Summary

This document is a practice exam covering computer troubleshooting and IT safety. It includes various questions related to topics like malware removal, computer maintenance, and security. The questions cover multiple choice and performance-based tasks, providing a comprehensive assessment of various aspects of computer systems.

Full Transcript

Practice Exam A Performance-Based Questions A1. A technician has recently removed malware from a Windows computer, but the technician is concerned that some of the system les may have been modied. From the command line, analyze and repair any damaged operating system les....

Practice Exam A Performance-Based Questions A1. A technician has recently removed malware from a Windows computer, but the technician is concerned that some of the system les may have been modied. From the command line, analyze and repair any damaged operating system les. Answer Page: 35 Practice Exam A - Questions 1 A2. A technician has been tasked with removing malware from a desktop computer. Arrange these malware removal tasks in the correct order to successfully remove the malware. Schedule scans and run updates Educate the end user Enable System Restore Quarantine infected systems Remediate Identify malware symptoms Disable System Restore Answer Page: 36 2 Practice Exam A - Questions A3. Match the technology with the description. Some descriptions will not have a match. Technologies: Descriptions: e proper use of computers, tablets, and other EULA devices is part of the employee handbook. Software can be used on one computer and one PII copy can be stored for backup purposes A database includes all client rst names, last GFS names, and home addresses A spark is seen and felt when touching the AUP outside case of a desktop computer. A company needs to dispose of recently updated batteries in twenty UPS systems. A backup series consists of monthly, weekly, and daily backup data. Answer Page: 37 A4. A user needs to access a le located on the \\gate-room server. e le is located in a share called ship-diagnostics. Use the command line to connect to this share using drive g:. Answer Page: 39 Practice Exam A - Questions 3 A5. Match the commands to the description. Some descriptions will not have a match. Commands: Descriptions: dir Identify the name of a database server gpupdate Repair logical le system errors diskpart Change to a dierent working directory hostname Process changes made in Group Policy List the contents of a Windows directory List the volume names on a storage drive View the "About Windows" dialog Answer Page: 40 4 Practice Exam A - Questions Practice Exam A Multiple Choice Questions A6. A system administrator is installing a new server into the metal racks in a data center. During the installation process, the administrator can feel a faint tingling sensation when mounting the server. Which of the following safety systems should be tested and veried FIRST? ❍ A. Equipment grounding Quick Answer: 33 ❍ B. Air ltration ❍ C. Cable management e Details: 41 ❍ D. Waste disposal regulations A7. A user has opened a help desk ticket regarding the battery life on their mobile phone. e battery in the phone held a charge for most of the day prior to connecting to the corporate network. e battery now only lasts about half a day and the back of the phone is warmer than usual. e phone is congured as follows: Storage: 216.2 GB of 512 GB used Display and Brightness: Automatic Wi-Fi: Enabled Auto-lock: Disabled VPN: Not connected Low Power Mode: Disabled Battery Maximum Capacity: 100% Which of the following changes would have the BEST impact on battery performance? ❍ A. Enable auto-lock Quick Answer: 33 ❍ B. Connect to the VPN ❍ C. Increase available storage space e Details: 42 ❍ D. Disable Wi-Fi Practice Exam A - Questions 5 A8. A user in the accounting department has received this error message: “e print spooler service is not running.” e user contacts the help desk and opens a ticket for assistance. e help desk technician performs some testing and identies the issue. Which of these would be the best NEXT step? ❍ A. Reinstall all printer drivers Quick Answer: 33 ❍ B. Restart the spooler service ❍ C. Reboot the computer e Details: 44 ❍ D. Power cycle the printer A9. A student would like to prevent the theft of their laptop while studying at the library. Which of the following security methods would be the BEST choice to protect this laptop? ❍ A. Biometrics Quick Answer: 33 ❍ B. Badge reader ❍ C. USB token e Details: 45 ❍ D. Cable lock A10. Rodney, a desktop technician, is cleaning the outside of computers used on a manufacturing assembly line. e assembly line creates sawdust and wood chips, so most of the computers are protected with enclosed computer cases. Which of the following would be the MOST important item for Rodney to include during this cleaning process? ❍ A. Surge suppressor Quick Answer: 33 ❍ B. Temperature sensor ❍ C. Face mask e Details: 46 ❍ D. ESD mat 6 Practice Exam A - Questions A11. A user is attempting to AirDrop a document to an associate, but they do not see any destination devices in their list of available AirDrop locations. Which of the following would be the MOST likely reason for this issue? ❍ A. Low battery Quick ❍ B. Rotation lock is enabled Answer: 33 ❍ C. Low storage space e Details: 47 ❍ D. Wi-Fi and Bluetooth are disabled A12. e motherboard of a server in the corporate data center has started smoking, and ames can be seen inside the computer case. Which of the following would be the BEST way to extinguish this re? ❍ A. Water-based extinguisher Quick Answer: 33 ❍ B. Foam-based extinguisher ❍ C. Disconnect the power e Details: 48 ❍ D. Carbon dioxide extinguisher A13. Which of these Windows features provides full disk encryption for all data on a storage drive? ❍ A. Domain Services Quick Answer: 33 ❍ B. EFS ❍ C. RDP e Details: 49 ❍ D. BitLocker A14. A company maintains data retention requirements of ve years for all customer names, addresses, and phone numbers. Which of the following would BEST describe this data? ❍ A. Credit card transactions Quick Answer: 33 ❍ B. Government-issued information ❍ C. PII e Details: 50 ❍ D. Healthcare data Practice Exam A - Questions 7 A15. A user in the accounting department would like to ensure that their mobile device data is always available. If the user's smartphone is damaged or stolen, they would like to replace the device and restore all data as quickly as possible. Which of the following would provide this functionality? ❍ A. Full device encryption Quick Answer: 33 ❍ B. Remote backup ❍ C. IoT isolation e Details: 51 ❍ D. Remote wipe A16. Each time a user starts a specic corporate application, a page of disclaimers and usage requirements is shown before the login prompt. Which of the following would BEST describe this page? ❍ A. Splash screen Quick Answer: 33 ❍ B. Acceptable use policy ❍ C. Standard operating procedures e Details: 52 ❍ D. Topology diagram A17. A system administrator is troubleshooting an older application on a Windows 10 computer and needs to modify the UAC process. Which of the following options would provide access to these settings? ❍ A. Device Manager Quick Answer: 33 ❍ B. System Information ❍ C. Event Viewer e Details: 53 ❍ D. User Accounts A18. An oce power system occasionally experiences minor voltage spikes during the business day. Which of the following would be the BEST way to address this power issue? Quick ❍ A. Power down when not actively working Answer: 33 ❍ B. Conrm that the building has an electrical ground ❍ C. Connect a surge suppressor to each system e Details: 54 ❍ D. Maintain an inventory of replacement power supplies 8 Practice Exam A - Questions A19. What is the maximum amount of RAM supported by a 32-bit version of an operating system? ❍ A. 4 GB Quick Answer: 33 ❍ B. 8 GB ❍ C. 16 GB e Details: 55 ❍ D. 192 GB A20. Daniel, a user, is attempting to start an application on his laptop computer. Each time the application shows the starting graphic, it suddenly disappears and the application icon disappears from the taskbar. A technician would like to get more information about each previous occurrence of the application crash. Which of these choices would provide these details? ❍ A. Event Viewer Quick ❍ B. Task Manager Answer: 33 ❍ C. Startup Repair e Details: 56 ❍ D. Safe Mode A21. An attacker is using every combination of letters, numbers, and special characters in an attempt