Pre Black Friday Sale Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! 220-1002 has been withdrawn. The new exam code is 220-1102

220-1002 CompTIA A+ Certification Exam: Core 2 Questions and Answers

Question # 6

A technician needs to allow RDP access for a user. Port forwarding is already set up for port 3389. The technician will have to change the listening port for the new access. Which of the following OS tools should the technician use on the PC to change the listening port for RDP?

A.

Local firewall

B.

MSTSC

C.

MSINFO32

D.

Services

Full Access
Question # 7

An end user submits a request for the IT specialist to install new software on a workstation The workstation has the following specifications.

220-1002 question answer

The minimum software requirements for the new application are a dual-core. 64-btt OS with 4GB of RAM and 60GB storage Which of the following conditions will the technician encounter when attempting to install the software?

A.

Insufficient RAM

B.

Incompatible processor

C.

Insufficient storage

D.

Incompatible system architecture

E.

Insufficient network bandwidth

Full Access
Question # 8

A vendor requires remote access to a specific server to maintain a proprietary software system. Security policy restricts the use of port 3389 to employees but does allow command-line access to non-employees. Which of the following would MOST likely need to be enabled?

A.

RDP

B.

Telnet

C.

SSH

D.

FTP

Full Access
Question # 9

A user’s mobile device has slow data speeds. The user first noticed the slow speeds after downloading a large

application to the device. The application download MOST likely caused:

A.

a hardware issue on the device.

B.

the device to run more slowly.

C.

the user to exceed the monthly data limit.

D.

the device to change to WiFi settings.

Full Access
Question # 10

A small business, which is located in a Hood plain, wants a technician to recommend a backup strategy that will allow for Its flies to be recovered at an alternate location within a few days following a disaster. Which of the following backup methodologies will the technician MOST likely recommend''

A.

Implement a hoi site in an area outside the flood plain.

B.

Move all servers to an laaS provider and only use SaaS applications

C.

Install cloud backup software and use it (or regular backups

D.

Configure local tape backups and store them in a safe on site.

Full Access
Question # 11

Which of the following is the maximum amount of RAM a computer can access if it is using a 32-bit version of the Windows OS?

A.

2GB

B.

4GB

C.

6GB

D.

8GB

Full Access
Question # 12

Which of the following would be the FASTEST method to perform a clean install of the latest Windows OS?

A.

USB media

B.

Optical drive

C.

Network boot

D.

In-place upgrade

Full Access
Question # 13

A new security policy stores all remote access to network devices must be performed using secure connections whenever possible. Which of the following remote access technologies would a technician MOST likely use to manage a Windows-based device remote without using a CLI?

A.

RDP

B.

SSH

C.

Telnet

D.

RADIUS

E.

SSO

Full Access
Question # 14

A sales manager uses a phone as a hot-spot to connect a laptop to the Internet. The connection is fast most of the time, but the connection becomes noticeably slower every few weeks. The manager contacts the help desk for assistance. Which of the following should a technician check NEXT to troubleshoot the issue?

A.

Wireless channel interference

B.

The time since the last phone restart

C.

The data plan limits

D.

The mobile OS update log

Full Access
Question # 15

The default Windows 7 web browser will not display most websites correctly on a user’s PC. The issue started after the user changed many of the settings, but the user does not remember which settings were altered.

Which of the following should a technician use to restore the original configuration?

A.

Internet Options

B.

Programs and Features

C.

Device Manager

D.

Network Options

Full Access
Question # 16

An administrator is loading a new Linux server. Which of the following filesystems will the administrator MOST likely select for the primary partition?

A.

ExFAT

B.

NTFS

C.

ext3

D.

Swap

Full Access
Question # 17

A user installs a flashlight application on a phone. The user later discovers this application was stealing users' data files, pictures, call history, and other private information The user wants to prevent this from happening in the future. Which of the following would BEST prevent this from reoccurring?

A.

Only install applications that request appropriate permissions

B.

Only install applications made by large and well-known companies

C.

Install an antivirus on the mobile OS.

D.

Use a mobile device manager to increase security on the phone.

