Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CompTIA A+ Certification Core 2 Exam Question and Answers

CompTIA A+ Certification Core 2 Exam

Last Update May 18, 2024
Total Questions : 629

We are offering FREE 220-1102 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare 220-1102 free exam questions and then go for complete pool of CompTIA A+ Certification Core 2 Exam test questions that will help you more.

220-1102 pdf

220-1102 PDF

$35  $99.99
220-1102 Engine

220-1102 Testing Engine

$42  $119.99
220-1102 PDF + Engine

220-1102 PDF + Testing Engine

$56  $159.99
Questions 1

A remote user is experiencing issues connecting to a corporate email account on a laptop. The user clicks the internet connection icon and does not recognize the connected Wi-Fi. The help desk technician, who is troubleshooting the issue, assumes this is a rogue access point. Which of the following is the first action the technician should take?

Options:

A.  

Restart the wireless adapter.

B.  

Launch the browser to see if it redirects to an unknown site.

C.  

Instruct the user to disconnect the Wi-Fi.

D.  

Instruct the user to run the installed antivirus software.

Discussion 0
Questions 2

A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?

Options:

A.  

PIN-based login

B.  

Quarterly password changes

C.  

Hard drive encryption

D.  

A physical laptop lock

Discussion 0
Questions 3

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

Options:

A.  

Installer_x64.exe

B.  

Installer_Files.zip

C.  

Installer_32.msi

D.  

Installer_x86.exe

E.  

Installer_Win10Enterprise.dmg

Discussion 0
Questions 4

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.  

Differential backup

B.  

Off-site backup

C.  

Incremental backup

D.  

Full backup

Discussion 0
Questions 5

A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default?

Options:

A.  

.py

B.  

.js

C.  

.vbs

D.  

.sh

Discussion 0
Questions 6

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

Options:

A.  

Use the application only on the home laptop because it contains the initial license.

B.  

Use the application at home and contact the vendor regarding a corporate license.

C.  

Use the application on any computer since the user has a license.

D.  

Use the application only on corporate computers.

Discussion 0
Questions 7

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a

ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods

would BEST meet the requirements?

Options:

A.  

A daily, incremental backup that is saved to the corporate file server

B.  

An additional, secondary hard drive in a mirrored RAID configuration

C.  

A full backup of the data that is stored of site in cold storage

D.  

Weekly, differential backups that are stored in a cloud-hosting provider

Discussion 0
Questions 8

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

Options:

A.  

Zero day

B.  

Vishing

C.  

DDoS

D.  

Evil twin

Discussion 0
Questions 9

Which of the following is MOST likely contained in an EULA?

Options:

A.  

Chain of custody

B.  

Backup of software code

C.  

Personally identifiable information

D.  

Restrictions of use

Discussion 0
Questions 10

A technician has verified that a user's computer has a virus, and the antivirus software is out Of date. Which of the following steps should the technician take NEXT?

Options:

A.  

Quarantine the computer.

B.  

use a previous restore point,

C.  

Educate the end user about viruses

D.  

Download the latest virus definitions

Discussion 0
Questions 11

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

Options:

A.  

Zero day

B.  

SOL injection

C.  

Cross-site scripting

D.  

Distributed denial of service

Discussion 0
Questions 12

A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).

Options:

A.  

Encryption

B.  

Antivirus

C.  

AutoRun

D.  

Guest accounts

E.  

Default passwords

F.  

Backups

Discussion 0
Questions 13

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Options:

A.  

Avoid distractions

B.  

Deal appropriately with customer's confidential material .

C.  

Adhere to user privacy policy

D.  

Set and meet timelines

Discussion 0
Questions 14

A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal?

Options:

A.  

Security and Maintenance

B.  

Network and Sharing Center

C.  

Windows Defender Firewall

D.  

Internet Options

Discussion 0
Questions 15

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

Options:

A.  

Escalate the ticket to Tier 2.

B.  

Run a virus scan.

C.  

Utilize a Windows restore point.

D.  

Reimage the computer.

Discussion 0
Questions 16

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file

extension Which pf the following actions is the FIRST step the technician should take?

Options:

A.  

Runa live disk clone.

B.  

Run a full antivirus scan.

C.  

Use a batch file to rename the files-

D.  

Disconnect the machine from the network

Discussion 0
Questions 17

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

Options:

A.  

Requiring strong passwords

B.  

Disabling cached credentials

C.  

Requiring MFA to sign on

D.  

Enabling BitLocker on all hard drives

Discussion 0
Questions 18

A change advisory board authorized a setting change so a technician is permitted to Implement the change. The technician successfully implemented the change. Which of the following should be done next?

Options:

A.  

Document the date and time of change

B.  

Document the purpose of the change.

C.  

Document the risk level.

D.  

Document the findings of the sandbox test,

Discussion 0
Questions 19

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the technician should take to resolve the issue?

Options:

A.  

Run the antivirus scan.

B.  

Add the required snap-in.

C.  

Restore the system backup

D.  

use the administrator console.

Discussion 0
Questions 20

An Internet cafe has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?

Options:

A.  

Spyware is redirecting browser searches.

B.  

A cryptominer is verifying transactions.

C.  

Files were damaged from a cleaned virus infection.

D.  

A keylogger is capturing user passwords.

Discussion 0
Questions 21

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

Options:

A.  

