Winter Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

CompTIA A+ Certification Core 2 Exam Question and Answers

CompTIA A+ Certification Core 2 Exam

Last Update Dec 13, 2024
Total Questions : 756

We are offering FREE 220-1102 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare 220-1102 free exam questions and then go for complete pool of CompTIA A+ Certification Core 2 Exam test questions that will help you more.

220-1102 pdf

220-1102 PDF

$42  $104.99
220-1102 Engine

220-1102 Testing Engine

$50  $124.99
220-1102 PDF + Engine

220-1102 PDF + Testing Engine

$66  $164.99
Questions 1

Which of the following are mobile operating systems used on smartphones? (Select two).

Options:

A.  

macOS

B.  

Windows

C.  

Chrome OS

D.  

Linux

E.  

iOS

F.  

Android

Discussion 0
Questions 2

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

Options:

A.  

Operating system updates

B.  

Remote wipe

C.  

Antivirus

D.  

Firewall

Discussion 0
Questions 3

A Windows user wants a filesystem that protects confidential data from attackers who have physical access to the system. Which of the following should the user choose?

Options:

A.  

ext

B.  

APFS

C.  

FAT

D.  

EFS

Discussion 0
Questions 4

A user reports that a new, personally owned tablet will not connect to the corporate Wi-Fi network. The user is able to connect to the Wi-Fi network with other devices, and the tablet is running the latest software. Which of the following is the most likely cause of the issue?

Options:

A.  

Incorrect encryption settings

B.  

Blocked MAC address

C.  

Outdated drivers

D.  

Disabled location services

Discussion 0
Questions 5

Internet speeds on a user's Windows 10 device are slow, but other devices on the same network are running at normal speeds. A technician thinks the issue may be related to the proxy settings. Which of the following should the technician check to verify the proxy configuration?

Options:

A.  

Network and Sharing Center

B.  

Internet Options

C.  

Firewall settings

D.  

System settings

Discussion 0
Questions 6

A user reports that a device with a statically defined IP is unable to connect to the internet. The technician runs the ipconfig /all command and sees the following output:

IPv4 Address............ 192.168.0.74

Subnet Mask.............255.255.255.255

Default Gateway......... 192.168.0.1

Which of the following is most likely the reason for the issue?

Options:

A.  

The default gateway is up.

B.  

The user has an APIPA IP address.

C.  

The IP address is on the wrong subnet

D.  

The subnet mask is incorrect.

Discussion 0
Questions 7

Which of the following ensures data is unrecoverable on a lost or stolen mobile device?

Options:

A.  

Device encryption

B.  

Remote wipe

C.  

Data backup

D.  

Fingerprint reader

Discussion 0
Questions 8

A technician is replacing the rack mount UPS. Which of the following should the technician consider?

Options:

A.  

Determining the availability of compressed air

B.  

Getting assistance to lift the hardware

C.  

Checking local low-voltage regulations

D.  

Testing the fire suppression system

Discussion 0
Questions 9

Several computers have been infected with malware, causing the company network to slow down and sensitive company information to be lost. The IT department installs new antivirus software to remove the malware and needs to decide the best method to prevent future malware infections. Which of the following methods would be the most effective?

Options:

A.  

Encrypting data at rest

B.  

Implementing firewalls

C.  

Utilizing Intrusion detection systems

D.  

Backing up data regularly

Discussion 0
Questions 10

A technician is configuring a workstation's security settings, and the following options are available:

    Account lockout policy

    Group policy

    Two-factor authentication

    Password complexity requirements

    Firewalls

    User accounts

    Access control lists

    Antivirus software

Which of the following settings should the technician configure to deploy strong password enforcement across the enterprise?

Options:

A.  

Account lockout policy

B.  

Group policy

C.  

Two-factor authentication

D.  

Access control lists

Discussion 0
Questions 11

Which of the following system preference items allows a user to enable third-party application installations on macOS 11?

Options:

A.  

Keychain

B.  

Privacy

C.  

Accessibility

D.  

Spotlight

Discussion 0
Questions 12

During a routine check, a systems administrator discovers that a user's PC is running slowly and CPU utilization is at 100%. Further investigation shows a large amount of resource usage. Which of the following is the most likely cause of the high resource usage?

Options:

A.  

Firewall activities

B.  

Botnet attack

C.  

DDoS attack

D.  

Keylogger attack

Discussion 0
Questions 13

A technician received a notification about encrypted production data files and thinks active ransomware is on the network. The technician isolated and removed the suspicious system from the network. Which of the following steps should the technician take next?

Options:

A.  

Schedule and perform an antivirus scan and system update

B.  

Educate the end user on internet usage

C.  

Perform a system scan to remove the malware

D.  

Create a system restore point

Discussion 0
Questions 14

Which of the following filesystems supports journaling?

Options:

A.  

NTFS

B.  

exFAT

C.  

HFS

D.  

ext2

Discussion 0
Questions 15

A technician runs a command and gets the following output:

Ethernet adapter Ethernet 3:

Connection-specific DNS Suffix . :reddog.microsoft.com

Link-local IPv6 Address .......... :fe80::de3d:9283:4f00:856a%5

IPv4 Address.......................:10.203.10.16

Subnet Mask ...................... :255.255.255.0

Default Gateway .................. :10.203.10.1

Which of the following commands did the technician use?

Options:

A.  

ipconfig

B.  

tracert

C.  

whoami

D.  

net use

Discussion 0
Questions 16

A developer installed a new software package that has stopped all file server access. Which of the following change management practices should have been followed?

Options:

A.  

End-user acceptance

B.  

Staff delegation

C.  

Appropriate scoping

D.  

Sandbox testing

Discussion 0
Questions 17

While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?

Options:

A.  

Evil twin

B.  

Impersonation

C.  

Insider threat

D.  

Whaling

Discussion 0
Questions 18

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

Options:

A.  

System

B.  

Network and Sharing Center

C.  

User Accounts

D.  

Security and Maintenance

Discussion 0
Questions 19

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

Options:

A.  

The Windows 10 desktop has Windows 10 Home installed.

B.  

The Windows 10 desktop does not have DHCP configured.

C.  

The Windows 10 desktop is connected via Wi-Fi.

D.  

The Windows 10 desktop is hibernating.

Discussion 0
Questions 20

A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?

Options:

A.  

Enable promiscuous mode.

B.  

Clear the browser cache.

C.  

Add a new network adapter.

D.  

Reset the network adapter.

Discussion 0
Questions 21

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

Options:

A.  

Requiring employees to enter their usernames and passwords

B.  