Full Access
Question # 18

A folder on an NTFS volume has the following permissions enabled for the administrators group: full control, modify, and write. A technician adds a permissions entry to the folder's security settings denying the administrators group write and modify access. Which of the following permissions will the administrators group effectively have? (Select TWO)

A.

Write

B.

Read

C.

Full control

D.

Modify

E.

Execute

F.

Special permissions

Full Access
Question # 19

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.

Which of the following account types would the technician MOST likely set up on this kiosk machine?

A.

Guest

B.

Administrator

C.

Power User

D.

Remote Desktop User

Full Access
Question # 20

Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow. Which of the following is the MOST likely cause of this issue?

A.

Files disappearing

B.

File permission changes

C.

Application crash

D.

Too many startup items

Full Access
Question # 21

Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?

A.

Folder Redirection

B.

Group Policy

C.

Security Groups

D.

Home Folder

Full Access
Question # 22

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?

A.

Use an antivirus product capable of performing heuristic analysis

B.

Use a host-based intrusion detection system on each computer

C.

Disallow the password caching of accounts in the administrators group

D.

Install a UTM in between PC endpoints to monitor for suspicious traffic

E.

Log all failed login attempts to the PCs and report them to a central server

Full Access
Question # 23

A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST?

A.

ping

B.

nslooking

C.

net use

D.

ipconfig

Full Access
Question # 24

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?

A.

Install to a network drive

B.

Install to a USB drive

C.

Install to a DVD-RW

D.

Install to a security internal_HDD

Full Access
Question # 25

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?

A.

BranchCache

B.

Swap partition

C.

Domain access

D.

Proxy server

Full Access
Question # 26

Which of the following devices provides protection against brownouts?

A.

battery backup

B.

surge suppressor

C.

rack grounding

D.

line conditioner

Full Access
Question # 27

A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.

Which of the following BEST enforces this policy?

A.

Delete the user accounts

B.

Disable the user accounts

C.

Restrict the user accounts

D.

Reset the user accounts

Full Access
Question # 28

A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away.

The device is relatively new, so the user is concerned it is defective. A technician inspects the device and see the following:

Which of the following should be changed to resolve this issue?

220-1002 question answer

A.

Privacy – Maps

B.

Display – Brightness

C.

Storage – Photos

D.

Mail – Work

Full Access
Question # 29

A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low. Which of the following tasks should be done FIRST?

A.

Disconnect the network cable.

B.

Update the antivirus software.

C.

Run an antivirus scan.

D.

Shut down the PC

Full Access
Question # 30

A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers.

Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

A.

Degaussing

B.

Standard format

C.

Overwrite

D.

Low-level format

Full Access
Question # 31

Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed The technician investigates and determines the PC is not infected with any viruses or malware. Which of the following should the technician check NEXT?

A.

Hijacked email

B.

DNS entries

C.

Hosts file

D.

POP3 errors

Full Access
Question # 32

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

A.

Spyware

B.

Zombies

C.

Virus

D.

Ransomware

E.

Worm

F.

Botnet

Full Access
Question # 33

Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?

A.

Credential Manager

B.

Network and Sharing Center

C.

Security and Maintenance

D.

Troubleshooting

Full Access
Question # 34

Which of the following is considered government-regulated data?

A.

PII

B.

End-user license agreement

C.

Digital Millennium Copyright Act

D.

DRM

Full Access
Question # 35

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?

A.

Inform management regarding the anticipated amount of downtime

B.

Document a backout plan to roll back changes to the router

C.

Configure a redundant data path to eliminate downtime

D.

Make the downtime window larger than actually anticipated

Full Access
Question # 36

A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?

A.

PHI certification

B.

PCI compliance

C.

POTS implementation

D.

PII filtering

Full Access
Question # 37

Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.

Which of the following should the technician do?

A.

Since Joe is concerned about time, suggest calling back later when Joe has more time to troubleshoot

B.

Record the call and send it to the local intranet for future technicians to learn how to deal with calls like this one

C.

Ask more open-ended questions to see if the issue can be narrowed down in order to properly identify the issue and save time

D.