The SNTP server is offline.

B.  

A user changed the time zone on a local machine.

C.  

The Group Policy setting has disrupted domain authentication on the system,

D.  

The workstations and the authentication server have a system clock difference.

Discussion 0
Questions 22

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

Options:

A.  

Testing

B.  

Rollback

C.  

Risk

D.  

Acceptance

Discussion 0
Questions 23

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection. Which of the following should the technician check NEXT?

Options:

A.  

Windows updates

B.  

DNS settings

C.  

Certificate store

D.  

Browser plug-ins

Discussion 0
Questions 24

A technician downloaded a software program to a network share. When the technician attempts to copy the program to the Windows tablet for installation, the technician receives an error. Which of the following is the best procedure for the technician to use to complete the assignment?

Options:

A.  

Copy the program file to a USB drive and install.

B.  

Burn the program file to a CD and install.

C.  

Format the HDD and then do the installation.

D.  

Replace the HDD and then do the installation.

Discussion 0
Questions 25

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

Options:

A.  

Use a key combination to lock the computer when leaving.

B.  

Ensure no unauthorized personnel are in the area.

C.  

Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D.  

Turn off the monitor to prevent unauthorized visibility of information.

Discussion 0
Questions 26

A user's laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?

Options:

A.  

Scan for malware and ransomware.

B.  

Perform a system restore.

C.  

Check the network utilization.

D.  

Update the antivirus software.

Discussion 0
Questions 27

A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?

Options:

A.  

Degaussing

B.  

Standard formatting

C.  

Low-level wiping

D.  

Deleting

Discussion 0
Questions 28

A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?

Options:

A.  

Apps and Features

B.  

Personalization

C.  

File Explorer

D.  

Task Manager

Discussion 0
Questions 29

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

Options:

A.  

Configure the firewall.

B.  

Restore the system from backups.

C.  

Educate the end user

D.  

Update the antivirus program.

Discussion 0
Questions 30

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems?

Options:

A.  

Turn off the machine.

B.  

Run a full antivirus scan.

C.  

Remove the LAN card.

D.  

Install a different endpoint solution.

Discussion 0
Questions 31

A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next?

Options:

A.  

Restart the phone.

B.  

Reimage the OS.

C.  

Reinstall the application.

D.  

Clear the cache.

Discussion 0
Questions 32

Which of the following is command options is used to display hidden files and directories?

Options:

A.  

-a

B.  

-s

C.  

-lh

D.  

-t

Discussion 0
Questions 33

A technician is modifying the default home page of all the workstations in a company. Which of the following will help to implement this change?

Options:

A.  

Group Policy

B.  

Browser extension

C.  

System Configuration

D.  

Task Scheduler

Discussion 0
Questions 34

An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices?

Options:

A.  

Devices and Printers

B.  

Ease of Access

C.  

Programs and Features

D.  

Device Manager

Discussion 0
Questions 35

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

Options:

A.  

Installing a VPN

B.  

Implementing location tracking

C.  

Configuring remote wipe

D.  

Enabling backups

Discussion 0
Questions 36

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

Options:

A.  

To maintain an information security policy

B.  

To properly identify the issue

C.  

To control evidence and maintain integrity

D.  

To gather as much information as possible

Discussion 0
Questions 37

A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?

Options:

A.  

Color Management

B.  

System

C.  

Troubleshooting

D.  

Device Manager

E.  

Administrative Tools

Discussion 0
Questions 38

An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable?

Options:

A.  

Smart card

B.  

Biometrics

C.  

Hard token

D.  

One-time password

Discussion 0
Questions 39

A large organization is researching proprietary software with vendor support for a multiuser environment. Which of the following EULA types should be selected?

Options:

A.  

Corporate

B.  

Perpetual

C.  

Open-source

D.  

Personal

Discussion 0
Questions 40

Which of the following statements describes the purpose of scripting languages?

Options:

A.  

To access the hardware of the computer it is running on

B.  

To automate tasks and reduce the amount of manual labor

C.  

To abstract the complexity of the computer system

D.  

To compile the program into an executable file

Discussion 0
Questions 41

A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?

Options:

A.  

Disable System Restore.

B.  

Remediate the system.

C.  

Educate the system user.

D.  

Quarantine the system.

Discussion 0
Questions 42

Which of the following involves sending arbitrary characters in a web page request?

Options:

A.  

SMS

B.  

SSL

C.  

XSS

D.  

VPN

Discussion 0
Questions 43

Which of the following combinations meets the requirements for mobile device multifactor authentication?

Options:

A.  

Password and PIN

B.  

Password and swipe

C.  

Fingerprint and password

D.  

Swipe and PIN

Discussion 0
Questions 44

Which of the following environments allows for the testing of critical systems without the risk of them being negatively impacted by changes?

Options:

A.  

Regression

B.  

Cloud

C.  

Production

D.  

Sandbox

Discussion 0
Questions 45

A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?

Options:

A.  

Event Viewer

B.  

System Configuration

C.  

Device Manager

D.  

Performance Monitor

Discussion 0
Questions 46

Which of the following file extensions should a technician use for a PowerShell script?

Options:

A.  

.ps1

B.  

.py

C.  

.sh

D.  

.bat

E.  

.cmd

Discussion 0
Questions 47

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

Options:

A.  

