B.

Hard drive

C.

RAM

D.

Touch screen

Question 141

Which of the following Linux commands would be used to install an application?

Options:

A.

yum

B.

grep

C.

Is

D.

sudo

Question 142

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

Options:

A.

Run sfc / scannow on the drive as the administrator.

B.

Run clearnmgr on the drive as the administrator

C.

Run chkdsk on the drive as the administrator.

D.

Run dfrgui on the drive as the administrator.

Question 143

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

Options:

A.

Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin

B.

Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run

C.

Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup

D.

Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

Question 144

As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

Options:

A.

Use Settings to access Screensaver settings

B.

Use Settings to access Screen Timeout settings

C.

Use Settings to access General

D.

Use Settings to access Display.

Question 145

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

Options:

A.

All updated software must be tested with alt system types and accessories

B.

Extra technician hours must be budgeted during installation of updates

C.

Network utilization will be significantly increased due to the size of CAD files

D.

Large update and installation files will overload the local hard drives.

Question 146

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

Options:

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

Question 147

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

Options:

A.

Increase the paging file size

B.

Run the chkdsk command

C.

Rebuild the user's profile

D.

Add more system memory.

E.

Defragment the hard drive.

Question 148

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

Options:

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

Question 149

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

Options:

A.

Lock all devices in a closet.

B.

Ensure all devices are from the same manufacturer.

C.

Change the default administrative password.

D.

Install the latest operating system and patches

Question 150

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

Options:

A.

Encryption at rest

B.

Account lockout

C.

Automatic screen lock

D.

Antivirus

Question 151

The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?

Options:

A.

The contents of the text comptia.txt will be replaced with a new blank document

B.

The contents of the text comptia. txt would be displayed.

C.

The contents of the text comptia.txt would be categorized in alphabetical order.

D.

The contents of the text comptia. txt would be copied to another comptia. txt file

Question 152

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

Options:

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

Question 153

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

Options:

A.

Default gateway

B.

Host address

C.

Name server

D.

Subnet mask

Question 154

A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook?

Options:

A.

macOS

B.

Linux

C.

Chrome OS

D.

Windows

Question 155

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?

Options:

A.

Continue researching the issue

B.

Repeat the iterative processes

C.

Inform the CEO the repair will take a couple of weeks

D.

Escalate the ticket

Question 156

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?

Options:

A.

Power user account

B.

Standard account

C.

Guest account

D.

Administrator account

Question 157

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Options:

A.

Avoid distractions

B.

Deal appropriately with customer's confidential material

C.

Adhere to user privacy policy

D.

Set and meet timelines

Question 158

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

Options:

A.

Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

B.

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

C.

Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

D.

Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

Question 159

A user reports a computer is running slow. Which of the following tools will help a technician identity the issued

Options:

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Question 160

Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

Options:

A.

Network and Sharing Center

B.

Programs and Features

C.

Default Apps

D.

Add or Remove Programs

Question 161

A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?

Options:

A.

Open Settings select Devices, select Display, and change the display resolution to a lower resolution option

B.

Open Settings, select System, select Display, and change the display resolution to a lower resolution option.

C.

Open Settings Select System, select Display, and change the Scale and layout setting to a higher percentage.

D.

Open Settings select Personalization, select Display and change the Scale and layout setting to a higher percentage

Question 162

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

Options:

A.

Open Settings, select Accounts, select, Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper

B.

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper

C.

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper

D.

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Question 163

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

Options:

A.

MDM

B.

EULA

C.

IRP

D.

AUP

Question 164

Which of the following is a proprietary Cisco AAA protocol?

Options:

A.

TKIP

B.

AES

C.

RADIUS

D.

TACACS+

Question 165

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

Options:

A.

Application updates

B.

Anti-malware software

C.

OS reinstallation

D.

File restore

Question 166

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

Options:

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Question 167

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

Options:

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Question 168

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

Options:

A.

System

B.

Network and Sharing Center

C.

User Accounts

D.

Security and Maintenance

Question 169

A technician is in the process of installing a new hard drive on a server but is called away to another task. The drive has been unpackaged and left on a desk. Which of the following should the technician perform before leaving?

Options:

A.

Ask coworkers to make sure no one touches the hard drive.

B.

Leave the hard drive on the table; it will be okay while the other task is completed.

C.

Place the hard drive in an antistatic bag and secure the area containing the hard drive.

D.

Connect an electrostatic discharge strap to the drive.

Question 170

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

Options:

A.

VPN

B.

MSRA

C.

SSH

D.

RDP

Question 171

A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

Options:

A.

Repair Windows.

B.

Partition the hard disk.

C.

Reimage the workstation.

D.

Roll back the updates.

Question 172

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the

available RAM?

Options:

A.

The system is missing updates.

B.

The systems utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates.

Question 173

A user reports that the pages flash on the screen two or three times before finally staying open when attempting to access banking web pages. Which of the following troubleshooting steps should the technician perform NEXT to resolve the issue?

