web analytics

A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

A technician is recycling PCs to be reused by a middle school. Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs? A.

Which of the following technologies is used by malicious employees to obtain user passwords?

Which of the following technologies is used by malicious employees to obtain user passwords? A. Main-in-the-middle B. Phishing C. Tailgating D. Shoulder surfing Answer: D

Which of the following would BEST accomplish this goal?

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site.

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up the server room?

A team needs to deploy a temporary server room at a site to provide support during construction. Which of the following should they use at this site while setting up

Which of the following upgrade methods should the technician use?

A technician is installing the latest OS on a user’s system. The user wants all of the settings and file to remain intact during the installation. Which of the following

Which of the following actions should be taken to close the vulnerability? (Select two.)

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed

Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s

Which of the following is considered government-regulated data?

Which of the following is considered government-regulated data? A. PII B. End-user license agreement C. Digital Millennium Copyright Act D. DRM Answer: A

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process? A. Driver detection B. Metro

Which of the following types of infection does the user MOST likely have?

A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded

Which of the following should the technician do to resolve the problem?

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are: Two 1GHz CPUs 2GB of memory 15GB hard drive

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

A wireless access point is going to be configured in a small office located in a crowded building. Which of the following should the installation technician perform to increase the

Which of the following BEST enforces this policy?

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The company’s security policy states that once the inventory is completed, the

Which of the following is an important part of the change request process for which the administrator still must plan?

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the

Which of the following boot methods initiates such an upgrade?

A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network.

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take?

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of

A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user?

A Windows user is attempting to install a local printer and is unsuccessful on permissions. Which of the following user types BEST describes this user? A. Guest B. Power User

Which of the following should the technician attempt NEXT?

A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.

which of the following configuration settings should be changed to address these concerns?

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and

A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software? A.

Which of the following is the MOST likely issue Ann is experiencing?

Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she gets a message indicating the page cannot be displayed. She notices

Which of the following devices provides protection against brownouts?

Which of the following devices provides protection against brownouts? A. battery backup B. surge suppressor C. rack grounding D. line conditioner Answer: A

Which of the following authentication methods is being requested?

Joe, an end user, has been prompted to provide his username and password to access the payroll system. Which of the following authentication methods is being requested? A. Single-factor B.

When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which

Which of the following is the maximum RAM limit of a Windows 32-bit version?

Which of the following is the maximum RAM limit of a Windows 32-bit version? A. no limit B. 4GB C. 8GB D. 32GB Answer: B

Which of the following are the NEXT steps Joe should take to resolve the issue? (Select two.)

Ann, an employee at a company, calls the help disk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer? A. Image deployment B. Multiboot configuration C. In-place upgrade D.

Which of the following protocols and authentication methods should the technician implement? (Select two.)

A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various

An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.) A.

Which of the following would MOST likely fix the issue?

A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse

Which of the following would the project team MOST likely add to the SOW?

A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to

Which of the following should the help desk perform to fix the issue?

Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate

Which of the following messages will be displayed?

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC? A. Put on an ESD strap. B. Place components on an

Which of the following should the technician replace to prevent these issues in the future?

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has

In which of the following file extension types would a user expect to see the command. “net use T:\ \server\files’?

In which of the following file extension types would a user expect to see the command. “net use T:\ \server\files’? A. .bat B. .vbs C. .js D. .py Answer: A

Which of the following should the technician have covered previously as part of the original repair?

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned. Which of the following

Which of the following settings or features is responsible for the problems Ann is experiencing?

Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives

With which of the following types of infections are the PCs MOST likely infected? (Select two.)

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician

Which of the following documents did the network administrator MOST likely give to the technician?

A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network

Which of the following is the MOST likely cause of the problem?

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem? A. Untrusted software B. Outdated

Which of the following steps should the technician take NEXT to resolve the problem?

A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at

Which of the following types of social engineering threats is this?

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this? A. Phishing B. Spear phishing C.

With which of the following types is a man-in-the-middle attack associated?

With which of the following types is a man-in-the-middle attack associated? A. Brute force B. Spoofing C. DDoS D. Zero-day Answer: B

Which of the following are the MOST likely reasons for these issues? (Select two.)

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When

Which of the following should the technician do NEXT?

A manager with a restricted user account receives the following error message: Windows Update cannot currently check for updates because the service is not running. The manager contacts the help

which of the following is the MOST important step a technician can take to protect against possible infection?

A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the

Which of the following built-in utilities should be used?

A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which

Which of the following installation types would require the use of an answer file to install the OS?

Which of the following installation types would require the use of an answer file to install the OS? A. Unattended B. Clean C. Repair D. Upgrade Answer: A

Which of the following should a technician recommend?

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions.