Black Friday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

220-1102 Sample Questions Answers

Questions 4

Which of the following is MOST likely used to run .vbs files on Windows devices?

Options:

A.

winmgmt.exe

B.

powershell.exe

C.

cscript.exe

D.

explorer.exe

Buy Now
Questions 5

A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?

Options:

A.

Keylogger

B.

Cryptominers

C.

Virus

D.

Malware

Buy Now
Questions 6

A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service?

Options:

A.

Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service

B.

Flashing the BIOS, reformatting the drive, and then reinstalling the OS

C.

Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS

D.

Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus

Buy Now
Questions 7

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to ‘mirror the source data for the backup?

Options:

A.

copy

B.

xcopy

C.

robocopy

D.

Copy-Item

Buy Now
Questions 8

A technician needs to troubleshoot a user's computer while the user is connected to the system. The technician must also connect to the user's system using remote access tools built in to Windows Which of the following is the best option to troubleshoot the user's computer?

Options:

A.

Screen share

B.

MSRA

C.

Virtual network computer

D.

RDP

Buy Now
Questions 9

A user reports being unable to access a sports team's website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?

Options:

A.

NDA

B.

AUP

C.

VPN

D.

SOP

Buy Now
Questions 10

Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a secondary feature of Windows Hello that can be used to log in?

Options:

A.

Personal identification number

B.

Username/password

C.

One-time-use token

D.

Cryptographic device

Buy Now
Questions 11

A technician is setting up a new PC in a SOHO. Which of the following should the technician most likely configure on the PC?

Options:

A.

VDI

B.

Mapped drives

C.

Wireless WAN

D.

Domain

Buy Now
Questions 12

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

Options:

A.

Windows Backup

B.

BitLocker

C.

Shadow Copy

D.

Trusted PlatformModule

Buy Now
Questions 13

A user reports that after a recent software deployment to upgrade applications, the user can no longer use the Testing program.

However, other employees can successfully use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve any issues discovered by selecting the:

    Index number of the Event Viewer issue

    First command to resolve the issue

    Second command to resolve the issue

BSOD

Commands:

Event Viewer:

System Error:

Options:

Buy Now
Questions 14

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

Options:

A.

UEFI password

B.

Secure boot

C.

Account lockout

D.

Restricted user permissions

Buy Now
Questions 15

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

Options:

A.

Requiring strong passwords

B.

Disabling cached credentials

C.

Requiring MFA to sign on

D.

Enabling BitLocker on all hard drives

Buy Now
Questions 16

A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account Which of the following should the systems administrator do?

Options:

A.

Require the user to change the password at the next log-in.

B.

Disallow tie user from changing the password.

C.

Disable the account

D.

Choose a password that never expires.

Buy Now
Questions 17

A technician is investigating options to secure a small office's wireless network. One requirement is to allow automatic log-ins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature?

Options:

A.

RADIUS

B.

AES

C.

EAP-EKE

D.

MFA

Buy Now
Questions 18

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

Options:

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

Buy Now
Questions 19

A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?

Options:

A.

Multifactor authentication

B.

Encryption

C.

Increased password complexity

D.

Secure password vault

Buy Now
Questions 20

A technician needs to recommend a way to keep company devices for field and home-based staff up to date. The users live in various places across the country and the company has several national offices that staff can go to for technical support Which of the following methods is most appropriate for the users?

Options:

A.

Make office attendance mandatory for one day per week so that updates can be installed.

B.

Ask users to ensure that they run updates on devices and reboot computers on a regular basis.

C.

Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.

D.

Configure cloud-based endpoint management software to automatically manage computer updates.

Buy Now
Questions 21

A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?

Options:

A.

Acceptable use policy

B.

Incident report

C.

End user license agreement

D.

Standard operating procedures

Buy Now
Questions 22

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

Options:

A.

diskpart

B.

chown

C.

gpupdate

D.

netstat

Buy Now
Questions 23

A user is experiencing the following issues with Bluetooth on a smartphone:

•The user cannot hear any sound from a speaker paired with the smartphone.

•The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?

Options:

A.

Restart the smartphone.

B.

Reset the network settings.

C.

Unpair the Bluetooth speaker.

D.

Check for system updates.

Buy Now
Questions 24

A user reports receiving constant, unwanted pop-ups and being unable to close the browser window. These issues have impacted the user's productivity and may have caused the user's files to be altered. Which of the following should a technician do to address these issues with minimal impact to the user?

Options:

A.

Use System Restore to recover the OS files.

B.

Wipe the computer and install a new copy of the OS.

C.

Identify whether the disk partition table has been reduced in size.

D.

Perform a full-system, antivirus scan and check browser notifications.

Buy Now
Questions 25

A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?

Options:

A.

Security groups

B.

Folder redirection

C.

Organizational unit structure

D.

Access control list

Buy Now
Questions 26

Which of the following common security vulnerabilities can be mitigated by using input validation?

Options:

A.

Brute-force attack

B.

Cross-site scripting

C.

SQL injection

D.

Cross-site request forgery

Buy Now
Questions 27

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a

ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods

would BEST meet the requirements?

Options:

A.

A daily, incremental backup that is saved to the corporate file server

B.

An additional, secondary hard drive in a mirrored RAID configuration

C.

A full backup of the data that is stored of site in cold storage

D.

Weekly, differential backups that are stored in a cloud-hosting provider

Buy Now
Questions 28

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Options:

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

Buy Now
Questions 29

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

Options:

A.

A new IT policy requires users to set up a lock screen PIN.

B.

A user is overseas and wants to use a compatible international SIM Card.

C.

A user left the phone at home and wants to prevent children from gaining access to the phone.

D.

A user traded in the company phone for a cell carrier upgrade by mistake.

E.

A user cannot locate the phone after attending a play at a theater.

F.

A user forgot the phone in a taxi, and the driver called the company to return the device.

Buy Now
Questions 30

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

Options:

A.

Windows Enterprise Edition

B.

Windows Professional Edition

C.

Windows Server Standard Edition

D.

Windows Home Edition

Buy Now
Questions 31

Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?

Options:

A.

System time

B.

IP address

C.

DNS servers

D.

Windows updates

Buy Now
Questions 32

A technician needs to implement password requirements that apply to all domain-joined computers. Which of the following commands should the technician most likely run?

Options:

A.

gpugdate

B.

devmgmt

C.

regedit

D.

resmon

Buy Now
Questions 33

A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

Options:

A.

Proceed to the site.

B.

Use a different browser.

C.

Report the error to the bank.

D.

Reinstall the browser.

Buy Now
Questions 34

Which of the following defines the extent of a change?

Options:

A.

Scope

B.

Purpose

C.

Analysis

D.

Impact

Buy Now
Questions 35

Which of the following is the default GUI and file manager in macOS?

Options:

A.

Disk Utility

B.

Finder

C.

Dock

D.

FileVault

Buy Now
Questions 36

Which of the following editions of Windows 10 requires reactivation every 180 days?

Options:

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Buy Now
Questions 37

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

Options:

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Buy Now
Questions 38

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

Options:

A.

Spam filter installation

B.

Invalid registry settings

C.

Malware infection

D.

Operating system update

Buy Now
Questions 39

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

Options:

A.

The system is missing updates.

B.

The system is utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates

Buy Now
Questions 40

An administrator needs to back up the following components of a single workstation:

•The installation of the operating system

•Applications

•User profiles

•System settings

Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?

Options:

A.

Differential

B.

Image

C.

Synthetic

D.

Archive

Buy Now
Questions 41

A user reports that an Android mobile device takes a long time to boot, and all applications crash when launched. The user installed the applications from a third-party website. Which of the following steps should the technician complete to diagnose the issue?

Options:

A.

Scan the system for malware.

B.

Clear the web browser cache.

C.

Enroll the device in an MDM system.

D.

Confirm the compatibility of the applications with the OS.

Buy Now
Questions 42

A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Select two).

Options:

A.

Uninstall the game application.

B.

Perform a factory reset of the device.

C.

Connect the device to an external charger.

D.

Install the latest security patches.

E.

Clear the application's cache.

F.

Enable the device's built-in anti-malware protection.

Buy Now
Questions 43

Which of the following features can a technician use to ensure users are following password length requirements?

Options:

A.

Group Policy

B.

Log-on script

C.

Access controllist

D.

Security groups

Buy Now
Questions 44

A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to make sure the printer stays connected in the future and is available on all the computers in the house. Which of the following should the technician configure on the printer?

Options:

A.

DNS settings

B.

Static IP

C.

WWAN

D.

Meteredconnection

Buy Now
Questions 45

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

Options:

A.

Spam filtering

B.

Malware preventionsoftware

C.

End user education

D.

Stateful firewall inspection

Buy Now
Questions 46

A user's computer is running slower than usual and takes a long time to start up. Which of the following tools should the technician use first to investigate the issue?

Options:

A.

Action Center

B.

Task Manager

C.

Resource Monitor

D.

Security Configuration Wizard

E.

Event Viewer

Buy Now
Questions 47

Which of the following features can be used to ensure a user can access multiple versions of files?

Options:

A.

Multiple desktops

B.

Remote Disc

C.

Time Machine

D.

FileVault

Buy Now
Questions 48

An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?

Options:

A.

Configuring firewall settings

B.

Implementing expiration policies

C.

Defining complexity requirements

D.

Updating antivirus definitions

Buy Now
Questions 49

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?

Options:

A.

SSH

B.

MDM

C.

RDP

D.

SFTP

Buy Now
Questions 50

A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost. the gateway, and known IP addresses on the interne! and receive a response. Which of the following Is the MOST likely reason tor the Issue?

Options:

A.

A firewall is blocking the application.

B.

The wrong VLAN was assigned.

C.

The incorrect DNS address was assigned.

D.

The browser cache needs to be cleared

Buy Now
Questions 51

A user is unable to access the company's network. A technician learns the user's account became inaccessible after multiple unsuccessful login attempts. The user also changed their password before the issue started. Which of the following steps should the technician take to resolve the issue?

Options:

A.

Escalate the user’s issue to the network team.

B.

Reset the user's password.

C.

Unlock the user's account.

D.

Verify the user's login and password.

Buy Now
Questions 52

A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?

Options:

A.

Expired certificate

B.

OS update failure

C.

Service not started

D.

Application crash

E.

Profile rebuild needed

Buy Now
Questions 53

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

Options:

A.

Disable unused ports.

B.

Remove the guest network

C.

Add a password to the guest network

D.

Change the network channel.

Buy Now
Questions 54

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

Options:

A.

Implementing password expiration

B.

Restricting user permissions

C.

Using screen locks

D.

Disabling unnecessary services

Buy Now
Questions 55

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?

Options:

A.

Rebuild the Windows profiles.

B.

Restore the computers from backup.

C.

Reimage the computers.

D.

Run the System File Checker.

Buy Now
Questions 56

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Options:

A.

Avoid distractions

B.

Deal appropriately with customer's confidential material .

C.

Adhere to user privacy policy

D.

Set and meet timelines

Buy Now
Questions 57

A Windows administrator is creating user profiles that will include home directories and network printers for several new users. Which of the following is the most efficient way for the technician to complete this task?

Options:

A.

Access control

B.

Authentication application

C.

Group Policy

D.

Folder redirection

Buy Now
Questions 58

A user received the following error upon visiting a banking website:

The security presented by website was issued a different website' s address .

