Jason Dion CompTIA A+ core 2 exam (Questions I missed)

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

A user's workstation is running slowly and cannot open some larger program files. The user complains that they often get a warning that states memory is running low on their Windows 10 workstation. Which of the following should you configure until more memory can be installed to help alleviate this problem?

  • Increase the pagefile size (correct)
  • Defragment the hard disk
  • Disable the visual effects
  • Enable the swap file

Which of the following commands is used on a Linux system to delete a file from a directory?

  • rm (correct)
  • cp
  • mv
  • kill

Tony works for a company as a cybersecurity analyst. His company runs a website that allows public postings. Recently, users have started complaining about the website having pop-up messages asking for their username and password. Simultaneously, your security team has noticed a large increase in the number of compromised user accounts on the system. What type of attack is most likely the cause of both of these events?

  • Cross-site scripting (correct)
  • SQL injection
  • Rootkit
  • Cross-site request forgery

Joseph contacted the service desk because his Windows 10 desktop is acting strangely. He cannot use his mouse, speakers, or printer connected to his workstation by USB. Yesterday, everything worked normally. He attempted to reboot the computer to fix the issue, but it remains. Which of the following actions should be performed NEXT?

<p>Rollback any system updates or changes since yesterday (B)</p> Signup and view all the answers

You are concerned that your servers could be damaged during a power failure or under-voltage event. Which TWO devices would protect against these conditions?

<p>Line conditioner (A), Battery backup (B)</p> Signup and view all the answers

A user's personal settings are not showing up on their computer. You suspect that their profile has become corrupted within Windows. You attempt to look at their profile folder but cannot find it in their profile directory. Which of the following options do you need to configure to see this file?

<p>Folder Options (C)</p> Signup and view all the answers

Regardless of what website Michelle types into her browser, she is being redirected to "malwarescammers.com." What should Michelle do to fix this problem?

<p>Reset the web browser's proxy setting (A)</p> Signup and view all the answers

A user contacts the service desk after they just finished attempting to upgrade their laptop to Windows 10. The upgrade failed, and the user asks you to explain why. Which of the following log files should you review to determine the cause of the upgrade failure?

<p>Setup log (D)</p> Signup and view all the answers

You are trying to open your company's internal shared drive from your Windows 10 laptop but cannot reach it. You open your web browser and can connect to DionTraining.com without any issues. Which of the following commands should you use to determine if the internal shared drive is mapped to your computer properly?

<p>net use (D)</p> Signup and view all the answers

You have been asked to recycle 20 of your company's old laptops. The laptops will be donated to a local community center for underprivileged children. Which of the following data destruction and disposal methods is MOST appropriate to allow the data on the drives to be fully destroyed and the drives to be reused by the community center?

<p>Low-level formatting of the HDDs (A)</p> Signup and view all the answers

A technician wants to conduct a vulnerability scan on a server every morning at 3:00 am. Which of the following tools should the technician use?

<p>Task scheduler (B)</p> Signup and view all the answers

Which of the following commands is used on a Linux system to edit a text file on a server?

<p>vi (B)</p> Signup and view all the answers

Sam and Mary both work in the accounting department and use a web-based SaaS product as part of their job. Sam cannot log in to the website using his credentials from his computer, but Mary can log in with her credentials on her computer. Sam asks Mary to login into her account from his computer to see if the problem is with his account or computer. When Mary attempts to log in to Sam's computer, she receives an error. Mary noticed a pop-up notification about a new piece of software on Sam's computer when she attempted to log in to the website. Which TWO of the following steps should Mary take to resolve the issue with logging in from Sam's computer?

<p>Ask Sam about the pop-up notification and determine what new programs he installed on his computer (B), Verify Sam's computer has the correct web browser configuration and settings (C)</p> Signup and view all the answers

Your supervisor has requested remote access to a particular server to check on specific data and processes in the evenings and weekends. You are concerned that the server could become infected and want to take some precautions. Which of the following is the MOST important thing to do before granting remote access to the server to your supervisor?

<p>Install the latest security updates and patches to the server (D)</p> Signup and view all the answers

A coworker is creating a file containing a script. You look over their shoulder and see "net use s:\fileserver\videos" in the file. Based on this, what type of file extension should this script use?

<p>.bat (B)</p> Signup and view all the answers

Which of the following types of remote access technologies should NOT be used in a network due to its lack of security?

<p>Telnet (D)</p> Signup and view all the answers

A technician needs to add new features to an existing router on the network. Which of the following should be performed to add the new features?

<p>Firmware update (D)</p> Signup and view all the answers

Jonni is installing Windows 11 (64-bit) in a virtual machine on his Linux desktop. The installation is continually failing and producing an error. Jonni has configured the virtual machine with a dual-core 1.2 GHz processor, 4 GB of memory, a 32 GB hard drive, and a 1920 x 1080 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

<p>Amount of hard drive space (C)</p> Signup and view all the answers

A user reports that every time they try to access https://www.diontraining.com, they receive an error stating "Invalid or Expired Security Certificate." The technician attempts to connect to the same site from other computers on the network, and no errors or issues are observed. Which of the following settings needs to be changed on the user's workstation to fix the "Invalid or Expired Security Certificate" error?

<p>Date and time (C)</p> Signup and view all the answers

Your company's wireless network was recently compromised by an attacker who utilized a brute force attack against the network's PIN to gain access. Once connected to the network, the attacker modified the DNS settings on the router and spread additional malware across the entire network. Which TWO of the following configurations were most likely used to allow the attack to occur?

<p>WPS enabled (@), Default administrative login credentials (@)</p> Signup and view all the answers

Dion Training has an open wireless network so that their students can connect to the network during class without logging in. The Dion Training security team is worried that the customers from the coffee shop next door may be connecting to the wireless network without permission. If Dion Training wants to keep the wireless network open for students but prevents the coffee shop's customers from using it, which of the following should be changed or modified?

<p>Signal strength or power level (A)</p> Signup and view all the answers

Which of the following commands can a technician use on a Linux server to verify the IP address associated with diontraining.com?

<p>dig (C)</p> Signup and view all the answers

During a disaster recovery, which of the following statements is true?

<p>A virtual machine has less downtime than a physical server (A)</p> Signup and view all the answers

Which of the following Windows tools should a technician use to import and install data in the x.509 format?

<p>Certificate manager (B)</p> Signup and view all the answers

A user is attempting to pay for their morning coffee using Apple Pay on their iPhone. The user quickly taps their phone against the payment terminal, but it fails to process. Which of the following should the user do to properly use NFC for payment? (Select all that apply)

<p>Manually select a card from your Apple Wallet and try again (A), Hold the phone on the payment terminal for at least 3 seconds (D)</p> Signup and view all the answers

Which of the following data types would be used to store the number 3.14?

