IT - A+ Part 2
![]() |
![]() |
![]() |
Title of test:![]() IT - A+ Part 2 Description: Practice Creation Date: 2024/06/05 Category: Others Number of questions: 143
|




New Comment |
---|
NO RECORDS |
A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?. Fingerprint and pattern. Facial recognition and PIN code. Primary account and password. Recovery contact and recovery key. A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?. Run an antivirus and enable encryption. Restore the defaults and reimage the corporate OS. Back up the files and do a system restore. Undo the jailbreak and enable an antivirus. A remote user is experiencing issues with Outlook settings and asks a technician to review the settings. Which of the following can the technician use to access the user's computer remotely?. VPN. RDP. RMM. SSH. A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key. Which of the following is the best way for a technician to return the device to service safely?. Run an AV scan. Reinstall the operating system. Install a software firewall. Perform a system restore. Comply with the on-screen instructions. A salesperson's computer is unable to print any orders on a local printer that is connected to the computer. Which of the following tools should the salesperson use to restart the print spooler?. Control Panel. Processes. Startup. Services. Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of law?. Data integrity form. Valid operating system license. Documentation of an incident. Chain of custody. A network technician is deploying a new machine in a small branch office that does not have a DHCP server. The new machine automatically receives the IP address of 169.254.0.2 and is unable to communicate with the rest of the network. Which of the following would restore communication?. Static entry. ARP table. APIPA address. NTP specification. A user wants to back up a Windows 10 device. Which of the following should the user select?. Devices and Printers. Email and Accounts. Update and Security. Apps and Features. A technician is unable to completely start up a system. The OS freezes when the desktop background appears, and the issue persists when the system is restarted. Which of the following should the technician do next to troubleshoot the issue?. Disable applicable BIOS options. Load the system in safe mode. Start up using a flash drive OS and run System Repair. Enable Secure Boot and reinstall the system. A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure what the user means and needs to view the email to assist with troubleshooting. Which of the following should the technician use to assist the user?. VNC. SSH. VPN. RMM. A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?. Respond to calls and text messages while on site but not when working directly with personnel. Respond to calls and text messages only from family. Respond to calls and text messages only when an emergency situation requires a response. Respond to calls and text messages discreetly while on site. Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?. Professional. Home. Enterprise. Embedded. A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity. A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do to best address these security and privacy concerns? (Choose two.). Disable Wi-Fi autoconnect. Stay offline when in public places. Uninstall all recently installed applications. Schedule an antivirus scan. Reboot the device. Update the OS. In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it. The developer states that the management team approved the business use of this software. Which of the following is the best action for the technician to take?. Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased. Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process. Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software. Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software. A technician needs to reimage a desktop in an area without network access. Which of the following should the technician use? (Choose two.). USB. PXE. Optical media. Partition. Boot record. SMB. A customer has a USB-only printer attached to a computer. A technician is configuring an arrangement that allows other computers on the network to use the printer. In which of the following locations on the customer's desktop should the technician make this configuration?. Printing Preferences/Advanced tab. Printer Properties/Sharing tab. Printer Properties/Security tab. Printer Properties/Ports tab. A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?. NC. RMM. RDP. SSH. Which of the following combinations meets the requirements for mobile device multifactor authentication?. Password and PIN. Password and swipe. Fingerprint and password. Swipe and PIN. A help desk technician needs to remotely access and control a customer's Windows PC by using a secure session that allows the technician the same control as the customer. Which of the following tools provides this type of access?. FTP. RDP. SSH. VNC. A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next?. Restart the phone. Reimage the OS. Reinstall the application. Clear the cache. A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?. The user is in a poor signal area. The user has too many processes running. The smartphone has malware on it. The smartphone has been jailbroken. A technician is installing RAM in a new workstation and needs to protect against electrostatic discharge. Which of the following will best resolve this concern?. Battery backup. Thermal paste. ESD strap. Consistent power. A technician is trying to connect to a user's laptop in order to securely install updates. Given the following information about the laptop: Which of the