A technician should instruct the user to:

Options:

A.

clear the browser cache and contact the bank.

B.

close out of the site and contact the bank.

C.

continue to the site and contact the bank.

D.

update the browser and contact the bank.

Buy Now
Questions 59

A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).

Options:

A.

Encryption

B.

Antivirus

C.

AutoRun

D.

Guest accounts

E.

Default passwords

F.

Backups

Buy Now
Questions 60

A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

Options:

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

Buy Now
Questions 61

While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?

Options:

A.

Send a quick message regarding the delay to the next customer.

B.

Cut the current customer's lime short and rush to the next customer.

C.

Apologize to the next customer when arriving late.

D.

Arrive late to the next meeting without acknowledging the lime.

Buy Now
Questions 62

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

Options:

A.

RDP through RD Gateway

B.

Apple Remote Desktop

C.

SSH access with SSH keys

D.

VNC with username and password

Buy Now
Questions 63

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?

Options:

A.

Enable multifactor authentication.

B.

Increase the failed log-in threshold.

C.

Remove complex password requirements.

D.

Implement a single sign-on with biometrics.

Buy Now
Questions 64

A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping, all functioning devices also turned off. In case of a future power failure, the customer wants to have the most time available to save cloud documents and shut down the computer without losing any data.

Options:

Buy Now
Questions 65

A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?

Options:

A.

PIN-based login

B.

Quarterly password changes

C.

Hard drive encryption

D.

A physical laptop lock

Buy Now
Questions 66

A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?

Options:

A.

Guards

B.

Bollards

C.

Motion sensors

D.

Access control vestibule

Buy Now
Questions 67

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

Options:

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Buy Now
Questions 68

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?

Options:

A.

Private-browsing mode

B.

Invalid certificate

C.

Modified file

D.

Browser cache

Buy Now
Questions 69

A technician is working on a way to register all employee badges and associated computer IDs. Which of the following options should the technician use in order to achieve this objective?

Options:

A.

Database system

B.

Software management

C.

Active Directory description

D.

Infrastructure as a Service

Buy Now
Questions 70

A BSOD appears on a user's workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?

Options:

A.

Stop code

B.

Event Mewer

C.

Services

D.

System Configuration

Buy Now
Questions 71

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

Options:

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Buy Now
Questions 72

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

Options:

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

Buy Now
Questions 73

Which of the following is a consequence of end-of-lite operating systems?

Options:

A.

Operating systems void the hardware warranty.

B.

Operating systems cease to function.

C.

Operating systems no longer receive updates.

D.

Operating systems are unable to migrate data to the new operating system.

Buy Now
Questions 74

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

Options:

A.

Installer_x64.exe

B.

Installer_Files.zip

C.

Installer_32.msi

D.

Installer_x86.exe

E.

Installer_Win10Enterprise.dmg

Buy Now
Questions 75

Which of the following is the proper way for a technician to dispose of used printer consumables?

Options:

A.

Proceed with the custom manufacturer's procedure.

B.

Proceed with the disposal of consumables in standard trash receptacles.

C.

Empty any residual ink or toner from consumables before disposing of them in a standard recycling bin.

D.

Proceed with the disposal of consumables in standard recycling bins.

Buy Now
Questions 76

When a user is in the office, web pages are loading slowly on the user's phone. Which of the following best explains this issue?

Options:

A.

Exceeded the data usage limit

B.

Sluggish response time

C.

Degraded network service

D.

High network traffic

Buy Now
Questions 77

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?

Options:

A.

Risk analysis

B.

Sandbox testing

C.

End user acceptance

D.

Lessons learned

Buy Now
Questions 78

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

Options:

A.

Cross-site scripting

B.

SQL injection

C.

Brute-force attack

D.

DDoS attack

Buy Now
Questions 79

A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed optional Windows updates. Which of the following is best way to resolve the issue?

Options:

A.

Enable System Restore.

B.

Roll back the device drivers.

C.

Reinstall the OS.

D.

Update the BIOS.

Buy Now
Questions 80

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

Options:

A.

Application permissions

B.

Available storage space

C.

Battery charge level

D.

Wi-Fi connection speed

Buy Now
Questions 81

A technician receives a high-priority ticket about sensitive information collected from an end user’s workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

Options:

A.

Reimage the workstation.

B.

Inform the user of the investigation.

C.

Recover and secure the workstation.

D.

Back up the workstation

Buy Now
Questions 82

An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented?

Options:

A.

TKIP

B.

RADIUS

C.

WPA2

D.

AES

Buy Now
Questions 83

A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do NEXT?

Options:

A.

Remove the HDD and then send the computer for repair.

B.

Check corporate polices for guidance.

C.

Delete the sensitive information before the computer leaves the building.

D.

Get authorization from the manager.

Buy Now
Questions 84

Which of the following operating systems were designed for smartphones? (Select two).

Options:

A.

Ubuntu

B.

CentOS

C.

macOS

D.

Chrome OS

E.

iOS

F.

Android

Buy Now
Questions 85

Which of the following languages is used for scripting the creation of Active Directory accounts?

Options:

A.

Bash

B.

Structured Query Language

C.

Hypertext Preprocessor

D.

PowerShell

Buy Now
Questions 86

An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable?

Options:

A.

Smart card

B.

Biometrics

C.

Hard token

D.

One-time password

Buy Now
Questions 87

Which of the following device types would a technician consider a security concern?

Options:

A.

NIC

B.

IoT

C.

PoE

D.

LC

Buy Now
Questions 88

Which of the following is the weakest wireless security protocol?

Options:

A.

WEP

B.

WPA2

C.

TKIP

D.