<p>Floating-point (A)</p> Signup and view all the answers

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?

<p>WPA personal (B)</p> Signup and view all the answers

You are cleaning out the closet in your office and find several bottles of cleaner that need to be disposed of. Which of the following should you consult to determine the proper method of disposal?

<p>MSDS (C)</p> Signup and view all the answers

A user's workstation is opening up browser windows without any action from the user. A technician attempts to troubleshoot the workstation, but the machine is extremely slow when in use. Which of the following actions should the technician perform?

<p>Perform an anti-malware scan of the workstation (A)</p> Signup and view all the answers

Marta's organization is concerned with the vulnerability of a user's account being vulnerable for an extended period of time if their password was compromised. Which of the following controls should be configured as part of their password policy to minimize this vulnerability?

<p>Password expiration (D)</p> Signup and view all the answers

You are configuring a wireless access point (WAP) in a large apartment building for a home user. The home user is concerned that their neighbor may try to connect to their Wi-Fi and wants to prevent it. Which THREE of the following actions should you perform to increase the wireless network's security?

<p>Enable WPA3 encryption (A), Reduce the transmission power (B), Disable the SSID broadcast (@)</p> Signup and view all the answers

Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues began to occur and remember that each time it happened the lights also dimmed momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router's power cycling. What should you (a network technician) do to solve this problem?

<p>Install a UPS (D)</p> Signup and view all the answers

A user's workstation is infected with malware. You have quarantined it from the network. When you attempt to boot it to the Windows 10 desktop, it fails. Which of the following should you do NEXT to begin remediating this system?

<p>Restart into Safe Mode and conduct an antivirus scan (B)</p> Signup and view all the answers

What is the maximum amount of memory used in a 32-bit version of the Windows operating system?

<p>4 GB (B)</p> Signup and view all the answers

You were troubleshooting a recently installed NIC on a workstation and decided to ping the NIC's loopback address. Which of the following IPv4 addresses should you ping?

<p>127.0.0.1 (D)</p> Signup and view all the answers

Which of the following should you use to fix an issue with a graphics card's drivers in Windows 10?

<p>Device Manager (C)</p> Signup and view all the answers

Your Windows 10 machine has just crashed. Where should you look to identify the cause of the system crash and how to fix it?

<p>BSOD (B)</p> Signup and view all the answers

Tim connects his Windows 10 laptop to his office’s wireless network to print out a report for his boss. Which type of network should he select to discover the printer on the office’s wireless network?

<p>Private (B)</p> Signup and view all the answers

A technician at Dion Training wants to identify which version and build of Windows 10 is installed on a laptop. Which of the following commands should the technician enter at the command line?

<p>winver (C)</p> Signup and view all the answers

Which of the following commands is used on a Linux system to change the ownership of a file or directory on a system?

<p>chown (A)</p> Signup and view all the answers

You need to determine the best way to test operating system patches in a lab environment before deploying them to your automated patch management system. Unfortunately, your network has several different operating systems in use, but you only have one machine available to test the patches on. What is the best environment to utilize to perform the testing of the patches before deployment?

<p>Virtualization (D)</p> Signup and view all the answers

Eduardo is installing Windows 11 (64-bit) in a virtual machine on his macOS desktop. The installation is continually failing and producing an error. Eduardo has configured the virtual machine with a 2.2 GHz single core processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

<p>Number of CPU cores (C)</p> Signup and view all the answers

Which of the following types of attacks occurs when an attacker attempts to gain confidential information or login credentials by sending targeted emails to a specific set of recipients within an organization?

<p>Spear phishing (D)</p> Signup and view all the answers

David is troubleshooting a new Android application his company is creating. He has installed the app on an Android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. Which of the following should David enable on the device?

<p>Developer mode (A)</p> Signup and view all the answers

Susan, an executive at Dion Training, will be traveling to Italy for a conference next week. She is worried about remaining connected to the internet while overseas and plans to use the WiFi in her hotel room and the local coffee shop with her laptop. Which of the following should she purchase and configure before leaving for Italy to ensure her communications remain secure regardless of where she is connecting from?

<p>VPN (A)</p> Signup and view all the answers

You are installing a new file server at the offices of Dion Training. The entire building has a diesel generator installed to protect it from power outages. The file server must have zero downtime once placed into production. Which of the following power sources should the file server utilize?

<p>An uninterruptible power supply (UPS) (B)</p> Signup and view all the answers

Last week, a technician remediated a malware infection on Karen's laptop. Today, she shows up at the service desk, frustrated because her laptop appears to have been infected again. What step of the malware remediation process did the technician MOST likely forget to complete?

<p>Educating the end user (D)</p> Signup and view all the answers

A Windows 2019 server is crashing every evening at 2:35 am, but you are not sure why. Which of the following tools should you use to identify the cause of the system crash?

<p>Event viewer (C)</p> Signup and view all the answers

What is the SIXTH step of the seven-step malware removal process?

<p>Enable System Restore and create a restore point in Windows (D)</p> Signup and view all the answers

Dion Training is building a new computer for its video editor to use. The new computer will use four physical Intel Xeon processors, 128 GB of DDR4 memory, and a RAID 0 with two 2 TB SSDs for optimal performance. Which of the following editions of Windows 10 would support all of this computer's resources properly?

<p>Pro for Workstations (C)</p> Signup and view all the answers

The Chief Financial Officer has asked Maria for a recommendation on how the company could reduce its software licensing costs while still maintaining the ability to access its application server remotely. Which of the following should Maria recommend?

<p>Install and deploy thin clients without an operating system for each user (B)</p> Signup and view all the answers

Your company is concerned about the possibility of power fluctuations that may occur and cause a small dip in the input power to their server room for an extended period of time. What condition is this known as?

<p>Under-voltage event (A)</p> Signup and view all the answers

You recently moved 1.5 TB of data from your office's file server to a new 16 TB NAS and decommissioned the old file server. You verified all users had been given the same permissions to the new file shares on the NAS as they had on the old server. The users are receiving an error stating, "Windows cannot access \server10\shared" every time they click the Share drive icon on their desktop. What is MOST likely the source of this error?

<p>The users are still mapped to the old share drive (B)</p> Signup and view all the answers

You are working on a Windows 10 workstation with a 1 TB HDD and 16 GB of memory that is operating slowly when reading large files from its storage device. Which of the following commands should you use to speed up this workstation?

<p>chkdsk (D)</p> Signup and view all the answers

You have connected your laptop to the network using a CAT 5e cable but received an IP address of 169.254.13.52 and cannot connect to www.DionTraining.com. What is most likely the cause of this issue?

<p>DHCP failure (A)</p> Signup and view all the answers

Your company is concerned about the possibility of power fluctuations that may occur and cause a large increase in the input power to their server room. What condition is this known as?

<p>Power spikes (A)</p> Signup and view all the answers

During the reconnaissance phase of a penetration test, you have determined that your client's employees all use iPhones that connect back to the corporate network over a secure VPN connection. Which of the following methods would MOST likely be the best method for exploiting these?

<p>Identify a jailbroken device for easy exploitation (A)</p> Signup and view all the answers

You are writing a script that will take an employee's name as the input. Which of the following data types would the employee's name be stored in?

<p>String (B)</p> Signup and view all the answers

Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards?

<p>PCI-DSS (A)</p> Signup and view all the answers

A user attempted to go to their favorite social media website this morning from their laptop. When they typed in Facebook.com, their browser redirected them to MalwareInfect.com instead. You asked the user to clear their cache, history, and cookies, but the problem remains. What should you do NEXT to solve this problem?

<p>Check the hosts file (A)</p> Signup and view all the answers

Which file system type should you format a 4 TB USB flash drive to use with both Windows and macOS laptops?

<p>exFAT (B)</p> Signup and view all the answers

Which of the following techniques would be the most appropriate solution to implementing a multi-factor authentication system?

<p>Smartcard and PIN (D)</p> Signup and view all the answers

A programmer is writing a script to calculate the temperature in Fahrenheit when it receives input in Celsius. The conversion factor used is 5/9. Which of the following would be used to store this fixed conversion factor in the script?

<p>Constant (C)</p> Signup and view all the answers

Which of the following is a connectionless protocol that utilizes on UDP?

<p>TFTP (C)</p> Signup and view all the answers

Your company is expanding its operations in the European Union and is concerned about additional governmental regulations that may apply. Which of the following regulations applies when processing personal data within the European Union?

<p>GDPR (C)</p> Signup and view all the answers

A factory worker suspects that a legacy workstation is infected with malware. The workstation runs Windows XP and is used as part of an ICS/SCADA system to control industrial factory equipment. The workstation is connected to an isolated network that cannot reach the internet. The workstation receives the patterns for the manufactured designs through a USB drive. A technician is dispatched to remove the malware from this workstation. After its removal, the technician provides the factory worker with a new USB drive to move the pattern files to the workstation. Within a few days, the factory worker contacts the technician again to report the workstation appears to be reinfected with malware. Which of the following steps did the technician MOST likely forget to perform to prevent reinfection?

<p>Update the anti-malware solution (C)</p> Signup and view all the answers

What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card's hardware address?

<p>MAC filtering (B)</p> Signup and view all the answers

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You have finished remediating the infected system. Which of the following steps should you NEXT?

<p>Schedule scans and run updates (A)</p> Signup and view all the answers

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as challenge/response and password encryption?

<p>TACACS+ (A)</p> Signup and view all the answers

Which of the following commands is used on a Linux system to switch to another user's account?

<p>su (B)</p> Signup and view all the answers

John is setting up 100 Windows 10 computers for a new corporate office. He wants to ensure that no one can change the boot order and boot from an unauthorized operating system. What feature should he ensure is enabled?

<p>BIOS password required (D)</p> Signup and view all the answers

What is the minimum amount of memory required to install Windows 10 (x64) on a device?

<p>2 GB (D)</p> Signup and view all the answers

Christina is attempting to install Windows 10 (32-bit) on an older netbook-style laptop. The installation is continually failing and producing an error. The device has a 1.1 GHz processor, 1 GB of memory, an 8 GB hard drive, and a 720p display. Which component would need to be fixed to allow Windows 10 (32-bit) to be installed on this device?

<p>Amount of hard drive space (B)</p> Signup and view all the answers

A corporate user has called the enterprise service desk because they believe their computer has become infected with malware. When you arrive at their desktop to troubleshoot the issue, you notice it was powered down. You press the power button, the system loads without any issues. When you open Google Chrome, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

<p>Quarantine the machine and report it as infected to your company's cybersecurity department for investigation (C)</p> Signup and view all the answers

Dion Training's offices are frequently experiencing under voltage events. Which of the following solutions would protect all of their workstations and servers from these under-voltage events?

<p>Uninterruptible power supply (B)</p> Signup and view all the answers

You attempt to boot a Windows 10 laptop and receive an "Operating System Not Found" error on the screen. You can see the hard disk listed in the BIOS of the system. Which of the following commands should you use to repair the first 512-byte sector on the hard disk?

<p>bootrec /fixmbr (C)</p> Signup and view all the answers

A printing company uses an isolated Windows XP workstation to print out large format banners for its customers on a custom printer. Unfortunately, the printer does not support newer versions of Windows and would cost $50,000 to replace it. To mitigate this risk, the workstation is not connected to the internet or a local area network. When a customer needs a banner printer, the technician takes a copy of their PDF file and moves it to the Windows XP workstation using a USB thumb drive. The workstation recently became infected with malware when printing a customer's file. The technician remediated the issue, but the workstation became infected again three weeks later. Which of the following actions did the technician forget to perform?

<p>Manually update the antivirus on the workstation and set it to perform on-access scans (A)</p> Signup and view all the answers

Which of the following remote access tools is a command-line terminal emulation program operating on port 23?

<p>Telnet (A)</p> Signup and view all the answers

Which of the following installation types would allow a single technician to quickly install Windows 10 Enterprise on 50 workstations simultaneously?

<p>Image deployment (A)</p> Signup and view all the answers

The customer service manager at Dion Training is having issues with her Windows 10 laptop. A technician believes that the operating system may have been corrupted by a piece of malware. The technician has removed the malware and wants to perform an installation or upgrade that will recopy the system files and revert most of the system settings to their default configurations while still preserving the user’s personalization settings, data files, and any applications installed through the Windows store. The technician has been told that they may delete any applications installed by the user, though, since they may have been infected by the malware. Which of the following types of upgrades or installations should the technician use?

<p>Refresh installation (B)</p> Signup and view all the answers

Your boss from work just sent you an important email, but you are not in the office. You tried to open the email from your smartphone, but it is encrypted and won't open. What should you do?

<p>Verify the digital certificate is installed on the device (B)</p> Signup and view all the answers

What is the FIFTH step of the seven-step malware removal process?

<p>Schedule scans and run updates (C)</p> Signup and view all the answers

You are working as a military defense contractor and have been asked to dispose of 5 laptop hard drives used in systems that processed classified information. Which of the following physical data destruction and disposal methods is MOST appropriate to ensure the data cannot be recovered?

<p>Degaussing of the HDDs (D)</p> Signup and view all the answers

Your home network is configured with a long, strong, and complex pre-shared key for its WPA2 encryption. You noticed that your wireless network has been running slow, so you checked the list of "connected clients" and see that "Bob's Laptop" is connected to it. Bob lives downstairs and is the maintenance man for your apartment building. You know that you never gave Bob your password, but somehow he has figured out how to connect to your wireless network. Which of the following actions should you take to prevent anyone from connecting to your wireless network without the proper WPA2 password?

