Which of the following would BEST support an 8TB hard drive with one partition?
A home user reports slow computer performance and application crashes after clicking a "repair" button on a pop-up warning while browsing the Internet Which of the following are the FIRST steps a technician should take to identify and resolve the issue? (Select TWO).
A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed. Which of the following is the MOST likely cause of the issue?
A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information. Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?
A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (Choose two.)
An end user reports a Windows computer is infected with a virus. Which of the following should be the technician’s FIRST troubleshooting step?
A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)
A new user has joined a company, and human resources has given the user several documents to sign
regarding compliance and regulations for company computers. The user has also received web links to
documentation for applications, as well as processes and procedures to do jobs in accordance with those
programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)
A user brings in a home desktop computer for cleaning. Upon opening the computer, a technician finds large amounts of dust and dirt inside. Which of the following should the technician use to remove the excess dust and dirt?
An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue?
Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)
A Windows 7 machine appears to have a failure. Every time it is rebooted, the message “BOOTMGR is missing” appears.
You have previously inserted a Windows 7 installation DVD into the DVD-ROM.D18912E1457D5D1DDCBD40AB3BF70D5D
Please repair this failure without overwriting the customers’ local user profiles.
Use the Windows recovery and repair utilities to remediate the issue.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Please see explanation.
Step 1: Choose Boot from Windows 7 DVD
Step 2: Click Install
Step 3: Choose Upgrade
Which of the following Is the MOST cost-effective option to protect computers and peripherals from damage caused by power fluctuations?
A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which
of the following should the technician monitor during the installation?
A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings.
Which of the following Control Panel utilities should the technician use to accomplish this task?
A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?
A desktop technician needs to replace a laptop’s SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement?
A user wants to use a computer to access files on a nearby laptop Both computers can ping each other, but the user is unable to access any remote files. Which of the following settings should the user change to resolve the issue?
A technician is working on a virtual server migration project. The technician has already completed the SOW; however, the servers will not work without a critical network configuration that was missed in the original SOW. The technician needs to make the adjustments quickly.
Which of the following best practice processes should the technician perform NEXT?
A technician is in the process of removing a recently discovered Trojan horse application from a users laptop. Which of the following should the technician complete to prevent reinfection of the same machine?
A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible Which of the following technologies should the technician use to manage this system?
A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?
Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.
Which of the following is MOST likely the cause?
A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform FIRST?
A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose two.)
A technician is securing a server room by implementing a two-factor authentication solution Which of the following should the technician implement to provide the BEST security for the server room?
A smartphone user receives notice that a threshold for high-speed data usage, despite the user’s usage
behaviors being unchanged from previous periods. Which of the following troubleshooting steps should the user take FIRST?
Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some
websites, and web services are not responding from any of the web browsers, although Joe can access these
services from his smartphone without issue. The computer’s malware scanner has the latest definitions
installed. Which of the following would BEST explain why the computer is functioning this way?
A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users. Which of the following should the technician add to meet the multifactor requirement?
A user on a local desktop wants to allow a blocked program through the Windows Firewall. Which of the following user accounts is necessary to perform this task?
A computer running Windows 7 has an icon that has the appearance of an unlocked padlock with a yellow warning graphic. This icon advises the user that:
A technician has been asked to review the configuration of an executive’s SOHO network following a recent news report regarding home Internet routers that are being added to botnets for malicious purposes. Which of the following would be BEST to prevent the router from being added to a botnet? (Choose two.)
Which of the following OS types provides a lightweight option for workstations that need an easy-to-use browser-based interface?
Which of the following types filesystems is in use when data is endiphered on a disk using a key?
A technician is remediating a virus on an infected workstation. All user files are set to system and hidden. Which of the following shouW a technician perform NEXT to remediate the system?
After setting up a replacement macOS device, Ann, a user, notices none of her previously saved passwords are automatically populating in her applications. Which of the following would have prevented this scenario?
Which of the following should be done prior to installing replacement RAM modules into a desktop computer?
A technician needs to remove malware from a Windows system. The technician has already performed research on the malware and determined it is a memory virus. Which of the following steps should the technician take NEXT?
After purchasing an Ultrabook. Ann. a home user, has a technician come to her home and install an operating system. Which of the following OS retaliation methods will the technician MOST likely use?
The Chief Executive Officer (CEO) of an organization frequently travels with sensitive data on a laptop and is concerned the data could be compromised if the laptop is lost or stolen. Which of the following should the technician recommend to BEST ensure the data is not compromised if the laptop is lost or stolen?
An administrator is loading a new Linux server. Which of the following filesystems will the administrator MOST likely select for the primary partition?
A user opens a phishing email and types logon credentials into a fake banking website. The computer’s antivirus software then reports it has quarantined several temporary Internet files. A technician disconnects the computer from the network. Which of the following should the technician perform NEXT?
A user's mobile device has slow data speeds. The user first noticed the stow speeds after downloading a large application to the device. The application download MOST likely caused.
The management team has issued a new directive that states a certain string is no longer allowed in any of the names on any of the Linux workstation. Which of the following commands would a technician issue to find all the instances of the unwanted string on a workstation?
A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected. II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?
A user reports a computer is experiencing the following issues:
Which of the following tools should the technician use to analyze the computer’s behavior?