Reinstall the application on the smartphone.

B.  

Update the smartphone's OS.

C.  

Reset the smartphone to factory settings.

D.  

Reboot the smartphone.

Discussion 0
Questions 48

A user clicks a link in an email. A warning message in the user's browser states the site's certificate cannot be verified. Which of the following is the most appropriate action for a technician to take?

Options:

A.  

Click proceed.

B.  

Report the employee to the human resources department for violating company policy.

C.  

Restore the computer from the last known backup.

D.  

Close the browser window and report the email to IT security.

Discussion 0
Questions 49

A technician was assigned a help desk ticket and resolved the issue. Which of the following should the technician update to assist other technicians in resolving similar issues?

Options:

A.  

End user training

B.  

Progress notes

C.  

Knowledge base

D.  

Acceptable use policy document

Discussion 0
Questions 50

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?

Options:

A.  

Risk analysis

B.  

Sandbox testing

C.  

End user acceptance

D.  

Lessons learned

Discussion 0
Questions 51

A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?

Options:

A.  

Respond to calls and text messages while on site but not when working directly with personnel.

B.  

Respond to calls and text messages only from family.

C.  

Respond to calls and text messages only when an emergency situation requires a response.

D.  

Respond to calls and text messages discreetly while on site.

Discussion 0
Questions 52

Which of the following is the most likely to use NTFS as the native filesystem?

Options:

A.  

macOS

B.  

Linux

C.  

Windows

D.  

Android

Discussion 0
Questions 53

A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes the following security log:

SRC: 192.168.1.1/secrets.zip Protocol SMB >> DST: 192.168.1.50/capture

The technician analyses the following Windows firewall information:

Which of the following protocols most likely allowed the data theft to occur?

Options:

A.  

1

B.  

53

C.  

110

D.  

445

Discussion 0
Questions 54

When a user is in the office, the user's mobile phone loads applications and web browses very slowly on a cellular connection. Which of the following is the best way to fix this issue?

Options:

A.  

Connect to the company's Wi-Fi network.

B.  

Change the settings on the phone to connect to a different cellular tower.

C.  

Install a cellular repeater at the office for this user.

D.  

Update all applications on the phone.

Discussion 0
Questions 55

A user reports being unable to access a sports team's website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?

Options:

A.  

NDA

B.  

AUP

C.  

VPN

D.  

SOP

Discussion 0
Questions 56

A company wants to take advantage of modern technology and transition away from face-to-face meetings. Which of the following types of software would benefit the company the most? (Select two).

Options:

A.  

Videoconferencing

B.  

File transfer

C.  

Screen-sharing

D.  

Financial

E.  

Remote access

F.  

Record-keeping

Discussion 0
Questions 57

A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall output:

Protocol/PortActionDirection

1 AllowOut

445 BlockOut

53 BlockOut

123 BlockOut

80 BlockOut

Which of the following ports should be opened to allow for DNS recursion?

Options:

A.  

1

B.  

53

C.  

80

D.  

123

E.  

445

Discussion 0
Questions 58

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

Options:

A.  

Standard operating procedure

B.  

Acceptable use policy

C.  

Security protocols

D.  

Data flow diagram

Discussion 0
Questions 59

A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

Options:

A.  

Turn off the monitor.

B.  

Remove the power cord.

C.  

Remove the PSU.

D.  

Remove the RAM modules.

Discussion 0
Questions 60

A technician is upgrading the Microsoft Windows 10 OS. Which of the following are required for the technician to safely upgrade the OS? (Select two).

Options:

A.  

Release notes

B.  

Antivirus software

C.  

Backup of critical data

D.  

Device drivers

E.  

Word processing software

F.  

Safe boot mode

Discussion 0
Questions 61

A user's workstation was infected with a newly discovered virus that the AV system detected. After a full virus scan and a workstation reboot, the virus is still present in the OS. Which of the following actions should the user take to remove the virus?

Options:

A.  

Enable the system firewall.

B.  

Use bootable antivirus media to scan the system.

C.  

Download software designed to specifically target the virus.

D.  

Run the operating system update process.

Discussion 0
Questions 62

A technician wants to update the local security policies on a Windows machine but is unable to launch the expected snap-in. Which of the following is the most likely reason?

Options:

A.  

The computer is running Windows Home.

B.  

The user did not sign the end user license agreement.

C.  

The user disabled the User Account Control.

D.  

An antivirus application is blocking access.

Discussion 0
Questions 63

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

Options:

A.  

Devices and Printers

B.  

Administrative Tools

C.  

Network and Sharing Center

D.  

Programs and Features

Discussion 0
Questions 64

A technician receives a high-priority ticket about sensitive information collected from an end user’s workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

Options:

A.  

Reimage the workstation.

B.  

Inform the user of the investigation.

C.  

Recover and secure the workstation.

D.  

Back up the workstation

Discussion 0
Questions 65

A customer who uses a Linux OS called the help desk to request assistance in locating a missing file. The customer does not know the exact name of the file but can provide a partial file name. Which of the following tools should the technician use? (Select two).

Options:

A.  

cat

B.  

df

C.  

grep

D.  

ps

E.  

dig

F.  

find

G.  

top

Discussion 0
Questions 66

A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?

Options:

A.  

Network & Internet

B.  