<p>Disable WPS (B)</p> Signup and view all the answers

What is the FIRST step of the seven-step malware removal process?

<p>Investigate and verify malware symptoms (C)</p> Signup and view all the answers

Which of the following types of encryption uses a 128-bit encryption key but is considered weak due to its use of a 24-bit initialization vector?

<p>WEP (D)</p> Signup and view all the answers

Which of the following file types are commonly used to create applications that can be run on Linux, macOS, and Windows?

<p>.py (B)</p> Signup and view all the answers

A file currently has permissions of 755. Which of the following commands would change file permission to r-xr--r--?

<p>chmod 544 filename (C)</p> Signup and view all the answers

A small doctor's office has asked you to configure their network to use the highest levels of wireless security and desktop authentication. The office only uses cloud-based SaaS applications to store their patient's sensitive data. Which TWO of the following protocols or authentication methods should you implement for the BEST security?

<p>WPA2 (B), Multifactor (D)</p> Signup and view all the answers

When Jonathan opens the web browser on his computer, the initial page loads up to a search engine that he does not recognize. Jonathan attempts to use the search engine, but the results are abysmal, and the browser creates numerous pop-ups. Jonathan asks for your assistance in fixing this issue. Which TWO of the following actions do you recommend Jonathan perform first?

<p>Reset the web browser to the default settings and configuration (C), Uncheck any unapproved applications from the Startup tab in the Task Manager (D)</p> Signup and view all the answers

What kind of attack is an example of IP spoofing?

<p>On-path attack (A)</p> Signup and view all the answers

Which of the following encryption types was used by WPA to better secure wireless networks than WEP?

<p>TKIP (A)</p> Signup and view all the answers

A customer runs frantically into your computer repair store. He says that his smartphone fell into a puddle, and now it won't turn on. He excitedly tells you that he needs the smartphone working again "right now" and cannot wait. What should you do?

<p>Offer the customer the option to replace his phone (C)</p> Signup and view all the answers

Which of the following policies or plans would dictate the complexity requirements for a wireless network's shared secret key?

<p>Password policy (B)</p> Signup and view all the answers

You run the command ipconfig on your laptop and see that you have been assigned an IP address of 169.254.0.56. Which category of IPv4 address is this?

<p>APIPA (A)</p> Signup and view all the answers

Which of the following file types are commonly used by scripts in a web page?

<p>.js (B)</p> Signup and view all the answers

Which file system type is used to mount remote storage devices on a Linux system?

<p>NFS (D)</p> Signup and view all the answers

Joanne is having a drink at the coffee shop near her office. She takes out her Windows 10 laptop and connects it to the coffee shop’s wireless network to check her email. Which type of network should she select to hide their computer from other devices on the network and prevent file sharing with other patrons of the coffee shop?

<p>Public (D)</p> Signup and view all the answers

What is the minimum amount of memory required to install Windows 10 (x86) on a device?

<p>1 GB (D)</p> Signup and view all the answers

A network technician is tasked with designing a firewall to improve security for an existing FTP server on the company network. The FTP server must be accessible from the Internet. The security team is concerned that the FTP server could be compromised and used to attack the domain controller hosted within the company's internal network. What is the BEST way to mitigate this risk?

<p>Migrate the FTP server from the internal network to a screened subnet (C)</p> Signup and view all the answers

A programmer is writing a script to calculate the disk space needed to perform a daily backup. The programming needs to store the amount of disk space in a temporary placeholder within the program that can be updated and changed during the script's execution. Which of the following would be used to store the value of the disk space needed?

<p>Variable (A)</p> Signup and view all the answers

Which of the following IP addresses is considered an APIPA address?

<p>169.254.125.154 (A)</p> Signup and view all the answers

Which of the following is considered a form of regulated data?

<p>PII (D)</p> Signup and view all the answers

You are helping to set up a backup plan for your organization. The current plan states that all of the organization's Linux servers must have a daily backup conducted. These backups are then saved to a local NAS device. You have been asked to recommend a method to ensure the backups will work when needed for restoration. Which of the following should you recommend?

<p>Attempt to restore to a test server from one of the backup files to verify them (C)</p> Signup and view all the answers

Gina just installed a 4 TB HDD into her Windows 10 computer and wants to assign the drive letter "M" to store her media files. Which type of partition should Gina use if she wants to mount the drive as a single partition?

<p>GPT (D)</p> Signup and view all the answers

A system administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The server manager decides to initiate a rollback. Which describes what the system administrator should do next?

<p>Return the system to the original state before the change (D)</p> Signup and view all the answers

Which of the following is the LEAST secure wireless security and encryption protocol?

<p>WEP (B)</p> Signup and view all the answers

Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall's ACL to see if the server's outgoing email is being blocked. Which of the following ports should you ensure is open and not blocked by the firewall?

<p>25 (D)</p> Signup and view all the answers

Which of the following is used to communicate data and preferences to child processes within a script or batch file?

<p>Environmental variables (B)</p> Signup and view all the answers

Tim has created a new iOS application that he wants to install on an iPad without having to install it through the official App Store. To save some money, he has not purchased a developer certificate from Apple since he isn't planning to sell this app to others. Which of the following would allow Tim to install this unofficial app on his own iPad for testing?

<p>Jailbroken device (C)</p> Signup and view all the answers

Which of the following backup rotation schemes requires backups to be stored to at least two different types of media?

<p>3-2-1 backup (B)</p> Signup and view all the answers

Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 workstations. When connected to a private network, the firewall has been configured to only allow inbound connections that match an existing rule and to only allow outbound connections that do not match any existing rules. What type of security posture has Dion Training implemented?

<p>Explicit allow for inbound, implicit allow for outbound (C)</p> Signup and view all the answers

Which of the following file types are commonly used by scripts in a Linux command line environment?

<p>.sh (A)</p> Signup and view all the answers

A customer is complaining that there are intermittent problems with their PC. As a technician, you don't know exactly what the errors are, so which tool should you use to determine what errors have previously occurred?

<p>Event Viewer (A)</p> Signup and view all the answers

Jason has built a custom Android application that he wants to install on an Android tablet without having to install it through the Play Store. Which of the following would be required to allow him to install the app's APK on the device?

<p>Sideloading (C)</p> Signup and view all the answers

Karen, a salesperson in your company, is currently on travel this week. She calls your company's help desk and is yelling because she cannot connect to her email using her hotel room's WiFi. Her laptop shows that it is connected to the "HotelWiFi" network, but Windows states it has "Limited or no connectivity." What action should Karen perform to fix this issue?

<p>Open a web browser and agree to the hotel's capture page AUP (A)</p> Signup and view all the answers

An employee's inbox is now filled with unwanted emails after their email password had been compromised last week. You helped them reset their password and regain access to their account. Many of the emails are coming from different email addresses ending in spamyou.com. Which of the following actions should you take to help reduce the amount of spam this and other users in your organization are receiving?