Options:

A.

Examine the antivirus logs.

B.

Verify the address bar URL.

C.

Test the internet connection speed.

D.

Check the web service status.

Question 174

A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

Options:

A.

Proceed to the site.

B.

Use a different browser.

C.

Report the error to the bank.

D.

Reinstall the browser.

Question 175

A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?

Options:

A.

Keylogger

B.

Cryptominers

C.

Virus

D.

Malware

Question 176

While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?

Options:

A.

Evil twin

B.

Impersonation

C.

Insider threat

D.

Whaling

Question 177

A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed:

crypt32.d11 is missing not found

Which of the following should the technician attempt FIRST?

Options:

A.

Rebuild Windows profiles.

B.

Reimage the workstation

C.

Roll back updates

D.

Perform a system file check

Question 178

A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the following tools should the technician use to resolve this issue?

Options:

A.

taskschd.msc

B.

eventvwr.msc

C.

de vmgmt. msc

D.

diskmgmt.msc

Question 179

A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?

Options:

A.

Phishing

B.

Smishing

C.

Whaling

D.

Vishing

Question 180

A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do NEXT?

Options:

A.

Remove the HDD and then send the computer for repair.

B.

Check corporate polices for guidance.

C.

Delete the sensitive information before the computer leaves the building.

D.

Get authorization from the manager.

Question 181

A technician is installing a program from an ISO file. Which of the following steps should the technician take?

Options:

A.

Mount the ISO and run the installation file.

B.

Copy the ISO and execute on the server.

C.

Copy the ISO file to a backup location and run the ISO file.

D.

Unzip the ISO and execute the setup.exe file.

Question 182

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

Options:

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Question 183

A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?

Options:

A.

Inform the customer that the issue is not within the scope of this department.

B.

Apologize to the customer and escalate the issue to a manager.

C.

Ask the customer to explain the issue and then try to fix it independently.

D.

Respond that the issue is something the customer should be able to fix.

Question 184

Which of the following is used as a password manager in the macOS?

Options:

A.

Terminal

B.

FileVault

C.

Privacy

D.

Keychain

Question 185

A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

Options:

A.

File Explorer

B.

Startup Folder

C.

System Information

D.

Programs and Features

E.

Task Scheduler

F.

Device Manager

Question 186

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

Options:

A.

Recalibrating the magnetometer

B.

Recalibrating the compass

C.

Recalibrating the digitizer

D.

Recalibrating the accelerometer

Question 187

A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?

Options:

A.

Enable firewall ACLs.

B.

Examine the localhost file entries.

C.

Verify the routing tables.

D.

Update the antivirus definitions.

Question 188

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

Options:

A.

Implementing password expiration

B.

Restricting user permissions

C.

Using screen locks

D.

Disabling unnecessary services

Question 189

A technician, who is working at a local office, has found multiple copies of home edition software installed on computers. Which of the following does this MOST likely violate?

Options:

A.

EULA

B.

Pll

C.

DRM

D.

Open-source agreement

Question 190

A customer called the help desk to report that a machine that was recently updated is no longer working. The support technician checks the latest logs to see what updates were deployed, but nothing was

deployed in more than three weeks. Which of the following should the support technician do to BEST resolve the situation?

Options:

A.

Offer to wipe and reset the device for the customer.

B.

Advise that the help desk will investigate and follow up at a later date.

C.

Put the customer on hold and escalate the call to a manager.

D.

Use open-ended questions to further diagnose the issue.

Question 191

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?

Options:

A.

Private-browsing mode

B.

Invalid certificate

C.

Modified file

D.

Browser cache

Question 192

A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service?

Options:

A.

Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service

B.

Flashing the BIOS, reformatting the drive, and then reinstalling the OS

C.

Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS

D.

Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus

Question 193

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

Options:

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Question 194

An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of the following should the

technician perform to fix the issue?

Options:

A.

Disable the Windows Update service.

B.

Check for updates.

C.

Restore hidden updates.

D.

Rollback updates.

Question 195

A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items?

Options:

A.

msinfo32

B.

perfmon

C.

regedit

D.

taskmgr

Question 196

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

Options:

A.

UAC

B.

MDM

C.

LDAP

D.

SSO

Question 197

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

Options:

A.

Spam filter installation

B.

Invalid registry settings

C.

Malware infection

D.

Operating system update

Question 198

A technician needs to provide recommendations about how to upgrade backup solutions for a site in an area that has frequent hurricanes and an unstable power grid. Which of the following should the technician recommend implementing?

Options:

A.

High availability

B.

Regionally diverse backups

C.

On-site backups

D.

Incremental backups

Question 199

Which of the following commands lists running processes in Linux?

Options:

A.

top

B.

apt-get

C.