System

C.  

Personalization

D.  

Accounts

Discussion 0
Questions 67

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

Options:

A.  

Cross-site scripting

B.  

SQL injection

C.  

Brute-force attack

D.  

DDoS attack

Discussion 0
Questions 68

A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?

Options:

A.  

Expired certificate

B.  

False alert

C.  

Missing system files

D.  

OS update failure

Discussion 0
Questions 69

Which of the following is used to generate passcodes necessary to access applications or systems that require an extra layer of security?

Options:

A.  

Authenticator application

B.  

Access control lists

C.  

Biometrics

D.  

Smart card readers

Discussion 0
Questions 70

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

Options:

A.  

diskpart

B.  

chown

C.  

gpupdate

D.  

netstat

Discussion 0
Questions 71

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?

Options:

A.  

Move the application to the desktop and press delete

B.  

Identify the application in Finder and drag it to the trash can.

C.  

Use Spotlight to search for the application, and then run the application.

D.  

Use Time Machine to go back to the date before the installation.

Discussion 0
Questions 72

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

Options:

A.  

Trojan

B.  

Boot sector virus

C.  

Spyware

D.  

Rootkit

Discussion 0
Questions 73

A technician is following the ticketing system’s best practices when handling user support requests. Which of the following should the technician do first when responding to a user support request that contains insufficient information?

Options:

A.  

Ask the user for clarification.

B.  

Keep the user updated on the progress.

C.  

Document the root cause.

D.  

Follow the system’s escalation process.

Discussion 0
Questions 74

Which of the following macOS file types requires mounting before installation?

Options:

A.  

.pkg

B.  

.zip

C.  

.app

D.  

.dmg

Discussion 0
Questions 75

An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?

Options:

A.  

Configuring firewall settings

B.  

Implementing expiration policies

C.  

Defining complexity requirements

D.  

Updating antivirus definitions

Discussion 0
Questions 76

An employee using an Apple MacBook is receiving frequent, random pop-up requests from other Apple devices wanting to share photos and videos and asking whether the user would like to accept the request Which of the following configurations should the technician advise the user to change first"?

Options:

A.  

Wi-Fi

B.  

iCloud

C.  

Antivirus

D.  

AirDrop

Discussion 0
Questions 77

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

Options:

A.  

Application permissions

B.  

Available storage space

C.  

Battery charge level

D.  

Wi-Fi connection speed

Discussion 0
Questions 78

A user is unable to see transaction details on a website, and nothing happens when the user clicks the details button. Which of the following should the user do to fix this issue?

Options:

A.  

Clear the browser cache.

B.  

Disable the pop-up blocker.

C.  

Configure private browsing.

D.  

Verify valid certificates.

Discussion 0
Questions 79

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).

Options:

A.  

NIC

B.  

CPU

C.  

PSU

D.  

KVM

E.  

RAM

F.  

DVI

Discussion 0
Questions 80

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

Options:

A.  

Spam filtering

B.  

Malware preventionsoftware

C.  

End user education

D.  

Stateful firewall inspection

Discussion 0
Questions 81

A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

Options:

A.  

Install antispyware

B.  

Reimage the system

C.  

Disable the pop-up blocker

D.  

Upgrade the browser

E.  

Install antivirus software

Discussion 0
Questions 82

An administrator needs to back up the following components of a single workstation:

•The installation of the operating system

•Applications

•User profiles

•System settings

Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?

Options:

A.  

Differential

B.  

Image

C.  

Synthetic

D.  

Archive

Discussion 0
Questions 83

Employees at comptia.org are reporting getting an usual amount of emails from a coworker. A technician discovers the emails were sent from the following address:

john@cOmptia.org

Which of the following social engineering attacks is this an example of?

Options:

A.  

Whaling

B.  

Insider threat

C.  

Phishing

D.  

Vishing

E.  

Evil twin

Discussion 0
Questions 84

Which of the following commands lists running processes in Linux?

Options:

A.  

top

B.  

apt-get

C.  

Is

D.  

cat

Discussion 0
Questions 85

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?

Options:

A.  

Request physical media

B.  

Mount the ISO file.

C.  

Install a third-party software.

D.  

Download an appropriate 32-bit/64-bit OS file.

Discussion 0
Questions 86

An organization wants to deploy a customizable operating system. Which of the following should the organization choose?

Options:

A.  

Windows 10

B.  

macOS

C.  

Linux

D.  

Chrome OS

E.  

iOS

Discussion 0
Questions 87

A user's work PC has been the target of multiple phishing attacks. Which of the following is a way for the user to prevent further attacks?

Options:

A.  

Enabling Windows Firewall

B.  

Activating the email spam filter

C.  

Using a secure VPN connection

D.  

Running vulnerability scans on a schedule

Discussion 0
Questions 88

A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?

Options:

A.  

Disk Management

B.  

Device Manager

C.  

Disk Cleanup

D.  

Disk Defragmenter

Discussion 0
Questions 89

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?

Options:

A.  

Privacy

B.  

Advanced

C.  

Content

D.  

Connections

E.  

Security

Discussion 0
Questions 90

A hard drive that previously contained PI I needs to be repurposed for a public access workstation. Which of the following data destruction methods should a technician use to ensure data is completely removed from the hard drive?

Options:

A.  

Shredding

B.  