<p>Create a domain-based email filter (C)</p> Signup and view all the answers

What type of structure is "IF THEN ELSE" in scripting?

<p>Branch (C)</p> Signup and view all the answers

Which of the following contains virtual memory that can supplement the physical system memory in a Linux system?

<p>Swap partition (A)</p> Signup and view all the answers

Which of the following tools should a technician use to modify the HOSTS file on a Windows 10 system to solve a website address resolution issue?

<p>Notepad (D)</p> Signup and view all the answers

Which attack utilizes a wireless access point made to look as if it belongs to the network by mimicking the corporate network's SSID to eavesdrop on the wireless traffic?

<p>Evil twin (D)</p> Signup and view all the answers

Which of the following options in Windows 10 would create a small hibernation file saved on the storage device before shutting down the computer so that it reduces the time to boot up when powered on?

<p>Fast startup (D)</p> Signup and view all the answers

Which of the following Windows tools can a technician use to display information about the performance of hardware and software resources in real-time?

<p>resmon.exe (A)</p> Signup and view all the answers

Which command-line tool is used on a Linux system to display a list of the files and directories within the current path?

<p>ls (A)</p> Signup and view all the answers

You are working as a mobile device technician for a large corporation's enterprise service desk. A user complains that every time they attempt to launch the company's mobile email application, it crashes and displays an error message of Code123. Which of the following should you do FIRST to attempt to solve this problem?

<p>Clear the app's cache (D)</p> Signup and view all the answers

Which of the following Control Panel sections would a technician use to configure a Windows 10 computer to use Narrator mode to read aloud the list of files that appear on the screen to the user?

<p>Ease of Access (D)</p> Signup and view all the answers

Which of the following Windows 10 power options will turn off individual devices connected to a laptop to save energy?

<p>USB selective suspend (A)</p> Signup and view all the answers

Signup and view all the answers

You have been asked to install a new hard drive in a Windows 10 system. You have already installed the hard drive and booted the system up. Which tool should you use to create the new partitions on the hard drive?

<p>Disk Management (C)</p> Signup and view all the answers

A computer was recently infected with a piece of malware. Without any user intervention, the malware is now spreading throughout the corporate network and infecting other computers that it finds. Which type of malware MOST likely infected these computers?

<p>Worm (C)</p> Signup and view all the answers

During the reconnaissance phase of a penetration test, you have determined that your client's employees all use Android smartphones that connect back to the corporate network over a secure VPN connection. Which of the following methods would MOST likely be the best method for exploiting these?

<p>Use social engineering to trick a user into opening a malicious APK (D)</p> Signup and view all the answers

Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function?

<p>UPnP (C)</p> Signup and view all the answers

A customer has requested you install an external video card into their gaming PC. Which of the following tools should you utilize to protect the video card as you carry it from the storage room to your workbench?

<p>Antistatic bag (B)</p> Signup and view all the answers

You are partitioning a 1 TB hard drive on a new workstation. The hard disk has been partitioned into four different partitions with 100 GB, 150 GB, 250 GB, and 500 GB. How many different file system types could you support on this 1 TB hard drive?

<p>4 (B)</p> Signup and view all the answers

Sagar is planning to patch a production system to correct a detected vulnerability during his most recent network vulnerability scan. What process should he follow to minimize the risk of a system failure while patching this vulnerability?

<p>Deploy the patch in a sandbox environment to test it before patching the production system (A)</p> Signup and view all the answers

A user's computer is experiencing repeated BSODs and calls the service desk. The call is routed to Tier 2 support, and the Tier 2 technician is scheduled for a break in about 2 minutes when the call comes in. Which of the following actions should the technician do?

<p>Ask another Tier 2 technician to answer the call since it will take too long to solve (B)</p> Signup and view all the answers

Jason has an old 2017 Dell Laptop that he uses to connect to his office network while traveling. The computer is slow and is running Windows 7. The laptop's screen was recently cracked and needs replacement. Jason brings the laptop to the computer store you work at and asks for your assistance. Which of the following do you recommend?

<p>Purchase a new laptop as the cost to repair might be more than a new laptop (D)</p> Signup and view all the answers

Which of the following types of wireless encryption uses a 40-bit encryption key with an RC4 encryption cipher?

<p>WEP (D)</p> Signup and view all the answers

Windows file servers commonly hold sensitive files, databases, passwords, and more. What common vulnerability is usually used against a Windows file server to expose sensitive files, databases, and passwords?

<p>Missing patches (C)</p> Signup and view all the answers

You are configuring a SOHO network and only allowing specific IP addresses to access the network while blocking any IP addresses that are not on the list. Which of the following should be implemented?

<p>Allow list (C)</p> Signup and view all the answers

Elizabeth was replacing a client’s security device that protects their screened subnet. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. Which of the following devices was MOST likely misconfigured and is now causing a problem?

<p>Firewall (B)</p> Signup and view all the answers

Which of the following data types would be used to store the user's middle initial?

<p>Character (D)</p> Signup and view all the answers

Jason is working in Microsoft Word, but the application appears to have become frozen and unresponsive. Which of the following features in the Task Manager should he use to terminate the unresponsive program?

<p>Processes (C)</p> Signup and view all the answers

What permissions would be represented by the octal 517?

<p>r-x--xrwx (C)</p> Signup and view all the answers

You are troubleshooting a user's workstation that is operating extremely slowly. You open the Task Manager and see that only Microsoft Word is currently running, but the CPU and network utilization is consistently running between 95-100%. Which of the following is MOST likely causing this issue?

<p>The computer has become a zombie (C)</p> Signup and view all the answers

You are troubleshooting a user's computer. As part of your efforts, you want to install a new login with administrative privileges. Which of the following utilities should you use?

<p>Local Users and Groups (A)</p> Signup and view all the answers

An Android user recently cracked their screen and had it replaced. If they are in a dark room, the phone works fine. If the user enters a room with normal lights on, then the phone's display is dim and hard to read. What is MOST likely the problem?

<p>Faulty ambient light sensor (C)</p> Signup and view all the answers

You have submitted an RFC to install a security patch on all of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe why the change will be installed during this maintenance window?

<p>Purpose (A)</p> Signup and view all the answers

A user is having an issue with an application on their Android device. Whenever the user attempts to launch the application, the app fails and generates an error message. When asked, other users say they are not having the same issue. Which of the following should the technician attempt FIRST to solve this issue?

<p>Clear the local application cache (C)</p> Signup and view all the answers

Dion Training uses DHCP to assign private Class C IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class C address?

<p>192.168.3.5 (A)</p> Signup and view all the answers

Which of the following types of backups generates the recovered files from a complete copy of a file created at some point in time and one or more partial backups created at later times to merge them into the recovered data?