AES

Buy Now
Questions 89

A user in a SOHO asks an off-site, remote technician to connect securely to the user’s laptop. The technician is able to connect to the VPN but is unable to connect to the user’s laptop. Which of the following settings should the technician review?

Options:

A.

Wireless protocol

B.

DHCP pool

C.

Content filtering

D.

Firewall

Buy Now
Questions 90

A customer needs to purchase a desktop capable of rendering video. Which of the following should the customer prioritize?

Options:

A.

NIC

B.

USB

C.

GPU

D.

HDMI

Buy Now
Questions 91

A technician is trying to perform an in-place upgrade of a Windows OS from a file. When the technician double-clicks the file, the technician receives a prompt to mount a drive. Which of the following file types did the technician download?

Options:

A.

msi

B.

iso

C.

zip

D.

exe

Buy Now
Questions 92

A technician needs to import a new digital certificate and place it in the proper location. Which of the following Control Panel utilities should the technician use to import the certificate?

Options:

A.

Internet Options

B.

Network and Sharing Center

C.

Credential Manager

D.

Security and Maintenance

Buy Now
Questions 93

A Windows user wants a filesystem that protects confidential data from attackers who have physical access to the system. Which of the following should the user choose?

Options:

A.

ext

B.

APFS

C.

FAT

D.

EFS

Buy Now
Questions 94

A technician is troubleshooting a PC that will not run Windows Defender. Windows Defender has been disabled and no other antivirus is installed on the PC. Which of the following would have caused this issue?

Options:

A.

Ransomware

B.

Rootkit

C.

Spyware

D.

Keylogger

Buy Now
Questions 95

Which of the following provides disk encryption on computers running a Windows OS?

Options:

A.

FileVault

B.

BitLocker

C.

Private Key

D.

PowerShell

Buy Now
Questions 96

A technician wants to update the local security policies on a Windows machine but is unable to launch the expected snap-in. Which of the following is the most likely reason?

Options:

A.

The computer is running Windows Home.

B.

The user did not sign the end user license agreement.

C.

The user disabled the User Account Control.

D.

An antivirus application is blocking access.

Buy Now
Questions 97

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?

Options:

A.

Remote wipe

B.

Mandatory screen locks

C.

Location applications

D.

Device data encryption

Buy Now
Questions 98

A user's corporate iPhone had issues and was repaired while the user was on vacation. The mobile phone has compared to an identical phone. Which of the following best describes what is happening to the phone?

Options:

A.

APK Source

B.

Connectivity issues

C.

Developer Mode

D.

Jailbreak

Buy Now
Questions 99

Users report that a network printer intermittently goes offline during the day. Which of the following commands should the technician use to confirm whether the printer has connectivity issues?

Options:

A.

ping

B.

netstat

C.

net

D.

nslookup

Buy Now
Questions 100

A user reports that a new, personally owned tablet will not connect to the corporate Wi-Fi network. The user is able to connect to the Wi-Fi network with other devices, and the tablet is running the latest software. Which of the following is the most likely cause of the issue?

Options:

A.

Incorrect encryption settings

B.

Blocked MAC address

C.

Outdated drivers

D.

Disabled location services

Buy Now
Questions 101

Employees want their Windows 10 laptops to wirelessly connect when they take them home. Which of the following should the employees configure so the laptops can automatically connect wirelessly?

Options:

A.

Network and Internet settings

B.

Windows Firewall settings

C.

Devices and Printers

D.

Personalization settings

Buy Now
Questions 102

A technician discovers a user’s PC has a "No OS found" error message. Which of the following steps should the technician take next?

Options:

A.

Remove external storage and reboot the PC.

B.

Replace the SSD and run disk defragmenter.

C.

Start up in safe mode and roll back the latest security updates.

D.

Back up personal data and rebuild the user profile.

Buy Now
Questions 103

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

Options:

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Buy Now
Questions 104

Several computers have been infected with malware, causing the company network to slow down and sensitive company information to be lost. The IT department installs new antivirus software to remove the malware and needs to decide the best method to prevent future malware infections. Which of the following methods would be the most effective?

Options:

A.

Encrypting data at rest

B.

Implementing firewalls

C.

Utilizing Intrusion detection systems

D.

Backing up data regularly

Buy Now
Questions 105

Users report that they can log in to the web application during business hours, but none of the application's functions are working properly. Company policy does not allow for the server to be rebooted during business hours. Which of the following should a technician do to fix the web application and follow company policy?

Options:

A.

Restart services.

B.

Roll back Windows updates.

C.

Perform a Windows repair.

D.

Add RAM to the server.

Buy Now
Questions 106

A technician is replacing the rack mount UPS. Which of the following should the technician consider?

Options:

A.

Determining the availability of compressed air

B.

Getting assistance to lift the hardware

C.

Checking local low-voltage regulations

D.

Testing the fire suppression system

Buy Now
Questions 107

A user has been adding data to the same spreadsheet for several years. After adding a significant amount of data, they are now unable to open the file. Which of the following should a technician do to resolve the issue?

Options:

A.

Revert the spreadsheet to the last restore point.

B.

Increase the amount of RAM.

C.

Defragment the storage drive.

D.

Upgrade the network connection speed.

Buy Now
Questions 108

A user downloaded a 64-bit version of a new software program, but the installation failed due to an error. Which of the following most likely caused the error?

Options:

A.

The OS version is incompatible.

B.

The user needs to enable ActiveX.

C.

The .NET Framework needs to be updated.

D.

The user needs administrator privileges.

Buy Now
Questions 109

A technician is helping a customer connect to a shared drive. The technician notices some unused drives that have already been mapped and wants to disconnect those drives first. Which of the following commands should the technician use?