to discover a user's password. Which of the following would describe this attack type? ❍ A. Spoong Quick Answer: 33 ❍ B. Social engineering ❍ C. Brute force attack e Details: 57 ❍ D. DDoS A22. A system administrator is upgrading an email service in the corporate data center. During the upgrade, an error message appears and the upgrade fails. Subsequent attempts to perform the upgrade also fail. Which of the following processes should the system administrator follow to return the email server to its previous state? ❍ A. Rollback plan Quick ❍ B. Disaster recovery plan Answer: 33 ❍ C. Incident response plan e Details: 58 ❍ D. Power plan Practice Exam A - Questions 9 A23. When connecting a new USB webcam to Windows 10, a message appears stating "e controller does not have enough resources for this device." Which of the following would be the BEST next troubleshooting step? Quick ❍ A. Close all large-memory processes Answer: 33 ❍ B. Modify the BCD e Details: 59 ❍ C. Move the webcam to a dierent USB interface ❍ D. Use System Restore to rollback to a previous conguration A24. A system administrator has created a shared folder on a server to store operating system images. Technicians access the shared folder to download the latest images when performing large-scale system installations. Which of the following will be the MOST likely method of Quick accessing this data? Answer: 33 ❍ A. Map the shared folder to an available drive letter e Details: 60 ❍ B. Download the shared folder through a proxy ❍ C. Link the images to a cloud storage service ❍ D. Access the folder using a remote access client A25. A desktop administrator is installing a 64-bit version of Windows 10 Pro on a workstation, but the installation will not start. e workstation conguration is: 1 GHz CPU 2 GB of RAM 15 GB of free storage space 1280 x 720 video resolution Which of the following would allow this installation to proceed? ❍ A. Increase free storage space to 32 GB Quick Answer: 33 ❍ B. Decrease resolution to 800 x 600 ❍ C. Upgrade to a faster processor e Details: 61 ❍ D. Increase RAM to 4 GB 10 Practice Exam A - Questions A26. A security technician has identied malware running in the OS kernel. Traditional anti-malware scans were not able to identify any problems on the computer. Which of the following would be the BEST description of this malware? ❍ A. Rootkit Quick Answer: 33 ❍ B. Worm e Details: 62 ❍ C. Botnet ❍ D. Cryptominer A27. A help desk technician has been called to a training room that uses Android tablets as presentation devices. An application used for the training program will not start on any of the tablets. When the application is selected, the splash screen appears for a moment and then completely disappears with no error message. Which of the following would be the best NEXT troubleshooting step? ❍ A. Install all operating system updates Quick Answer: 33 ❍ B. Uninstall the application ❍ C. Power cycle the tablets e Details: 63 ❍ D. Roll back to the previous application version A28. A user on the headquarters network has opened a help desk ticket about their Windows desktop. When starting their computer, the login process proceeds normally but the Windows desktop takes fteen minutes to appear. Yesterday, the desktop would appear in just a few seconds. Which of the following would be the MOST likely reason for this issue? ❍ A. Slow prole load Quick Answer: 33 ❍ B. Incorrect boot device order ❍ C. Faulty RAM e Details: 64 ❍ D. Incorrect username and password Practice Exam A - Questions 11 A29. A system administrator has been asked to install a new application on a server, but the application is 64-bit and the server operating system is 32-bit. Which of the following describes the issue associated with this installation? ❍ A. File permissions Quick Answer: 33 ❍ B. OS compatibility e Details: 65 ❍ C. Installation method ❍ D. Available drive space A30. A security guard has reported that a person was seen passing through a secure door without using a door badge. e intruder slipped through the door by closely following the person in front of them. Which of these would best describe these actions? ❍ A. Dumpster diving Quick Answer: 33 ❍ B. Brute force ❍ C. Phishing e Details: 66 ❍ D. Tailgating A31. A Linux administrator needs to modify the conguration text le for a service. Which of the following utilities would provide this functionality? ❍ A. nano Quick ❍ B. chmod Answer: 33 ❍ C. df e Details: 67 ❍ D. sudo A32. An internal audit has found that a server in the DMZ appears to be infected with malware. e malware does not appear to be part of a le in the OS, and the malware is started each time system is started. What type of malware would be MOST likely found on this server? ❍ A. Trojan Quick ❍ B. Ransomware Answer: 33 ❍ C. Keylogger e Details: 68 ❍ D. Spyware ❍ E. Boot sector virus 12 Practice Exam A - Questions A33. A user has delivered a broken laptop to the help desk, and they are visibly upset and quite vocal about the problem they're having. e user is also asking for a very specic repair that doesn't appear to have any relationship to his issue. What's the best way to handle this situation? Quick ❍ A. Repeat your understanding of the issue to Answer: 33 the customer and provide an estimate and e Details: 69 follow-up time ❍ B. Refuse the repair until the customer calms down ❍ C. Inform the customer of his mistake with the proposed repair ❍ D. Refuse to make any commitments until the computer is examined A34. Daniel, a user in the nance department, has purchased a new Android smartphone and has installed a number of productivity apps. After a day of use, Daniel nds the phone displaying a large number of advertisements when browsing the Internet. Which of the following tasks should Daniel perform after completing a factory reset? ❍ A. Disable Bluetooth Quick Answer: 33 ❍ B. Check app sharing permissions ❍ C. Run a speed test on the cellular connection e Details: 70 ❍ D. Verify the source of each app before installation A35. A network administrator has congured all of their wireless access points with WPA3 security. Which of the following technologies would be associated with this conguration? ❍ A. RC4 Quick Answer: 33 ❍ B. TACACS e Details: 71 ❍ C. TKIP ❍ D. GCMP Practice Exam A - Questions 13 A36. A user has been provided with a username and password to access the corporate VPN. e user has also been provided with a hardware device displaying a six digit code, and the code changes every 30 seconds. Which of the following would BEST describe the use of this device? ❍ A. ACL Quick Answer: 33 ❍ B. Group Policy ❍ C. SMS e Details: 72 ❍ D. Least privilege ❍ E. MFA A37. A user has installed multiple applications over the last week. During the startup process, the computer now takes over fteen minutes to display the Windows 10 desktop. Which of the following utilities would help the system administrator troubleshoot this issue? ❍ A. defrag Quick Answer: 33 ❍ B. Performance Monitor ❍ C. Task Manager e Details: 73 ❍ D. robocopy A38. A server administrator is replacing the memory in a database server. Which of the following steps should be followed FIRST? ❍ A. Remove the existing memory modules Quick Answer: 33 ❍ B. Wear an air lter mask ❍ C. Disconnect all power sources e Details: 74 ❍ D. Connect an ESD strap 14 Practice Exam A - Questions A39. A technician is dismantling a test lab for a recently completed project, and the lab manager would like to use the existing computers on a new project. However, the security administrator would like to ensure that none of the data from the previous project is accessible on the existing hard drives. Which of the following would be the best way to accomplish this? ❍ A. Quick format Quick Answer: 33 ❍ B. Deguass ❍ C. Regular format e Details: 75 ❍ D. Reinstall the operating system A40. A system administrator needs to view a set of application log les contained in a folder named “logs.” Which of the following commands should be used to make this folder the current directory? ❍ A. cd logs Quick ❍ B. mv logs Answer: 33 ❍ C. dir logs e Details: 76 ❍ D. md logs A41. A system administrator is conguring a server to use eight bootable partitions on a single SSD. Which of the following partition styles would be the BEST choice for this conguration? ❍ A. MBR Quick Answer: 33 ❍ B. NTFS e Details: 77 ❍ C. diskpart ❍ D. GPT Practice Exam A - Questions 15 A42. A technician is installing a fresh Windows operating