<p>Synthetic (B)</p> Signup and view all the answers

A network administrator needs to allow employees to upload files to a remote server securely. What port must be allowed through the firewall?

<p>22 (D)</p> Signup and view all the answers

A coworker is creating a file containing a script. You look over their shoulder and see "#!/bin/bash" as the first line in the file. Based on this, what type of file extension should this script use?

<p>.sh (D)</p> Signup and view all the answers

You have submitted an RFC to install a security patch on some of your company's Windows 2019 servers during the weekly maintenance window. Which of the following change request documents would describe which servers will receive the patch during this maintenance window?

<p>Scope (B)</p> Signup and view all the answers

Peter is attempting to print to his office printer, but nothing comes out. Yesterday, his printer was working just fine. Peter does not notice any errors on the taskbar's printer icon. Which of the following actions should Peter try FIRST to solve this issue?

<p>Check the status of the print server queue (C)</p> Signup and view all the answers

Which of the following backup rotation schemes uses a three-tiered approach to ensure at least one monthly full backup is conducted?

<p>Grandfather-father-son (B)</p> Signup and view all the answers

A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system's web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then perform the remediation to remove the malware. You have scanned the machine with several anti-virus and anti-malware programs and determined it is now cleaned of all malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated anti-virus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers?

<p>Verify the hosts file has not been maliciously modified (D)</p> Signup and view all the answers

What type of structure is "For Next" in scripting?

<p>Loop (A)</p> Signup and view all the answers

Which command-line tool is used on a Windows system to erase all the data on a hard disk and ensure it is ready to accept new Windows files?

<p>format /fs:NTFS (A)</p> Signup and view all the answers

You recently read a news article about a new crypto-malware worm that is causing issues for corporate networks. Today, you noticed that four of your company's workstations had their files encrypted. You are worried about the rest of the network's workstations. What should you do FIRST?

<p>Immediately quarantine the affected workstations (D)</p> Signup and view all the answers

Which of the following file system formatting types should be used with older recordable optical discs?

<p>CDFS (D)</p> Signup and view all the answers

A company has had several virus infections over the past few months. The root cause was determined to be known vulnerabilities in the software applications in use by the company. What should an administrator implement to prevent future outbreaks?

<p>Patch management (D)</p> Signup and view all the answers

A macOS user is browsing the internet in Google Chrome when they see a notification that says, "Windows Enterprise Defender: Your computer is infected with a virus, please click here to remove it!" What type of threat is this user experiencing?

<p>Rogue anti-virus (A)</p> Signup and view all the answers

Which of the following policies or plans would describe the access requirements for connecting a user's laptop to the corporate network?

<p>Bring your own device policy (C)</p> Signup and view all the answers

You are trying to copy a 4.7 GB file from your Windows laptop to an external hard drive using USB 3. The external hard drive is formatted with FAT32. Every time you attempt this copy, you receive an error. What is MOST likely the issue?

<p>Files over 4 GB cannot be stored on a FAT32 formatted drive (C)</p> Signup and view all the answers

Which of the following should be used to uniquely identify every piece of hardware installed on the corporate network, including servers, desktops, laptops, printers, and monitors?

<p>Asset ID (A)</p> Signup and view all the answers

A home user brought their Windows 10 laptop to the electronics store where you work because they suspect it has a malware infection. You are in the process of remediating the infected system. Which of the following actions should you be performing?

<p>Remove, quarantine, or erase the infected files (B)</p> Signup and view all the answers

The video editor at Dion Training is having issues with her workstation. The workstation is running Windows 10 and is failing to boot up properly. A technician wants to replace the existing operating system files with a new copy of the same version. The technician has been told to ensure the user’s data and applications are not modified or deleted during the upgrade or installation. Which types of upgrades or installations should the technician use?

<p>Repair installation (D)</p> Signup and view all the answers

A programmer is writing a script to display all the numbers from 1 to 100 to the screen. Which of the following should they use in their script?

<p>Loop (B)</p> Signup and view all the answers

Sarah is installing Windows 10 (64-bit) in a virtual machine. The installation is continually failing and producing an error. She has configured the virtual machine with a dual-core 950 MHz processor, 4 GB of memory, a 64 GB hard drive, and a 1280 x 720 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

<p>The processor is insufficient (C)</p> Signup and view all the answers

Which of the following MacOS features allows you to use multiple desktops or spaces on a single system?

<p>Mission Control (D)</p> Signup and view all the answers

Which type of antivirus scan provides the best protection for a typical home user?

<p>On-access scans (C)</p> Signup and view all the answers

Stephanie is installing Windows 10 (64-bit) in a virtual machine on her laptop. The installation is continually failing and producing an error. She has configured the virtual machine with a dual-core 1.7 GHz processor, 1 GB of memory, a 64 GB hard drive, and a 1920 x 1080 screen resolution. Which item in the virtual machine should be increased to fix the installation issue experienced?

<p>Amount of memory (D)</p> Signup and view all the answers

Which mobile device strategy is most likely to introduce vulnerable devices to a corporate network?

<p>BYOD (D)</p> Signup and view all the answers

Dion Training has configured Windows Defender Firewall on all of its corporate Windows 10 laptops. When connected to a public network, the firewall has been configured to allow only inbound connections that match an existing rule and to only allow outbound connections that do match an existing rule to achieve the highest level of security. What type of security posture has Dion Training implemented?

<p>Explicit allow for inbound, explicit allow for outbound (D)</p> Signup and view all the answers

A user with an older laptop running Windows 7 that has only 2 GB of RAM, 32 GB of SSD, and a 1.7 GHz 64-bit processor. The user would like to upgrade to a newer OS since Windows 7 is now considered end-of-life. Which of the following operating systems should the technician recommend to ensure the BEST performance on this computer?

<p>Windows 10 (B)</p> Signup and view all the answers

Your coworker is creating a script to run on a Windows server using PowerShell. Which of the following file formats should the script use?

<p>.ps1 (B)</p> Signup and view all the answers

Dion Training wants to implement a new wireless network in their offices. Which of the following types would support encryption for traffic being sent and received over the network while still allowing users to connect to the open network without a password, passphrase, or digital certificate?

<p>WPA3 (A)</p> Signup and view all the answers

A cybersecurity analyst notices that an attacker is trying to crack the WPS pin associated with a wireless printer. The device logs show that the attacker tried 00000000, 00000001, 00000002 and continued to increment by 1 number each time until they found the correct PIN of 13252342. Which of the following type of password cracking was being performed by the attacker?

<p>Brute-force (C)</p> Signup and view all the answers

What is the minimum amount of RAM needed to install Windows 10 on a 32-bit system?

<p>1 GB (D)</p> Signup and view all the answers

You are configuring a Windows 10 Professional workstation to connect to the Dion Training domain. To provide additional security to its users, Dion Training requires that all uses route their internet traffic through a server located at 10.0.0.15 for inspection before it is sent to the internet. Once inspected, the server will route the traffic to the WAN router whose IP is 10.0.0.1. Which of the following settings should be configured on the workstation to achieve this?

<p>Under Internet Options, configure the proxy server address as 10.0.0.15 (C)</p> Signup and view all the answers

Two weeks ago, David's computer was infected with a virus. A technician performed the malware removal process on the machine, removed the infection from the system, update the system's software, and closed the trouble ticket. Now, many of the symptoms have returned on David's computer. Which of the following steps of the malware removal procedure did the technician MOST likely forget to perform as part of the original remediation?

<p>Educate the end-user about how to avoid malware in the future (A)</p> Signup and view all the answers

You have decided to have DNA genetic testing and analysis performed to determine your exact ancestry composition and possibly find some lost relatives through their database. Which of the following types of data should this be classified?

<p>PHI (C)</p> Signup and view all the answers

You are formatting a 4 TB external hard drive on your MacBook. The drive will be used to share files large video files between your MacBook and your friend's Windows 10 desktop. Which file format should you use?

<p>exFAT (D)</p> Signup and view all the answers

What does the command "shutdown /h" do on a Windows workstation?

<p>Enter hibernation mode (D)</p> Signup and view all the answers

You have just installed a new photo-sharing social media app on your smartphone. When you try to take a photo with the app, you hear the picture-taking sound. Unfortunately, when you check the app and your photo album, you cannot find any new pictures. Which of the following actions should you take to fix this issue?

<p>Verify the app has the correct permissions (C)</p> Signup and view all the answers

When using an MBR, which of the following types of partitions can only have up to four partitions?

<p>Primary (D)</p> Signup and view all the answers

Your boss has asked you to write a script that will copy all of the files from one hard drive to another each evening. This script should mirror the directories from one drive to the other and ensure they are synchronized each evening. Which command-line tool should you use in your script?

<p>robocopy (B)</p> Signup and view all the answers

You are troubleshooting a Windows 10 laptop that is infected with malware. You have already identified the type of malware on the laptop. What should you do NEXT? (Select THREE)

<p>Disconnect the laptop from the network (B), Update the anti-malware software (D), Disable System Restore in Windows (@)</p> Signup and view all the answers

Which of the following allows a user to save their current session to memory and put a Windows 10 computer into a minimal power state?

<p>Sleep (D)</p> Signup and view all the answers

A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?

<p>Clear the browser's cookies and history, enable the pop-up blocker, and scan the system for malware (A)</p> Signup and view all the answers

You are going to replace a power supply in a desktop computer. Which of the following actions should you take FIRST?

<p>Remove any jewelry you are wearing (C)</p> Signup and view all the answers

You are working on a customer's computer when your cellphone begins to ring. What should you do?

<p>Apologize to the customer and send the call to voicemail (A)</p> Signup and view all the answers

Which type of security measure is used to control access to an area by using a retina scan?

<p>Biometric (A)</p> Signup and view all the answers

Which of the following types of mobile device screen locks uses biometrics to securely unlock the device?

<p>FaceID (A), TouchID (C)</p> Signup and view all the answers

Madison is trying to open up her anti-malware solution to run a full system scan because she suspects her computer has become infected. When she attempts to run the tool, an error of "Access denied" is received. What security issue is MOST likely occurring?

<p>File permission change (C)</p> Signup and view all the answers

Dion Training wants to implement a new wireless network using WPA3 in their offices. Which of the following features of WPA3 is used to provide a password-based authentication using the dragonfly handshake instead of the older WPA 4-way handshake?

<p>SAE (D)</p> Signup and view all the answers

Which of the following types of backups only copies data modified since the last full backup?

<p>Differential (D)</p> Signup and view all the answers

What type of structure is a "Do While" in scripting?

<p>Loop (D)</p> Signup and view all the answers

Dion Training uses DHCP to assign private Class A IP addresses to its Windows 10 workstations. Which of the following IP addresses is a Class A address?

<p>10.5.34.15 (D)</p> Signup and view all the answers

Samuel's computer is taking a very long time to boot up, and he has asked for your help speeding it up. Which TWO of the following actions should you perform to BEST resolve this issue with the least amount of expense?

<p>Remove unnecessary applications from startup (@), Defragment the hard drive (@)</p> Signup and view all the answers

A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?

<p>Increase the Wi-Fi signal being transmitted by their WAP (A)</p> Signup and view all the answers

Jason took home a company-issued Windows 10 laptop home to do some work. He successfully connected it to his home's wireless network and verified he could access the internet and browse his favorite websites. Unfortunately, Jason cannot access any of the network's shared files from his home network's media server. Which of the following may be why Jason cannot access the network shares in his home network?

<p>The laptop must join the network as private (D)</p> Signup and view all the answers

You have been asked to replace a computer's hard drive. Which of the following steps should you take FIRST to prevent an electrical hazard while working on the computer?

<p>Disconnect the power before servicing the computer (C)</p> Signup and view all the answers

Which command would be used to display the network address and subnet mask for the wired network connection on a Linux system?

<p>ip (C)</p> Signup and view all the answers

Which of the following types of backup requires the LEAST time to complete a backup?

<p>Incremental (C)</p> Signup and view all the answers

Which of the following is an APIPA or link-local address?

<p>169.254.64.23 (A)</p> Signup and view all the answers

David is a brand new help desk technician. To perform his job, he needs to install programs and printers but should not have full access to change everything on a Windows workstation. Which of the following types of user accounts should David be given to perform his job as a help desk technician?

<p>Power User (B)</p> Signup and view all the answers

Which of the following is TRUE about the GPT schema?

<p>The GPT is a more up to date partitioning schema. (B)</p> Signup and view all the answers

Fail To Pass Systems has just been the victim of another embarrassing data breach. Their database administrator needed to work from home this weekend, so he downloaded the corporate database to his work laptop. On his way home, he left the laptop in an Uber, and a few days later, the data was posted on the internet. Which of the following mitigations would have provided the greatest protection against this data breach?

<p>Require data at rest encryption on all endpoints (C)</p> Signup and view all the answers

You are configuring a SOHO network and only denying specific IP addresses from accessing the network while allowing any IP addresses not found on the list. Which of the following should be implemented?

<p>Blocklist (A)</p> Signup and view all the answers

You are working as a desktop repair technician for a large corporation. The company uses the exact same desktop hardware for all of its user's workstations. Today, you have received multiple calls from users complaining that their screen becomes filled with static when moving their mouse. You noticed that the systems all received a security patch and other updates from the Microsoft Endpoint Configuration Management (MECM) server last night. Which of the following actions should you take to resolve this issue?