Options:

A.

format

B.

netstat

C.

diskpart

D.

net use

E.

rmdir

Buy Now
Questions 110

After a failed attempt to open an email attachment for an unexpected overdue invoice, a smartphone user experiences abnormal performance when using their mobile browser and other applications. The user restarts the device, but the issue persists. Which of the following actions should the user take next?

Options:

A.

Shut down and cold start the smartphone

B.

Delete the email containing the attachment

C.

Wipe the device and reset it to factory defaults

D.

Uninstall and reinstall the mobile browser

Buy Now
Questions 111

Which of the following would most likely be used to extend the life of a device?

Options:

A.

Battery backup

B.

Electrostatic discharge mat

C.

Proper ventilation

D.

Green disposal

Buy Now
Questions 112

A technician is trying to perform an in-place upgrade of a Windows OS from a file. When the technician double-clicks the file, the technician receives a prompt to mount a drive. Which of the following file types did the technician download?

Options:

A.

.msi

B.

.iso

C.

.zip

D.

.exe

Buy Now
Questions 113

A technician, who is completing hardware upgrades at a company, is approached by a user who submitted a computer upgrade request. After checking the list of offices to upgrade, the technician finds that the user's office is not listed for an upgrade. Which of the following actions should the technician take next?

Options:

A.

Ask the company's human resources department to address the issue.

B.

Notify the project manager about the user's concern.

C.

Tell the user that this request is not on the list to be upgraded.

D.

Ask the user's supervisor if the technician should upgrade the computer.

Buy Now
Questions 114

A company executive is currently attending a major music festival with a large number of attendees and is having trouble accessing a work email account. The email application is not downloading emails and appears to be stuck during connection attempts. Which of the following is most likely causing the disruption?

Options:

A.

The phone has no storage space available.

B.

Company firewalls are configured to block remote access to email resources.

C.

Too many devices in the same area are trying to connect to the mobile network.

D.

The festival organizer prohibits internet usage during the event and has blocked the internet signal.

Buy Now
Questions 115

The camera and microphone on an iPhone user's device are activating without any user input. The user’s friend recently modified the device to allow applications to be installed outside the normal App Store. Which of the following is the issue?

Options:

A.

The user connected a counterfeit Lightning cable to the iPhone.

B.

The device is unenrolled from Mobile Device Management.

C.

The device was jailbroken to remove internal security protections.

D.

The iPhone has an out-of-date operating system.

Buy Now
Questions 116

A large university wants to equip all classrooms with high-definition IP videoconferencing equipment. Which of the following would most likely be impacted in this situation?

Options:

A.

SAN

B.

LAN

C.

GPU

D.

PAN

Buy Now
Questions 117

Which of the following best describes XFS?

Options:

A.

A filesystem used by the Linux OS

B.

A filesystem used by iOS

C.

A filesystem used by the Windows OS

D.

A filesystem used by macOS

Buy Now
Questions 118

An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product?

Options:

A.

AUP

B.

EULA

C.

EOL

D.

UAC

Buy Now
Questions 119

A technician is trying to encrypt a single folder on a PC. Which of the following should the technician use to accomplish this task?

Options:

A.

FAT32

B.

exFAT

C.

BitLocker

D.

EFS

Buy Now
Questions 120

Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs?

Options:

A.

TACACS+

B.

Kerberos

C.

Preshared key

D.

WPA2/AES

Buy Now
Questions 121

A technician needs to establish a remote access session with a user who has a Windows workstation. The session must allow for simultaneous viewing of the workstation by both the user and technician. Which of the following remote access technologies should be used?

Options:

A.

RDP

B.

VPN

C.

SSH

D.

MSRA

Buy Now
Questions 122

Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of law?

Options:

A.

Data integrity form

B.

Valid operating system license

C.

Documentation of an incident

D.

Chain of custody

Buy Now
Questions 123

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

Options:

A.

nslookup

B.

net use

C.

netstat

D.

net user

Buy Now
Questions 124

Which of the following protects a mobile device against unwanted access when it is left unattended?

Options:

A.

PIN code

B.

OS updates

C.

Antivirus software

D.

BYOD policy

Buy Now
Questions 125

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

Options:

A.

The Windows 10 desktop has Windows 10 Home installed.

B.

The Windows 10 desktop does not have DHCP configured.

C.

The Windows 10 desktop is connected via Wi-Fi.

D.

The Windows 10 desktop is hibernating.

Buy Now
Questions 126

A hard drive that previously contained PI I needs to be repurposed for a public access workstation. Which of the following data destruction methods should a technician use to ensure data is completely removed from the hard drive?

Options:

A.

Shredding

B.

Degaussing

C.

Low-level formatting

D.

Recycling

Buy Now
Questions 127

The battery life on an employee's new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check first to troubleshoot this issue? (Select two).

Options:

A.

Screen resolution

B.

Screen zoom

C.

Screen timeout

D.

Screen brightness

E.

Screen damage

F.

Screen motion smoothness

Buy Now
Questions 128

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?

Options:

A.

Scan and remove the malware

B.

Schedule automated malware scans

C.

Quarantine the system

D.

Disable System Restore

Buy Now
Questions 129

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

Options:

A.

Turn on airplane mode.

B.

Set the connection to be metered.

C.

Configure the device to use a static IP address.

D.

Enable the Windows Defender Firewall.

Buy Now
Questions 130

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

Options:

A.

DRM

B.

NDA

C.

EULA

D.

MOU

Buy Now
Questions 131

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?

    Document the date and time of the change.

Options:

A.

Submit a change request form.

B.

Determine the risk level of this change.

C.

Request an unused IP address.

Buy Now
Questions 132

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence. Which of the following was MOST likely violated during the investigation?

Options:

A.

Open-source software

B.

EULA

C.

Chain of custody

D.

AUP

Buy Now
Questions 133

An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of the following should the

technician perform to fix the issue?

