New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA 220-1002 Dumps Questions Answers

Page: 1 / 25
Total 665 questions

CompTIA A+ Certification Exam: Core 2 Questions and Answers

Question 1

A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.

Which of the following should the technician attempt NEXT?

Options:

A.

Reboot into safe mode and roll back the updates

B.

Repair the Windows Registry

C.

Configure boot options in the BIOS

D.

Disable Windows services and applications

Buy Now
Question 2

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hot-spot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hot-spot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hot-spot on her phone, and the speed test result on that hot-spot is 15Mbps. The technician checks the hot-spot settings on Joe’s phone and sees the following:

Which of the following is the MOST likely cause of the problem?

Options:

A.

Joe should be using WEP security on his hot-spot for faster throughput

B.

Someone else is using Joe’s hot-spot due to weak password

C.

Joe’s hot-spot gave him an invalid IP address

D.

Joe is likely in a poor signal area and should try another area

Question 3

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?

Options:

A.

BranchCache

B.

Swap partition

C.

Domain access

D.

Proxy server

Question 4

Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?

Options:

A.

Contact his supervisor so the supervisor can make schedule changes.

B.

Move the appoints to the next business day.

C.

Reach out to a colleague to assist in completing the jobs.

D.

Continue to work on the current call, and get to the others as soon as possible.

Question 5

A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?

Options:

A.

Disable System Restore.

B.

Create a restore point.

C.

Apply system updates.

D.

Restart into safe mode.

Question 6

Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is the MOST likely cause of this issue?

Options:

A.

Files disappearing

B.

File permission changes

C.

Application crash

D.

Too many start items

Question 7

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.

The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.

The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.

Make sure to maintain a consistent file system.

INSTRUCTIONS:

Conduct the necessary steps within the Disk Manager to accomplish these tasks.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 8

A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP. Which of the following would be the NEXT appropriate act?

Options:

A.

Promptly notify the administrator’s immediate supervisor

B.

Rename the folder on the server, and notify the information security officer

C.

Move the folder to another location on the server, and notify the local authorities

D.

Ask the owner to move the files from the server to a local computer

Question 9

A technician is installing the latest OS on a user’s system. The user wants all of the settings and file to remain intact during the installation.

Which of the following upgrade methods should the technician use?

Options:

A.

network installation

B.

clean install

C.

in-place upgrade

D.

image deployment

Question 10

A manager with a restricted user account receives the following error message:

Windows Update cannot currently check for updates because the service is not running.

The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem. Which of the following should the technician do NEXT?

Options:

A.

Reboot the computer

B.

Restart the network services

C.

Roll back the device drivers

D.

Rebuild the Windows profiles

Question 11

In which of the following file extension types would a user expect to see the command. “net use T:\ \server\files’?

Options:

A.

.bat

B.

.vbs

C.

.js

D.

.py

Question 12

Which of the following is the memory limitation of a 32-bit OS?

Options:

A.

16MB

B.

2048MB

C.

4GB

D.

1024GB

E.

2TB

F.

8TB

Question 13

After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)

Options:

A.

Screen locks

B.

Screensaver passwords

C.

UEFI passwords

D.

Login time restrictions

E.

Strong passwords

F.

Multifactor authentication

G.

BitLocker

Question 14

A user’s computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic. Which of the following is MOST likely causing the high resource usage?

Options:

A.

A keylogger is running

B.

The computer is part of a botnet.

C.

The computer is receiving a DDOS attack

D.

A software is blocking traffic

Question 15

Which of the following types of scripts would be seen on the user end of a web page?

Options:

A.

.bat

B.

.js

C.

.sh

D.

.vbs

Question 16

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.

Which of the following account types would the technician MOST likely set up on this kiosk machine?

Options:

A.

Guest

B.

Administrator

C.

Power User

D.

Remote Desktop User

Question 17

A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task?

Options:

A.

Drill

B.

Hammer

C.

Low-level format

D.

Degaussing

Question 18

A sales representative regularly modifies confidential files on a laptop and needs them to be available all the time. The sales representative will be on a six-month business trip in two weeks. A technician has been asked to assist the sales representative with saving files.

Which of the following is the BEST method to implement to prevent any data loss for the sales representative?

Options:

A.

Give the sales representative a USB security lock.

B.

Encrypt the laptop’s image on the server.

C.

Create a redundant cloud storage drive.

D.

Give the sales representative an external hard drive.

Question 19

A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.)

Options:

A.

Remove any proxy servers configured on the user’s browsers.