Setting up facial recognition for each employee

C.  

Using a PIN and providing it to employees

D.  

Requiring employees to use their fingerprints

Discussion 0
Questions 22

A user lost a company tablet that was used for customer intake at a doctor's office. Which of the following actions would BEST protect against unauthorized access of the data?

Options:

A.  

Changing the office's Wi-Fi SSID and password

B.  

Performing a remote wipe on the device

C.  

Changing the user's password

D.  

Enabling remote drive encryption

Discussion 0
Questions 23

A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

Options:

A.  

System

B.  

Indexing Options

C.  

Device Manager

D.  

Programs and Features

Discussion 0
Questions 24

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

Options:

A.  

Spam filter installation

B.  

Invalid registry settings

C.  

Malware infection

D.  

Operating system update

Discussion 0
Questions 25

A data center is required to destroy SSDs that contain sensitive information. Which of the following is the BEST method to use for the physical destruction of SSDs?

Options:

A.  

Wiping

B.  

Low-level formatting

C.  

Shredding

D.  

Erasing

Discussion 0
Questions 26

An application is not performing well and will occasionally shut down with no error provided. Which of the following Task Manager tabs should be used to troubleshoot the application while it is active?

Options:

A.  

Users

B.  

Services

C.  

Performance

D.  

Startup

Discussion 0
Questions 27

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

Options:

A.  

Revert the spreadsheet to the last restore point.

B.  

Increase the amount of RAM.

C.  

Defragment the storage drive.

D.  

Upgrade the network connection speed.

Discussion 0
Questions 28

A company executive is currently attending a major music festival with a large number of attendees and is having trouble accessing a work email account. The email application is not downloading emails and appears to be stuck during connection attempts. Which of the following is most likely causing the disruption?

Options:

A.  

The phone has no storage space available.

B.  

Company firewalls are configured to block remote access to email resources.

C.  

Too many devices in the same area are trying to connect to the mobile network.

D.  

The festival organizer prohibits internet usage during the event and has blocked the internet signal.

Discussion 0
Questions 29

A user is unable to access the company’s internal network on a separate subnet. A help desk technician verifies the user's credentials, and the user has the appropriate permissions to access the network. The technician checks the network and finds the connection is stable. No other users are having this issue. Which of the following should the technician do next?

Options:

A.  

Consult with the firewall team to see If the user's IP address Is blocked.

B.  

Delete the user’s credentials and create new ones.

C.  

Run a virus scan on the user's workstation.

D.  

Update the network drivers on the user’s workstation.

Discussion 0
Questions 30

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?

Options:

A.  

Remote wipe

B.  

Mandatory screen locks

C.  

Location applications

D.  

Device data encryption

Discussion 0
Questions 31

A user asks a technician for recommendations to back up desktop data from a Windows OS. The technician recommends implementing daily full backups, but the user is concerned about having enough space. Which of the following additional backup methods should the technician recommend?

Options:

A.  

Transaction log

B.  

Incremental

C.  

Synthetic

D.  

Differential

Discussion 0
Questions 32

A technician wants to update the local security policies on a Windows machine but is unable to launch the expected snap-in. Which of the following is the most likely reason?

Options:

A.  

The computer is running Windows Home.

B.  

The user did not sign the end user license agreement.

C.  

The user disabled the User Account Control.

D.  

An antivirus application is blocking access.

Discussion 0
Questions 33

A user is unable to log in to a workstation. The user reports an error message about the date being incorrect. A technician reviews the date and verifies it is correct, but the system clock is an hour behind. The technician also determines this workstation is the only one affected. Which of the following is the most likely issue?

Options:

A.  

Time drift

B.  

NTP failure

C.  

Windows Update

D.  

CMOS battery

Discussion 0
Questions 34

A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially. Which of the following considerations was overlooked?

Options:

A.  

OS compatibility

B.  

Quality of service

C.  

32- vs. 64-bit architecture

D.  

Storage requirements

Discussion 0
Questions 35

A user is attempting to access a shared drive from a company-issued laptop while working from home. The user is unable to access any files and notices a red X next to each shared drive. Which of the following needs to be configured in order to restore the user's access to the shared drives?

Options:

A.  

IPv6

B.  

VPN

C.  

IPS

D.  

DNS

Discussion 0
Questions 36

A user is unable to open personal files on a PC on a home network. An on-screen message indicates the files are encrypted and demands payment to access the files. Which of the following should a technician recommend the user do first?

Options:

A.  

Reinstall the OS.

B.  

Run the System Restore feature.

C.  

Disconnect the PC from the network.

D.  

Pay the amount demanded.

E.  

Scan the PC with an anti-malware program.

Discussion 0
Questions 37

Employees at comptia.org are reporting getting an usual amount of emails from a coworker. A technician discovers the emails were sent from the following address:

john@cOmptia.org

Which of the following social engineering attacks is this an example of?

Options:

A.  

Whaling

B.  

Insider threat

C.  

Phishing

D.  

Vishing

E.  

Evil twin

Discussion 0
Questions 38

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

    Standard operating procedure

Options:

A.  

Acceptable use policy

B.  

Security protocols

C.  

Data flow diagram

Discussion 0
Questions 39

Which of the following is a preventive physical security control?

Options:

A.  

Video surveillance system

B.  

Bollards

C.  

Alarm system

D.  

Motion sensors

Discussion 0
Questions 40

A customer needs to purchase a desktop capable of rendering video. Which of the following should the customer prioritize?

Options:

A.  

NIC

B.  

USB

C.  

GPU

D.  

HDMI

Discussion 0
Questions 41

Which of the following would allow physical access to a restricted area while maintaining a record of events?

Options:

A.  

Hard token

B.  

Access control vestibule

C.  

Key fob

D.  

Door Lock

Discussion 0
Questions 42

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

Options:

A.  

Investigate the firewall logs.

B.  

Isolate the machine from the network.

C.  

Inspect the Windows Event Viewer.

D.  

Take a physical inventory of the device.

Discussion 0
Questions 43

A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?

Options:

A.  

Ask the user for the model number of the hardware.

B.  

Offer a temporary replacement device to the user.

C.  

Submit the issue to the manufacturer.

D.  

Remotely install updates to the device driver.

Discussion 0
Questions 44

A technician wants to mitigate unauthorized data access if a computer is lost or stolen. Which of the following features should the technician enable?

Options:

A.  

Network share

B.  

Group Policy

C.  

BitLocker

D.  

Static IP

Discussion 0
Questions 45

Which of the following languages is used for scripting the creation of Active Directory accounts?

Options:

A.  

Bash

B.  

SQL

C.  

PHP

D.  

PowerShell

Discussion 0
Questions 46

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

Options:

A.  

Configure the firewall.

B.  

Restore the system from backups.

C.  

Educate the end user

D.  

Update the antivirus program.

Discussion 0
Questions 47

Which of the following items require special e-waste recycling? (Select two).

    Solid-state drive

Options:

A.  

A/C adapter

B.  

Surge protector

C.  

Laptop battery

D.  

CRT monitor

E.  

Power supply

Discussion 0
Questions 48

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

Options:

A.  

Turn on airplane mode.

B.  

Set the connection to be metered.

C.  

Configure the device to use a static IP address.

D.  

Enable the Windows Defender Firewall.

Discussion 0
Questions 49

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?

Options:

A.  

VNC

B.  

RMM

C.  

RDP

D.  

SSH

Discussion 0
Questions 50

Which of the following does MFA provide?

Options:

A.  

Security enhancement

B.  

Encryption

C.  

Digital signature

D.  

Public key infrastructure

Discussion 0
Questions 51

A technician is moving a Windows workstation from the accounting department to the sales department and needs to update the IP and gateway settings. Which of the following Control Panel utilities should the technician use?

Options:

A.  

Programs and Features

B.  

Network and Sharing Center

C.  

User Accounts

D.  

Device Manager

Discussion 0
Questions 52

A technician is modifying the default home page of all the workstations in a company. Which of the following will help to implement this change?

Options:

A.  

Group Policy

B.  

Browser extension

C.  

System Configuration

D.  

Task Scheduler

Discussion 0
Questions 53

A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default?

Options:

A.  

.py

B.  

.js

C.  

.vbs

D.  

.sh

Discussion 0
Questions 54

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

Options:

A.  

ipconfig

B.  

ifconfig

C.  

arpa

D.  

ping

Discussion 0
Questions 55

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?

Options:

A.  

Educate the end user on best practices for security.

B.  

Quarantine the host in the antivirus system.

C.  

Investigate how the system was infected with malware.

D.  

Create a system restore point.

Discussion 0
Questions 56

Applications on a computer are not updating, which is preventing the user from opening certain files. Which of the following MMC snap-ins should the technician launch next to continue troubleshooting the issue?

Options:

A.  

gpedit.msc

B.  

perfmon.msc

C.  

devmgmt.msc

Discussion 0
Questions 57

A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed optional Windows updates. Which of the following is best way to resolve the issue?

Options:

A.  

Enable System Restore.

B.  

Roll back the device drivers.

C.  

Reinstall the OS.

D.  

Update the BIOS.

Discussion 0
Questions 58

A user is experiencing the following issues with Bluetooth on a smartphone:

•The user cannot hear any sound from a speaker paired with the smartphone.

•The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?

Options:

A.  

Restart the smartphone.

B.  

Reset the network settings.

C.  

Unpair the Bluetooth speaker.

D.  

Check for system updates.

Discussion 0
Questions 59

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

Options:

A.  

Isolate the machine from the network.

B.  

Scan the system for hidden files.

C.  

Disable unused ports.

D.  

Install antivirus software.

E.  

Reconfigure the firewall.

Discussion 0
Questions 60

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

Options:

A.  

Rearranging the monitor's position in display settings

B.  

Swapping the cables for the monitors

C.  

Using the Ctrl+AIt+> to correct the display orientation

D.  

Updating the display drivers for the video card

Discussion 0
Questions 61

Which of the following should be documented to ensure that the change management plan is followed?

Options:

A.  

Scope of the change

B.  

Purpose of the change

C.  

Change rollback plan

D.  

Change risk analysis

Discussion 0
Questions 62

A user received the following error upon visiting a banking website:

The security presented by website was issued a different website' s address .

A technician should instruct the user to:

Options:

A.  

clear the browser cache and contact the bank.

B.  

close out of the site and contact the bank.

C.  

continue to the site and contact the bank.

D.  

update the browser and contact the bank.

Discussion 0
Questions 63

A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?

Options:

A.  

The instructions from the software company are not being followed.

B.  

Security controls will treat automated deployments as malware.

C.  

The deployment script is performing unknown actions.

D.  

Copying scripts off the internet is considered plagiarism.

Discussion 0
Questions 64

Which of the following is the MOST basic version of Windows that includes BitLocker?

Options:

A.  

Home

B.  

pro

C.  

Enterprise

D.  

Pro for Workstations

Discussion 0
Questions 65

After a company installed a new SOHO router customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?

Options:

A.  

Port forwarding

B.  

Firmware updates

C.  

IP filtering

D.  

Content filtering

Discussion 0
Questions 66

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

Options:

A.  

Use the application only on the home laptop because it contains the initial license.

B.  

Use the application at home and contact the vendor regarding a corporate license.

C.  

Use the application on any computer since the user has a license.

D.  

Use the application only on corporate computers.

Discussion 0
Questions 67

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

Options:

A.  

If airplane mode is enabled

B.  

If Bluetooth is disabled

C.  

If NFC is enabled

D.  

If WiFi is enabled

E.  

If location services are disabled

Discussion 0
Questions 68

A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?

Options:

A.  

The GPS application is installing software updates.

B.  

The GPS application contains malware.

C.  

The GPS application is updating its geospatial map data.

D.  

The GPS application is conflicting with the built-in GPS.

Discussion 0
Questions 69

A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on. The technician attempts to boot the computer via the NIC to image the computer, but this method does not work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging system via the network?

Options:

A.  

The computer's CMOS battery failed.

B.  

The computer's NIC is faulty.

C.  

The PXE boot option has not been enabled

D.  

The Ethernet cable the technician is using to connect the desktop to the network is faulty.

Discussion 0
Questions 70

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

Options:

A.  

File Explorer

B.  

User Account Control

C.  

Windows Backup and Restore

D.  

Windows Firewall

E.  

Windows Defender

F.  

Network Packet Analyzer

Discussion 0
Questions 71

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file

extension Which pf the following actions is the FIRST step the technician should take?

Options:

A.  

Runa live disk clone.

B.  

Run a full antivirus scan.

C.  

Use a batch file to rename the files-

D.  

Disconnect the machine from the network

Discussion 0
Questions 72

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

Options:

A.  

Use a network share to share the installation files.

B.  

Save software to an external hard drive to install.

C.  

Create an imaging USB for each P

C.  

D.  

Install the software from the vendor's website

Discussion 0
Questions 73

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:

"This site cannot be reached."