Inform the customer that there is a troubleshooting script that must be followed to get the issue resolved

Full Access
Question # 38

A user's desktop icons appear much larger than before, and the display colors look unusual A technician runs hardware diagnostics but finds no issues. The system logs show the update service ran last night; however, no new applications were installed. Which of the following is me BEST solution?

A.

Restore the system image

B.

Reinstall the application

C.

Restart the services.

D.

Roll back the device driver

Full Access
Question # 39

A recent security breach has caused a large company to audit its own internal security policy. The breach Involved an unauthorized user gaming access to an unattended computer by exploiting default credentials and then further elevating system privileges. Which of the following security measures would have MOST likely prevented the breach? (Select TWO).

A.

Account lockout policy

B.

Disabled guest account

C.

Screensaver password locks

D.

BIOS password

E.

Password expiration

F.

Logon time restrictions

Full Access
Question # 40

A user is receiving a large number of suspicious emails, many of which are automated emails that state the recipient cannot be found Which of the following is the MOST likely cause of the issue?

A.

An invalid certificate is on the mail server

B.

The user's email was hijacked

C.

The user's address book was corrupted

D.

The user's system time is different from the mail server.

Full Access
Question # 41

A technician is attempting to remove a virus from the machine of a user who just retuned from leave. The virus is a known signature that was identified 30 days ago. The antivirus solution the company is using was updated seven days ago with the most current signatures. Which of the following MOST likely allowed the infection?

A.

The last antivirus update the machine received was seven days ago.

B.

The user changed the machine's password 30 days ago.

C.

The user manually killed the antivirus process.

D.

The machine has not received an antivirus update in the past 30 days.

Full Access
Question # 42

A user's smartphone began experiencing decreased performance after the user watched some videos, browsed the web, and accessed the application store. The user states the phone was.

working fine beforehand. Which of the following should be done FIRST to resolve the issue?

A.

Replace the smartphone with a model that has faster hardware.

B.

‘Check the storage space availability on the smartphone.

C.

Look for OS updates.

D.

Restore the smartphone to the manufacturing image

Full Access
Question # 43

Joe. a technician, imaged a laptop using third-party software, but the drive is now showing a smaller partition size than the installed disk space. Which of the following utilities will allow Joe to resize the partition using a graphical interface?

A.

Device Manager

B.

DxDiag

C.

DiskPart

D.

Disk Management

Full Access
Question # 44

Which of the following operating systems has mandatory update installation built in?

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Full Access
Question # 45

A user is having network printing issues. The user indicates printing was working fine moments ago, but now there are no printers displayed in Microsoft Word. Which of the following should a technician check FIRST?

A.

The toner volume in the printer

B.

The USB cable from the PC to the printer

C.

The printer driver version

D.

The print spooler service

Full Access
Question # 46

A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs. Which of the following should the technician implement to ensure maximum uptime of the client VM?

A.

Cloud storage backup

B.

Large file storage

C.

Image-level backup

D.

Uninterruptible power supply

Full Access
Question # 47

Which of the following is the maximum RAM limit of a Windows 32-bit version?

A.

no limit

B.

4GB

C.

8GB

D.

32GB

Full Access
Question # 48

Which of the following technologies is used by malicious employees to obtain user passwords?

A.

Main-in-the-middle

B.

Phishing

C.

Tailgating

D.

Shoulder surfing

Full Access
Question # 49

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO).

A.

System files have been deleted

B.

Proxy settings are configured improperly

C.

The OS has been updated recently.

D.

There are disabled services on the vendor website.

E.

Program file permissions have changed recently.

F.

There is a rogue anti-malware program.

Full Access
Question # 50

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

A.

System

B.

Display

C.

Folder Options

D.

Indexing Options

Full Access
Question # 51

A user tries to open a client/server application, but a prompt appears for the username and password The user is able to open and use the email client with no issues. The user's workstation is a loaner laptop Everyone at the company is given administrator rights on their individual workstations. Which of the following is MOST likely preventing the user from running this program?

A.

EFS

B.

NTFS

C.

UTP

D.

UAC

Full Access
Question # 52

Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).

A.

.vbs

B.

.txt

C.

.exe

D.

.Up

E.

.bat

F.