B.

Assist the user with purchasing an SSL certificate and save the certificate to the desktop.

C.

Disable the SPI firewall on the office’s gateway and any other routers.

D.

Instruct the user to ignore the certificate error since the user is connecting to a secure website.

E.

Create an outbound rule in Windows Firewall named after the user’s homepage.

F.

Run anti-malware scans and download the latest Windows updates.

Question 20

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

Options:

A.

Put on an ESD strap.

B.

Place components on an ESD mat

C.

Disconnect the power before servicing the PC

D.

Place the PC on a grounded work bench

Question 21

A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

Options:

A.

Telnet

B.

SSH

C.

RDP

D.

VNC

Question 22

Which of the following is the MOST secure wireless security protocol?

Options:

A.

AES

B.

WPA

C.

WPA2

D.

WEP

Question 23

A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.

Which of the following would MOST likely fix the issue?

Options:

A.

Roll back updates

B.

Disable the Windows Update service

C.

Check for updates

D.

Restore hidden updates

Question 24

A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

Options:

A.

Uninstall the camera application

B.

Check the application permissions

C.

Reset the phone to factory settings

D.

Update all of the applications on the phone

E.

Run any pending OS updates

Question 25

With which of the following types is a man-in-the-middle attack associated?

Options:

A.

Brute force

B.

Spoofing

C.

DDoS

D.

Zero-day

Question 26

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network Which of the following best practices could have prevented the attack?

Options:

A.

Implementing strong passwords

B.

Changing default credentials

C.

Disabling AutoRun

D.

Removing Guest account

E.

Encrypting data

Question 27

A network administrator has noticed unusual activity with a user’s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.

Which of the following should the network administrator do NEXT?

Options:

A.

Delete the user’s AD account.

B.

Decrease the user’s AD privileges.

C.

Disable the user’s AD account.

D.

Reset the password on the user’s AD account.

Question 28

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

Options:

A.

SSO

B.

Permission propagation

C.

Inheritance

D.

MFA

Question 29

A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

Options:

A.

Fingerprint lock

B.

Passcode lock

C.

Swipe lock

D.

PIN lock

Question 30

Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS.

Which of the following can Joe do to ensure the backups will work if needed?

Options:

A.

Frequently restore the servers from backup files and test them

B.

Configure the backups to restore to virtual machines for quick recovery

C.

Set up scripts that automatically rerun failed backup jobs

D.

Set up alerts to let administrators know when backups fail

E.

Store copies of the backups off-side in a secure datacenter

Question 31

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

Options:

A.

System

B.

Display

C.

Folder Options

D.

Indexing Options

Question 32

A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?

Options:

A.

Reset the device’s network settings

B.

Check the data usage statistics on the device

C.

Verify the SSID with which the device is associated

D.

Run any pending application or OS updates

Question 33

A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on ot the device and opens terminal. Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?

Options:

A.

Pad and chmod

B.

Node and vi

C.

Is an chown

D.

Ps and kill

E.

Op and rm

Question 34

A Microsoft application will not open when a user clicks on it. Instead, the following error message pops up: This application has crashed. Would you like to send an error report to Microsoft? Which of the following should the user try FIRST to resolve this issue?

Options:

A.

Open the application with administrative privileges.

B.

Open a run command and then type the application name.

C.

Reboot the computer into safe mode and try to open the program.

D.

Uninstall the program after saving any associated data and reinstall the program.

Question 35

A user contains the help desk the restore an application that was lost when a System Restore was performed last week. A technician development the application was emitted to the user from an unknown source and downloaded from a link in the email. Which of the following should the technician do NEXT?

Options:

A.

Educate the user.

B.

Reboot the computer.

C.

Update the anti-malware software.

D.

Update the antivirus software.

Question 36

A customer keeps receiving the following message: Website blocked due to PUP. The customer asks a technician to resolve the issue immediately. Which of the following should the technician do to help resolve the customer’s issue?

Options:

A.

Check the customer’s computer for a rogue antivirus.

B.

Update the antivirus software and run a scan.

C.

Advise the customer to not revisit the website.

D.

Enable pop-ups for the website the customer is attempting to visit.

Question 37

A help desk technician needs to make administrative changes securely on a remote user's machine. The user must be logged off when the changes are made. Which of the following tools would the technician MOST likely use?

Options:

A.

RDP

B.

Virtual network computing

C.

Microsoft Remote Assistance

D.

SFTP

Question 38

A user wants a phone with an operating system that is highly customizable. Which of the following operating systems will a technician MOST likely recommend?