A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?

Options:

A.  

HTTPS

B.  

VLAN

C.  

DNS

D.  

SMTP

Discussion 0
Questions 74

A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?

Options:

A.  

NTFS

B.  

APFS

C.  

ext4

D.  

exFAT

Discussion 0
Questions 75

Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).

Options:

A.  

.mac

B.  

.Pkg

C.  

.deb

D.  

.dmg

E.  

.msi

F.  

.appx

G.  

.app

Discussion 0
Questions 76

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

Options:

A.  

Device Manager

B.  

System

C.  

Ease of Access Center

D.  

Programs and Features

Discussion 0
Questions 77

A technician has verified that a user's computer has a virus, and the antivirus software is out Of date. Which of the following steps should the technician take NEXT?

Options:

A.  

Quarantine the computer.

B.  

use a previous restore point,

C.  

Educate the end user about viruses

D.  

Download the latest virus definitions

Discussion 0
Questions 78

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?

Options:

A.  

The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozenapplication in the list, and clicks Force Quit.

B.  

The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.

C.  

The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.

D.  

The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in thelist, and clicks Force Quit.

Discussion 0
Questions 79

A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially

infect the network systems. Which of the following is the MOST effective method for dealing with this Issue?

Options:

A.  

Adjusting the spam gateway

B.  

Updating firmware for the spam appliance

C.  

Adjusting AV settings

D.  

Providing user training

Discussion 0
Questions 80

A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.

Which of the following should a technician do to remediate the issue?

Options:

A.  

Roll back the updates.

B.  

Increase the page file.

C.  

Update the drivers.

D.  

Rebuild the profile.

Discussion 0
Questions 81

A Windows computer is experiencing slow performance when the user tries to open programs and files. The user recently installed a new software program from an external website.

Various websites are being redirected to an unauthorized site, and Task Manager shows the CPU usage is consistently at 100%. Which of the following should the technician do first?

Options:

A.  

Uninstall the new program.

B.  

Check the HOSTS file.

C.  

Restore from a previous backup.

D.  

Clear the web browser cache.

Discussion 0
Questions 82

A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?

Options:

A.  

Dock

B.  

Spotlight

C.  

Mission Control

D.  

Launchpad

Discussion 0
Questions 83

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

Options:

A.  

Disable unused ports.

B.  

Remove the guest network

C.  

Add a password to the guest network

D.  

Change the network channel.

Discussion 0
Questions 84

A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?

Options:

A.  

Reviewing System Information

B.  

Running Disk Cleanup

C.  

Editing the Registry

D.  

Checking the Performance Monitor

E.  

Increasing the memory

Discussion 0
Questions 85

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?

Options:

A.  

WPS

B.  

TKIP

C.  

WPA3

D.  

WEP

Discussion 0
Questions 86

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.  

Differential backup

B.  

Off-site backup

C.  

Incremental backup

D.  

Full backup

Discussion 0
Questions 87

A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).

Options:

A.  

Encryption

B.  

Antivirus

C.  

AutoRun

D.  

Guest accounts

E.  

Default passwords

F.  

Backups

Discussion 0
Questions 88

Which of the following command-line tools will delete a directory?

Options:

A.  

md

B.  

del

C.  

dir

D.  

rd

E.  

cd

Discussion 0
Questions 89

A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?

Options:

A.  

Surge suppressor

B.  

Battery backup

C.  

CMOS battery

D.  

Generator backup

Discussion 0
Questions 90

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the technician should take to resolve the issue?

Options:

A.  

Run the antivirus scan.

B.  

Add the required snap-in.

C.  

Restore the system backup

D.  

use the administrator console.

Discussion 0
Questions 91

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

Options:

A.  

ipconfig /all

B.  

hostname

C.  

netstat /?

D.  

nslookup localhost

E.  

arp —a

F.  

ping:: 1

Discussion 0
Questions 92

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?

Options:

A.  

resmon_exe

B.  

dfrgui_exe

C.  

msinf032exe

D.  

msconfig_exe

Discussion 0
Questions 93

Which of the following is a consequence of end-of-lite operating systems?

Options:

A.  

Operating systems void the hardware warranty.

B.  

Operating systems cease to function.

C.  

Operating systems no longer receive updates.

D.  

Operating systems are unable to migrate data to the new operating system.

Discussion 0
Questions 94

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

Options:

A.  

Windows Enterprise Edition

B.  

Windows Professional Edition

C.  

Windows Server Standard Edition

D.  

Windows Home Edition

Discussion 0
Questions 95

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

Options:

A.  

Spam filtering

B.  

Malware preventionsoftware

C.  

End user education

D.  

Stateful firewall inspection

Discussion 0
Questions 96

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

Options:

A.  

Application permissions

B.  

Available storage space

C.  

Battery charge level

D.  

Wi-Fi connection speed

Discussion 0
Questions 97

A technician is troubleshooting a Windows system that is having issues with the OS loading at startup. Which of the following should the technician do to diagnose the issue?

Options:

A.  

Enable boot logging on the system.

B.  

Launch the last known-good configuration.

C.  

Check the system resource usage in Task Manager.

D.  

Run the sfc /scannow command.

E.  

Use the Event Viewer to open the application log

Discussion 0
Questions 98

A technician is setting up a printer on a Linux workstation. Which of the following commands should the technician use to set the default printer?

Options:

A.  

ipr

B.  

Ispool

C.  

Ipstat

D.  

Ipoptions

Discussion 0
Questions 99

An employee using an Apple MacBook is receiving frequent, random pop-up requests from other Apple devices wanting to share photos and videos and asking whether the user would like to accept the request Which of the following configurations should the technician advise the user to change first"?

Options:

A.  

Wi-Fi

B.  

iCloud

C.  

Antivirus

D.  

AirDrop

Discussion 0
Questions 100

A technician is following the ticketing system’s best practices when handling user support requests. Which of the following should the technician do first when responding to a user support request that contains insufficient information?

Options:

A.  

Ask the user for clarification.

B.  

Keep the user updated on the progress.

C.  

Document the root cause.

D.  

Follow the system’s escalation process.

Discussion 0
Questions 101

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

Options:

A.  

Trojan

B.  

Boot sector virus

C.  

Spyware

D.  

Rootkit

Discussion 0
Questions 102

A technician needs to configure a computer for a user to work from home so the user can still securely access the user’s shared files and corporate email. Which of the following tools would best accomplish this task*?

Options:

A.  

MSRA

B.  

FTP

C.  

RMM

D.  