.xlsx

Full Access
Question # 53

A technician implemented a network policy to deploy a printer over the network. A user reports being unable to see the printer. Which of the following should the technician perform to map the printer to

user laptops?

A.

netstat

B.

gpresult

C.

net use

D.

gpupdate

Full Access
Question # 54

A technician wants to write a script that will check data line by line until the end of the file. Which of the following elements will perform the check?

A.

Loop

B.

Integer

C.

String

D.

Variable

Full Access
Question # 55

A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory." Which of the following commands would BEST accomplish this?

A.

grep -d mandatory *

B.

grep -i mandatory *

C.

grep mandatory file

D.

grep mandatory *

Full Access
Question # 56

A technician is troubleshooting a computer that may have some corrupt operating system files. Which of the following command line tools should the technician use to check these files?

A.

dism

B.

chkdsk

C.

diskpart

D.

sfc

Full Access
Question # 57

Following a recent password change, a user can log on successfully to an Apple computer but cannot access a web-based service. An error message displays each time the user attempts lo authenticate to the service. Prior to changing the password, the computer had no communication issues. Which of the following should a technician use to continue troubleshooting the issue?

A.

passwd

B.

FileVault

C.

Keychain

D.

Gatekeeper

Full Access
Question # 58

The IT department must ensure previously used passwords cannot be reused when users change their passwords. Which of the following password policies should be enforced to meet this requirement? (Select TWO.)

A.

Password complexity

B.

Password history

C.

Password length

D.

Maximum password age

E.

Minimum password age

F.

Lockout threshold

Full Access
Question # 59

A technician must manually modify the HOSTS system file in order to resolve a website address to a specified

local destination. Which of the following utilities should the technician use to BEST accomplish the task?

A.

Regedit

B.

services.msc

C.

Msinfo32

D.

Notepad

E.

MMC

Full Access
Question # 60

A technician determines a newly installed service is keeping a device from functioning in Windows. Which of the following tools should the technician use to keep the service from being loaded on the PC reboot?

A.

Task Scheduler

B.

MSINFO32

C.

System Restore

D.

MSConfig

Full Access
Question # 61

Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)

A.

LCD monitor

B.

Power supply

C.

Laptop screen

D.

CRT monitor

E.

Motherboard

F.

Tablet

Full Access
Question # 62

Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?

A.

Update limitations

B.

Limited access

C.

End-of-life

D.

Network connection

Full Access
Question # 63

A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?

A.

netstat

B.

net use

C.

nslookup

D.

ping

Full Access
Question # 64

When users turn on or reboot their machines, many of the computers on the network are non-responsive and unable to access the Internet. The users who left their computers on or have not rebooted are not experiencing this issue A technician confirms all the network switches and routers are working, and no servers are having any issues The network administrator notices abnormally high network utilization Which of the following is the MOST likely issue the company is experiencing?

A.

Malware infection

B.

Rogue antivirus

C.

Browser redirection

D.

OS update failures

Full Access
Question # 65

A Chief Executive Officer (CEO) is giving a presentation at an industry conference but forgot to bring a laptop. The company has emailed several large presentation files and the links to several videos that will be streamed during the presentation. While showing the last video, it starts to buffer, times out. and will not display The CEO restarts the phone that is being used for the presentation and verifies there is enough free storage space, but the video still will not play Which of the following is MOST likely causing the Issue?

A.

Data transmission over limit

B.

Unauthorized account access

C.

Resource over use

D.

Unintended Bluetooth pairing

Full Access
Question # 66

While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?

A.

Reimage the machine from a network share

B.

Change the boot order and boot to an external drive

C.

Remove and then replace the CMOS battery

D.

Use the BIOS user password to reset the supervisor password

Full Access
Question # 67

A technology team is creating limits and guidelines for the use of company-provided software, equipment, and

Internet access. Which of the following policies is needed?

A.

Password policy

B.

Acceptable use policy

C.

Regulatory policy

D.

Compliance policy

Full Access
Question # 68

Joe, a technician, recently installed drivers for a webcam, but he is now experiencing issues when trying to operate it. Which of the following should Joe check NEXT to troubleshoot the issue?

A.

Services

B.

Device Manager

C.