Options:

A.

Windows Mobile

B.

Android

C.

Fire OS

D.

iOS

Question 39

A technician connected to a network switch remotely from a workstation. During an audit, a security analyst discovered the technician transmitted the username and password in plaintext over the network. Which of the following remote access technologies did the technician use to connect?

Options:

A.

Telnet

B.

SSH

C.

SFTP

D.

RDP

Question 40

A user’s mobile device has slow data speeds. The user first noticed the slow speeds after downloading a large

application to the device. The application download MOST likely caused:

Options:

A.

a hardware issue on the device.

B.

the device to run more slowly.

C.

the user to exceed the monthly data limit.

D.

the device to change to WiFi settings.

Question 41

A user is trying to find a file that contains a specific string on a Linux workstation. The user locates the file and then needs to navigate to another directory to work with it. Which of the following commands should the user enter

to accomplish both of these tasks? (Select TWO).

Options:

A.

grep

B.

chmod

C.

=rm

D.

pwd

E.

sudo

F.

cd

Question 42

A technician plugs a 16GB jump drive into a Windows PC, and it has multiple smaller partitions that are unwritable. Which of the following single DiskPart commands can be used to restore the drive, allowing it to be formatted to full capacity?

Options:

A.

extend

B.

merge

C.

clean

D.

repair

Question 43

Which of the following is an example of PHI?

Options:

A.

Phone number

B.

Credit card number

C.

Salary information

D.

Employer information

Question 44

Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Question 45

A technician is setting up network adapter settings on Windows clients that have static IP address assignments. The technician has more than 100 workstation to complete and wants to automate the process. The requirements for the adapter settings are as follows:

* They must utilize a command line utility

* The technician has no access to Group Policy

* All workstation should have an IP address assigned by the DHCP.

Which of the following steps should the technician perform to meet these requirements?

Options:

A.

Use the ipconfig/release and ipconfig /renev command to have the workstation contact the DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

B.

Use the petsh command to reset the workstation adapter. Then use the ipconfig /renew command to use DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

C.

Use the net use command to view active connection on the network. Then use the ipconf /renew command to use DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

D.

Use the netstat command to find connections on the workstation adapter. Then use the ipconf /renew command to use DHCP for a new lease. Place these two commands in a .bat file to execute on all systems.

Question 46

A user tries to open a client/server application, but a prompt appears for the username and password The user is able to open and use the email client with no issues. The user's workstation is a loaner laptop Everyone at the company is given administrator rights on their individual workstations. Which of the following is MOST likely preventing the user from running this program?

Options:

A.

EFS

B.

NTFS

C.

UTP

D.

UAC

Question 47

A user’s company phone was recently wiped. The user Is unsure if an IT administrator wiped the phone or if it was the result of a hacking attempt. A new company policy was recently implemented to tighten security. The new

policy requirements include:

* An allowance for the remote wiping of company data

* PIN unlock

* Failed-attempt device wiping

‘The user normally keeps the phone in a pocket, so it is unlikely that anyone else had access to It. Which of the following is the MOST likely cause of the device being wiped?

Options:

A.

Unauthorized remote access

B.

A system lockout

C.

A virus

D.

A faulty device

Question 48

A technician is setting up a SOHO router for a customer. Per the customer’s requirements, data security is the highest priority. Which of the following provides the MOST security for the network?

Options:

A.

Set up encryption for wireless

B.

Set up port forwarding.

C.

Set static IP addresses.

D.

Change the default SSID.

Question 49

A user calls the help desk to report an issue accessing a new application on a Windows PC When the user tries to launch the application, an error message appears and then quietly disappears before the user can read it, Which of the following protocols would a technician MOST likely use to help diagnose this issue?

Options:

A.

FTP

B.

ROP

C.

SNWP

D.

SSH

Question 50

A user received a brand new mobile device about six months ago. The device is now running very slowly and is

hotter than normal, and certain applications crash when they are started.

Which of the following are the BEST options for troubleshooting this phone? (Choose two.)

Options:

A.

Check for any applications that are running and stop them.

B.

Check the device's battery and replace it.

C.

Check the smartphone's screen and replace it.

D.

Check the smartphone's charging cable to ensure it is working properly.

E.

Check for any unnecessary applications and uninstall them.

F.

Check for any OS updates and install them.

Question 51

Which of the following is a risk to computer equipment when the humidity is low?

Options:

A.

Static discharge

B.

Corrosion

C.