VPN

Discussion 0
Questions 103

A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall output:

Protocol/PortActionDirection

1 AllowOut

445 BlockOut

53 BlockOut

123 BlockOut

80 BlockOut

Which of the following ports should be opened to allow for DNS recursion?

Options:

A.  

1

B.  

53

C.  

80

D.  

123

E.  

445

Discussion 0
Questions 104

Which of the following is used to generate passcodes necessary to access applications or systems that require an extra layer of security?

Options:

A.  

Authenticator application

B.  

Access control lists

C.  

Biometrics

D.  

Smart card readers

Discussion 0
Questions 105

A technician is installing a new copy of Windows on all computers in the enterprise Given the following requirements:

• The install phase must be scripted to run over the network • Each computer requires a new SSD as the system drive, • The existing HDD should remain as a backup drive.

Which of the following command-line tools should the technician use to install the drive and transfer the installation files from the network share? (Select three).

Options:

A.  

net use

B.  

robocopy

C.  

winver

D.  

diskpart

E.  

sfc

F.  

r.etstat

G.  

ping

Discussion 0
Questions 106

A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?

Options:

A.  

Security groups

B.  

Folder redirection

C.  

Organizational unit structure

D.  

Access control list

Discussion 0
Questions 107

A user clicked a link in an email, and now the cursor is moving around on its own. A technician notices that File Explorer is open and data is being copied from the local drive to an unknown cloud storage location. Which of the following should the technician do first?

Options:

A.  

Investigate the reported symptoms.

B.  

Run anti-malware software.

C.  

Educate the user about dangerous links.

D.  

Quarantine the workstation.

Discussion 0
Questions 108

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?

Options:

A.  

Move the application to the desktop and press delete

B.  

Identify the application in Finder and drag it to the trash can.

C.  

Use Spotlight to search for the application, and then run the application.

D.  

Use Time Machine to go back to the date before the installation.

Discussion 0
Questions 109

An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?

Options:

A.  

Configuring firewall settings

B.  

Implementing expiration policies

C.  

Defining complexity requirements

D.  

Updating antivirus definitions

Discussion 0
Questions 110

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?

Options:

A.  

Thegraphics card driver needs to beupdated

B.  

Theapplication installer is 64-bit.

C.  

Theinstallation requires administrative rights.

D.  

Thedisk space is inadequate.

Discussion 0
Questions 111

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

Options:

A.  

diskpart

B.  

chown

C.  

gpupdate

D.  

netstat

Discussion 0
Questions 112

A technician is setting up a new PC in a SOHO. Which of the following should the technician most likely configure on the PC?

Options:

A.  

VDI

B.  

Mapped drives

C.  

Wireless WAN

D.  

Domain

Discussion 0
Questions 113

A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

Options:

A.  

Install antispyware

B.  

Reimage the system

C.  

Disable the pop-up blocker

D.  

Upgrade the browser

E.  

Install antivirus software

Discussion 0
Questions 114

A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and has no subnet mask. Which of the following should the technician check next?

Options:

A.  

Internal antenna connections

B.  

Static IP settings

C.  

Airplane mode

D.  

Digitizer calibration

Discussion 0
Questions 115

A network administrator is setting up the security for a SOHO wireless network. Which of the following options should the administrator enable to secure the network?

Options:

A.  

NATBWPA3

B.  

802.1X

C.  

Static IP

Discussion 0
Questions 116

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

Options:

A.  

Disk Defragment

B.  

Registry Editor

C.  

System Information

D.  

Disk Cleanup

Discussion 0
Questions 117

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

Options:

A.  

Configure MAC filtering.

B.  

Disable DHCP.

C.  

Configure port forwarding.

D.  

Disable guest access.

Discussion 0
Questions 118

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?

Options:

A.  

SSH

B.  

MDM

C.  

RDP

D.  

SFTP

Discussion 0
Questions 119

A customer who uses a Linux OS called the help desk to request assistance in locating a missing file. The customer does not know the exact name of the file but can provide a partial file name. Which of the following tools should the technician use? (Select two).

Options:

A.  

cat

B.  

df

C.  

grep

D.  

ps

E.  

dig

F.  

find

G.  

top

Discussion 0
Questions 120

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

Options:

A.  

Cross-site scripting

B.  

SQL injection

C.  

Brute-force attack

D.  

DDoS attack

Discussion 0
Questions 121

Which of the following best describes a rollback plan?

Options:

A.  

A developer configures a process to return to the starting state upon completion.

B.  

A user asks to remove an unneeded fileshare.

C.  

An administrator applies new settings to a computer after the previous settings failed.

D.  

A technician reverts the system to a previous state following a failed upgrade.

Discussion 0
Questions 122

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

Options:

A.  

Lock all devices in a closet.

B.  

Ensure all devices are from the same manufacturer.

C.  

Change the default administrative password.

D.  

Install the latest operating system and patches

Discussion 0
Questions 123

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

Options:

Discussion 0
Questions 124

A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?

Options:

A.  

Multifactor authentication

B.  

Encryption

C.  

Increased password complexity

D.  

Secure password vault

Discussion 0
Questions 125

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

Options:

A.  

Spyware

B.  

Cryptominer

C.  

Ransormvare

D.  

Boot sector virus

Discussion 0
Questions 126

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

Options:

A.  

Default gateway

B.  

Host address

C.  

Name server

D.  

Subnet mask

Discussion 0
Questions 127

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

Options:

A.  

Disk Cleanup

B.  

Group Policy Editor

C.  

Disk Management

D.  

Resource Monitor

Discussion 0
Questions 128

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?

Options:

A.  

Power user account

B.  

Standard account

C.  

Guest account

D.  

Administrator account

Discussion 0
Questions 129

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

Options:

A.  

XSS verification

B.  

AES-256 verification

C.  

Hash verification

D.  

Digital signature verification

Discussion 0
Questions 130

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

Options:

A.  

Encryption at rest

B.  

Account lockout

C.  

Automatic screen lock

D.  

Antivirus

Discussion 0
Questions 131

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:

Options:

A.  

set AirDrop so that transfers are only accepted from known contacts

B.  

completely disable all wireless systems during the flight

C.  

discontinue using iMessage and only use secure communication applications

D.  

only allow messages and calls from saved contacts

Discussion 0
Questions 132

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?

Options:

A.  

Consoltf

B.  

Disk Utility

C.  

Time Machine

D.  

FileVault

Discussion 0
Questions 133

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?

Options:

A.  

Quarantining system files

B.  

Reimaging the workstation

C.  

Encrypting the hard drive

D.  