following should the technician do to connect via RDP?. Confirm the user can ping the default gateway. Change the IP address on the user's laptop. Change the subnet mask on the user's laptop. Open port 3389 on the Windows firewall. Which of the following is the most likely to use NTFS as the native filesystem?. macOS. Linux. Windows. Android. A user is unable to access several documents saved on a work PC. A technician discovers the files were corrupted and must change several system settings within Registry Editor to correct the issue. Which of the following should the technician do before modifying the registry keys?. Update the anti-malware software. Create a restore point. Run the PC in safe mode. Roll back the system updates. After a security event, a technician removes malware from an affected laptop and disconnects the laptop from the network. Which of the following should the technician do to prevent the operating system from automatically returning to an infected state?. Enable System Restore. Disable System Restore. Enable antivirus. Disable antivirus. Educate the user. Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in the trash bin?. .exe. .dmg. .app. .rpm. .pkg. A user's application is unresponsive. Which of the following Task Manager tabs will allow the user to address the situation?. Startup. Performance. Application history. Processes. A new spam gateway was recently deployed at a small business. However, users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems. Which of the following is the most effective method for dealing with this issue?. Adjusting the spam gateway. Updating firmware for the spam appliance. Adjusting AV settings. Providing user training. An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?. Configure the firewall. Restore the system from backups. Educate the end user. Update the antivirus program. A user clicks a link in an email. A warning message in the user's browser states the site's certificate cannot be verified. Which of the following is the most appropriate action for a technician to take?. Click proceed. Report the employee to the human resources department for violating company policy. Restore the computer from the last known backup. Close the browser window and report the email to IT security. A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?. Ask the user for the model number of the hardware. Offer a temporary replacement device to the user. Submit the issue to the manufacturer. Remotely install updates to the device driver. An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply with regulatory requirements. Which of the following disposal methods for the non-compliant cards is the most environmentally friendly?. Incineration. Resale. Physical destruction. Dumpster for recycling plastics. Which of the following file extensions should a technician use for a PowerShell script?. .ps1. .py. .sh. .bat. .cmd. A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer. Which of the following security measures should the user take to ensure security and privacy?. Only accept calls from known people. Disregard any suspicious emails. Update the antivirus software. Enable two-factor authentication. Install a malware scanner. A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Choose two.). Examine the event logs. Connect to the network. Document the findings. Update the definitions. Reimage the computer. Enable the firewall. An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Choose two.). Degauss. Delete. Incinerate. Recycle. Format. Shred. A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?. Run one scan and schedule future scans. Back up the uninfected files and reimage the computer. Restore the clean backup copies of the infected files. Run repeated remediation scans until the malware is removed. A technician needs to configure security settings on a Windows 10 workstation. Which of the following should the technician configure to limit password attempts?. Account Lockout Policy. User Access Control. System Protection. Firewall. Which of the following protocols supports fast roaming between networks?. WEP. WPA. WPA2. LEAP. PEAP. A technician is setting up a SOHO router in a user’s home. The user wants the router to be configured to prevent access to malicious content and apply internet access protection. Which of the following settings should the technician configure?. Port forwarding. Content filtering. Firmware updates. DHCP reservations. A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?. Event Viewer. System Configuration. Device Manager. Performance Monitor. A developer reports that a workstation’s database file extensions have been changed from .db to .enc. The developer is also unable to open the database files manually. Which of the following is the best option for recovering the data?. Accessing a restore point. Rebooting into safe mode. Utilizing the backups. Using an AV to scan the affected files. A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?. Group Policy. User accounts. Access control lists. Authenticator applications. Multiple users routinely record log-in information in readily accessible areas. Which of the following is the best way to mitigate this issue?. Trusted sources. Valid certificates. User training. Password manager. A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?. Color Management. System. Troubleshooting. Device Manager. Administrative Tools. Which of the following commands can a technician use to get the MAC address of a Linux distribution?. net use. ifconfig. netstat. ping. A user reports that an Android mobile device takes a long time to boot, and all applications crash when launched. The user installed the applications from a third-party website. Which