Joe, a mobile device user, reached his monthly quota of data about halfway through the current billing cycle. Joe contacts a technician to identify potential issues with the mobile device, as his usage patterns have not changed over the past month. Which of the following is MOST likely causing this issue?
A technician is removing malware from a workstation. The malware was installed via a phishing attack, which
was initiated from a link that was included in an email.
Which of the following should the technician do to address this issue? (Choose two.)
A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office. Which of the following steps should the technician take FIRST?
A network support technician takes a call from an office manager who wants to change the wireless security
key on the access point in that particular office. The office manager explains that a label on the access point
indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect
securely to the access point to make the change?
A technician is working on an infected computer After running a scan and removing the malicious software, only one issue remains. When opening up the browser, it is redirected to an unwanted site The technician checks the home page settings, and they are correct. The technician types the home page address in the browser, and it is still redirected. Which of the following does the technician need to edit to resolve this issue?
An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a
hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for
subscribing to an organization’s mailing list. Which of the following should be performed to remove and prevent
any further emails from this organization?
A company requires multifactor authentication. When accessing one of the available RemoteApp programs that requires authentication, the user is not prompted to enter a pin. Which of the following BEST describes this scenario?
The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?
A technician needs to install Windows 10 on a 4TB hard drive. Which of the following should the technician perform to accomplish this task?
A small business, which is located in a Hood plain, wants a technician to recommend a backup strategy that will allow for Its flies to be recovered at an alternate location within a few days following a disaster. Which of the following backup methodologies will the technician MOST likely recommend''
A technician responds to a call from a user who claims to have a virus on a workstation. The technician observes the following notification from the system tray:
There are 1033 infected files on this computer. Click here to disinfect.
The link is blocked by the corporate content filter and displays a message stating the site contains known malware. Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?
A technician discovers a user’s home computer has Windows Update disabled and suspects malware has replaced several Windows OS files. After completing a malware scan, which of the following command line utilities would the technician MOST likely run before enabling Windows Update?
A customer brings an old PC to a computer repair shop and asks for advice with regard to its repair or
replacement. The PC has numerous errors during the boot process and is running a very outdated operating
system. Which of the following should the technician do?
After connecting to the corporate VPN, a user's workstation is no longer able to browse Internet websites A technician discovers launching a different web browser on the same computer reaches the websites correctly Which of the following should the technician do NEXT?
A technician is removing a virus from a user’s Windows workstation. The virus was installed by the user while downloading pirated software from the Internet. Which of the following should the technician do to address this issue?
Which of the following basic scripting components can be used to repeat an operation until a specific requirement is met?
Which of the following wireless encryption standards uses 802.1X In its process to secure a wireless network?
Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).
A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST?
Which of the following application installation methods requires the use of a valid IP address?
A technician receives the Chief Executive Officer’s (CEO’s) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario?
Which of the following is the maximum RAM limit of a Windows 32-bit version?
A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups Which of the following should a technician do to resolve these issues? (Select TWO)
The Chief Executive Officer (CEO) of an organization frequently travels with sensitive data on a laptop and is concerned the data could be compromised if the laptop is lost or stolen. Which of the following should the technician recommend to BEST ensure the data is not compromised if the laptop is lost or stolen?
A network administrator has noticed unusual activity with a user's login credentials on the network. The user is attempting multiple simultaneous logins across the network, some of which are attempting to access workstations and servers to which the user does not have access Which of the following should the network administrator do NEXT?
A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices. Which of the following should the security administrator recommend? (Choose two.)
Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?
A technician recently updated a printer driver on all the computers in an office. Shortly after the update, several users’ accounts and passwords were compromised. Which of the following MOST likely explains the compromised accounts?
A team needs to deploy a temporary server room at a site to provide support during construction.
Which of the following should they use at this site while setting up the server room?
A cybersecurity researcher purchased several used laptops at an auction. While the hard drives appeared to be blank, the researcher was able to recover all the data that previously existed on the drives. Which of the following methods did the original owner MOST likely use to clear the drives’ contents?
A Standard format
B. Drive degaussing
C. Disk encryption
D. Drive wipe
A technician is investigating an application that has crashed on a workstation. The application is displaying a generic error. Which of the following tools should the technician use?
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hot-spot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hot-spot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hot-spot on her phone, and the speed test result on that hot-spot is 15Mbps. The technician checks the hot-spot settings on Joe’s phone and sees the following:
Which of the following is the MOST likely cause of the problem?
Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?
A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings.
Which of the following Control Panel utilities should the technician use to accomplish this task?
Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hot-spot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe’s slow data speeds?
Which of the following is a Device that stores a copy of a certificate that is used for authentication?
The medical records department of a local hospital recently upgraded its computers. A technician needs to ensure the data stored on the hard drives is unrecoverable. Which of the following methods should the technician use to meet the requirement?
A technician performed an in-place upgrade to Windows 10 on a customer’s laptop. Following the upgrade, a proprietary software application no longer works. The technician realizes the software is not compatible with Windows 10. Which of the following is the BEST option to make the software functional again?
A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?
Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?
A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?
A technician is creating a network topology diagram Which of the following would be the MOST appropriate to include? (Select TWO)
An administrator needs to uninstall an update on a Windows 7 computer. Which of the following Control Panel utilities would make this possible?