system on a le server. Unfortunately, the drive controller in the system is not recognized during the installation process. Which of the following would be the BEST way to manage this issue? ❍ A. Load third-party drivers Quick Answer: 33 ❍ B. Restart the system ❍ C. Use a remote network installation e Details: 78 ❍ D. Boot from the recovery partition A43. A user has noticed their system has been running very slowly over the last few days. ey have also noticed les stored on their computer randomly disappear after the les are saved. e user has rebooted the computer, but the same problems continue to occur. Which of the following should the user perform to resolve these issues? ❍ A. Boot to Safe Mode Quick Answer: 33 ❍ B. Release and renew the network connection ❍ C. Install anti-malware software e Details: 79 ❍ D. Upgrade the system RAM A44. A user in the sales department is attempting to upgrade the operating system of their smartphone, but the smartphone will not start the installation when selected. Which of the following is the MOST likely reason for this issue? ❍ A. Bluetooth is enabled Quick Answer: 33 ❍ B. e smartphone storage is nearly full ❍ C. Rotation lock is disabled e Details: 80 ❍ D. e phone is connected to a power source 16 Practice Exam A - Questions A45. e hard drive in a macOS desktop has failed and none of the data on the drive was recoverable. A new storage drive has now been installed. Which of the following should be used to restore the data on the computer? ❍ A. Backup and Restore Quick Answer: 33 ❍ B. Mission Control ❍ C. Time Machine e Details: 81 ❍ D. Disk Utility A46. A user purchased a copy of home tax software and has installed it on their company computer. is morning, the user logs in and nds that the tax software has been automatically removed from the system. Which of the following would be the MOST likely reason for this result? ❍ A. e company per-seat licenses are all in use Quick ❍ B. e software uses an open-source license Answer: 33 ❍ C. e user has installed a personal license e Details: 82 ❍ D. e software requires a USB key for DRM A47. A system administrator is upgrading four workstations from Windows 8.1 to Windows 10. All of the user les and applications are stored on the server, and no documents or settings need to be retained between versions. Which of these installation methods would be the BEST way to provide this upgrade? ❍ A. Factory reset Quick ❍ B. Repair installation Answer: 33 ❍ C. Clean install e Details: 83 ❍ D. In-place upgrade A48. A computer on a manufacturing oor has been identied as a malware-infected system. Which of the following should be the best NEXT step to resolve this issue? ❍ A. Disconnect the network cable Quick Answer: 33 ❍ B. Perform a malware scan ❍ C. Disable System Restore e Details: 84 ❍ D. Download the latest anti-malware signatures Practice Exam A - Questions 17 A49. A technician has been called to resolve an issue with a networked laser printer that is not printing. When the technician arrives on-site, they nd the printer will require a hardware replacement. All hardware is managed by a third-party and will take a week before the printer is operational again. Which of the following would be the technician’s best NEXT step? ❍ A. Work on the next ticket in the queue Quick Answer: 33 ❍ B. Add a follow-up event for one week later e Details: 85 ❍ C. Inform the user of the repair status ❍ D. Order a printer maintenance kit A50. An administrator is upgrading a Windows 8.1 Enterprise x64 computer to Windows 10. e user would like to maintain all applications and les during the upgrade process. Which of the following upgrade options would meet this requirement? ❍ A. Windows 10 Enterprise x86 Quick Answer: 33 ❍ B. Windows 10 Pro x64 ❍ C. Windows 10 Enterprise x64 e Details: 86 ❍ D. Windows 10 Pro x86 A51. A user in the marketing department is using an application that randomly shuts down during normal use. When the problem occurs, the application suddenly disappears and no error messages are shown on the screen. Which of the following would provide the system administrator with additional information regarding this issue? ❍ A. System Conguration Quick Answer: 33 ❍ B. Event Viewer e Details: 87 ❍ C. Device Manager ❍ D. Group Policy Editor ❍ E. SFC 18 Practice Exam A - Questions A52. A workstation on a manufacturing oor is taking much longer than normal to boot. Which of the following would be the BEST way to troubleshoot this issue? ❍ A. Replace the CPU Quick Answer: 33 ❍ B. Disable the startup applications ❍ C. Upgrade the RAM e Details: 88 ❍ D. Install the latest OS patches A53. A Windows 10 user is installing a new application that also installs a service. Which of the following permissions will be required for this installation? ❍ A. Guest Quick Answer: 33 ❍ B. Power User ❍ C. Administrator e Details: 89 ❍ D. Standard user A54. A user working from home is not able to print to a laser printer at the corporate oce. Which of the following would be the MOST likely reason for this issue? ❍ A. WPA3 settings Quick Answer: 33 ❍ B. Outdated anti-virus signatures ❍ C. Disconnected VPN e Details: 90 ❍ D. MDM conguration A55. An employee has modied the NTFS permissions on a local le share to provide read access to Everyone. However, users connecting from a dierent computer do not have access to the le. Which of the following is the reason for this issue? ❍ A. e NTFS permissions were not synchronized Quick ❍ B. Share permissions restrict access from Answer: 33 remote devices e Details: 91 ❍ C. e user is an Administrator ❍ D. Remote users are connecting with Guest accounts Practice Exam A - Questions 19 A56. A healthcare company has replaced some of their desktop computers with laptops and will be disposing of the older computers. e security administrator would like to guarantee none of the existing data on the hard drives could be recovered once the systems are sent to the recycling center. Which of the following methods would meet this requirement? Quick ❍ A. Quick format Answer: 33 ❍ B. Reinstall the OS e Details: 92 ❍ C. Remove all user folders ❍ D. Shred the drives A57. A technician has been assigned a support ticket that urgently requests a laptop repair, but there are already many open support tickets ahead of this request. e technician doesn’t recognize the name associated with the ticket. Which of these choices would be the best path to take? ❍ A. Place the ticket into the queue as rst-come, Quick rst-served Answer: 33 ❍ B. Prioritize the support tickets by device type e Details: 93 ❍ C. Triage the queue and prioritize the tickets in order of repair complexity ❍ D. Contact the end-user and determine the urgency of the repair A58. A user has received a pop up message on their computer that states applications on their computer are infected with a virus. A technician has determined that the pop up message is a hoax that needs to be removed from the computer. e technician has disabled System Restore to remove all previous restore points. Which of the following tasks would be the best NEXT step? Quick ❍ A. Update the anti-virus signatures Answer: 33 ❍ B. Educate the end-user e Details: 94 ❍ C. Schedule anti-virus scans for midnight each day ❍ D. Boot the system with the original installation media 20 Practice Exam A - Questions A59. A network administrator needs to manage a switch and rewall in the local data center. Which of the following would be the BEST choice for this requirement? ❍ A. RDP Quick Answer: 33 ❍ B. VPN ❍ C. SSH e Details: 95 ❍ D. VNC A60. A user has placed a smartphone on their desk, and they occasionally hear the sound of a camera shutter when the phone is not being used. Which of the following should a technician follow to BEST resolve this issue? Quick ❍ A. Put the phone into airplane mode Answer: 33 ❍ B. Connect to the corporate network using a VPN connection e Details: 96 ❍ C. Run an anti-malware scan on the smartphone ❍ D. Remove any paired Bluetooth devices A61. Sam, a user on the research and development team, reports that her computer displays the message “Missing operating system” during boot. A technician runs hardware diagnostics and nds that the RAM, CPU, storage drive, and power supply all pass the tests. e technician then nds that a connected USB ash drive was causing the issue. Which of the following would prevent this issue from occurring in the future? ❍ A. Create a login script Quick Answer: 33 ❍ B. Install