Event Viewer

D.

Programs and Features

Full Access
Question # 69

A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT?

A.

Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.

B.

Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed.

C.

Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video card vendor.

D.

Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.

Full Access
Question # 70

A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take?

A.

Continue to work on the assigned task

B.

Take the print job to the office manager

C.

Remove the print job from the output tray

D.

Disconnect the printer from the network to prevent further print jobs

Full Access
Question # 71

A technician is working on a computer that has the following symptoms

• Unable to access the Internet

• Unable to send email

• Network connection (limited or no connectivity)

The technician runs hardware diagnostics on the computer and verifies the computer's NIC is funcboning correctly. The technician attempts to access the Internet and receives the message: page cannot be displayed. The technician runs a command to verify the computer network settings and sees the following information

IP address:192.166.0.100

Subnet mask.: 255.255.255.0

Gateway: 192.168.0.1

DNS: 192.168.0.1

The technician confirms other computers on the network can access the Internet. Which of the following is MOST likely causing the issues?

A.

Rogue antivirus

B.

Firewall rule

C.

Ransomware

D.

Proxy settings

Full Access
Question # 72

A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business?

A.

Plan for the change

B.

Scope of the change

C.

Risk analysis of the change

D.

Documentation of the change

Full Access
Question # 73

Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)

A.

Firewall

B.

Antivirus

C.

Email filtering

D.

ACLs

E.

VPN

Full Access
Question # 74

A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings.

Which of the following Control Panel utilities should the technician use to accomplish this task?

A.

Network and Sharing Center

B.

Sync Center

C.

Credential Manager

D.

User Accounts

Full Access
Question # 75

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

A.

Inventory management policy

B.

Knowledge base articles

C.

End-user acceptance document

D.

Acceptable use policy

E.

Incident documentation

F.

Network diagrams

Full Access
Question # 76

Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications?

A.

Create a static DNS entry on the server for the PC

B.

Change her NIC IP address to dynamic

C.

Create a new exception on her local firewall

D.

Make sure the PC’s IP is in the management VLAN

Full Access
Question # 77

A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?

A.

Download and apply the security patch that addresses the vulnerability that was exploited

B.

Use System Restore to bring the PC back to a previous restore point.

C.

Reimage the computer and update it with all the latest patches

D.

Download another antivirus software that will quarantine the virus.

Full Access
Question # 78

A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime?

A.

Only a surge protector is needed due to the backup generator

B.

Plug directly into the emergency power source

C.

Plug a surge protector directly into the UPS

D.

Connect to a UPS that utilizes the emergency power source

Full Access
Question # 79

Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.

Which of the following is MOST likely the cause?

A.

Ransomware

B.

Cryptomining

C.

Rootkit

D.

Keylogger

Full Access
Question # 80

Which of the following standards controls the processing of credit cards?

A.

PCI

B.

PHI

C.

PGP

D.

PII

Full Access
Question # 81

An end user reports a Windows computer is infected with a virus. Which of the following should be the technician’s FIRST troubleshooting step?

A.

Identify malware symptoms

B.

Disable System Restore

C.

Run Windows Update

D.

Educate the end user

Full Access
Question # 82

Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?

A.

Download antivirus updates

B.

Update the device drivers

C.

Quarantine the affected systems

D.

Perform hardware diagnostics

Full Access
Question # 83

Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?

A.

WPA2-PSK

B.

AES

C.

TACACS

D.

TKIP

Full Access
Question # 84

A technician is adding a folder lo a structure that Is several levels down from the top level. The technician wants to make sure the new folder will have the same permissions as the top level Which of the following should the technician configure?

A.

Attributes

B.

Shares

C.

Inheritance

D.

Replication

Full Access
Question # 85

A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?

A.

exFAT security

B.

Ext3 security

C.

HFS security

D.

EFS security

E.

CDFS security

Full Access
Question # 86

A customer recently lost data because it was accidentally deleted The customer calls a technician and asks to have a Windows backup solution installed The customer needs to ensure all company data is backed up and quickly recoverable every time a change Is made. Which of the following solutions would the technician MOST likely recommend? (Select TWO)

A.

File level

B.