Disabling TLS 1.0 support

Discussion 0
Questions 134

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

Options:

A.  

Ransomware

B.  

Failed OS updates

C.  

Adware

D.  

Missing system files

Discussion 0
Questions 135

A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Options:

A.  

Data-in-transit encryption

B.  

File encryption

C.  

USB drive encryption

D.  

Disk encryption

Discussion 0
Questions 136

A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

Options:

A.  

Anti-malware

B.  

Remote wipe

C.  

Locator applications

D.  

Screen lock

Discussion 0
Questions 137

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

Options:

A.  

Full

B.  

Differential

C.  

Off-site

D.  

Grandfather-father-son

Discussion 0
Questions 138

A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?

Options:

A.  

Shut down the infected computer and swap it with another computer

B.  

Investigate what the interface is and what triggered it to pop up

C.  

Proceed with initiating a full scan and removal of the viruses using the presented interface

D.  

Call the phone number displayed in the interface of the antivirus removal tool

Discussion 0
Questions 139

A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

Options:

A.  

FAT32

B.  

ext4

C.  

NTFS

D.  

exFAT

Discussion 0
Questions 140

As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

Options:

A.  

Use Settings to access Screensaver settings

B.  

Use Settings to access Screen Timeout settings

C.  

Use Settings to access General

D.  

Use Settings to access Display.

Discussion 0
Questions 141

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO)

Options:

A.  

Enable multifactor authentication for each support account

B.  

Limit remote access to destinations inside the corporate network

C.  

Block all support accounts from logging in from foreign countries

D.  

Configure a replacement remote-access tool for support cases.

E.  

Purchase a password manager for remote-access tool users

F.  

Enforce account lockouts after five bad password attempts

Discussion 0
Questions 142

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Options:

A.  

Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never

B.  

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never

C.  

Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never

D.  

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Discussion 0
Questions 143

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).

Options:

A.  

Prevent a device root

B.  

Disable biometric authentication

C.  

Require a PIN on the unlock screen

D.  

Enable developer mode

E.  

Block a third-party application installation

F.  

Prevent GPS spoofing

Discussion 0
Questions 144

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?

Options:

A.  

Scope of change

B.  

Risk level

C.  

Rollback plan

D.  

End user acceptance

Discussion 0
Questions 145

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

Options:

A.  

Remote wipe

B.  

Anti-maIware

C.  

Device encryption

D.  

Failed login restrictions

Discussion 0
Questions 146

Which of the following Linux commands would be used to install an application?

Options:

A.  

yum

B.  

grep

C.  

Is

D.  

sudo

Discussion 0
Questions 147

Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).

Options:

A.  

Biometric lock

B.  

Badge reader

C.  

USB token

D.  

Video surveillance

E.  

Locking rack

F.  

Access control vestibule

Discussion 0
Questions 148

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

Options:

A.  

Privacy

B.  

Indexing Options

C.  

System

D.  

Device Manager

Discussion 0
Questions 149

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?

Options:

A.  

WPA2 with TKIP

B.  

WPA2 with AES

C.  

WPA3withAES-256

D.  

WPA3 with AES-128

Discussion 0
Questions 150

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?

Options:

A.  

RDP

B.  

VNC

C.  

SSH

D.  

VPN

Discussion 0
Questions 151

A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?

Options:

A.  

The smartphone's line was not provisioned with a data plan

B.  

The smartphone's SIM card has failed

C.  

The smartphone's Bluetooth radio is disabled.

D.  

The smartphone has too many applications open

Discussion 0
Questions 152

After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:

The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?

Options:

A.  

Update the browser's CRLs

B.  

File a trouble ticket with the bank.

C.  

Contact the ISP to report the CFCs concern

D.  

Instruct the CFO to exit the browser

Discussion 0
Questions 153

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?

Options:

A.  

Continue researching the issue

B.  

Repeat the iterative processes

C.  

Inform the CEO the repair will take a couple of weeks

D.  

Escalate the ticket

Discussion 0
Questions 154

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

Options:

A.  

Open Settings, select Accounts, select, Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper

B.  

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper

C.  

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper

D.  

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Discussion 0
Questions 155

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?

Options:

A.  

Biometrics

B.  

Full disk encryption

C.  

Enforced strong system password

D.  

Two-factor authentication

Discussion 0
Questions 156

A user reports an issue when connecting a mobile device to Bluetooth. The user states the mobile device's Bluetooth is turned on. Which of the following steps should the technician take NEXT to resolve the issue?

Options:

A.  

Restart the mobile device.

B.  

Turn on airplane mode.

C.  

Check that the accessory is ready to pair.

D.  

Clear all devices from the phone's Bluetooth settings.

Discussion 0
Questions 157

The battery life on an employee's new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check first to troubleshoot this issue? (Select two).

Options:

A.  

Screen resolution

B.  

Screen zoom

C.  

Screen timeout

D.  

Screen brightness

E.  

Screen damage

F.  

Screen motion smoothness

Discussion 0
Questions 158

An administrator is designing and implementing a server backup system that minimizes the capacity of storage used. Which of the following is the BEST backup approach to use in conjunction with synthetic full backups?

Options:

A.  

Differential

B.  

Open file

C.  

Archive

D.  

Incremental

Discussion 0
Questions 159

An Internet cafe has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?

Options:

A.  

Spyware is redirecting browser searches.

B.  

A cryptominer is verifying transactions.

C.  

Files were damaged from a cleaned virus infection.

D.  

A keylogger is capturing user passwords.

Discussion 0
Questions 160

A technician is working on a Windows 10 PC that has unwanted applications starting on boot. Which of the following tools should the technician use to disable applications on startup?

Options:

A.  

System Configuration

B.  

Task Manager

C.  

Performance Monitor

D.  

Group Policy Editor

Discussion 0
Questions 161

Which of the following would most likely be used to extend the life of a device?

Options:

A.  

Battery backup

B.  

Electrostatic discharge mat

C.  

Proper ventilation

D.  

Green disposal

Discussion 0
Questions 162

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

Options:

A.  

Quarantine the host in the antivirus system.

B.  

Run antivirus scan tor malicious software.

C.  

Investigate how malicious software was Installed.

D.  

Reimage the computer.

Discussion 0
Questions 163

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

Options:

A.  

Install and run Linux and the required application in a PaaS cloud environment

B.  

Install and run Linux and the required application as a virtual machine installed under the Windows OS

C.  

Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed

D.  

Set up a dual boot system by selecting the option to install Linux alongside Windows

Discussion 0
Questions 164

A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Select two).

Options:

A.  

Zombies

B.  