the latest OS patches e Details: 97 ❍ C. Run SFC ❍ D. Modify the BIOS boot order Practice Exam A - Questions 21 A62. Jack, a user, has opened a help desk ticket relating to desktop alerts randomly appearing throughout the day. Most of the alerts contain information about third-party products and services. Which of the following is the MOST likely cause of these messages? ❍ A. On-path attack Quick ❍ B. Corrupted email database Answer: 33 ❍ C. OS update failure e Details: 98 ❍ D. Adware A63. In which of the following le types would a system administrator expect to see the command, “cd c:\source”? ❍ A..sh Quick ❍ B..vbs Answer: 33 ❍ C..py e Details: 99 ❍ D..bat A64. A malware infection has recently been removed from a computer. When starting the operating system, Windows shows errors during the startup process indicating some core operating system les are missing. Which of the following should be used to restore these missing les? ❍ A. gpupdate Quick Answer: 33 ❍ B. winver ❍ C. sfc e Details: 100 ❍ D. diskpart 22 Practice Exam A - Questions A65. A desktop administrator has determined that an employee in the corporate oce has been using their computer to share copyrighted materials to others on the Internet. Which of the following should be the best NEXT step? ❍ A. Create a rewall rule to block Internet access to this computer Quick ❍ B. Create a hash for each le that was shared Answer: 33 ❍ C. Compile a list of licenses for each set of e Details: 101 copyrighted materials ❍ D. Retrieve and securely store the computer A66. A system administrator would like to require a specic password complexity for all Active Directory users. Which of the following would be the BEST way to complete this requirement? ❍ A. Login script Quick Answer: 33 ❍ B. Folder redirection ❍ C. Port security e Details: 102 ❍ D. Group Policy A67. A system administrator is creating a series of shared folders that should not be visible when users browse the network for available resources. What symbol should be added to the end of a share name to provide this functionality? ❍ A.. (period) Quick Answer: 33 ❍ B. $ (dollar sign) e Details: 103 ❍ C. ! (exclamation mark / bang) ❍ D. # (hash sign / number sign) Practice Exam A - Questions 23 A68. Jack, a user, is having problems with the 802.11 wireless connection on his iOS phone. Although there are names appearing in the network list, his phone does not show any connectivity to a wireless network. Jack has conrmed that airplane mode is not enabled, Bluetooth is on, and VPN is not enabled. Which of the following is the MOST likely reason for this lack of wireless connectivity? ❍ A. e phone does not include a data plan Quick Answer: 33 ❍ B. e wireless network is disabled ❍ C. e Bluetooth connection is conicting e Details: 104 with the Wi-Fi ❍ D. e Wi-Fi password is incorrect ❍ E. e wireless radio is disabled A69. A desktop administrator is upgrading the video adapter in a workstation. Which of the following should the administrator use during this process? ❍ A. Tone generator Quick Answer: 33 ❍ B. Anti-static strap ❍ C. Safety goggles e Details: 105 ❍ D. Toner vacuum A70. A help desk director would like to identify and track computer systems that have been returned for service or moved from one location to another. Which of the following would be the BEST solution for these requirements? ❍ A. Cable labels Quick Answer: 33 ❍ B. Asset tags ❍ C. Topology diagrams e Details: 106 ❍ D. Login names 24 Practice Exam A - Questions A71. A technician is troubleshooting a computer infected with a virus. e user thought they were opening a spreadsheet, but the le was actually a virus executable. Which of the following Windows options were MOST likely associated with this issue? ❍ A. Always show icons, never thumbnails Quick Answer: 33 ❍ B. Display the full path in the title bar ❍ C. Always show menus e Details: 107 ❍ D. Hide extensions for known le types A72. A nancial management company would like to ensure mobile users are congured with the highest level of wireless encryption while working in the oce. ey would also like to include an additional user verication step during the login process. Which of the following would provide this functionality? (Choose TWO) ❍ A. RADIUS Quick ❍ B. UPnP Answer: 33 ❍ C. Multi-factor authentication e Details: 108 ❍ D. TKIP ❍ E. TACACS ❍ F. Kerberos ❍ G. WPA3 A73. A network consulting rm is upgrading the Internet rewalls for a large corporation. e proposal includes a description of the project and the network topology changes required to support the upgrade. e proposal also describes the risks involved in the process of making this upgrade. Which of the following would be the LAST step in this upgrade? ❍ A. Detailed upgrade plan Quick Answer: 33 ❍ B. Backout plan e Details: 110 ❍ C. Change control application ❍ D. End-user acceptance Practice Exam A - Questions 25 A74. An organization has been tasked with increasing the minimum password length. A systems administrator has created a policy to require all passwords to be at least ten characters long for all users. When testing this policy in the lab, a laptop computer allowed the creation of eight- character passwords. Which of the following commands should be used to apply this new policy on the laptop? ❍ A. net use Quick Answer: 33 ❍ B. gpupdate ❍ C. sfc e Details: 111 ❍ D. tasklist A75. A technician has been tasked with removing malware on a training room laptop. After updating the anti-virus software and removing the malware, the technician creates a backup of the system. After the training class ends, the technician is notied that the malware has returned. Which of the following steps was missed and caused the system to be infected again? ❍ A. Boot to a pre-installation environment Quick Answer: 33 ❍ B. Identify malware symptoms e Details: 112 ❍ C. Disable System Restore before removal ❍ D. Update to the latest BIOS version A76. A data center manager requires each server to maintain at least fteen minutes of uptime during a power failure. Which of these would be the BEST choice for this requirement? ❍ A. Cloud-based storage Quick Answer: 33 ❍ B. UPS e Details: 113 ❍ C. Redundant power supplies ❍ D. Surge suppressor 26 Practice Exam A - Questions A77. A nancial corporation is deploying tablets to their salespeople in the eld. e company would like to ensure that the data on the tablets would remain private if the devices were ever stolen or lost. Which of the following would be the BEST way to meet this requirement? ❍ A. Use full device encryption Quick Answer: 33 ❍ B. Require multi-factor authentication e Details: 114 ❍ C. Install a locator application ❍ D. Use a rewall app A78. A system administrator is adding an additional drive to a server and extending the size of an existing volume. Which of the following utilities would provide a graphical summary of the existing storage conguration? ❍ A. Disk Management Quick Answer: 33 ❍ B. Performance Monitor ❍ C. Event Viewer e Details: 115 ❍ D. Task Scheduler ❍ E. Device Manager A79. While using a laptop during presentations, a company vice president has found her system randomly locks up. While the problem is occurring, the screen continues to display the last presentation slide but none of the mouse or keyboard buttons will work. To regain control, the vice president must power down and reboot her computer. Which of the following would be the BEST option for troubleshooting this issue? Quick ❍ A. Examine the Task Manager Answer: 33 ❍ B. Install an anti-malware utility e Details: 116 ❍ C. Run the presentation software in Safe Mode ❍ D. Check the Event Viewer Practice Exam A - Questions 27 A80. A system administrator needs to upgrade a training room of twenty systems to the latest Windows version. Which of the following would be the MOST ecient method of performing this upgrade process? ❍ A. Recovery partition Quick Answer: 33 ❍ B. Remote network installation e Details: 117 ❍ C. Repair installation ❍ D. USB key A81. A user has opened a help desk ticket for application slowdowns and unwanted pop-up windows. A technician updates the anti-virus software, scans the computer, and removes the malware. e technician then schedules future scans and creates a new restore point. Which of the following should be the NEXT step in the removal process? ❍ A. Disable System Restore Quick Answer: 33 ❍ B. Update the anti-virus signatures e Details: 118 ❍ C. Quarantine the system ❍ D. Educate the