Frequent brownouts

D.

Increased dust

Question 52

A user opens a phishing email and types logon credentials into a fake banking website. The computer’s antivirus software then reports it has quarantined several temporary Internet files. A technician disconnects the computer from the network. Which of the following should the technician perform NEXT?

Options:

A.

Have the user change the password.

B.

Update the antivirus software and run scans.

C.

Disable the user’s local computer account.

D.

Quarantine the phishing email.

Question 53

Which of the following has the ability to allow or deny POP3 traffic on the firewall?

Options:

A.

Email filtering

B.

MAC filtering

C.

Port security

D.

Access control list

Question 54

Which of the following tools should the technician use to analyze the computer's behavior?

Options:

A.

Computer Management

B.

Event Viewer

C.

Performance Monitor

D.

Task Manager

Question 55

A technician has enabled port security on a switchport. Which of the following BEST describes the effect this will have?

Options:

A.

Devices must match a list of allowed MAC addresses before accessing the network

B.

Devices need to conform to the policies set forth by the MDM software

C.

Data loss prevention software will be monitoring for data exfiltration on the port.

D.

A firewall is actively monitoring the network traffic using heuristic analysis.

Question 56

An administrator is creating a new user account and wants to grant access to only the resources required to perform the user's assigned job duties. Which of the following will the administrator MOST likely use?

Options:

A.

Access control lists

B.

Multifactor authentication

C.

Directory permissions

D.

Principle of least privilege

Question 57

A user's mobile device appears to lose connectivity only in certain areas. The device works normally when II is not in those areas, and the user has determined that a cellular signal is available In the areas where the connectivity is lost Which of the following should be considered?

Options:

A.

Unintended W1F1 connection

B.

Unauthorized location tracking

C.

Data transmission over set limit

D.

Unintended Bluetooth pairing

Question 58

A user received a call from a bank to confirm a wire transfer; however, the user created no such request. While

troubleshooting, a technician discovers there are rules on the user’s account that are forwarding the emails to

an external email address and deleting the emails from the bank.

This is an example of:

Options:

A.

spam email.

B.

invalid certificates.

C.

hijacked email.

D.

browser pop-ups.

Question 59

A technician needs to ensure users are prompted or warned when an installation takes place on a Windows system. Which of the following would meet this requirement?

Options:

A.

Educate the user to run the installation with runas.

B.

Add the user to the local administrators group.

C.

Enable UAC on the workstation.

D.

Log in as the administrator to install the application.

Question 60

A technician Is completing the documentation for a major OS upgrade of a Linux distribution that will impact a company's web services. The technician finishes the risk assessment and documents the change process. Which of the following should the technician complete NEXT?

Options:

A.

Scope of the change

B.

Back-out plan

C.

Purpose of the change

D.

Change request

Question 61

A customer is planning to recycle a computer. The customer wants to ensure any personal data on the computer is no longer recoverable, but the hardware must will still the be useable. Which of the following is the BEST method to dispose of the customer’s data?

Options:

A.

OS reinstallation

B.

TPM configuration

C.

Low-level format

D.

Drive incineration

Question 62

A user’s desktop will not run an accounting program. The program’s splash screen pops up, and then the software freezes. Which of the following actions should a technician take FIRST to help resolve the issue?

Options:

A.

Uninstall, reinstall, and restart the application.

B.

Reseat the memory.

C.

Ensure the PC meets the minimum requirements.

D.

Reset the PC display settings.

Question 63

A Chief Financial Officer (CFO) who is returning from vacation notices several emails from the Chief Executive Officer (CEO) requesting funds be transferred immediately. The CFO replies that the funds will be transferred, but the CEO responds that there was never a request for funds to be transferred. Which of the following MOST likely happened?

Options:

A.

Shadow IT

B.

Hijacking

C.

Malware

D.

Virus

E.

Spear phishing

Question 64

Options:

A.

user ran updates on a Windows computer recently. Since then, the external CD drive no longer reads discs. The user has connected the external drive to another computer that has not been updated and then successfully ran the discs. Which of the following should the user do to fix the issue?

B.

Upgrade the drive.

C.

Replace the discs.

D.

Roll back the drivers.

D Reinstall the firmware.

Question 65

A technician replaced the hard drive for the organization's Chief Financial Officer (CFO). The technician wants to reuse the old drive in another system, Which of the following actions would be MOST appropriate?

Options:

A.

Format the drive.

B.

Degauss the drive.

C.

Wipe the drive.

D.

Drill the drive.