Options:

A.

Disable the Windows Update service.

B.

Check for updates.

C.

Restore hidden updates.

D.

Rollback updates.

Buy Now
Questions 134

A user's iPhone was permanently locked after several tailed login attempts. Which of the following will restore access to the device?

Options:

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Secondary account and recovery code

Buy Now
Questions 135

A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to Investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?

Options:

A.

Resource Monitor

B.

Performance Monitor

C.

Command Prompt

D.

System Information

Buy Now
Questions 136

Which of the following macOS features can help a user close an application that has stopped responding?

Options:

A.

Finder

B.

Mission Control

C.

System Preferences

D.

Force Quit

Buy Now
Questions 137

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

Options:

A.

Quarantine the computer.

B.

Disable System Restore.

C.

Update the antivirus software definitions.

D.

Boot to safe mode.

Buy Now
Questions 138

A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company's risk to avoid any issues. Which of the following items should the technician implement?

Options:

A.

Screened subnet

B.

Firewall

C.

Anti-phishing training

D.

Antivirus

Buy Now
Questions 139

A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the Issue?

Options:

A.

Screen-sharing software

B.

Secure shell

C.

Virtual private network

D.

File transfer software

Buy Now
Questions 140

A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?

Options:

A.

AAA

B.

SSH

C.

RDP

D.

VPN

Buy Now
Questions 141

A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools should the technician use?

Options:

A.

Disk Cleanup

B.

Resource Monitor

C.

Disk Defragment

D.

Disk Management

Buy Now
Questions 142

A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to most likely resolve the issue?

Options:

A.

Install the software in safe mode.

B.

Attach the external hardware token.

C.

Install OS updates.

D.

Restart the workstation after installation.

Buy Now
Questions 143

A customer reports that an Android phone will not allow the use of contactless electronic payment. Which of the following needs to be enabled to resolve the issue?

Options:

A.

Wi-Fi

B.

Nearby share

C.

NFC

D.

Bluetooth

Buy Now
Questions 144

A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?

Options:

A.

Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.

B.

Redeem the included activation key card for a product key.

C.

Insert a Windows USB hardware dongle and initiate activation.

D.

Activate with the digital license included with the device hardware.

Buy Now
Questions 145

A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive?

Options:

A.

gpupdate

B.

net use

C.

hostname

D.

dir

Buy Now
Questions 146

A customer has a USB-only printer attached to a computer. A technician is configuring an arrangement that allows other computers on the network to use the printer. In which of the following locations on the customer's desktop should the technician make this configuration?

    Printing Preferences/Advanced tab

Options:

A.

Printer Properties/Sharing tab

B.

Printer Properties/Security tab

C.

Printer Properties/Ports tab

Buy Now
Questions 147

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

Options:

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Buy Now
Questions 148

Which of the following security methods supports the majority of current Wi-Fi-capable devices without sacrificing security?

Options:

A.

WPA3

B.

MAC filleting

C.

RADIUS

D.

TACACS+

Buy Now
Questions 149

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).

Options:

A.

Prevent a device root

B.

Disable biometric authentication

C.

Require a PIN on the unlock screen

D.

Enable developer mode

E.

Block a third-party application installation

F.

Prevent GPS spoofing

Buy Now
Questions 150

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?

Options:

A.

RDP

B.

VNC

C.

SSH

D.

VPN

Buy Now
Questions 151

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Options:

A.

Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never

B.

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never

C.

Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never

D.

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Buy Now
Questions 152

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

Options:

A.

Spyware

B.

Cryptominer

C.

Ransormvare

D.

Boot sector virus

Buy Now
Questions 153

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

Options:

A.

Increase the paging file size

B.

Run the chkdsk command

C.

Rebuild the user's profile

D.

Add more system memory.

E.

Defragment the hard drive.

Buy Now
Questions 154

A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?

Options:

A.

The smartphone's line was not provisioned with a data plan

B.

The smartphone's SIM card has failed

C.

The smartphone's Bluetooth radio is disabled.

D.

The smartphone has too many applications open

Buy Now
Questions 155

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

Options:

A.

Privacy

B.

Indexing Options

C.

System

D.

Device Manager

Buy Now
Questions 156

A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?

Options:

A.

Services

B.

Processes

C.

Performance

D.

Startup

Buy Now
Questions 157

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?

Options:

A.

Time drift

B.

Dual in-line memory module failure

C.

Application crash

D.

Filesystem errors

Buy Now
Questions 158

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:

Options:

A.

set AirDrop so that transfers are only accepted from known contacts

B.

completely disable all wireless systems during the flight

C.

discontinue using iMessage and only use secure communication applications

D.

only allow messages and calls from saved contacts

Buy Now
Questions 159

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

Options:

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

Buy Now
Questions 160

A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings should the user utilize to create the secondary login?

Options:

A.

Privacy

B.

Accounts

C.

Personalization

D.

Shared resources

Buy Now
Questions 161

Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company’s wireless network. All the corporate laptops are connecting without issue. She has asked you to assist with getting the device online.

INSTRUCTIONS

Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 162

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?

Options:

A.

Run a startup script that removes files by name.

B.

Provide a sample to the antivirus vendor.

C.

Manually check each machine.

D.

Monitor outbound network traffic.

Buy Now
Questions 163

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

Options:

A.

Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin

B.

Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run

C.

Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup

D.

Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

Buy Now
Questions 164

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

Options:

A.

Configure the network as private

B.

Enable a proxy server

C.

Grant the network administrator role to the user

D.

Create a shortcut to public documents

Buy Now
Questions 165

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

Options:

A.

MSRA

B.

VNC

C.

VPN

D.

SSH

Buy Now
Questions 166

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?

Options:

A.

Scope of change

B.

Risk level

C.

Rollback plan

D.

End user acceptance

Buy Now
Questions 167

As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

Options:

A.

Use Settings to access Screensaver settings

B.

Use Settings to access Screen Timeout settings

C.

Use Settings to access General

D.

Use Settings to access Display.

Buy Now
Questions 168

Which of the following Wi-Fi protocols is the MOST secure?

Options:

A.

WPA3

B.

WPA-AES

C.

WEP

D.

WPA-TKIP

Questions 169

A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

Options:

A.

Anti-malware

B.

Remote wipe

C.

Locator applications

D.

Screen lock

Buy Now
Questions 170

A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?

Options:

A.

Language

B.

System

C.

Personalization

D.

Ease of Access

Buy Now
Questions 171

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

Options:

A.

Run sfc / scannow on the drive as the administrator.

B.

Run clearnmgr on the drive as the administrator

C.

Run chkdsk on the drive as the administrator.

D.

Run dfrgui on the drive as the administrator.

Buy Now
Questions 172

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?

Options:

A.

Changing channels

B.

Modifying the wireless security

C.

Disabling the SSIO broadcast

D.

Changing the access point name

Buy Now
Questions 173

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

Options:

A.

afc

B.

ehkdsk

C.

git clone

D.

zobocopy

Buy Now
Questions 174

A Linux technician needs a filesystem type that meets the following requirements:

. All changes are tracked.

. The possibility of file corruption is reduced.

· Data recovery is easy.

Which of the following filesystem types best meets these requirements?

    ext3

Options:

A.

FAT32

B.

exFAT

C.

NTFS

Buy Now
Questions 175

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

Options:

A.

Application updates

B.

Anti-malware software

C.

OS reinstallation

D.

File restore

Buy Now
Questions 176

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?

Options:

A.

Have the user consider using an iPad if the user is unable to complete updates

B.

Have the user text the user's password to the technician.

C.

Ask the user to click in the Search field, type Check for Updates, and then press the Enter key

D.

Advise the user to wait for an upcoming, automatic patch

Buy Now
Questions 177

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?

Options:

A.

Continue researching the issue

B.

Repeat the iterative processes

C.

Inform the CEO the repair will take a couple of weeks

D.

Escalate the ticket

Buy Now
Questions 178

Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

Options:

A.

Network and Sharing Center

B.

Programs and Features

C.

Default Apps

D.

Add or Remove Programs

Buy Now
Questions 179

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

Options:

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

Buy Now
Questions 180

A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?

Options:

A.

Open Settings select Devices, select Display, and change the display resolution to a lower resolution option

B.

Open Settings, select System, select Display, and change the display resolution to a lower resolution option.

C.

Open Settings Select System, select Display, and change the Scale and layout setting to a higher percentage.

D.

Open Settings select Personalization, select Display and change the Scale and layout setting to a higher percentage

Buy Now
Questions 181

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.

Which of the following security measures should the user take to ensure security and privacy?

Options:

A.

Only accept calls from known people.

B.

Disregard any suspicious emails.

C.

Update the antivirus software.

D.

Enable two-factor authentication.

E.

Install a malware scanner.

Buy Now
Questions 182

Which of the following Linux commands would be used to install an application?

Options:

A.

yum

B.

grep

C.

Is

D.

sudo

Buy Now
Questions 183

A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue?

    msconfig

Options:

A.

chkdsk

B.

sfc

C.

diskpart

D.

mstsc

Buy Now
Questions 184

Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware?

Options:

A.

Run System Restore.

B.

Place in recovery mode.

C.

Schedule a scan.

D.

Restart the PC.

Buy Now
Questions 185

A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?

Options:

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Recovery contact and recovery key

Buy Now
Questions 186

Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team

implement?

Options:

A.

SSH

B.

VNC

C.

VPN

D.

RDP

Buy Now
Questions 187

A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend?

Options:

A.

Corporate

B.

Open-source

C.

Personal

D.

Enterprise

Buy Now
Questions 188

Which of the following statements describes the purpose of scripting languages?

    To access the hardware of the computer it is running on

Options:

A.

To automate tasks and reduce the amount of manual labor

B.

To abstract the complexity of the computer system

C.

To compile the program into an executable file

Buy Now
Questions 189

A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?

    Color Management

Options:

A.

System

B.

Troubleshooting

C.

Device Manager

D.

Administrative Tools

Buy Now
Questions 190

A user's laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?

Options:

A.

Scan for malware and ransomware.

B.

Perform a system restore.

C.

Check the network utilization.

D.

Update the antivirus software.

Buy Now
Questions 191

Which of the following should be documented to ensure that the change management plan is followed?

Options:

A.

Scope of the change

B.

Purpose of the change

C.

Change rollback plan

D.

Change risk analysis

Buy Now
Questions 192

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?

Options:

A.

VNC

B.

RMM

C.

RDP

D.

SSH

Buy Now
Questions 193

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the

users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

Options:

A.

acceptable use policy.

B.

regulatory compliance requirements.

C.

non-disclosure agreement

D.

incident response procedures

Buy Now
Questions 194

A help desk technician needs to remotely access and control a customer's Windows PC by using a secure session that allows the technician the same control as the customer. Which of the following tools provides this type of access?

Options:

A.

FTP

B.

RDP

C.

SSH

D.

VNC

Buy Now
Questions 195

Which of the following languages is used for scripting the creation of Active Directory accounts?

Options:

A.

Bash

B.

SQL

C.

PHP

D.

PowerShell

Buy Now
Questions 196

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?

Options:

A.

To determine which party had the machine and when.

B.

To remotely wipe sensitive data from the machine.

C.

To gather the information needed to replace the machine.

D.

To alert the owner that the password needs to be changed.