end user A82. A technician is cleaning out a laser printer with a toner spill. Which of the following would be the MOST important for this cleaning process? ❍ A. ESD mat Quick Answer: 33 ❍ B. UPS ❍ C. Anti-static bag e Details: 119 ❍ D. Air lter mask 28 Practice Exam A - Questions A83. Sam, a user in the accounting department, has opened a help desk ticket due to problems accessing the website of the company’s payroll service provider. While testing other website connections on Sam’s computer, the technician nds that many pop-up windows are displayed. Which of the following would be the BEST way for the technician to resolve this issue? ❍ A. Uninstall the browser and reinstall with a dierent version Quick Answer: 33 ❍ B. Restore the workstation from a known good backup e Details: 120 ❍ C. Start in Safe Mode and connect to the payroll website ❍ D. Modify the browser’s proxy settings A84. A business partner in a dierent country needs to access an internal company server during the very early morning hours. e internal rewall will limit the partner’s access to this single server. Which of these would be the MOST important security task to perform on this server? Quick ❍ A. Install the latest OS patches Answer: 33 ❍ B. Remove the server from the Active Director y domain e Details: 121 ❍ C. Use only 64-bit applications ❍ D. Run a weekly anti-virus scan A85. A Linux administrator has been asked to upgrade the web server software on a device. Which of the following would provide the administrator with the appropriate rights and permissions for this upgrade? ❍ A. chmod Quick ❍ B. apt-get Answer: 33 ❍ C. dig e Details: 122 ❍ D. sudo Practice Exam A - Questions 29 A86. A user is connecting their laptop to an external monitor and keyboard, but the laptop goes into sleep mode if the laptop screen is shut. Which of the following would modify this conguration to keep the laptop running when the lid is closed? ❍ A. Power Options Quick Answer: 33 ❍ B. Device Manager e Details: 123 ❍ C. Personalization ❍ D. User Accounts A87. A network administrator is conguring a wireless network at a small oce. e administrator would like to allow wireless access for all computers but exclude a single kiosk in the lobby. Which of the following conguration settings would meet this requirement? ❍ A. SSID suppression Quick Answer: 33 ❍ B. Content ltering e Details: 124 ❍ C. Static IP addressing ❍ D. DHCP reservation ❍ E. MAC ltering A88. After booting, a laptop computer is showing a black screen instead of the normal Windows login prompt. e logs from the update server show drivers on the laptop were automatically updated overnight. Which of the following would be the BEST way to resolve this issue? ❍ A. Reinstall the operating system Quick Answer: 33 ❍ B. Rebuild the User Prole ❍ C. Start in VGA mode and roll back the driver e Details: 126 ❍ D. Upgrade the BIOS A89. A security administrator has received an alert that a user’s workstation in the shipping department has attempted to communicate to a command and control server for a well-known botnet. e logs on the workstation show that the user manually installed a new Internet browser the previous day. Which of the following would be the BEST next step for troubleshooting this issue? ❍ A. Uninstall the new browser Quick Answer: 33 ❍ B. Backup the user's documents ❍ C. Roll back to a previous restore point e Details: 127 ❍ D. Disable the user's account A90. A technician is installing a new wireless network in a small remote oce. Which of the following should the technician choose to provide the highest level of security on the network? ❍ A. WPA3 Quick Answer: 33 ❍ B. MAC ltering e Details: 128 ❍ C. Static IP addressing ❍ D. SSID suppression Practice Exam A - Questions 31 32 Practice Exam A - Questions Practice Exam A Multiple Choice Quick Answers A6. A A36. E A66. D A7. A A37. C A67. B A8. B A38. C A68. D A9. D A39. C A69. B A10. C A40. A A70. B A11. D A41. D A71. D A12. D A42. A A72. C and G A13. D A43. C A73. D A14. C A44. B A74. B A15. B A45. C A75. C A16. A A46. C A76. B A17. D A47. C A77. A A18. C A48. A A78. A A19. A A49. C A79. D A20. A A50. C A80. B A21. C A51. B A81. D A22. A A52. B A82. D A23. C A53. C A83. B A24. A A54. C A84. A A25. A A55. B A85. D A26. A A56. D A86. A A27. C A57. D A87. E A28. A A58. A A88. C A29. B A59. C A89. D A30. D A60. C A90. A A31. A A61. D A32. E A62. D A33. A A63. D A34. D A64. C A35. D A65. D Practice Exam A - Answers 33 34 Practice Exam A - Questions Practice Exam A Performance-Based Answers A1. A technician has recently removed malware from a Windows computer, but the technician is concerned that some of the system les may have been modied. From the command line, analyze and repair any damaged operating system les. e sfc (System File Checker) utility will scan the integrity of all protected system les and replace any les that may be corrupted. More information: 220-1102, Objective 1.2 - Windows Command Line Tools https://professormesser.link/1102010201 Practice Exam A - Answers 35 A2. A technician has been tasked with removing malware from a desktop computer. Arrange these malware removal tasks in the correct order to successfully remove the malware. Identify malware symptoms Quarantine infected systems Disable System Restore Remediate Schedule scans and run updates Enable System Restore Educate the end user To properly remove malware, it's important to follow a strict set of guidelines. Missing one of these steps or following them out of order could cause the malware to remain on the computer or to have it easily reinfect after rebooting. More information: 220-1102, Objective 3.3 - Removing Malware https://professormesser.link/1102030301 36 Practice Exam A - Answers A3. Match the technology with the description. Some descriptions will not have a match. Technologies: Descriptions: Software can be used on one computer and one EULA copy can be stored for backup purposes e EULA (End User Licensing Agreement) determines how the software can be used by the end user. e user will commonly be required to agree to the terms of the EULA before the software can be installed. A database includes all client rst names, last PII names, and home addresses PII (Personally Identiable Information) is any data that could be associated with an individual. For example, your name, address, phone number, and email address are considered PII. A backup series consists of monthly, weekly, and GFS daily backup data. GFS (Grandfather, Father, Son) is a backup strategy using three dierent backup intervals to maintain and manage large amounts of data. e grandfather backup is generally done once a month, the father backups are performed weekly, and the son backups are captured each day. e proper use of computers, tablets, and other AUP devices is part of the employee handbook. An AUP (Acceptable Use Policy) is a set of rules, regulations, or policies used to document the proper use of technology devices and software. ese guidelines are often managed through the employee handbook. Practice Exam A - Answers 37 A spark is seen and felt when touching the ESD outside case of a desktop computer. e ESD (Electrostatic Discharge) is the discharge of static electricity, and it can damage sensitive electronics equipment. A good best practice is to use anti-ESD wrist straps and pads to help prevent any type of unexpected static discharge. A company needs to dispose of recently updated MSDS batteries in twenty UPS systems. An MSDS (Material Safety Data Sheet) provides information about the composition, hazard information, rst aid measures, and more for all products with hazardous chemicals. More information: 220-1102, Objective 4.6 - Privacy, Licensing, and Policies https://professormesser.link/1102040601 More information: 220-1102, Objective 4.3 - Managing Backups https://professormesser.link/1102040301 More information: 220-1102, Objective 4.5 - Environmental Impacts https://professormesser.link/1102040501 38 Practice Exam A - Answers A4. A user needs to access a le located on the \\gate-room server. e le is located in a share called ship-diagnostics. Use the command line to connect to this share using drive g:. e Windows net use command is used to map a network share to a drive letter. e syntax is: net use drive: \\\ More information: 220-1102, Objective 1.2 e Windows Network Command Line https://professormesser.link/1102010202 Practice Exam A - Answers 39 A5. Match the commands to the