Is

D.

cat

Question 200

Multiple users routinely record log-in information in readily accessible areas. Which of the following is the best way to mitigate this issue?

Options:

A.

Trusted sources

B.

Valid certificates

C.

User training

D.

Password manager

Question 201

An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?

Options:

A.

Configuring firewall settings

B.

Implementing expiration policies

C.

Defining complexity requirements

D.

Updating antivirus definitions

Question 202

A technician is setting up a new PC in a SOHO. Which of the following should the technician most likely configure on the PC?

Options:

A.

VDI

B.

Mapped drives

C.

Wireless WAN

D.

Domain

Question 203

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

Options:

A.

Replacing non-mobile users' laptops with wired desktop systems

B.

Increasing the wireless network adapter metric

C.

Adding wireless repeaters throughout the building

D.

Upgrading the current mesh network to support the 802.11 n specification

Question 204

An administrator needs to back up the following components of a single workstation:

•The installation of the operating system

•Applications

•User profiles

•System settings

Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?

Options:

A.

Differential

B.

Image

C.

Synthetic

D.

Archive

Question 205

A technician wants to improve password security after several users admitted to using very simple passwords. Which of the following is the best way to resolve this issue?

Options:

A.

Requiring four character types

B.

Decreasing the password expiration times

C.

Enabling an automatic lock timer

D.

Adding two characters to the minimum password length

Question 206

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

Options:

A.

Devices and Printers

B.

Administrative Tools

C.

Network and Sharing Center

D.

Programs and Features

Question 207

A technician needs to troubleshoot a user's computer while the user is connected to the system. The technician must also connect to the user's system using remote access tools built in to Windows Which of the following is the best option to troubleshoot the user's computer?

Options:

A.

Screen share

B.

MSRA

C.

Virtual network computer

D.

RDP

Question 208

A user's computer is running slower than usual and takes a long time to start up. Which of the following tools should the technician use first to investigate the issue?

Options:

A.

Action Center

B.

Task Manager

C.

Resource Monitor

D.

Security Configuration Wizard

E.

Event Viewer

Question 209

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

Options:

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Question 210

A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall output:

Protocol/PortActionDirection

1 AllowOut

445 BlockOut

53 BlockOut

123 BlockOut

80 BlockOut

Which of the following ports should be opened to allow for DNS recursion?

Options:

A.

1

B.

53

C.

80

D.

123

E.

445

Question 211

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?

Options:

A.

SSH

B.

MDM

C.

RDP

D.

SFTP

Question 212

A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?

Options:

A.

Perform a safe mode boot.

B.

Run the System Restore wizard.

C.

Start the computer in the last known-good configuration.

D.

Reset the BIOS settinqs.

Question 213

A technician is setting up a printer on a Linux workstation. Which of the following commands should the technician use to set the default printer?

Options:

A.

ipr

B.

Ispool

C.

Ipstat

D.

Ipoptions

Question 214

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

Options:

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Question 215

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

Options:

A.

Spam filtering

B.

Malware preventionsoftware

C.

End user education

D.

Stateful firewall inspection

Question 216

A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?

Options:

A.

Acceptable use policy

B.

Incident report

C.

End user license agreement

D.

Standard operating procedures

Question 217

A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?

Options:

A.

Degaussing

B.

Shredding

C.

Erasing

D.

Drilling

Question 218

A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed optional Windows updates. Which of the following is best way to resolve the issue?

Options:

A.

Enable System Restore.

B.

Roll back the device drivers.

C.

Reinstall the OS.

D.

Update the BIOS.

Question 219

A technician receives a high-priority ticket about sensitive information collected from an end user’s workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

Options:

A.

Reimage the workstation.

B.

Inform the user of the investigation.

C.

Recover and secure the workstation.

D.

Back up the workstation

Question 220

A user reports being unable to access a sports team's website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?

Options:

A.

NDA

B.

AUP

C.

VPN

D.

SOP

Question 221

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).

Options:

A.

NIC

B.

CPU

C.

PSU

D.

KVM

E.

RAM

F.

DVI

Question 222

Which of the following features can be used to ensure a user can access multiple versions of files?

Options:

A.

Multiple desktops

B.

Remote Disc

C.

Time Machine

D.

FileVault

Question 223

A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

Options:

A.

Install antispyware

B.

Reimage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

Question 224

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

Options:

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Question 225

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:

"This site cannot be reached."

A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?

Options:

A.

HTTPS

B.

VLAN

C.

DNS

D.

SMTP

Question 226

When a user attempts to open an email using a company-issued smartphone, the user receives a message stating the email is encrypted and cannot be opened. The user forwards the email to a personal account and receives the same message. The user then contacts the IT department for assistance. The technician instructs the user to contact the sender to exchange information in order to decode the message. Which of the following will the user receive from the sender?

Options:

A.

Keys

B.

Token

C.

Password

D.

RootCA

Page: 1 / 76
Total 756 questions