E.

Shred the drive.

Question 66

Which of the following are methods used to prevent an unauthorized computer from establishing a connection as a node on a corporate network? (Select TWO.)

Options:

A.

Port security

B.

Anti-malware

C.

Certificate

D.

IDS

E.

Firewall

F.

Captive portal

Question 67

A technician is in the process of removing a recently discovered Trojan horse application from a users laptop. Which of the following should the technician complete to prevent reinfection of the same machine?

Options:

A.

Reenable Windows System Restore after rebooting the device

B.

Research the symptoms to identify the threat.

C.

Update the operating system and anti-malware signatures.

D.

Isolate the infected machine from all networks.

Question 68

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

INSTRUCTIONS

Select the MOST appropriate statement for each response.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Let’s take a look at your phone settings.

Please change the port number on your mail settings to 993.

Which of the following should be done NEXT?

Options:

A.

Close the ticket out

B.

Educate the user on the solution that was performed

C.

Tell the user to take time to fix it themselves next time

D.

Send an email to Telecom to inform them of the issue and prevent reoccurrence

Question 69

A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT?

Options:

A.

Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.

B.

Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed.

C.

Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video card vendor.

D.

Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.

Question 70

A technician is troubleshooting a computer that may have some corrupt operating system files. Which of the following command line tools should the technician use to check these files?

Options:

A.

dism

B.

chkdsk

C.

diskpart

D.

sfc

Question 71

A corporate fileshare holds files for multiple departments. Individual users in each department create reports

that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that

encrypted all of the documents on the fileshare. The software asked for money to be transferred via

cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the

ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?

Options:

A.

Enable System Restore on the file server and make frequent restore points.

B.

Disable full disk encryption on the file server.

C.

Install a next-generation firewall at the network edge.

D.

Use a host-based intrusion detection system and continuously monitor filesystem changes.

E.

Use granular file permissions on the share and follow the principle of least privilege.

Question 72

A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen Which of the following should the technician instruct the user to do FIRST?

Options:

A.

Ignore the message as a false positive

B.

Shut down and restart the computer.

C.

Unplug the Ethernet cable.

D.

Follow the onscreen instructions to remove the malware

Question 73

Which of the following Is the MOST cost-effective option to protect computers and peripherals from damage caused by power fluctuations?

Options:

A.

Generator

B.

Battery backup

C.

Surge suppressor

D.

Line conditioner

Question 74

A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help desk team recommend the user do in this situation?

Options:

A.

After granting these permissions, disable the camera and GPS

B.

Install the application and change the permissions later

C.

Cancel installation of the application and report it to the application source

D.

Accept these permission requests and install the application

Question 75

When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?

Options:

A.

Certificates

B.

Software tokens

C.

Firewall

D.

Port security

Question 76

A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users’ computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose two.)

Options:

A.

Risk analysis

B.

End-user acceptance

C.

Backout plan

D.

Plan for change

E.

Business processes

F.

Request for proposal

Question 77

A user recently connected a Windows laptop to a free WiFi hot-spot. After returning to the office, the user cannot access network shares. Which of the following is the MOST likely cause?

Options:

A.

Remote access has been disabled.

B.

The local firewall settings are incorrect.

C.

Location-based settings are not turned on.

D.

The network shares are hidden.

Question 78

A user browses to a company's Intranet page and receives an invalid certificate message A technician discovers the certificate has expired A new certificate is put In place and Installed on the user's computer; however, the user still receives the same message when going to the Intranet page The technician tries with a third-party browser and connects without error The technician needs to make sure the old certificate is no longer used in Internet Explorer. Which of the following Internet Options should the technician use to ensure the old certificate is removed'?

Options:

A.

Advanced

B.

Clear SSL state

C.

Publishers

D.

Certificates

Question 79

A user is unable to open a document on a shared drive from a Linux workstation. Which of the following commands would help the user gain access to the document?

Options:

A.

chmod

B.

lfconfig

C.

pwd

D.

grep

Question 80

A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business?

Options:

A.

Plan for the change

B.

Scope of the change

C.

Risk analysis of the change

D.

Documentation of the change

Question 81

Several mobile users are reporting issues connecting to the WLAN within a warehouse. A technician tests wireless connectivity in the lobby and is able to connect successfully. Mobile users can connect to the Internet using cellular service, but they cannot access any internal resources on the WLAN The technician received alerts of devices failing throughout the network due to a power outage Which of the following is MOST likely causing the wireless issues?

Options:

A.