of the following steps should the technician complete to diagnose the issue?. Scan the system for malware. Clear the web browser cache. Enroll the device in an MDM system. Confirm the compatibility of the applications with the OS. A technician is hardening a company file server and needs to prevent unauthorized LAN devices from accessing stored files. Which of the following should the technician use?. Software firewall. Password complexity. Antivirus application. Anti-malware scans. A technician is installing software on a user’s workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Choose two.). NIC. CPU. PSU. KVM. RAM. DVI. Which of the following items require special e-waste recycling? (Choose two.). Solid-state drive. A/C adapter. Surge protector. Laptop battery. CRT monitor. Power supply. A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour and performance is severely degraded. Which of the following tabs in Task Manager contains the information a technician should use to identify the cause of this issue?. Services. Processes. Performance. Startup. A technician downloaded a software program to a network share. When the technician attempts to copy the program to the Windows tablet for installation, the technician receives an error. Which of the following is the best procedure for the technician to use to complete the assignment?. Copy the program file to a USB drive and install. Burn the program file to a CD and install. Format the HDD and then do the installation. Replace the HDD and then do the installation. Which of the following features can be used to ensure a user can access multiple versions of files?. Multiple desktops. Remote Disc. Time Machine. FileVault. Which of the following is an example of MFA?. Fingerprint scan and retina scan. Password and PIN. Username and password. Smart card and password. A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel. Which of the following explains why the technician is unable to find this menu item?. The hardware does not meet BitLocker’s minimum system requirements. BitLocker was renamed for Windows 10. BitLocker is not included on Windows 10 Home. BitLocker was disabled in the registry of the laptop. A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?. Disk Defragment. Registry Editor. System Information. Disk Cleanup. A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?. Disable System Restore. Remediate the system. Educate the system user. Quarantine the system. A Linux technician needs a filesystem type that meets the following requirements: • All changes are tracked. • The possibility of file corruption is reduced. • Data recovery is easy. Which of the following filesystem types best meets these requirements?. ext3. FAT32. exFAT. NTFS. A user’s laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?. Scan for malware and ransomware. Perform a system restore. Check the network utilization. Update the antivirus software. A user reports being unable to access a sports team’s website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?. NDA. AUP. VPN. SOP. Which of the following authentication types is the most secure?. WPA3. WEP. RADIUS. TACACS+\. WPS. A technician is manually updating Windows workstations. Each workstation is currently running Windows Pro in a workgroup environment. Which of the following changes can the technician make to create a more manageable environment?. Downgrade all workstations from the Pro version to the Home version of the OS. Upgrade all workstations from the Pro version to Pro for Workstations. Create a domain and join the workstations to the domain for management purposes. Make sure all workstations are operating under the same workgroup name. A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?. Perform a safe mode boot. Run the System Restore wizard. Start the computer in the last known-good configuration. Reset the BIOS settings. Applications on a computer are not updating, which is preventing the user from opening certain files. Which of the following MAC snap-ins should the technician launch next to continue troubleshooting the issue?. gpedit.msc. perfmon.msc. devmgmt.msc. eventvwr.msc. A technician needs to back up a small business’s entire network that includes ten workstations. Which of the following methods should the technician use to safely and securely back up the business’s network?. Cloud storage. RAID. Tape drive. Local backups. A technician wants to update the local security policies on a Windows machine but is unable to launch the expected snap-in. Which of the following is the most likely reason?. The computer is running Windows Home. The user did not sign the end user license agreement. The user disabled the User Account Control. An antivirus application is blocking access. Which of the following is also known as something you know, something you have, and something you are?. ACL. MFA. SMS. NFC. An organization is creating guidelines for the incorporation of generative AI solutions. In which of the following would these guidelines be published?. Standard operating procedure. Acceptable use policy. Security protocols. Data flow diagram. When visiting a particular website, a user receives a message stating, “Your connection is not private”. Which of the following describes this issue?. Certificate warning. Malware. JavaScript error. Missing OS update. Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware?. Run System Restore. Place in recovery mode. Schedule a scan. Restart the PC. A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20 minutes late. The customer will also be late. Which of the following should the technician do considering proper communication techniques and professionalism?. Do not notify the customer if arriving before the customer. Dismiss the customer and proceed with the after-hours work. Contact the customer if the technician is arriving late. Disclose the experience via social media. A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?. Privacy. Advanced. Content. Connections. Security. A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?. Delete the browser cookies and history. Reset all browser settings. Change the browser default search engine. Install a trusted browser. A company is creating an access control system that uses something you have and something you are. Which of the following will be required for user authentication? (Choose two.). Password manager. Encryption keys. Biometric scanner. Smartcard reader. Host-based IDS. PIN code. An administrator configured security features on company-owned mobile devices to help protect against data loss. Which of the following is the best way to protect data on a misplaced device?. Remote wipe. Device encryption. PIN codes. Locator applications. A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?. msinfo32.exe. dxdiag.exe. msconfig.exe. regedit.exe. Which of the following operating systems is most commonly used in embedded systems?. Chrome OS. macOS. Windows. Linux. A user identified that a program installed in a workstation does not have optional features enabled. Which of the following must the technician do to install the optional features?. Go to Programs and Features, uninstall the program, and reinstall it. Go to Administrative Tools and edit System Configuration. Go to Administrative Tools and run Disk Cleanup. Go to Programs and Features, select the program, and click on Change. A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?. Multifactor authentication. Encryption. Increased password complexity. Secure password vault. A user is experiencing the following issues with Bluetooth on a smartphone: • The user cannot hear any sound from a speaker paired with the smartphone. • The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth. A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?. Restart the smartphone. Reset the network settings. Unpair the Bluetooth speaker. Check for system updates. A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?. Dedicated GPU. DDR5 SODIMM. NVMe disk. 64-bit CPU. A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall output: Which of the following ports should be opened to allow for DNS recursion?. 1. 53. 80. 123. 445. When a user attempts to open an email using a company-issued smartphone, the user receives a message stating the email is encrypted and cannot be opened. The user forwards the email to a personal account and receives the same message. The user then contacts the IT department for assistance. The technician instructs the user to contact the sender to exchange information in order to decode the message. Which of the following will the user receive from the sender?. Keys. Token. Password. Root CA. Which of the following statements describes the purpose of scripting languages?. To access the hardware of the computer it is running on. To automate tasks and reduce the amount of manual labor. To abstract the complexity of the computer system. To compile the program into an executable file. A technician is setting up a printer on a Linux workstation. Which of the following commands should the technician use to set the default printer?. lpr. ispool. lpstat. Ipoptions. A user's work PC has been the target of multiple phishing attacks. Which of the following is a way for the user to prevent further attacks?. Enabling Windows Firewall. Activating the email spam filter. Using a secure VPN connection. Running vulnerability scans on a schedule. A technician is troubleshooting a Windows system that is having issues with the OS loading at startup. Which of the following should the technician do to diagnose the issue?. Enable boot logging on the system. Launch the last known-good configuration. Check the system resource usage in Task Manager. Run the sfc /scannow command. Use the Event Viewer to open the application log. A payroll server has data on it that needs to be readily available and can be recovered quickly if something is accidentally removed. Which of the following backup methods should be used to provide the fastest data recovery in this situation?. Full. Differential. Synthetic. Incremental. A company recently experienced a security incident in which a USB drive containing malicious software was able to covertly install malware on a workstation. Which of the following actions should be taken to prevent this incident from happening again? (Choose two.). Install a host-based IDS. Restrict log-ln times. Enable a BIOS password. Update the password complexity. Disable AutoRun. Restrict user permissions. A user is trying to limit the amount of time their children spend on the internet. Which of the following Windows 10 settings should be enabled to accomplish this objective?. Family Options. Update & Security. Ease of Access. Network & Internet. Privacy. A user reports that a new, personally owned tablet will not connect to the corporate Wi-Fi network. The user is able to connect to the Wi-Fi network with other devices, and the tablet is running the latest software. Which of the following is the most likely cause of the issue?. Incorrect encryption settings. Blocked MAC address. Outdated drivers. Disabled location services. A technician is on site dealing with an angry customer. The customer thinks the issues have not been addressed, while the technician thinks that the issue has been correctly resolved. Which of the following should the technician do to best handle the situation?. Insist that the customer is correct and document the concern. Listen to the customer and do not