Joe. a technician, receives notification that a share for production data files on the network Is encrypted. Joe suspects a crypto virus Is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?
A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?
A company needs to destroy several SSDs that contain sensitive information. Which of the following methods
is BEST suited for the total destruction of the SSDs?
A network technician is creating a set of scripts to help complete some common tasks. The technician wants to leave notes within the scripts to explain the purpose of each section and allow for changes later. Which of the following should the technician use?
Which of the following security measures would BEST prevent unauthorized individuals from being granted access to a secure location?
A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.
Which of the following should the technician replace to prevent these issues in the future?
A user is unable to get to any internal websites but can access some external websites. Which of the following will MOST likely resolve this issue?
A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.)
A user's laptop screen goes Clank every time the keyboard and/or mouse are not active for five minutes The user needs to change the settings for this option. Which of the following Control Panel utilities allows the user to make the adjustment?
A technician was contacted regarding an issue affecting hundreds of users on a domain network. Which of the following would be MOST effective at remediating future issues through documentation?
A technician is investigating connectivity issues over the corporate network. The technician attempts to Telnet into an access point in the break room, which is labeled AP-1. but is unable to proceed any further or authenticate Which of the following commands will be MOST beneficial in determining the connectivity issues?
A user who is running Windows 10 logs into a machine and notices that shared drives are missing, the “My Documents” folder is empty, and personal settings are reset. Which of the following would be required to resolve the issue?
A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users. Which of the following should the technician add to meet the multifactor requirement?
Which of the following malware types would MOST likely require reimaging?
A help desk technician needs to make administrative changes securely on a remote user's machine. The user must be logged off when the changes are made. Which of the following tools would the technician MOST likely use?
A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?
Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?
Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?
When users turn on or reboot their machines, many of the computers on the network are non-responsive and unable to access the Internet. The users who left their computers on or have not rebooted are not experiencing this issue A technician confirms all the network switches and routers are working, and no servers are having any issues The network administrator notices abnormally high network utilization Which of the following is the MOST likely issue the company is experiencing?
A user can no longer edit files on the company shared drive. The user previously used has access to these files. A technician verifies the user can view the folders but cannot open any subfolders or folders. Which of the following must happen to fix this issue?
Malware has been identified on a critical system that is currently quarantined. Which of the following should a technician do after the malware symptoms are correctly identified?
A technician deployed a new file server on the network. The technician wants to map the file server as a network drive on all users' computers when they log onto the network by creating a logon script Which of the following should the technician use?
A systems administrator needs to add security to the server room.
Which of the following would provide the BEST security for the room? (Choose two.)
A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.
Which of the following is MOST likely causing this error?
A new business will be using credit cards in a physical location as well as its web presence. Which of the following does the business need?
A technician needs to recommend a disaster recovery solution for a company that has three offices across two
states. The technician must ensure the solution has:
• The ability to centralize data backups
• High availability
• The ability to synchronize user data to local machines
Which of the following solutions will the technician MOST likely recommend? (Choose two.)
An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?
Which of the following operating systems is based on UNIX source code and is closed source?
A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO).
A company has hired a new IT firm to manage its network switches and routers.
The firm is geographically separated from the company and will need to able to securely access the devices.
Which of the following will provide the ability to access these devices?
Several mobile users are reporting issues connecting to the WLAN within a warehouse. A technician tests wireless connectivity in the lobby and is able to connect successfully. Mobile users can connect to the Internet using cellular service, but they cannot access any internal resources on the WLAN The technician received alerts of devices failing throughout the network due to a power outage Which of the following is MOST likely causing the wireless issues?
A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.
The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.
The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.
Make sure to maintain a consistent file system.
Conduct the necessary steps within the Disk Manager to accomplish these tasks.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Please review explanation for detailed answer.
Please review explanation for detailed answer.
Right click on disk 1, click on initialize
Choose disk and option as MBR. Hit ok.
Again, right click on disk 1 and choose convert to dynamic disk.
Now right click on disk 1 and choose new simple volume.
Specify storage as 256000 and assign a drive letter F and choose file system as NTFS and click finish.
Do the same thing for rest of space of disk 1, assigning 512000MB and using Disc G
Here are the screen shots showing this process:
Which of the following is the MOST secure wireless security protocol?
A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis. Which of the following is an important part of the change request process for which the administrator still must plan?
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?
A technician is decommissioning a workstation that contains Pll The HDDs cannot be used in another device, and all data must be destroyed Which of the following actions would BEST fulfill these requirements? (Select TWO)
Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)
Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password. Which of the following Control Panel utilities can Joe use to help with this situation?
A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users' mobile devices? (Select TWO).
A technician is troubleshooting a PC and identifies the issue as malware. To remediate the PC, the technician attempts to download a malware removal tool but finds the PC cannot connect to the Internet. Which of the following MOST likely explains why the PC cannot access the Internet?
A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT?
A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email. Which of the following is MOST likely causing the missing folders issue?
Which of the following accurately describes why a file on a USB drive would be inaccessible by a user until the correct authentication is received?
A technician is running Windows on a company’s Mac workstations without incurring an additional expense to the company. The Windows licenses were purchased in the past. Users are required to run both Windows and Mac operating systems on their machines, but never at the same time. Which of the following would be the BEST way to accomplish this?
A technician is installing an application on a Linux system using the Bash shell console. Which of the following extensions should the technician select to install the application?