description. Some descriptions will not have a match. Commands: Descriptions: dir List the contents of a Windows directory e dir (directory list) command provides a list of les and directories. gpupdate Process changes made in Group Policy Any changes made to Group Policy usually take eect during the login process. To update changes to a computer without going through the login process, it's common to run the gpupdate (Group Policy Update) command. diskpart List the volume names on a storage drive Diskpart (Disk Partitioning) provides command line access to disk and partition conguration settings. hostname Identify the name of a database server e hostname command simply displays the name of the host at the command line. is can be a very useful utility when three or more remote console windows are open. chkdsk Repair logical le system errors e chkdsk (Check Disk) command can x logical le system error and locate and recover data from bad sectors on a hard drive. cd Change to a dierent working directory e cd (Change Directory) command is used with the backslash (\) to change the working directory to a dierent volume or folder name. winver View the "About Windows" dialog e winver (Windows Version) command launches the "About Windows" dialog box from the command prompt. More information: 220-1102, Objective 1.2 - Windows Command Line Tools https://professormesser.link/1102010201 40 Practice Exam A - Answers Practice Exam A Multiple Choice Detailed Answers A6. A system administrator is installing a new server into the metal racks in a data center. During the installation process, the administrator can feel a faint tingling sensation when mounting the server. Which of the following safety systems should be tested and veried FIRST? ❍ A. Equipment grounding ❍ B. Air ltration ❍ C. Cable management ❍ D. Waste disposal regulations e Answer: A. Equipment grounding Electrical safety is one of the highest priorities because of its association with personal safety. Before a single computer can be turned on, the facility has to be properly grounded and the power systems must be installed properly. e incorrect answers: B. Air ltration Cleaning the inside of a system or printer can cause dust and particles to become airborne. Using a mask or air ltration system can keep those particles out of your mouth, nose, and lungs. C. Cable management Proper cable management will help prevent any trip hazards. Before addressing the cable management system, it will be more important to resolve any electrical problems in the facility. D. Waste disposal systems e waste disposal system would not be a cause of the electrical issues described this in question. More information: 220-1102, Objective 4.4 - Safety Procedures https://professormesser.link/1102040402 Practice Exam A - Answers 41 A7. A user has opened a help desk ticket regarding the battery life on their mobile phone. e battery in the phone held a charge for most of the day prior to connecting to the corporate network. e battery now only lasts about half a day and the back of the phone is warmer than usual. e phone is congured as follows: Storage: 216.2 GB of 512 GB used Display and Brightness: Automatic Wi-Fi: Enabled Auto-lock: Disabled VPN: Not connected Low Power Mode: Disabled Battery Maximum Capacity: 100% Which of the following changes would have the BEST impact on battery performance? ❍ A. Enable auto-lock ❍ B. Connect to the VPN ❍ C. Increase available storage space ❍ D. Disable Wi-Fi e Answer: A. Enable auto-lock e backlight of a mobile phone requires constant battery use, and the phone in an active state will use more battery than one that is locked or in a standby state. e incorrect answers: B. Connect to the VPN Connecting to a VPN would most likely increase the amount of batter y used due to the encryption and decryption that would need to occur. 42 Practice Exam A - Answers C. Increase available storage space e battery life on a phone is not based on the amount of storage space in use. Increasing storage space would not extend the life of the battery. D. Disable Wi-Fi Wi-Fi does not have a signicant impact on battery performance when compared to the screen backlight and active phone services. More information: 220-1102, Objective 3.4 - Troubleshooting Mobile Devices https://professormesser.link/1102030401 Practice Exam A - Answers 43 A8. A user in the accounting department has received this error message: “e print spooler service is not running.” e user contacts the help desk and opens a ticket for assistance. e help desk technician performs some testing and identies the issue. Which of these would be the best NEXT step? ❍ A. Reinstall all printer drivers ❍ B. Restart the spooler service ❍ C. Reboot the computer ❍ D. Power cycle the printer e Answer: B. Restart the spooler service e spooler operates as a background service in Windows. Once the problem is identied and corrected, the spooler service would need to be restarted. e incorrect answers: A. Reinstall all printer drivers e print spooler service is not dependent on the print drivers. Reinstalling print drivers would not commonly resolve a problem with the print spooler not running. C. Reboot the computer Although rebooting the computer may cause the services to restart, it's an unnecessary step that takes time away from problem resolution. It's much easier and faster to simply restart the service. D. Power cycle the printer If the print spooler service isn't running, then the printer won't receive a print job. Power cycling the printer won't cause the print spooler to restart. More information: 220-1102, Objective 3.1 - Troubleshooting Solutions https://professormesser.link/1102030102 44 Practice Exam A - Answers A9. A student would like to prevent the theft of their laptop while studying at the library. Which of the following security methods would be the BEST choice to protect this laptop? ❍ A. Biometrics ❍ B. Badge reader ❍ C. USB token ❍ D. Cable lock e Answer: D. Cable lock A cable lock is portable, it can be installed and uninstalled quickly, and it can be wrapped around an existing table or chair to prevent a computer from theft. e incorrect answers: A. Biometrics Biometrics, such as ngerprints or face scanning, is useful for preventing access through a door or to an operating system. However, biometrics won't stop someone from physically taking a laptop from a table. B. Badge reader A badge reader can be used to authenticate to a device or unlock a door, but it won't prevent a laptop from being stolen from a table. C. USB token A USB token is often used to control the use of certain applications. A USB token will not protect a laptop from being stolen. More information: 220-1102, Objective 2.1 - Physical Security https://professormesser.link/1102020101 Practice Exam A - Answers 45 A10. Rodney, a desktop technician, is cleaning the outside of computers used on a manufacturing assembly line. e assembly line creates sawdust and wood chips, so most of the computers are protected with enclosed computer cases. Which of the following would be the MOST important item for Rodney to include during this cleaning process? ❍ A. Surge suppressor ❍ B. Temperature sensor ❍ C. Face mask ❍ D. ESD mat e Answer: C. Face mask A technician working in an area of dust or debris in the air should use a face mask to prevent any particles in the air from entering their lungs. e incorrect answers: A. Surge suppressor Surge suppressors would protect systems from power surges, but it wouldn't help with the cleaning process on an assembly line. B. Temperature sensor ere's no mention of any temperature issues, so monitoring the temperature during the cleaning process would not be the most important item to include. D. ESD mat If the technicians were working inside of a computer, an ESD (Electrostatic Discharge) mat may be important to include. However, this question only mentioned cleaning the outside of the computers. More information: 220-1102, Objective 4.5 - Environmental Impacts https://professormesser.link/1102040501 46 Practice Exam A - Answers A11. A user is attempting to AirDrop a document to an associate, but they do not see any destination devices in their list of available AirDrop locations. Which of the following would be the MOST likely reason for this issue? ❍ A. Low battery ❍ B. Rotation lock is enabled ❍ C. Low storage space ❍ D. Wi-Fi and Bluetooth are disabled e Answer: D. Wi-Fi and Bluetooth are disabled An