Degaussing

C.  

Low-level formatting

D.  

Recycling

Discussion 0
Questions 91

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

Options:

A.  

Factory reset

B.  

System Restore

C.  

In-place upgrade

D.  

Unattended installation

Discussion 0
Questions 92

Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and Its files. Which of the following will MOST likely allow all users to access the new folders?

Options:

A.  

Assigning share permissions

B.  

Enabling inheritance

C.  

Requiring multifactor authentication

D.  

Removing archive attribute

Discussion 0
Questions 93

A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?

Options:

A.  

Network and Sharing Center

B.  

net use

C.  

User Accounts

D.  

regedit

E.  

Group Policy

Discussion 0
Questions 94

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?

Options:

A.  

Biometrics

B.  

Full disk encryption

C.  

Enforced strong system password

D.  

Two-factor authentication

Discussion 0
Questions 95

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

Options:

A.  

Quarantine the host in the antivirus system.

B.  

Run antivirus scan tor malicious software.

C.  

Investigate how malicious software was Installed.

D.  

Reimage the computer.

Discussion 0
Questions 96

Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

Options:

A.  

Network and Sharing Center

B.  

Programs and Features

C.  

Default Apps

D.  

Add or Remove Programs

Discussion 0
Questions 97

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Options:

A.  

Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never

B.  

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never

C.  

Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never

D.  

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Discussion 0
Questions 98

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Options:

A.  

Acceptable use

B.  

Chain of custody

C.  

Security policy

D.  

Information management

Discussion 0
Questions 99

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

Options:

A.  

MDM

B.  

EULA

C.  

IRP

D.  

AUP

Discussion 0
Questions 100

A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason?

Options:

A.  

The domain's processor compatibility is not met

B.  

The laptop has Windows 10 Home installed

C.  

The laptop does not have an onboard Ethernet adapter

D.  

The Laptop does not have all current Windows updates installed

Discussion 0
Questions 101

A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements?

Options:

A.  

PIN

B.  

Username and password

C.  

SSO

D.  

Fingerprint

Discussion 0
Questions 102

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?

Options:

A.  

Encrypting File System

B.  

FileVault

C.  

BitLocker

D.  

Encrypted LVM

Discussion 0
Questions 103

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

Options:

A.  

Language

B.  

System

C.  

Personalization

D.  

Ease of Access

Discussion 0
Questions 104

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

Options:

A.  

Degaussing

B.  

Low-level formatting

C.  

Recycling

D.  

Shredding

Discussion 0
Questions 105

A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Options:

A.  

Data-in-transit encryption

B.  

File encryption

C.  

USB drive encryption

D.  

Disk encryption

Discussion 0
Questions 106

A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method

Options:

A.  

Reinstalling Windows

B.  

Performing a quick format

C.  

Using disk-wiping software

D.  

Deleting all files from command-line interface

Discussion 0
Questions 107

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

Options:

A.  

Advise the user to run a complete system scan using the OS anti-malware application

B.  

Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present

C.  

Have the user check for recently installed applications and outline those installed since the link in the email was clicked

D.  

Instruct the user to disconnect the Ethernet connection to the corporate network.

Discussion 0
Questions 108

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?

Options:

A.  

Time drift

B.  

Dual in-line memory module failure

C.  

Application crash

D.  

Filesystem errors

Discussion 0
Questions 109

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

Options:

A.  

Pretexting

B.  

Spoofing

C.  

Vishing

D.  

Scareware

Discussion 0
Questions 110

A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

Options:

A.  

FAT32

B.  

ext4

C.  

NTFS

D.  

exFAT

Discussion 0
Questions 111

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

Options:

A.  

Default gateway

B.  

Host address

C.  

Name server

D.  

Subnet mask

Discussion 0
Questions 112

A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times. Which of the following should the technician use?

Options:

A.  

DHCP reservation

B.  

Port forwarding

C.  

DNS A record

D.  

NAT

Discussion 0
Questions 113

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

Options:

A.  

Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin

B.  

Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run

C.  

Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup

D.  

Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

Discussion 0
Questions 114

A user reports a computer is running slow. Which of the following tools will help a technician identity the issued

Options:

A.  

Disk Cleanup

B.  

Group Policy Editor

C.  

Disk Management

D.  

Resource Monitor

Discussion 0
Questions 115

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

Options:

A.  

Spyware

B.  

Cryptominer

C.  

Ransormvare

D.  

Boot sector virus

Discussion 0
Questions 116

A department has the following technical requirements for a new application:

The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?

Options:

A.  

CPU

B.  

Hard drive

C.  

RAM

D.  

Touch screen

Discussion 0
Questions 117

A technician receives a help desk ticket from a user who is unable to update a phone. The technician investigates the issue and notices the following error message: Insufficient storage space

While analyzing the phone, the technician does not discover any third-party' applications or photos. Which of the following is the best way to resolve the issue?

Options:

A.  

Exchange the device for a newer one.

B.  

Upgrade the onboard storage

C.  

Allocate more space by removing factory applications

D.  

Move factory applications to external memory.

Discussion 0
Questions 118

A customer is accessing a public kiosk in a company's lobby. Which of the following should be enforced to mitigate the risk of customer data being accidentally saved to the kiosk?

Options:

A.  

Manually clearing browsing data

B.  

Private-browsing mode

C.  