Keylogger

C.  

Adware

D.  

Botnet

E.  

Ransomware

F.  

Spyware

Discussion 0
Questions 165

While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?

Options:

A.  

SSL key

B.  

Preshared key

C.  

WPA2 key

D.  

Recovery key

Discussion 0
Questions 166

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen Immediately before network use is authorized?

Options:

A.  

Document the date and time of the change.

B.  

Submit a change request form

C.  

Determine the risk level of this change

D.  

Request an unused IP address.

Discussion 0
Questions 167

A technician is selling up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?

Options:

A.  

Factory reset

B.  

System Restore

C.  

In-place upgrade

D.  

Unattended installation

Discussion 0
Questions 168

A large university wants to equip all classrooms with high-definition IP videoconferencing equipment. Which of the following would most likely be impacted in this situation?

Options:

A.  

SAN

B.  

LAN

C.  

GPU

D.  

PAN

Discussion 0
Questions 169

Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?

Options:

A.  

A forgotten keychain password

B.  

An employee's Apple ID used on the device

C.  

An operating system that has been jailbroken

D.  

An expired screen unlock code

Discussion 0
Questions 170

A systems administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. Which of the following should the administrator do to resolve this issue?

Options:

A.  

Rebuild user profiles.

B.  

Roll back the updates.

C.  

Restart the services.

D.  

Perform a system file check.

Discussion 0
Questions 171

A user is unable to access several documents saved on a work PC. A technician discovers the files were corrupted and must change several system settings within Registry Editor to correct the issue. Which of the following should the technician do before modifying the registry keys?

Options:

A.  

Update the anti-malware software.

B.  

Create a restore point.

C.  

Run the PC in sate mode.

D.  

Roll back the system updates.

Discussion 0
Questions 172

A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?

Options:

A.  

Disk Management

B.  

Device Manager

C.  

Disk Cleanup

D.  

Disk Defragmenter

Discussion 0
Questions 173

A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the best choice for accessing the necessary configuration to complete this goal?

Options:

A.  

Security and Maintenance

B.  

Network and Sharing Center

C.  

Windows Defender Firewall

D.  

Internet Options

Discussion 0
Questions 174

Which of the following macOS utilities uses AES-128 to encrypt the startup disk?

Options:

A.  

fdisk

B.  

Diskpart

C.  

Disk Utility

D.  

FileVault

Discussion 0
Questions 175

Which of the following common security vulnerabilities can be mitigated by using input validation?

Options:

A.  

Brute-force attack

B.  

Cross-site scripting

C.  

SQL injection

D.  

Cross-site request forgery

Discussion 0
Questions 176

A large company is selecting a new Windows operating system and needs to ensure it has built-in encryption and endpoint protection. Which of the following Windows versions will MOST likely be selected?

Options:

A.  

Home

B.  

Pro

C.  

Pro for Workstations

D.  

Enterprise

Discussion 0
Questions 177

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

Options:

A.  

UAC

B.  

MDM

C.  

LDAP

D.  

SSO

Discussion 0
Questions 178

Which of the following editions of Windows 10 requires reactivation every 180 days?

Options:

A.  

Enterprise

B.  

Pro for Workstation

C.  

Home

D.  

Pro

Discussion 0
Questions 179

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

Options:

A.  

Login times

B.  

Screen lock

C.  

User permission

D.  

Login lockout attempts

Discussion 0
Questions 180

Which of the following only has a web browser interface?

Options:

A.  

Linux

B.  

Microsoft Windows

C.  

iOS

D.  

Chromium

Discussion 0
Questions 181

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

Options:

A.  

VPN

B.  

MSRA

C.  

SSH

D.  

RDP

Discussion 0
Questions 182

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

Options:

A.  

Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.

B.  

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.

C.  

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.

D.  

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Discussion 0
Questions 183

Which of the following defines the extent of a change?

Options:

A.  

Scope

B.  

Purpose

C.  

Analysis

D.  

Impact

Discussion 0
Questions 184

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?

Options:

A.  

Private-browsing mode

B.  

Invalid certificate

C.  

Modified file

D.  

Browser cache

Discussion 0
Questions 185

A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

Options:

A.  

File Explorer

B.  

Startup Folder

C.  

System Information

D.  

Programs and Features

E.  

Task Scheduler

F.  

Device Manager

Discussion 0
Questions 186

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

Options:

A.  

A system patch disabled the antivirus protection and host firewall.

B.  

The system updates did not include the latest anti-malware definitions.

C.  

The system restore process was compromised by the malware.

D.  

The malware was installed before the system restore point was created.

Discussion 0
Questions 187

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

Options:

A.  

DHCP

B.  

SMTP

C.  

DNS

D.  

RDP

Discussion 0
Questions 188

A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?

Options:

A.  

Boot order

B.  

Malware

C.  

Drive failure

D.  

Windows updates

Discussion 0
Questions 189

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

Options:

A.  

Implementing password expiration

B.  

Restricting user permissions

C.  

Using screen locks

D.  

Disabling unnecessary services

Discussion 0
Questions 190

A user's corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

Options:

A.  

Remote wipe

B.  

Firewall

C.  

Device encryption

D.  

Remote backup

E.  

Antivirus

F.  

Global Positioning System

Discussion 0
Questions 191

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

Options:

A.  

The system is missing updates.

B.  

The system is utilizing a 32-bit OS.

C.  

The system's memory is failing.

D.  

The system requires BIOS updates

Discussion 0
Questions 192

Which of the following often uses an SMS or third-party application as a secondary method to access a system?

Options:

A.  

MFA

B.  

WPA2

C.  

AES

D.  

RADIUS

Discussion 0
Questions 193

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

Options:

A.  

Delete the application's cache.

B.  

Check for application updates.

C.  

Roll back the OS update.

D.  

Uninstall and reinstall the application.

Discussion 0
Questions 194

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

Options:

A.  

Licensing agreements

B.  

Chain of custody

C.  

Incident management documentation

D.  

Data integrity

E.  

Material safety data sheet

F.  

Retention requirements

Discussion 0
Questions 195

Which of the following is the default GUI and file manager in macOS?

Options:

A.  

Disk Utility

B.  

Finder

C.  

Dock

D.  

FileVault

Discussion 0
Questions 196

A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

Options:

A.  

Convert the PC from a DHCP assignment to a static IP address.

B.  

Run a speed test to ensure the advertised speeds are met.

C.  

Test all network sharing and printing functionality the customer uses.

D.  

Change the default passwords on new network devices.