Apple iOS and iPadOS devices uses both Wi-Fi and Bluetooth to provide location and transfer functionality for AirDrop. Both wireless options should be enabled to use the AirDrop feature. e incorrect answers: A. Low battery A low battery is always a concern, but it doesn't have any direct eect on transferring les using AirDrop. B. Rotation lock is enabled e rotation lock will prevent a device from alternating between portrait and landscape views. Rotation lock does not prevent AirDrop from working properly. C. Low storage space Low storage space would not prevent a device from sending a document using AirDrop. More information: 220-1102, Objective 3.4 - Troubleshooting Mobile Devices https://professormesser.link/1102030401 Practice Exam A - Answers 47 A12. e motherboard of a server in the corporate data center has started smoking, and ames can be seen inside the computer case. Which of the following would be the BEST way to extinguish this re? ❍ A. Water-based extinguisher ❍ B. Foam-based extinguisher ❍ C. Disconnect the power ❍ D. Carbon dioxide extinguisher e Answer: D. Carbon dioxide extinguisher For an electrical re, it's best to use carbon dioxide, FM-200, or other dry chemicals to extinguish any ames. e incorrect answers: A. Water-based extinguisher Water and electricity don't go well together, and that applies just as strongly if a re is involved. B. Foam-based extinguisher Foam-based extinguishers have a similar eect as a water extinguisher, and you shouldn't use them with electrical equipment. C. Disconnect the power Although it's important to disconnect the power source, the more important task will be to put out the re. Removing the power source would not extinguish an electrical re once it has started. More information: 220-1102, Objective 4.4 - Safety Procedures https://professormesser.link/1102040402 48 Practice Exam A - Answers A13. Which of these Windows features provides full disk encryption for all data on a storage drive? ❍ A. Domain Services ❍ B. EFS ❍ C. RDP ❍ D. BitLocker e Answer: D. BitLocker BitLocker provides full disk encryption (FDE) for Windows operating system volumes. e incorrect answers: A. Domain Services Windows Domain Services are used as a centralized database for management of large-scale Windows implementations. Domain Services itself is not an encryption mechanism. B. EFS EFS (Encrypting File System) is a feature of the NTFS (NT File System) that provides encryption at the le system level. Individual les and folders can be encrypted in Windows using EFS. C. RDP RDP (Remote Desktop Protocol) is commonly used to remotely control the desktop of a Windows computer. RDP is not used for encryption of les on the system. More information: 220-1102, Objective 1.1 - Windows Features https://professormesser.link/1102010102 Practice Exam A - Answers 49 A14. A company maintains data retention requirements of ve years for all customer names, addresses, and phone numbers. Which of the following would BEST describe this data? ❍ A. Credit card transactions ❍ B. Government-issued information ❍ C. PII ❍ D. Healthcare data e Answer: C. PII PII (Personally Identiable Information) is any data which could be used to identify an individual. A name, address, and phone number would be common examples of PII. e incorrect answers: A. Credit card transactions Financial information is considered to be sensitive information, and the credit card number and transaction details are important data security concerns. B. Government-issued information Governments commonly issue documents and identication cards to support government services and documentation for the citizens. A person's name, address, and phone numbers are not commonly issued by a governmental entity. D. Healthcare data Healthcare data often contains health status information, health care records, and more. A persons name, address, and phone number are not considered to be related to healthcare data. More information: 220-1102, Objective 4.6 - Privacy, Licensing, and Policies https://professormesser.link/1102040601 50 Practice Exam A - Answers A15. A user in the accounting department would like to ensure that their mobile device data is always available. If the user's smartphone is damaged or stolen, they would like to replace the device and restore all data as quickly as possible. Which of the following would provide this functionality? ❍ A. Full device encryption ❍ B. Remote backup ❍ C. IoT isolation ❍ D. Remote wipe e Answer: B. Remote backup A cloud-based remote backup solution will constantly backup all user data to a remote service. If the device is replaced, all of the user data can be restored directly from this backup in the cloud. e incorrect answers: A. Full device encryption Most remote devices support the encryption of all data stored on the system. With this encryption enabled, a third-party with physical access to the mobile device would not be able to access the data. C. IoT isolation IoT (Internet of ings) devices can provide smart devices and wearable devices, but isolating IoT devices to their own network would not provide data recovery is a system is no longer available. D. Remote wipe If a device is stolen, it's useful to send a remote wipe command to delete everything on the device. is functionality would not backup or restore the user's data, however. More information: 220-1102, Objective 2.7 - Mobile Device Security https://professormesser.link/1102020701 Practice Exam A - Answers 51 A16. Each time a user starts a specic corporate application, a page of disclaimers and usage requirements is shown before the login prompt. Which of the following would BEST describe this page? ❍ A. Splash screen ❍ B. Acceptable use policy ❍ C. Standard operating procedures ❍ D. Topology diagram e Answer: A. Splash screen A splash screen displays a message, logo, or graphic during the startup process. is screen often contains a legal disclaimer regarding access to the system and information about the data contained in the application. e incorrect answers: B. Acceptable use policy An acceptable use policy (AUP) is a formal set of rules and regulations, and it's usually maintained in a central repository such as the employee handbook. C. Standard operating procedures Standard operating procedures (SOP) are a set of procedures for handling operations, software upgrades, and other normal and expected business functions. A list of standard operating procedures would not be shown when an application is started. D. Topology diagram Topology diagrams are useful for identifying the conguration of switches, routers, and other infrastructure devices. A topology diagram is not shown during the startup process for an application. More information: 220-1102, Objective 4.1 - Document Types https://professormesser.link/1102040103 52 Practice Exam A - Answers A17. A system administrator is troubleshooting an older application on a Windows 10 computer and needs to modify the UAC process. Which of the following options would provide access to these settings? ❍ A. Device Manager ❍ B. System Information ❍ C. Event Viewer ❍ D. User Accounts e Answer: D. User Accounts UAC (User Account Control) settings are contained in the Control Panel's User Accounts applet. e incorrect answers: A. Device Manager e Device Manager allows a user to enable, disable, and manage device drivers, but it doesn't provide any access to the UAC settings. B. System Information e System Information utility can provide information about a system's hardware, components, and software environment. UAC controls are not located in the System Information utility. C. Event Viewer e Event Viewer provides a consolidated view of all system logs, but it doesn't provide any access to the User Account Control settings. More information: 220-1102, Objective 2.5 - Windows Security Settings https://professormesser.link/1102020503 Practice Exam A - Answers 53 A18. An oce power system occasionally experiences minor voltage spikes during the business day. Which of the following would be the BEST way to address this power issue? ❍ A. Power down when not actively working ❍ B. Conrm that the building has an electrical ground ❍ C. Connect a surge suppressor to each system ❍ D. Maintain an inventory of replacement power supplies e Answer: C. Connect a surge suppressor to each system A surge suppressor can help to even out voltage spikes in an electrical system. It's common to use a surge suppressor at each