Browser data synchronization

D.  

Password manager

Discussion 0
Questions 119

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen Immediately before network use is authorized?

Options:

A.  

Document the date and time of the change.

B.  

Submit a change request form

C.  

Determine the risk level of this change

D.  

Request an unused IP address.

Discussion 0
Questions 120

A user reported that a laptop's screen turns off very quickly after silting for a few moments and is also very dim when not plugged in to an outlet Everything else seems to be functioning normally. Which of the following Windows settings should be configured?

Options:

A.  

Power Plans

B.  

Hibernate

C.  

Sleep/Suspend

D.  

Screensaver

Discussion 0
Questions 121

A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue?

Options:

A.  

Add a user account to the local administrator's group.

B.  

Configure Windows Defender Firewall to allow access to all networks.

C.  

Create a Microsoft account.

D.  

Disable the guest account.

Discussion 0
Questions 122

A technician is selling up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?

Options:

A.  

Factory reset

B.  

System Restore

C.  

In-place upgrade

D.  

Unattended installation

Discussion 0
Questions 123

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence. Which of the following was MOST likely violated during the investigation?

Options:

A.  

Open-source software

B.  

EULA

C.  

Chain of custody

D.  

AUP

Discussion 0
Questions 124

Every time a user tries to open the organization's proprietary application on an Android tablet, the application immediately closes. Other applications are operating normally. Which of the following troubleshooting actions would MOST likely resolve the Issue? (Select TWO).

Options:

A.  

Uninstalling the application

B.  

Gaining root access to the tablet

C.  

Resetting the web browser cache

D.  

Deleting the application cache

E.  

Clearing the application storage

F.  

Disabling mobile device management

Discussion 0
Questions 125

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?

Options:

A.  

USB drive

B.  

DVD Installation media

C.  

PXE boot

D.  

Recovery partition

Discussion 0
Questions 126

A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer's BEST choice for this environment?

Options:

A.  

Workgroup network

B.  

Public network

C.  

Wide area network

D.  

Domain network

Discussion 0
Questions 127

While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?

Options:

A.  

SSL key

B.  

Preshared key

C.  

WPA2 key

D.  

Recovery key

Discussion 0
Questions 128

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:

The Audio Driver is not running.

Which of the following will MOST likely resolve the issue?

Options:

A.  

compmgmt.msc

B.  

regedit.exe

C.  

explorer.exe

D.  

taskmgt.exe

E.  

gpmc.msc

F.  

services.msc

Discussion 0
Questions 129

A user is unable to access several documents saved on a work PC. A technician discovers the files were corrupted and must change several system settings within Registry Editor to correct the issue. Which of the following should the technician do before modifying the registry keys?

Options:

A.  

Update the anti-malware software.

B.  

Create a restore point.

C.  

Run the PC in sate mode.

D.  

Roll back the system updates.

Discussion 0
Questions 130

Which of the following common security vulnerabilities can be mitigated by using input validation?

Options:

A.  

Brute-force attack

B.  

Cross-site scripting

C.  

SQL injection

D.  

Cross-site request forgery

Discussion 0
Questions 131

Which of the following is an advantage of using WPA2 instead of WPA3?

Options:

A.  

Connection security

B.  

Encryption key length

C.  

Device compatibility

D.  

Offline decryption resistance

Discussion 0
Questions 132

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?

Options:

A.  

Preserving chain of custody

B.  

Implementing data protection policies

C.  

Informing law enforcement

D.  

Creating a summary of the incident

Discussion 0
Questions 133

Which of the following operating systems is considered closed source?

Options:

A.  

Ubuntu

B.  

Android

C.  

CentOS

D.  

OSX

Discussion 0
Questions 134

Which of the following threats will the use of a privacy screen on a computer help prevent?

Options:

A.  

Impersonation

B.  

Shoulder surfing

C.  

Whaling

D.  

Tailgating

Discussion 0
Questions 135

A technician needs to establish a remote access session with a user who has a Windows workstation. The session must allow for simultaneous viewing of the workstation by both the user and technician. Which of the following remote access technologies should be used?

Options:

A.  

RDP

B.  

VPN

C.  

SSH

D.  

MSRA

Discussion 0
Questions 136

A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to most likely resolve the issue?

Options:

A.  

Install the software in safe mode.

B.  

Attach the external hardware token.

C.  

Install OS updates.

D.  

Restart the workstation after installation.

Discussion 0
Questions 137

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Options:

A.  

Avoid distractions

B.  

Deal appropriately with customer's confidential material

C.  

Adhere to user privacy policy

D.  

Set and meet timelines

Discussion 0
Questions 138

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

Which of the following should be done NEXT?

Options:

A.  

Educate the user on the solution that was performed.

B.  

Tell the user to take time to fix it themselves next time.

C.  

Close the ticket out.

D.  

Send an email to Telecom to inform them of the Issue and prevent reoccurrence.

Discussion 0
Questions 139

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?

Options:

A.  

Continue researching the issue

B.  

Repeat the iterative processes

C.  

Inform the CEO the repair will take a couple of weeks

D.  

Escalate the ticket

Discussion 0
Questions 140

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Options:

Discussion 0
Questions 141

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?

Options:

A.  

Have the user consider using an iPad if the user is unable to complete updates

B.  

Have the user text the user's password to the technician.