Buy Now
Questions 197

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

Options:

A.

Investigate the firewall logs.

B.

Isolate the machine from the network.

C.

Inspect the Windows Event Viewer.

D.

Take a physical inventory of the device.

Buy Now
Questions 198

A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?

Options:

A.

Respond to calls and text messages while on site but not when working directly with personnel.

B.

Respond to calls and text messages only from family.

C.

Respond to calls and text messages only when an emergency situation requires a response.

D.

Respond to calls and text messages discreetly while on site.

Buy Now
Questions 199

A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?

Options:

A.

Phishing

B.

Dumpster diving

C.

Tailgating

D.

Evil twin

Buy Now
Questions 200

A technician is unable to completely start up a system. The OS freezes when the desktop background appears, and the issue persists when the system is restarted. Which of the following should the technician do next to troubleshoot the issue?

Options:

A.

Disable applicable BIOS options.

B.

Load the system in safe mode.

C.

Start up using a flash drive OS and run System Repair.

D.

Enable Secure Boot and reinstall the system.

Buy Now
Questions 201

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

Options:

A.

The user is in a poor signal area.

B.

The user has too many processes running.

C.

The smartphone has malware on it.

D.

The smartphone has been jailbroken.

Buy Now
Questions 202

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

    Run an antivirus and enable encryption.

Options:

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

Buy Now
Questions 203

A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue?

Options:

A.

Reimage the computer.

B.

Replace the system RAM.

C.

Reinstall and update the failing software.

D.

Decrease the page file size.

Buy Now
Questions 204

A technician needs to implement a system to handle both authentication and authorization Which of the following meets this requirement?

Options:

A.

WPA3

B.

MFA

C.

TACACS+

D.

RADIUS

Buy Now
Questions 205

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).

Options:

A.

Degauss

B.

Delete

C.

Incinerate

D.

Recycle

E.

Format

F.

Shred

Buy Now
Questions 206

Which of the following operating systems was the app file type designed to run under as an application file bundle?

Options:

A.

macOS

B.

Chrome

C.

Windows

D.

Linux

Buy Now
Questions 207

A user's company phone has several pending software updates. A technician completes the following steps:

•Rebooted the phone

•Connected to Wi-Fi

•Disabled metered data

Which of the following should the technician do next?

Options:

A.

Restore the factory settings.

B.

Clean the browser history.

C.

Uninstall and reinstall the applications.

D.

Clear the cache.

Buy Now
Questions 208

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

Options:

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Buy Now
Questions 209

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

Options:

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Buy Now
Questions 210

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

Options:

A.

Escalate the ticket to Tier 2.

B.

Run a virus scan.

C.

Utilize a Windows restore point.

D.

Reimage the computer.

Buy Now
Questions 211

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?

Options:

A.

resmon_exe

B.

dfrgui_exe

C.

msinf032exe

D.

msconfig_exe

Buy Now
Questions 212

Which of the following would typically require the most computing resources from the host computer?

    Chrome OS

Options:

A.

Windows

B.

Android

C.

macOS

D.

Linux

Buy Now
Questions 213

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?

Options:

A.

Educate the end user on best practices for security.

B.

Quarantine the host in the antivirus system.

C.

Investigate how the system was infected with malware.

D.

Create a system restore point.

Buy Now
Questions 214

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

Options:

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

Buy Now
Questions 215

After a security event, a technician removes malware from an affected laptop and disconnects the laptop from the network. Which of the following should the technician do to prevent the operating system from automatically returning to an infected state?

Options:

A.

Enable System Restore.

B.

Disable System Restore.

C.

Enable antivirus.

D.

Disable antivirus.

E.

Educate the user.

Buy Now
Questions 216

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

Options:

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

Buy Now
Questions 217

Which of the following commands can a technician use to get the MAC address of a Linux distribution?

    net use

Options:

A.

ifconfig

B.

netstat

C.

ping

Buy Now
Questions 218

Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?

Options:

A.

Professional

B.

Home

C.

Enterprise

D.

Embedded

Buy Now
Questions 219

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

Options:

A.

Reinstall the application on the smartphone.

B.

Update the smartphone's OS.

C.

Reset the smartphone to factory settings.

D.

Reboot the smartphone.

Buy Now
Questions 220

Which of the following does MFA provide?

Options:

A.

Security enhancement

B.

Encryption

C.

Digital signature

D.

Public key infrastructure

Buy Now
Questions 221

A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?

Options:

A.

cat

B.

chmod

C.

pwd

D.

cacls

Buy Now
Questions 222

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

Options:

A.

Device drivers

B.

Keyboard backlight settings

C.

Installed application license keys

D.

Display orientation

E.

Target device power supply

F.

Disabling express charging

Buy Now
Questions 223

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

Options:

A.

Remote Assistance

B.

Remote Desktop Protocol

C.

Screen Sharing

D.

Virtual Network Computing

Buy Now
Questions 224

A change advisory board authorized a setting change so a technician is permitted to implement the change. The technician successfully implemented the change. Which of the following should be done NEXT?

Options:

A.

Document the date and time of change.

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document findings of the sandbox test.

Buy Now
Questions 225

A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?

Options:

A.

Boot order

B.

Malware

C.

Drive failure

D.

Windows updates

Buy Now
Questions 226

A company acquired a local office, and a technician is attempting to join the machines at the office to the local domain. The technician notes that the domain join option appears to be missing. Which of the following editions of Windows is MOST likely installed on the machines?

Options:

A.

Windows Professional

B.

Windows Education

C.

Windows Enterprise

D.

Windows Home

Buy Now
Exam Code: 220-1102
Exam Name: CompTIA A+ Certification Core 2 Exam
Last Update: Nov 15, 2024
Questions: 756
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 220-1102