A company recently upgraded its computers from Windows XP SP3 lo Windows 7. Due to budget constraints, the company was not able to purchase newer machines. The computers do not have TPM chips. Out the company would like to secure the information on the local hard disk in case the hard drive is stolen, while being able to access all of its information even if users leave. Which of the following would allow the company to accomplish this task?
A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs. Which of the following should the technician implement to ensure maximum uptime of the client VM?
A technician is attempting to resolve an issue with a customer's smartphone. The customer can no longer unlock the smartphone due to an “incorrect pattern" message appearing onscreen,
The customer explains that the option to "make pattern visible” is unchecked in the security settings. The customer has also unsuccessfully tried to unlock the smartphone using a PIN. The
customer is certain the pattern and PIN being entered are both correct. The technician is unable to click the proper options onscreen to perform a reset, but can select it without issue using
the side buttons designed for volume and power. Which of the following describes the root cause of the issue?
An IT manager receives a call from a user who states a technician completed work on a department laptop within the last week. The user indicates the technician tried to explain the issue
with the laptop, but the user was unable to understand because the technician used a lot acronyms. Additionally, the user claims the technician spoke too quickly when explaining the issue
and seemed preoccupied with a cell phone. The IT manager wants to address an email to the IT department to ensure the user's complaints are conveyed to the team. Which of the following
should the IT manager recommend in the email to the team? (Select TWO).
A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?
An administrator wants to search a file on a Linux server for the plus symbol (+). Which of the following will the administrator MOST likely use?
Which of the following should be replaced after a voltage spike?
A user moves a file from one NTFS disk to another NTFS disk Which of the following descnbes the changes to the file permissions?
A technician is setting up network adapter settings on Windows clients that have static IP address assignments. The technician has more than 100 workstation to complete and wants to automate the process. The requirements for the adapter settings are as follows:
* They must utilize a command line utility
* The technician has no access to Group Policy
* All workstation should have an IP address assigned by the DHCP.
Which of the following steps should the technician perform to meet these requirements?
A user received a call from a bank to confirm a wire transfer; however, the user created no such request. While
troubleshooting, a technician discovers there are rules on the user’s account that are forwarding the emails to
an external email address and deleting the emails from the bank.
This is an example of:
A technician needs to recommend a disaster recovery solution for a company that has three offices across two
states. The technician must ensure the solution has:
• The ability to centralize data backups
• High availability
• The ability to synchronize user data to local machines
Which of the following solutions will the technician MOST likely recommend? (Choose two.)
Which of the following is an authentication protocol that can be used for users in the field?
A technician is troubleshooting a home WiFi router that is used by a small company of 30 employees. The business is experiencing intermittent wireless connectivity issues. Which of the following is the MOST likely cause of the issues'?
A technician encounters a previously unidentified issue. The technician conducts some research, finds a solution, and resolves the issue. According to best practices, which of the following should the technician do so the issue can be addressed if it is encountered again?
A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the
BEST choice for the technician to make?
A user’s mobile social media application is sending emails on behalf of the user. However, the user has not authorized any new permissions for the social media application. The user only has this application installed on their smart phone and no other devices. Which of the following should a technician perform to resolve the issue?
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?
A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?
A customer's computer is powered on and working, but the customer is unable to get to any wired network resources, shared drives, printers, or the Internet. Which of the following command-line tools should be used to troubleshoot this scenario?
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid.
Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.
Which of the following settings or features is responsible for the problems Ann is experiencing?
A user reports that a cell phone application is loading slowly and not functioning properly Which of the following should a technician do FIRST to remedy this issue?
A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?
While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?
A company has hired a new IT firm to manage its network switches and routers.
The firm is geographically separated from the company and will need to able to securely access the devices.
Which of the following will provide the ability to access these devices?
A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?
A technician responds to a report that a user’s desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly. Which of the following should the technician attempt that will MOST likely resolve the performance issue?
A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user's computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard. Which of the following would be BEST suited for this task?
Which of the following provide the BEST security for a server room? (Select two.)
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hot-spot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hot-spot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hot-spot on her phone, and the speed test result on that hot-spot is 15Mbps. The technician checks the hot-spot settings on Joe’s phone and sees the following:
Which of the following is the MOST likely cause of the problem?
A systems administrator needs to add security to the server room.
Which of the following would provide the BEST security for the room? (Choose two.)
A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?
A user who is running Windows 10 logs Into a machine and notices that shared drives are missing, the "My Documents* folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?
A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?
A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC. Which of the following built-in utilities should be used?
A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?
A technician is working on a user’s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet.
Which of the following types of infection does the user MOST likely have?
A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.)
An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)
Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?
Joe. a customer, requests to have a technician rename his laptop to the name of his favorite sports team. Which of the following documents MUST the technician consider before performing this action?
Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?
A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10.
Which of the following installation methods would the technician MOST likely use to accomplish this quickly?
A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses Which of the following is MOST likely the problem?
Which of the following is a community supported, open source OS used for both services and workstations?
A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:
There are 1033 infected files on this computer. Click here to disinfect.
The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?
A technician is troubleshooting a printer issue on a Windows computer and wants to disable the printer to test a theory. Which of the following should the technician use to accomplish this?
Which of the following built-in accounts was removed in Windows 10?
A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?