C.  

Ask the user to click in the Search field, type Check for Updates, and then press the Enter key

D.  

Advise the user to wait for an upcoming, automatic patch

Discussion 0
Questions 142

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

Options:

A.  

Increase the paging file size

B.  

Run the chkdsk command

C.  

Rebuild the user's profile

D.  

Add more system memory.

E.  

Defragment the hard drive.

Discussion 0
Questions 143

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?

Options:

A.  

Multifactor authentication will be forced for Wi-Fi

B.  

All Wi-Fi traffic will be encrypted in transit

C.  

Eavesdropping attempts will be prevented

D.  

Rogue access points will not connect

Discussion 0
Questions 144

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

Options:

A.  

Rights management

B.  

Audit trail

C.  

Chain of custody

D.  

Data integrity

Discussion 0
Questions 145

Which of the following Wi-Fi protocols is the MOST secure?

Options:

A.  

WPA3

B.  

WPA-AES

C.  

WEP

D.  

WPA-TKIP

Discussion 0
Questions 146

A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook?

Options:

A.  

macOS

B.  

Linux

C.  

Chrome OS

D.  

Windows

Discussion 0
Questions 147

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?

Options:

A.  

Scope of change

B.  

Risk level

C.  

Rollback plan

D.  

End user acceptance

Discussion 0
Questions 148

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the

computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?

Options:

A.  

Services in Control Panel to check for overutilization

B.  

Performance Monitor to check for resource utilization

C.  

System File Checker to check for modified Windows files

D.  

Event Viewer to identify errors

Discussion 0
Questions 149

Which of the following is the STRONGEST wireless configuration?

Options:

A.  

WPS

B.  

WPA3

C.  

WEP

D.  

WMN

Discussion 0
Questions 150

Which of the following is an example of MFA?

Options:

A.  

Fingerprint scan and retina scan

B.  

Password and PIN

C.  

Username and password

D.  

Smart card and password

Discussion 0
Questions 151

A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?

Options:

A.  

NTFS

B.  

APFS

C.  

ext4

D.  

exFAT

Discussion 0
Questions 152

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

Options:

A.  

Device Manager

B.  

System

C.  

Ease of Access Center

D.  

Programs and Features

Discussion 0
Questions 153

A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on. The technician attempts to boot the computer via the NIC to image the computer, but this method does not work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging system via the network?

Options:

A.  

The computer's CMOS battery failed.

B.  

The computer's NIC is faulty.

C.  

The PXE boot option has not been enabled

D.  

The Ethernet cable the technician is using to connect the desktop to the network is faulty.

Discussion 0
Questions 154

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

Options:

A.  

Disable unused ports.

B.  

Remove the guest network

C.  

Add a password to the guest network

D.  

Change the network channel.

Discussion 0
Questions 155

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

Options:

A.  

Implementing a support portal

B.  

Creating a ticketing system

C.  

Commissioning an automated callback system

D.  

Submitting tickets through email

Discussion 0
Questions 156

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

Options:

A.  

Educate the user on malware removal.

B.  

Educate the user on how to reinstall the laptop OS.

C.  

Educate the user on how to access recovery mode.

D.  

Educate the user on common threats and how to avoid them.

Discussion 0
Questions 157

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

Options:

A.  

DRM

B.  

NDA

C.  

EULA

D.  

MOU

Discussion 0
Questions 158

Which of the following is a data security standard for protecting credit cards?

Options:

A.  

PHI

B.  

NIST

C.  

PCI

D.  

GDPR

Discussion 0
Questions 159

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

Options:

A.  

Encrypt the workstation hard drives.

B.  

Lock the workstations after five minutes of inactivity.

C.  

Install privacy screens.

D.  

Log off the users when their workstations are not in use.

Discussion 0
Questions 160

Which of the following change management documents includes how to uninstall a patch?

Options:

A.  

Purpose of change

B.  

Rollback plan

C.  

Scope of change

D.  

Risk analysis

Discussion 0
Questions 161

A change advisory board authorized a setting change so a technician is permitted to implement the change. The technician successfully implemented the change. Which of the following should be done NEXT?

Options:

A.  

Document the date and time of change.

B.  

Document the purpose of the change.

C.  

Document the risk level.

D.  

Document findings of the sandbox test.

Discussion 0
Questions 162

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

Options:

A.  

apt-get

B.  

CIFS

C.  

Samba

D.  

greP

Discussion 0
Questions 163

A technician is troubleshooting a mobile device that was dropped. The technician finds that the screen (ails to rotate, even though the settings are correctly applied. Which of the following pieces of hardware should the technician replace to resolve the issue?

Options:

A.  

LCD

B.  

Battery

C.  

Accelerometer

D.  

Digitizer

Discussion 0
Questions 164

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

Options:

A.  

The system is missing updates.

B.  

The system is utilizing a 32-bit OS.

C.  

The system's memory is failing.

D.  

The system requires BIOS updates

Discussion 0
Questions 165

Which of the following is the proper way for a technician to dispose of used printer consumables?

Options:

A.  

Proceed with the custom manufacturer's procedure.

B.  

Proceed with the disposal of consumables in standard trash receptacles.

C.  

Empty any residual ink or toner from consumables before disposing of them in a standard recycling bin.

D.  