<p>Rollback the video card driver and wait for a new driver to be released (A)</p> Signup and view all the answers

Dion Training utilizes a federation authentication model for all of its internal and external services. If an employee needs to access one of the company's web applications from their smartphone, they use a username and password to log in to the main website. They then are transferred and authenticated to all of the other sites and services automatically. Which of the following type of authentication is this known as?

<p>SSO (C)</p> Signup and view all the answers

Your son just attempted to start up three programs at once on his Windows 10 Home laptop. The application appears to be unresponsive, and a spinning circle has replaced his mouse cursor on the screen. What is the BEST solution to this problem?

<p>Kill the unresponsive task (A)</p> Signup and view all the answers

Which low power mode is used with Windows 10 laptops to save power, but it takes longer to turn back on and resume where the user left off?

<p>Hibernate (D)</p> Signup and view all the answers

You need to move a 75-pound box with a rack-mounted UPS in it. Which of the following actions should you take?

<p>Ask a coworker to team lift it with you (D)</p> Signup and view all the answers

Your company wants to provide a secure SSO solution for accessing both the corporate wireless network and its network resources. Which of the following technologies should be used?

<p>RADIUS (B)</p> Signup and view all the answers

You have just finished installing a new workstation for a user in your office. They need to be able to see the other workstations on the company's workgroup. Which of the following settings should you ensure is enabled?

<p>Enable network discovery (D)</p> Signup and view all the answers

You are troubleshooting a user's laptop that is unable to print a document. You have verified the printer is working and properly connected to the workstation by USB. Which of the following actions should you attempt to fix the problem in Windows 10?

<p>Restart the print spooler service (A)</p> Signup and view all the answers

Which editions of Windows 10 can you connect to using Remote Desktop?

<p>Education (B), Pro (C), Enterprise (D)</p> Signup and view all the answers

You have discovered that an employee has been conducting illegal activities using his workplace computer. You have taken possession of the employee's laptop according to your company's procedures and are waiting to give it to law enforcement authorities. What should you do when turning over the laptop to the police?

<p>Maintain the chain of custody (A)</p> Signup and view all the answers

A client contacts the service desk and complains that their smartphone is warm to the touch and their battery only lasts 4 hours a day, not the 10 hours advertised by your company. You ask them for the status of their location settings, which are summarized below: * Storage (49 GB Used, 15 GB Free, 64 GB Total) * Mail Client (Corporate account set to push, Personal account set to pull hourly) * Display (Auto brightness, Lock after 30 minutes, Night mode disabled) * Calls (33 minutes used during last 24 hours) * Data (52 MB used during last 24 hours) * Location (All apps set to "allow while using") Based on the information provided, what should be changed to resolve this client's problem?

<p>Display settings (C)</p> Signup and view all the answers

Which of the following file types are commonly used to create simple scripts in the Windows command-line environment?

<p>.bat (B)</p> Signup and view all the answers

Michael, a salesman, is on a business trip and is trying to access his corporate email over the hotel's Wi-Fi network. Michael's laptop appears to be connected to the hotel's wireless network, but his email client cannot download any new messages and states, "Network Offline." Michael contacts the help desk for assistance. What action should the help desk technician tell Michael to perform to solve this issue?

<p>Open a web browser, enter google.com, and see if a redirect page is displayed (C)</p> Signup and view all the answers

What is the minimum processor required to install Windows 11 (x64) on a device?

<p>1 GHz dual-core processor (D)</p> Signup and view all the answers

Which of the following backup rotation schemes uses a complex mathematical puzzle to extend the number of unique days of backups stored with the least amount of tapes?

<p>Tower of Hanoi (D)</p> Signup and view all the answers

Which of the following would NOT be included in a company's password policy?

<p>Password style (B)</p> Signup and view all the answers

A customer is complaining that they cannot connect to the local network share drive. You run the command 'ipconfig /all' from their workstation, and it returns an IP of 169.254.34.12. Which of the following is the problem with this workstation?

<p>The workstation couldn't reach the DHCP server (A)</p> Signup and view all the answers

You are troubleshooting a workstation and want to check if any S.M.A.R.T. errors are being reported. Which of the following tools should you use to troubleshoot this workstation?

<p>Disk management (C)</p> Signup and view all the answers

You are working at the service desk and just received the following email from an end-user who believes it is suspicious:
How should you classify this email?

<p>Phishing (D)</p> Signup and view all the answers

Which of the following wireless technologies allows a wireless device to automatically be configured for a SOHO wireless network with the push of a button?

<p>WPS (A)</p> Signup and view all the answers

Tamera just purchased a Wi-Fi-enabled Nest Thermostat for her home. She has hired you to install it, but she is worried about a hacker breaking into the thermostat since it is an IoT device. Which of the following is the BEST thing to do to mitigate Tamera's security concerns? (Select TWO)

<p>Configure the thermostat to use a segregated part of the network by installing it into a screened subnet (B), Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password (if supported) (@)</p> Signup and view all the answers

Which of the following allows users to save their current session to disk and before powering down their Windows 10 laptop?

<p>Hibernate (A)</p> Signup and view all the answers

Which of the following file system formatting types should be used with a DVD?

<p>UDF (B)</p> Signup and view all the answers

You are working as a forensic investigator for the police. The police have a search warrant to capture a suspect's workstation as evidence for an ongoing criminal investigation. As you enter the room with the policeman, he arrests the suspect and handcuffs him. What should you do FIRST?

<p>Secure the area (B)</p> Signup and view all the answers

What anti-malware solution is installed as a dedicated on-premise appliance to scan all incoming traffic and prevent malware from being installed on any of your clients without requiring the installation of any software on your clients?

<p>Network-based anti-malware (D)</p> Signup and view all the answers

Jason wants to configure his Windows 10 laptop to more quickly find files when he is searching its hard drive. Which of the following Control Panel sections should he use to configure his laptop for optimal searching performance?

<p>Indexing Options (A)</p> Signup and view all the answers

You have just set up a Minecraft server on a spare computer within your network and want your friends to connect to it over the internet. What do you need to configure in your SOHO router to allow your friends to connect to the new Minecraft server you created?

<p>Configure port forwarding (A)</p> Signup and view all the answers

Which of the following commands is used on a Linux system to delete all the files and directories in a Linux system's filesystem?

<p>rm -rf / (B)</p> Signup and view all the answers

An employee was recently moved from the Human Resources department into the Sales department. Which of the following should you check to ensure they no longer have access to the employee data stored in the Human Resource department share drives?

<p>Security Groups (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Jason's Conversation with His Mother
10 questions
Jason's Gaming Adventure
10 questions

Jason's Gaming Adventure

SharperThermodynamics avatar
SharperThermodynamics
Jason and the Argonauts Quiz
16 questions
Use Quizgecko on...
Browser
Browser