A technician needs to allow RDP access for a user. Port forwarding is already set up for port 3389. The technician will have to change the listening port for the new access. Which of the following OS tools should the technician use on the PC to change the listening port for RDP?
An end user submits a request for the IT specialist to install new software on a workstation The workstation has the following specifications.
The minimum software requirements for the new application are a dual-core. 64-btt OS with 4GB of RAM and 60GB storage Which of the following conditions will the technician encounter when attempting to install the software?
A vendor requires remote access to a specific server to maintain a proprietary software system. Security policy restricts the use of port 3389 to employees but does allow command-line access to non-employees. Which of the following would MOST likely need to be enabled?
A user’s mobile device has slow data speeds. The user first noticed the slow speeds after downloading a large
application to the device. The application download MOST likely caused:
A small business, which is located in a Hood plain, wants a technician to recommend a backup strategy that will allow for Its flies to be recovered at an alternate location within a few days following a disaster. Which of the following backup methodologies will the technician MOST likely recommend''
Which of the following is the maximum amount of RAM a computer can access if it is using a 32-bit version of the Windows OS?
Which of the following would be the FASTEST method to perform a clean install of the latest Windows OS?
A new security policy stores all remote access to network devices must be performed using secure connections whenever possible. Which of the following remote access technologies would a technician MOST likely use to manage a Windows-based device remote without using a CLI?
A sales manager uses a phone as a hot-spot to connect a laptop to the Internet. The connection is fast most of the time, but the connection becomes noticeably slower every few weeks. The manager contacts the help desk for assistance. Which of the following should a technician check NEXT to troubleshoot the issue?
The default Windows 7 web browser will not display most websites correctly on a user’s PC. The issue started after the user changed many of the settings, but the user does not remember which settings were altered.
Which of the following should a technician use to restore the original configuration?
An administrator is loading a new Linux server. Which of the following filesystems will the administrator MOST likely select for the primary partition?
A user installs a flashlight application on a phone. The user later discovers this application was stealing users' data files, pictures, call history, and other private information The user wants to prevent this from happening in the future. Which of the following would BEST prevent this from reoccurring?
A folder on an NTFS volume has the following permissions enabled for the administrators group: full control, modify, and write. A technician adds a permissions entry to the folder's security settings denying the administrators group write and modify access. Which of the following permissions will the administrators group effectively have? (Select TWO)
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.
Which of the following account types would the technician MOST likely set up on this kiosk machine?
Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?
Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?
A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?
A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST?
While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?
Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?
Which of the following devices provides protection against brownouts?
A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.
Which of the following BEST enforces this policy?
A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away.
The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following:
Which of the following should be changed to resolve this issue?
A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low. Which of the following tasks should be done FIRST?
A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers.
Which of the following data destruction methods should the technician perform to ensure the data is removed completely?
Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed The technician investigates and determines the PC is not infected with any viruses or malware. Which of the following should the technician check NEXT?
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)
Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?
Which of the following is considered government-regulated data?
A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?
A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.
Which of the following should the technician do?
A user's desktop icons appear much larger than before, and the display colors look unusual A technician runs hardware diagnostics but finds no issues. The system logs show the update service ran last night; however, no new applications were installed. Which of the following is me BEST solution?
A recent security breach has caused a large company to audit its own internal security policy. The breach Involved an unauthorized user gaming access to an unattended computer by exploiting default credentials and then further elevating system privileges. Which of the following security measures would have MOST likely prevented the breach? (Select TWO).
A user is receiving a large number of suspicious emails, many of which are automated emails that state the recipient cannot be found Which of the following is the MOST likely cause of the issue?
A technician is attempting to remove a virus from the machine of a user who just retuned from leave. The virus is a known signature that was identified 30 days ago. The antivirus solution the company is using was updated seven days ago with the most current signatures. Which of the following MOST likely allowed the infection?
A user's smartphone began experiencing decreased performance after the user watched some videos, browsed the web, and accessed the application store. The user states the phone was.
working fine beforehand. Which of the following should be done FIRST to resolve the issue?
Joe. a technician, imaged a laptop using third-party software, but the drive is now showing a smaller partition size than the installed disk space. Which of the following utilities will allow Joe to resize the partition using a graphical interface?
Which of the following operating systems has mandatory update installation built in?
A user is having network printing issues. The user indicates printing was working fine moments ago, but now there are no printers displayed in Microsoft Word. Which of the following should a technician check FIRST?
A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs. Which of the following should the technician implement to ensure maximum uptime of the client VM?
Which of the following is the maximum RAM limit of a Windows 32-bit version?
Which of the following technologies is used by malicious employees to obtain user passwords?
A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO).
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?
A user tries to open a client/server application, but a prompt appears for the username and password The user is able to open and use the email client with no issues. The user's workstation is a loaner laptop Everyone at the company is given administrator rights on their individual workstations. Which of the following is MOST likely preventing the user from running this program?
Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).
A technician implemented a network policy to deploy a printer over the network. A user reports being unable to see the printer. Which of the following should the technician perform to map the printer to
A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?
A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory." Which of the following commands would BEST accomplish this?
A technician is troubleshooting a computer that may have some corrupt operating system files. Which of the following command line tools should the technician use to check these files?
Following a recent password change, a user can log on successfully to an Apple computer but cannot access a web-based service. An error message displays each time the user attempts lo authenticate to the service. Prior to changing the password, the computer had no communication issues. Which of the following should a technician use to continue troubleshooting the issue?
The IT department must ensure previously used passwords cannot be reused when users change their passwords. Which of the following password policies should be enforced to meet this requirement? (Select TWO.)
A technician must manually modify the HOSTS system file in order to resolve a website address to a specified
local destination. Which of the following utilities should the technician use to BEST accomplish the task?
A technician determines a newly installed service is keeping a device from functioning in Windows. Which of the following tools should the technician use to keep the service from being loaded on the PC reboot?
Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)
Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?
A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?
When users turn on or reboot their machines, many of the computers on the network are non-responsive and unable to access the Internet. The users who left their computers on or have not rebooted are not experiencing this issue A technician confirms all the network switches and routers are working, and no servers are having any issues The network administrator notices abnormally high network utilization Which of the following is the MOST likely issue the company is experiencing?
A Chief Executive Officer (CEO) is giving a presentation at an industry conference but forgot to bring a laptop. The company has emailed several large presentation files and the links to several videos that will be streamed during the presentation. While showing the last video, it starts to buffer, times out. and will not display The CEO restarts the phone that is being used for the presentation and verifies there is enough free storage space, but the video still will not play Which of the following is MOST likely causing the Issue?
While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?
A technology team is creating limits and guidelines for the use of company-provided software, equipment, and
Internet access. Which of the following policies is needed?
Joe, a technician, recently installed drivers for a webcam, but he is now experiencing issues when trying to operate it. Which of the following should Joe check NEXT to troubleshoot the issue?
A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT?
A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take?
A technician is working on a computer that has the following symptoms
• Unable to access the Internet
• Unable to send email
• Network connection (limited or no connectivity)
The technician runs hardware diagnostics on the computer and verifies the computer's NIC is funcboning correctly. The technician attempts to access the Internet and receives the message: page cannot be displayed. The technician runs a command to verify the computer network settings and sees the following information
Subnet mask.: 255.255.255.0
The technician confirms other computers on the network can access the Internet. Which of the following is MOST likely causing the issues?
A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business?
Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)
A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings.
Which of the following Control Panel utilities should the technician use to accomplish this task?
A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)
Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications?
A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?
A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime?
Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.
Which of the following is MOST likely the cause?
Which of the following standards controls the processing of credit cards?
An end user reports a Windows computer is infected with a virus. Which of the following should be the technician’s FIRST troubleshooting step?
Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?
Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?
A technician is adding a folder lo a structure that Is several levels down from the top level. The technician wants to make sure the new folder will have the same permissions as the top level Which of the following should the technician configure?
A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?
A customer recently lost data because it was accidentally deleted The customer calls a technician and asks to have a Windows backup solution installed The customer needs to ensure all company data is backed up and quickly recoverable every time a change Is made. Which of the following solutions would the technician MOST likely recommend? (Select TWO)
A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change?
A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (Choose two.)
A corporate fileshare holds files for multiple departments. Individual users in each department create reports
that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that
encrypted all of the documents on the fileshare. The software asked for money to be transferred via
cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the
ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?
A network administrator has noticed unusual activity with a user's login credentials on the network. The user is attempting multiple simultaneous logins across the network, some of which are attempting to access workstations and servers to which the user does not have access Which of the following should the network administrator do NEXT?
A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the
BEST choice for the technician to make?
A technician accessed a network share from a computer joined to workgroup. The technician logged in as “user1” and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the “user1” account. Which of the following would allow the technician to log in using the “administrator” username?
A team needs to deploy a temporary server room at a site to provide support during construction.
Which of the following should they use at this site while setting up the server room?
An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO).
A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error. Which of the following tools should the technician use?
A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?
Verify the SSID with which the device is associated – Most likely, the user’s smartphone is connecting to a neighbor’s wireless network instead of their own. This network likely has a lower signal strength since it is outside the home, and this is causing the limited or slow bandwidth. Therefore, you should first verify that the user is connected to the proper wireless network before conducting any additional troubleshooting.
A Windows user is attempting to install a local printer and is unsuccessful on permissions.
Which of the following user types BEST describes this user?
A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10.
Which of the following installation methods would the technician MOST likely use to accomplish this quickly?
When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT?