A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.
Which of the following should the technician attempt NEXT?
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hot-spot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hot-spot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hot-spot on her phone, and the speed test result on that hot-spot is 15Mbps. The technician checks the hot-spot settings on Joe’s phone and sees the following:
Which of the following is the MOST likely cause of the problem?
Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?
Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?
A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?
Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is the MOST likely cause of this issue?
A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.
The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.
The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.
Make sure to maintain a consistent file system.
INSTRUCTIONS:
Conduct the necessary steps within the Disk Manager to accomplish these tasks.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP. Which of the following would be the NEXT appropriate act?
A technician is installing the latest OS on a user’s system. The user wants all of the settings and file to remain intact during the installation.
Which of the following upgrade methods should the technician use?
A manager with a restricted user account receives the following error message:
Windows Update cannot currently check for updates because the service is not running.
The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem. Which of the following should the technician do NEXT?
In which of the following file extension types would a user expect to see the command. “net use T:\ \server\files’?
Which of the following is the memory limitation of a 32-bit OS?
After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled. Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)
A user’s computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic. Which of the following is MOST likely causing the high resource usage?
Which of the following types of scripts would be seen on the user end of a web page?
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.
Which of the following account types would the technician MOST likely set up on this kiosk machine?
A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task?
A sales representative regularly modifies confidential files on a laptop and needs them to be available all the time. The sales representative will be on a six-month business trip in two weeks. A technician has been asked to assist the sales representative with saving files.
Which of the following is the BEST method to implement to prevent any data loss for the sales representative?
A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.)
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?
A company has hired a new IT firm to manage its network switches and routers.
The firm is geographically separated from the company and will need to able to securely access the devices.
Which of the following will provide the ability to access these devices?
Which of the following is the MOST secure wireless security protocol?
A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.
Which of the following would MOST likely fix the issue?
A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?
With which of the following types is a man-in-the-middle attack associated?
A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network Which of the following best practices could have prevented the attack?
A network administrator has noticed unusual activity with a user’s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.
Which of the following should the network administrator do NEXT?
Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?
A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?
Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS.
Which of the following can Joe do to ensure the backups will work if needed?
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?
A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?
A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on ot the device and opens terminal. Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?
A Microsoft application will not open when a user clicks on it. Instead, the following error message pops up: This application has crashed. Would you like to send an error report to Microsoft? Which of the following should the user try FIRST to resolve this issue?
A user contains the help desk the restore an application that was lost when a System Restore was performed last week. A technician development the application was emitted to the user from an unknown source and downloaded from a link in the email. Which of the following should the technician do NEXT?
A customer keeps receiving the following message: Website blocked due to PUP. The customer asks a technician to resolve the issue immediately. Which of the following should the technician do to help resolve the customer’s issue?
A help desk technician needs to make administrative changes securely on a remote user's machine. The user must be logged off when the changes are made. Which of the following tools would the technician MOST likely use?
A user wants a phone with an operating system that is highly customizable. Which of the following operating systems will a technician MOST likely recommend?
A technician connected to a network switch remotely from a workstation. During an audit, a security analyst discovered the technician transmitted the username and password in plaintext over the network. Which of the following remote access technologies did the technician use to connect?
A user’s mobile device has slow data speeds. The user first noticed the slow speeds after downloading a large
application to the device. The application download MOST likely caused:
A user is trying to find a file that contains a specific string on a Linux workstation. The user locates the file and then needs to navigate to another directory to work with it. Which of the following commands should the user enter
to accomplish both of these tasks? (Select TWO).
A technician plugs a 16GB jump drive into a Windows PC, and it has multiple smaller partitions that are unwritable. Which of the following single DiskPart commands can be used to restore the drive, allowing it to be formatted to full capacity?
Which of the following is an example of PHI?
Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?
A technician is setting up network adapter settings on Windows clients that have static IP address assignments. The technician has more than 100 workstation to complete and wants to automate the process. The requirements for the adapter settings are as follows:
* They must utilize a command line utility
* The technician has no access to Group Policy
* All workstation should have an IP address assigned by the DHCP.
Which of the following steps should the technician perform to meet these requirements?
A user tries to open a client/server application, but a prompt appears for the username and password The user is able to open and use the email client with no issues. The user's workstation is a loaner laptop Everyone at the company is given administrator rights on their individual workstations. Which of the following is MOST likely preventing the user from running this program?
A user’s company phone was recently wiped. The user Is unsure if an IT administrator wiped the phone or if it was the result of a hacking attempt. A new company policy was recently implemented to tighten security. The new
policy requirements include:
* An allowance for the remote wiping of company data
* PIN unlock
* Failed-attempt device wiping
‘The user normally keeps the phone in a pocket, so it is unlikely that anyone else had access to It. Which of the following is the MOST likely cause of the device being wiped?
A technician is setting up a SOHO router for a customer. Per the customer’s requirements, data security is the highest priority. Which of the following provides the MOST security for the network?
A user calls the help desk to report an issue accessing a new application on a Windows PC When the user tries to launch the application, an error message appears and then quietly disappears before the user can read it, Which of the following protocols would a technician MOST likely use to help diagnose this issue?
A user received a brand new mobile device about six months ago. The device is now running very slowly and is
hotter than normal, and certain applications crash when they are started.
Which of the following are the BEST options for troubleshooting this phone? (Choose two.)
Which of the following is a risk to computer equipment when the humidity is low?
A user opens a phishing email and types logon credentials into a fake banking website. The computer’s antivirus software then reports it has quarantined several temporary Internet files. A technician disconnects the computer from the network. Which of the following should the technician perform NEXT?