Discussion 0
Questions 197

A technician needs to provide recommendations about how to upgrade backup solutions for a site in an area that has frequent hurricanes and an unstable power grid. Which of the following should the technician recommend implementing?

Options:

A.  

High availability

B.  

Regionally diverse backups

C.  

On-site backups

D.  

Incremental backups

Discussion 0
Questions 198

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

Options:

A.  

Recalibrating the magnetometer

B.  

Recalibrating the compass

C.  

Recalibrating the digitizer

D.  

Recalibrating the accelerometer

Discussion 0
Questions 199

A technician has verified that a user's computer has a virus and the antivirus software is out of date. Which of the following steps should the technician take next?

Options:

A.  

Quarantine the computer.

B.  

Use a previous restore point.

C.  

Educate the end user about viruses.

D.  

Download the latest virus definitions.

Discussion 0
Questions 200

A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next?

    Restart the phone.

Options:

A.  

Reimage the OS.

B.  

Reinstall the application.

C.  

Clear the cache.

Discussion 0
Questions 201

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?

    SSID

Options:

A.  

DHCP

B.  

Firewall

C.  

SSD

Discussion 0
Questions 202

Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware?

Options:

A.  

Run System Restore.

B.  

Place in recovery mode.

C.  

Schedule a scan.

D.  

Restart the PC.

Discussion 0
Questions 203

A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?

Options:

A.  

msinfo32.exe

B.  

dxdiag.exe

C.  

msconfig.exe

D.  

regedit.exe

Discussion 0
Questions 204

A technician wants to install Developer Mode on a Windows laptop but is receiving a "failed to install package" message. Which of the following should the technician do first?

Options:

A.  

Ensure internet connectivity.

B.  

Check for Windows updates.

C.  

Enable SSH.

D.  

Reboot computer.

Discussion 0
Questions 205

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?

    Group Policy

Options:

A.  

User accounts

B.  

Access control lists

C.  

Authenticator applications

Discussion 0
Questions 206

A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes the following security log:

SRC: 192.168.1.1/secrets.zip Protocol SMB >> DST: 192.168.1.50/capture

The technician analyses the following Windows firewall information:

Which of the following protocols most likely allowed the data theft to occur?

Options:

A.  

1

B.  

53

C.  

110

D.  

445

Discussion 0
Questions 207

A technician is investigating options to secure a small office's wireless network. One requirement is to allow automatic log-ins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature?

Options:

A.  

RADIUS

B.  

AES

C.  

EAP-EKE

D.  

MFA

Discussion 0
Questions 208

A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should the technician use to configure the setting?

Options:

A.  

System

B.  

Power Options

C.  

Devices and Printers

D.  

Ease of Access

Discussion 0
Questions 209

A user's permissions are limited to read on a shared network folder using NTFS security settings. Which of the following describes this type of security control?

Options:

A.  

SMS

B.  

MFA

C.  

ACL

D.  

MDM

Discussion 0
Questions 210

Which of the following macOS features can help a user close an application that has stopped responding?

Options:

A.  

Finder

B.  

Mission Control

C.  

System Preferences

D.  

Force Quit

Discussion 0
Questions 211

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

Options:

A.  

Quarantine the computer.

B.  

Disable System Restore.

C.  

Update the antivirus software definitions.

D.  

Boot to safe mode.

Discussion 0
Questions 212

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection. Which of the following should the technician check NEXT?

Options:

A.  

Windows updates

B.  

DNS settings

C.  

Certificate store

D.  

Browser plug-ins

Discussion 0
Questions 213

A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost. the gateway, and known IP addresses on the interne! and receive a response. Which of the following Is the MOST likely reason tor the Issue?

Options:

A.  

A firewall is blocking the application.

B.  

The wrong VLAN was assigned.

C.  

The incorrect DNS address was assigned.

D.  

The browser cache needs to be cleared

Discussion 0
Questions 214

A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?

Options:

A.  

Password-protected Wi-Fi

B.  

Port forwarding

C.  

Virtual private network

D.  

Perimeter network

Discussion 0
Questions 215

A user is setting up backups on a workstation. The user wants to ensure that the restore process is as simple as possible. Which of the following backup types should the user select?

Options:

A.  

Full

B.  

Incremental

C.  

Differential

D.  

Synthetic

Discussion 0
Questions 216

Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in the trash bin?

    .exe

Options:

A.  

.dmg

B.  

. app

C.  

. rpm

D.  

.pkg

Discussion 0
Questions 217

Which of the following is used to ensure users have the appropriate level of access to perform their job functions?

Options:

A.  

Access control list

B.  

Multifactor authentication

C.  

Least privilege

D.  

Mobile device management

Discussion 0
Questions 218

A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?

Options:

A.  

Apps and Features

B.  

Personalization

C.  

File Explorer

D.  

Task Manager

Discussion 0
Questions 219

Which of the following statements describes the purpose of scripting languages?

    To access the hardware of the computer it is running on

Options:

A.  

To automate tasks and reduce the amount of manual labor

B.  

To abstract the complexity of the computer system

C.  

To compile the program into an executable file

Discussion 0
Questions 220

Which of the following is also known as something you know, something you have, and something you are?

    ACL

Options:

A.  

MFA

B.  

SMS

C.  

NFC

Discussion 0
Questions 221

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

Options:

A.  

Factory reset

B.  

System Restore

C.  

In-place upgrade

D.  

Unattended installation

Discussion 0
Questions 222

A technician is unable to access the internet or named network resources. The technician receives a valid IP address from the DHCP server and can ping the default gateway. Which of the following should the technician check next to resolve the issue?

    Verify the DNS server settings.

Options:

A.  

Turn off the Windows firewall.

B.  

Confirm the subnet mask is correct.

C.  

Configure a static IP address.

Discussion 0
Questions 223

A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company's requirements?

Options:

A.  

Biometrics

B.  

Soft token

C.  

Access control lists

D.  

Smart card

Discussion 0
Questions 224

A company is experiencing a ODDS attack. Several internal workstations are the source of the traffic Which of the following types of infections are the workstations most likely experiencing? (Select two)

Options:

A.  

Zombies

B.  

Keylogger

C.  

Adware

D.  

Botnet

E.  

Ransomvvare

F.  

Spyware

Discussion 0
Questions 225

An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product?

Options:

A.  

AUP

B.  

EULA

C.  

EOL

D.  

UAC

Discussion 0
Questions 226

A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?

Options:

A.  

Disable System Restore.

B.  

Educate the end user.

C.  

Install the latest OS patches.

D.  

Clean the environment reinstallation.

Discussion 0