Proceed with the disposal of consumables in standard recycling bins.

Discussion 0
Questions 166

A user reports that the pages flash on the screen two or three times before finally staying open when attempting to access banking web pages. Which of the following troubleshooting steps should the technician perform NEXT to resolve the issue?

Options:

A.  

Examine the antivirus logs.

B.  

Verify the address bar URL.

C.  

Test the internet connection speed.

D.  

Check the web service status.

Discussion 0
Questions 167

A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items?

Options:

A.  

msinfo32

B.  

perfmon

C.  

regedit

D.  

taskmgr

Discussion 0
Questions 168

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

Options:

A.  

Device drivers

B.  

Keyboard backlight settings

C.  

Installed application license keys

D.  

Display orientation

E.  

Target device power supply

F.  

Disabling express charging

Discussion 0
Questions 169

The audio on a user's mobile device is inconsistent when the user uses wireless headphones and moves around. Which of the following should a technician perform to troubleshoot the issue?

Options:

A.  

Verify the Wi-Fi connection status.

B.  

Enable the NFC setting on the device.

C.  

Bring the device within Bluetooth range.

D.  

Turn on device tethering.

Discussion 0
Questions 170

A user reports that after a recent software deployment to upgrade applications, the user can no longer use the Testing program.

However, other employees can successfully use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve any issues discovered by selecting the:

  • Index number of the Event Viewer issue
  • First command to resolve the issue
  • Second command to resolve the issue

BSOD

Commands:

Event Viewer:

System Error:

Options:

Discussion 0
Questions 171

A technician is in the process of installing a new hard drive on a server but is called away to another task. The drive has been unpackaged and left on a desk. Which of the following should the technician perform before leaving?

Options:

A.  

Ask coworkers to make sure no one touches the hard drive.

B.  

Leave the hard drive on the table; it will be okay while the other task is completed.

C.  

Place the hard drive in an antistatic bag and secure the area containing the hard drive.

D.  

Connect an electrostatic discharge strap to the drive.

Discussion 0
Questions 172

A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

Options:

A.  

Convert the PC from a DHCP assignment to a static IP address.

B.  

Run a speed test to ensure the advertised speeds are met.

C.  

Test all network sharing and printing functionality the customer uses.

D.  

Change the default passwords on new network devices.

Discussion 0
Questions 173

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

Options:

A.  

The Windows 10 desktop has Windows 10 Home installed.

B.  

The Windows 10 desktop does not have DHCP configured.

C.  

The Windows 10 desktop is connected via Wi-Fi.

D.  

The Windows 10 desktop is hibernating.

Discussion 0
Questions 174

A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?

Options:

A.  

Password-protected Wi-Fi

B.  

Port forwarding

C.  

Virtual private network

D.  

Perimeter network

Discussion 0
Questions 175

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

Options:

A.  

System

B.  

Devices

C.  

Personalization

D.  

Accessibility

Discussion 0
Questions 176

Which of the following only has a web browser interface?

Options:

A.  

Linux

B.  

Microsoft Windows

C.  

iOS

D.  

Chromium

Discussion 0
Questions 177

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

Options:

A.  

Access control list

B.  

Acceptable use policy

C.  

Incident report

D.  

Standard operating procedure

Discussion 0
Questions 178

A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

Options:

A.  

Proceed to the site.

B.  

Use a different browser.

C.  

Report the error to the bank.

D.  

Reinstall the browser.

Discussion 0
Questions 179

A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

Options:

A.  

System

B.  

Indexing Options

C.  

Device Manager

D.  

Programs and Features

Discussion 0
Questions 180

A technician is working on a way to register all employee badges and associated computer IDs. Which of the following options should the technician use in order to achieve this objective?

Options:

A.  

Database system

B.  

Software management

C.  

Active Directory description

D.  

Infrastructure as a Service

Discussion 0
Questions 181

A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?

Options:

A.  

Settings > Personalization

B.  

Control Panel > Credential Manager

C.  

Settings > Accounts > Family and Other Users

D.  

Control Panel > Network and Sharing Center

Discussion 0
Questions 182

While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?

Options:

A.  

Evil twin

B.  

Impersonation

C.  

Insider threat

D.  

Whaling

Discussion 0
Questions 183

A technician, who is working at a local office, has found multiple copies of home edition software installed on computers. Which of the following does this MOST likely violate?

Options:

A.  

EULA

B.  

Pll

C.  

DRM

D.  

Open-source agreement

Discussion 0
Questions 184

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

Options:

A.  

Licensing agreements

B.  

Chain of custody

C.  

Incident management documentation

D.  

Data integrity

E.  

Material safety data sheet

F.  

Retention requirements

Discussion 0
Questions 185

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

Options:

A.  

Security groups

B.  

Access control list

C.  

Group Policy

D.  

Login script

Discussion 0
Questions 186

A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service?

Options:

A.  

Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service

B.  

Flashing the BIOS, reformatting the drive, and then reinstalling the OS

C.  

Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS

D.  

Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus

Discussion 0
Questions 187

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

Options:

A.  

Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.

B.  

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.

C.  

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.

D.  

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Discussion 0
Questions 188

A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?

Options:

A.  

Enable promiscuous mode.

B.  

Clear the browser cache.

C.  

Add a new network adapter.

D.  

Reset the network adapter.

Discussion 0