Which of the following has the ability to allow or deny POP3 traffic on the firewall?
Which of the following tools should the technician use to analyze the computer's behavior?
A technician has enabled port security on a switchport. Which of the following BEST describes the effect this will have?
An administrator is creating a new user account and wants to grant access to only the resources required to perform the user's assigned job duties. Which of the following will the administrator MOST likely use?
A user's mobile device appears to lose connectivity only in certain areas. The device works normally when II is not in those areas, and the user has determined that a cellular signal is available In the areas where the connectivity is lost Which of the following should be considered?
A user received a call from a bank to confirm a wire transfer; however, the user created no such request. While
troubleshooting, a technician discovers there are rules on the user’s account that are forwarding the emails to
an external email address and deleting the emails from the bank.
This is an example of:
A technician needs to ensure users are prompted or warned when an installation takes place on a Windows system. Which of the following would meet this requirement?
A technician Is completing the documentation for a major OS upgrade of a Linux distribution that will impact a company's web services. The technician finishes the risk assessment and documents the change process. Which of the following should the technician complete NEXT?
A customer is planning to recycle a computer. The customer wants to ensure any personal data on the computer is no longer recoverable, but the hardware must will still the be useable. Which of the following is the BEST method to dispose of the customer’s data?
A user’s desktop will not run an accounting program. The program’s splash screen pops up, and then the software freezes. Which of the following actions should a technician take FIRST to help resolve the issue?
A Chief Financial Officer (CFO) who is returning from vacation notices several emails from the Chief Executive Officer (CEO) requesting funds be transferred immediately. The CFO replies that the funds will be transferred, but the CEO responds that there was never a request for funds to be transferred. Which of the following MOST likely happened?
A technician replaced the hard drive for the organization's Chief Financial Officer (CFO). The technician wants to reuse the old drive in another system, Which of the following actions would be MOST appropriate?
Which of the following are methods used to prevent an unauthorized computer from establishing a connection as a node on a corporate network? (Select TWO.)
A technician is in the process of removing a recently discovered Trojan horse application from a users laptop. Which of the following should the technician complete to prevent reinfection of the same machine?
An executive has contacted you through the help-desk chat support about an issue with a mobile device.
Assist the executive to help resolve the issue.
INSTRUCTIONS
Select the MOST appropriate statement for each response.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Let’s take a look at your phone settings.
Please change the port number on your mail settings to 993.
Which of the following should be done NEXT?
A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT?
A technician is troubleshooting a computer that may have some corrupt operating system files. Which of the following command line tools should the technician use to check these files?
A corporate fileshare holds files for multiple departments. Individual users in each department create reports
that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that
encrypted all of the documents on the fileshare. The software asked for money to be transferred via
cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the
ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?
A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen Which of the following should the technician instruct the user to do FIRST?
Which of the following Is the MOST cost-effective option to protect computers and peripherals from damage caused by power fluctuations?
A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help desk team recommend the user do in this situation?
When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?
A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users’ computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose two.)
A user recently connected a Windows laptop to a free WiFi hot-spot. After returning to the office, the user cannot access network shares. Which of the following is the MOST likely cause?
A user browses to a company's Intranet page and receives an invalid certificate message A technician discovers the certificate has expired A new certificate is put In place and Installed on the user's computer; however, the user still receives the same message when going to the Intranet page The technician tries with a third-party browser and connects without error The technician needs to make sure the old certificate is no longer used in Internet Explorer. Which of the following Internet Options should the technician use to ensure the old certificate is removed'?
A user is unable to open a document on a shared drive from a Linux workstation. Which of the following commands would help the user gain access to the document?
A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business?
Several mobile users are reporting issues connecting to the WLAN within a warehouse. A technician tests wireless connectivity in the lobby and is able to connect successfully. Mobile users can connect to the Internet using cellular service, but they cannot access any internal resources on the WLAN The technician received alerts of devices failing throughout the network due to a power outage Which of the following is MOST likely causing the wireless issues?
A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices such as a mouse or a printer, and a reboot did not fix the problem Which of the following would MOST likely fix the issue?
Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?
Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications?
Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?
A customer built a computer with the following specifications:
Single hexa-core processor
8GB DDR4 memory
256GB SSD drive
Built-in graphics card
32-bit Windows OS
Audio editing software
The computer seems to be working, but the OS reports only 3.5GB of RAM is available. Which of the following
would correct the issue?
A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings.
Which of the following Control Panel utilities should the technician use to accomplish this task?
An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application?
A technician is securing a server room by implementing a two-factor authentication solution Which of the following should the technician implement to provide the BEST security for the server room?
A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform FIRST?
While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?
A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)
Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?
A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime?
A smartphone user receives notice that a threshold for high-speed data usage, despite the user’s usage
behaviors being unchanged from previous periods. Which of the following troubleshooting steps should the user take FIRST?
A customer brings an old PC to a computer repair shop and asks for advice with regard to its repair or
replacement. The PC has numerous errors during the boot process and is running a very outdated operating
system. Which of the following should the technician do?
Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some
websites, and web services are not responding from any of the web browsers, although Joe can access these
services from his smartphone without issue. The computer’s malware scanner has the latest definitions
installed. Which of the following would BEST explain why the computer is functioning this way?
A technology team is creating limits and guidelines for the use of company-provided software, equipment, and
Internet access. Which of the following policies is needed?
A customer's smartphone has been overheating frequently and becoming unresponsive since installing an OS update A technician has already performed a soft reboot of the device. Which of the following should the technician perform NEXT? (Select TWO)