Bare metal

C.

Snapshot

D.

Shadow Copy

E.

Critical applications

F.

Image level

Full Access
Question # 87

A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change?

A.

File attributes

B.

Share permissions

C.

Local share

D.

Inheritance

Full Access
Question # 88

A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (Choose two.)

A.

Image deployment

B.

Multiboot

C.

PXE

D.

Unattended installation

E.

USB

F.

Wake-on-LAN

Full Access
Question # 89

A corporate fileshare holds files for multiple departments. Individual users in each department create reports

that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that

encrypted all of the documents on the fileshare. The software asked for money to be transferred via

cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the

ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?

A.

Enable System Restore on the file server and make frequent restore points.

B.

Disable full disk encryption on the file server.

C.

Install a next-generation firewall at the network edge.

D.

Use a host-based intrusion detection system and continuously monitor filesystem changes.

E.

Use granular file permissions on the share and follow the principle of least privilege.

Full Access
Question # 90

A network administrator has noticed unusual activity with a user's login credentials on the network. The user is attempting multiple simultaneous logins across the network, some of which are attempting to access workstations and servers to which the user does not have access Which of the following should the network administrator do NEXT?

A.

Delete the user's AD account

B.

Decrease the user's AD privileges

C.

Disable the user's AD account

D.

Reset the password on the user's AD account

Full Access
Question # 91

A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in. Which of the following is the

BEST choice for the technician to make?

A.

Politely ask the user to call back

B.

Ask another technician to take the call

C.

Troubleshoot the issue for the user

D.

Input the issue as a ticket and escalate to Tier 2

E.

Put the user on hold and troubleshoot after the scheduled break

Full Access
Question # 92

A technician accessed a network share from a computer joined to workgroup. The technician logged in as “user1” and directed the computer to save the username and password. Several weeks later, the technician wants to log in to this network share using the administrator account. The computer does not prompt for a username and password, but it automatically logs in to the network share under the “user1” account. Which of the following would allow the technician to log in using the “administrator” username?

A.

Use the command: net use Z: \\fileserver\share

B.

Go to the Sync Center and disable the offline files feature.

C.

Delete the “user” account for the network share in Credential Manager.

D.

Join the computer and file server to a domain and delegate administrator rights to “user1”.

E.

Use the Advanced Sharing options in the Network and Sharing Center and enable “turn on network discovery”.

Full Access
Question # 93

A team needs to deploy a temporary server room at a site to provide support during construction.

Which of the following should they use at this site while setting up the server room?

A.

Air filters

B.

Privacy screens

C.

Vacuums

D.

ESD mats

Full Access
Question # 94

An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO).

A.

Close applications when tasks are completed.

B.

Increase the time to dim the screen automatically.

C.

Increase the frequency for syncing corporate email.

D.

Set the smartphone display to maximum brightness.

E.

Connect to the office WiFi network automatically.

F.

Disable 802.11ac and use mobile data exclusively.

Full Access
Question # 95

A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error. Which of the following tools should the technician use?

A.

Performance Monitor

B.

Component Services

C.

Task Manager

D.

Event Viewer

Full Access
Question # 96

A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?

A.

Reset the device’s network settings

B.

Check the data usage statistics on the device

C.

Verify the SSID with which the device is associated

D.

Run any pending application or OS updates

Full Access
Question # 97

A Windows user is attempting to install a local printer and is unsuccessful on permissions.

Which of the following user types BEST describes this user?

A.

Guest

B.

Power User

C.

Administrator

D.

Standard User

Full Access
Question # 98

A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10.

Which of the following installation methods would the technician MOST likely use to accomplish this quickly?

A.

Unattended installation

B.

Remote network installation

C.

In-place upgrade

D.

Clean installation

Full Access
Question # 99

When a user browses to a favorite website on a Windows laptop, a different website opens. A technician installs an additional web browser, but it also opens to the same unfamiliar site. The technician resets the web browser settings back to default, but the issue persists. Which of the following troubleshooting steps should the technician complete NEXT?

A.

Change the browser’s home page

B.

Check the Windows host file

C.

Update the default web browser

D.

Restore Windows to a previous date

Full Access