speak at all. Escalate the issue to the next tier. Apologize and ask what would help resolve the issue. Which of the following should be documented to ensure that the change management plan is followed?. Scope of the change. Purpose of the change. Change rollback plan. Change risk analysis. A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with?. Device. Business. Network. Operation. A technician is modifying the default home page of all the workstations in a company. Which of the following will help to implement this change?. Insist that the customer is correct and document the concern. Listen to the customer and do not speak at all. Escalate the issue to the next tier. Apologize and ask what would help resolve the issue. A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue?. msconfig. chkdsk. sfc. diskpart. mstsc. A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?. Isolate the machine from the network. Scan the system for hidden files. Disable unused ports. Install antivirus software. Reconfigure the firewall. A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS, the malware infection returned later that day. Which of the following is the most likely source?. Trojan. Boot sector virus. Spyware. Rootkit. A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?. Internet connection. Product key. Sufficient storage space. UEFI firmware. Legacy BIOS. Which of the following operating systems would most likely be used to run the inventory management system at a factory?. Windows. Chrome OS. Android. iOS. A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?. Security groups. Folder redirection. Organizational unit structure. Access control list. A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?. c:\minutes. dir. rmdir. md. Which of the following is the most likely reason a filtration system is critical for data centers?. Plastics degrade over time. High humidity levels can rust metal. Insects can invade the data center. Dust particles can clog the machines. Which of the following Linux commands would help to identify which directory the user is currently operating in?. pwd. dig. find. cat. Which of the following authentication methods should be used for BYOD wireless devices?. Local certificates. TACACS+. RADIUS. Captive portal. A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Choose two.). Uninstall the game application. Perform a factory reset of the device. Connect the device to an external charger. Install the latest security patches. Clear the application's cache. Enable the device's built-in anti-malware protection. A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?. Network & Internet. System. Personalization. Accounts. A customer is configuring on an old desktop an inexpensive file server to share photos and videos and wants to avoid complicated licensing. Which of the following operating systems should the technician most likely recommend?. Chrome OS. Linux. macOS. Windows. A technician is following the ticketing system's best practices when handling user support requests. Which of the following should the technician do first when responding to a user support request that contains insufficient information?. Ask the user for clarification. Keep the user updated on the progress. Document the root cause. Follow the system's escalation process. Which of the following is used to prevent automobiles from crashing into a building?. Cameras. Bollard. Lighting. Biometrics. Which of the following operating systems uses the ext4 filesystem type?. macOS. iOS. Linux. Windows. A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend?. Corporate. Open-source. Personal. Enterprise. A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?. Valid license. Data retention requirements. Material safety data sheet. Chain of custody. Which of the following describes a concept that requires using a combination of an ID, a password, and a biometric?. Types of security. Access control. Principle of least privilege. Multifactor authentication. A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?. Application permissions. Available storage space. Battery charge level. Wi-Fi connection speed. A SOHO wireless router needs to be configured so incoming traffic is only allowed on specified ports. Which of the following is the best way for the technician to accomplish this task?. Physically secure access to the router. Implement AES encryption. Install the latest firmware. Disable Universal Plug and Play. The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?. Reinstall the application on the smartphone. Update the smartphone's OS. Reset the smartphone to factory settings. Reboot the smartphone. Which of the following is the Windows OS that only recognizes 4GB of RAM?. The Home version OS. The 32-bit OS. The 64-bit OS. The trial version OS. A company is requiring its staff to work remotely and needs to ensure remote access to servers and fileshares is secure. Which of the following should the company implement? (Choose two.). RDP. VPN. FTP. VLAN. TELNET. HTTPS. DHCP. A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?. Devices and Printers. Administrative Tools. Network and Sharing Center. Programs and Features. An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable?. Smart card. Biometrics. Hard token. One-time password. Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?. Installing a VPN. Implementing location tracking. Configuring remote wipe. Enabling backups. A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42, and has no subnet mask. Which of the following should the technician check next?. Internal antenna connections. Static IP settings. Airplane mode. Digitizer calibration. A computer is restarting automatically and displaying the following error message: Your PC ran into a problem and needs to restart. We’re just collecting some error info, and then we’ll restart for you. (0% complete). Which of the following should the technician do first to diagnose the issue?. Check the system event logs. Verify the hardware driver versions. Install Windows updates. Perform a RAM diagnostic. An IT technician is attempting to access a user’s workstation on the corporate network but needs more information from the user before an invitation can be sent. Which of the following command-line tools should the technician instruct the user to run?. nslookup. tracert. hostname. gpresult. A technician needs to upgrade the operating system on 200 lab computers to the latest version of Linux. Which of the following is the fastest upgrade method?. Starting up from the USB flash drive. Cloning each computer’s hard drive. Installing from a network share. Using the Windows Subsystem for Linux. Which of the following is the best reason for sandbox testing in change management?. To evaluate the change before deployment. To obtain end-user acceptance. To determine the affected systems. To select a change owner. A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond?. Place the customer on hold until the customer calms down. Disconnect the call to avoid a confrontation. Wait until the customer is done speaking and offer assistance. Escalate the issue to a supervisor. Which of the following operating systems was the .app file type designed to run under as an application file bundle?. macOS. Chrome. Windows. Linux. A healthcare organization wants to provide iPads to the nursing staff. Which of the following accounts would provide the least privilege to the users?. Guest. Root. Superuser. Adminstrator. A user clicked on a link in an email and was redirected to a web page. Now, some commonly used websites are not accessible. A technician confirms that other users are not experiencing the same issue. Which of the following steps should the technician take next to properly identify the issue?. Check the hosts file. Review the laptop’s IP settings. Enable the Windows Firewall. Verify if the wireless router is functioning. A technician is installing a new copy of Windows on all computers in the enterprise. Given the following requirements: • The install phase must be scripted to run over the network. • Each computer requires a new SSD as the system drive. • The existing HDD should remain as a backup drive Which of the following command-line tools should the technician use to install the drive and transfer the installation files from the network share? (Choose three.). net use. robocopy. winver. diskpart. sfc. netstat. ping. chkdsk. A newly hired employee is trying to enroll a personal mobile device in the company's mobile device management system. After the initial attempt, the employee receives a notification stating, "not compliant - call support.' Which of the following is the reason why the employee is receiving this message?. More RAM is needed. AirDrop is not enabled. The device has been jailbroken. The account has no profile picture. A technician is modifying the default home page of all the workstations in a company. Which of the following will help to implement this change?. Group Policy. Browser extension. System Configuration. Task Scheduler. A technician is implementing the latest application security updates for endpoints on an enterprise network. Which of the following solutions should the technician use to ensure device security on the network while adhering to industry best practices?. Automate the patching process. Monitor the firewall configuration,. Implement access control lists. Document all changes. A user's File Explorer keeps crashing. The technician is troubleshooting and tries the following: • Runs Windows Update • Runs CHKDSK and SFC /scannow • Clears File Explorer history Which of the following actions should the technician take next?. Roll back the most recent set of Windows updates. Reimage the computer and ask the user to test. Test the computer's memory. Repartition the boot drive. A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?. Replacing non-mobile users' laptops with wired desktop systems. Increasing the wireless network adapter metric. Adding wireless repeaters throughout the building. Upgrading the current mesh network to support the 802.11n specification. A customer needs to verify an executable file that the customer downloaded from a website. Which of the following should the customer use to verify the file?. Password manager. BitLocker. File Vault. Checksum. Secure site. A technician needs to implement a backup and recovery solution that will ensure executives’ laptops can be restored if needed. The plan should include the capability to perform granular and whole-disk recovery. Which of the following are the best options for the technician to successfully implement the plan? (Choose two.). RAID. Volume shadow copy. Incremental backup. System restore. Grandfather-father-son backup. Disk imaging. A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?. Configure MAC filtering. Disable DHCP. Configure port forwarding. Disable guest access. A technician is adding some Windows 10 workstations to the corporate domain. A script was able to add the majority of the workstations, but failed on a couple. Which of the following menus should the technician check in order to complete the task manually?. User Accounts. System Properties. Windows Firewall. Network and Sharing. A technician is troubleshooting a user's PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window. Which of the following is the most likely cause of these issues?. Expired certificate. False alert. Missing system files. OS update failure. |