SSID is configured to not broadcast.

B.

The system locked out for all wireless users.

C.

The DHCP scope for WLAN is full

D.

The WAP in the warehouse is down

Question 82

A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices such as a mouse or a printer, and a reboot did not fix the problem Which of the following would MOST likely fix the issue?

Options:

A.

Roll back updates.

B.

Disable the Windows Update service

C.

Check for updates

D.

Restore hidden updates

Question 83

Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?

Options:

A.

Update limitations

B.

Limited access

C.

End-of-life

D.

Network connection

Question 84

Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications?

Options:

A.

Create a static DNS entry on the server for the PC

B.

Change her NIC IP address to dynamic

C.

Create a new exception on her local firewall

D.

Make sure the PC’s IP is in the management VLAN

Question 85

Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Question 86

A customer built a computer with the following specifications:

Single hexa-core processor

8GB DDR4 memory

256GB SSD drive

Built-in graphics card

32-bit Windows OS

Audio editing software

The computer seems to be working, but the OS reports only 3.5GB of RAM is available. Which of the following

would correct the issue?

Options:

A.

16GB DDR4 memory

B.

64-bit Windows OS

C.

Dual hexa-core processors

D.

512GB SSD drive

Question 87

A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings.

Which of the following Control Panel utilities should the technician use to accomplish this task?

Options:

A.

Network and Sharing Center

B.

Sync Center

C.

Credential Manager

D.

User Accounts

Question 88

An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application?

Options:

A.

Network-based

B.

Client/server

C.

Application streaming

D.

Peer-to-peer

Question 89

A technician is securing a server room by implementing a two-factor authentication solution Which of the following should the technician implement to provide the BEST security for the server room?

Options:

A.

Door lock and mantrap

B.

Server lock and badge reader

C.

Security guard and entry control roster

D.

Biometric lock and hardware token

Question 90

A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform FIRST?

Options:

A.

Change the default SSID

B.

Enable MAC filtering

C.

Update the firmware

D.

Set encryption

Question 91

While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?

Options:

A.

Reimage the machine from a network share

B.

Change the boot order and boot to an external drive

C.

Remove and then replace the CMOS battery

D.

Use the BIOS user password to reset the supervisor password

Question 92

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

Options:

A.

Inventory management policy

B.

Knowledge base articles

C.

End-user acceptance document

D.

Acceptable use policy

E.

Incident documentation

F.

Network diagrams

Question 93

Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Question 94

A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime?

Options:

A.

Only a surge protector is needed due to the backup generator

B.

Plug directly into the emergency power source

C.

Plug a surge protector directly into the UPS

D.

Connect to a UPS that utilizes the emergency power source

Question 95

A smartphone user receives notice that a threshold for high-speed data usage, despite the user’s usage

behaviors being unchanged from previous periods. Which of the following troubleshooting steps should the user take FIRST?

Options:

A.

Check network access permissions on recently loaded applications.

B.

Limit data usage to WiFi networks only.

C.

Wipe the device and restore to the factory default.

D.

Change the lock screen password.

Question 96

A customer brings an old PC to a computer repair shop and asks for advice with regard to its repair or

replacement. The PC has numerous errors during the boot process and is running a very outdated operating

system. Which of the following should the technician do?

Options:

A.

Ask if the customer would like to donate the PC to a school

B.

Offer to sell a slightly newer computer to the customer

C.

Work on the computer and bill the customer for the time

D.

Advise the customer that the cost of repair is more than a new PC

Question 97

Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some

websites, and web services are not responding from any of the web browsers, although Joe can access these

services from his smartphone without issue. The computer’s malware scanner has the latest definitions

installed. Which of the following would BEST explain why the computer is functioning this way?

Options:

A.

Expired root certificate

B.

OS update failures

C.

Pop-up blocker

D.

Hijacked email

Question 98

A technology team is creating limits and guidelines for the use of company-provided software, equipment, and

Internet access. Which of the following policies is needed?

Options:

A.

Password policy

B.

Acceptable use policy

C.

Regulatory policy

D.

Compliance policy

Question 99

A customer's smartphone has been overheating frequently and becoming unresponsive since installing an OS update A technician has already performed a soft reboot of the device. Which of the following should the technician perform NEXT? (Select TWO)

Options:

A.

Roll back the OS update

B.

Update the PRL.

C.

Force stop running applicabons

D.

Enable airplane mode

E.

Perform a factory reset

F.

Run application updates

G.

Reset network settings

Page: 1 / 25
Total 665 questions