workstation to limit the eect of these voltage spikes. e incorrect answers: A. Power down when not actively working Although powering down a system would certainly protect it from voltage issues, it would not be a very ecient way of working. B. Conrm that the building has an electrical ground A good ground is an important part of any building's electrical system, but the ground won't help lter out the occasional voltage spike. D. Maintain an inventory of replacement power supplies If you don't use surge suppressors and you have constant power spikes, you might need replacement power supplies. However, it would be more eective to use surge suppressors instead of replacing power supplies. More information: 220-1102, Objective 4.5 - Environmental Impacts https://professormesser.link/1102040501 54 Practice Exam A - Answers A19. What is the maximum amount of RAM supported by a 32-bit version of an operating system? ❍ A. 4 GB ❍ B. 8 GB ❍ C. 16 GB ❍ D. 192 GB e Answer: A. 4 GB e limited address space of a 32-bit operating system can only support 4 GB of system memory. e incorrect answers: B. 8 GB A 32-bit operating system is limited to 4 GB of addressable memory. Although there are some techniques to work around this 4 GB limitation, they're not often implemented in practice. C. 16 GB 4 GB is the limit for 32-bit operating systems. D. 192 GB 192 GB would be well over the limit for 32-bit operating systems. More information: 220-1102, Objective 1.7 - Installing Applications https://professormesser.link/1102010701 Practice Exam A - Answers 55 A20. Daniel, a user, is attempting to start an application on his laptop computer. Each time the application shows the starting graphic, it suddenly disappears and the application icon disappears from the taskbar. A technician would like to get more information about each previous occurrence of the application crash. Which of these choices would provide these details? ❍ A. Event Viewer ❍ B. Task Manager ❍ C. Startup Repair ❍ D. Safe Mode e Answer: A. Event Viewer Event Viewer contains a consolidated log of all system and application logs. A technician can use Event Viewer to review all past events on the system. e incorrect answers: B. Task Manager Task Manager provides a real-time view of performance across many dierent system metrics, but it doesn't provide a way to review historical performance or events. C. Startup Repair Startup Repair is a useful tool when a system is not able to boot. Startup Repair does not resolve problems with applications that will not properly start. D. Safe Mode Safe Mode useful for testing in a minimal operating system environment, but it doesn't provide any additional method of viewing application crash event logs. More information: 220-1102, Objective 1.3 e Microsoft Management Console https://professormesser.link/1102010302 56 Practice Exam A - Answers A21. An attacker is using every combination of letters, numbers, and special characters in an attempt to discover a user's password. Which of the following would describe this attack type? ❍ A. Spoong ❍ B. Social engineering ❍ C. Brute force attack ❍ D. DDoS e Answer: C. Brute force attack A brute force attack attempts to determine a user's password by trying every possible combination of letters, numbers, and special characters until the proper combination is found. e incorrect answers: A. Spoong Spoong is a technique where one device pretends to be another device. Trying every possible password option would not be associated with a spoong attack. B. Social engineering Social engineering is an attack method that uses many dierent psychological techniques to obtain access or information. A brute force attack is not categorized as social engineering. D. DDoS DDoS (Distributed Denial of Service) is an attack type that uses many dierent and distributed systems to force a service to fail. A brute force attack is not associated with a DDoS attack. More information: 220-1102, Objective 2.4 - Password Attacks https://professormesser.link/1102020405 Practice Exam A - Answers 57 A22. A system administrator is upgrading an email service in the corporate data center. During the upgrade, an error message appears and the upgrade fails. Subsequent attempts to perform the upgrade also fail. Which of the following processes should the system administrator follow to return the email server to its previous state? ❍ A. Rollback plan ❍ B. Disaster recovery plan ❍ C. Incident response plan ❍ D. Power plan e Answer: A. Rollback plan Even with the best planning, there can always be unexpected events. Every planned change needs to have a rollback plan to return the environment to its original state. e incorrect answers: B. Disaster recovery plan A disaster recovery plan is written for major events that impact a large portion of an organization. An email upgrade that goes badly does not meet the scope of needing a disaster recovery plan. C. Incident response plan An incident response plan is commonly used to address a security event. Issues discovered during the planned upgrade of an email server would not be associated with an incident response plan. D. Power plan e Windows operating system allows users to modify the power use on their systems using built in power plans. ese environmental controls are not associated with the change control process. More information: 220-1102, Objective 4.2 - Change Management https://professormesser.link/1102040201 58 Practice Exam A - Answers A23. When connecting a new USB webcam to Windows 10, a message appears stating "e controller does not have enough resources for this device." Which of the following would be the BEST next troubleshooting step? ❍ A. Close all large-memory processes ❍ B. Modify the BCD ❍ C. Move the webcam to a dierent USB interface ❍ D. Use System Restore to rollback to a previous conguration e Answer: C. Move the webcam to a dierent USB interface e resources associated with a USB (Universal Serial Bus) interface can vary based on the interface type and USB controller version. If these resources are exceeded on a USB controller, the system will display a message explaining the lack of resources. e incorrect answers: A. Close all large-memory processes e resources associated with the USB interface are not related to the available RAM in the operating system. B. Modify the BCD e Windows BCD (Boot Conguration Data) is used during startup to identify the location of the Windows installation. Updating the BCD will not resolve USB-related resource contention. D. Use System Restore to rollback to a previous conguration is issue is related to the hardware connected to a USB controller. Changing the conguration of the operating system will not resolve this issue. More information: 220-1102, Objective 3.1 - Troubleshooting Windows https://professormesser.link/1102030101 Practice Exam A - Answers 59 A24. A system administrator has created a shared folder on a server to store operating system images. Technicians access the shared folder to download the latest images when performing large-scale system installations. Which of the following will be the MOST likely method of accessing this data? ❍ A. Map the shared folder to an available drive letter ❍ B. Download the shared folder through a proxy ❍ C. Link the images to a cloud storage service ❍ D. Access the folder using a remote access client e Answer: A. Map the shared folder to an available drive letter e easiest and most ecient way for technicians to access the drive share is to map a drive letter to the share and transfer the les directly. e incorrect answers: B. Download the shared folder through a proxy ere's no mention of a proxy in the question, and adding a proxy to this process would not provide any additional features or benets. C. Link the images to a cloud storage service Operating system images are relatively large, and transferring them to an external cloud-based service would add additional time and bandwidth to resources that are already located on a local le server. D. Access the folder using a remote access client e installation of an operating system requires direct access to the installation les, and a remote access client would not provide direct access to the les. More information: 220-1102, Objective 1.6 - Windows Network Technologies https://professormesser.link/1102010601 60 Practice Exam A - Answers A25. A desktop administrator is installing a 64-bit version of Windows 10 Pro on a workstation, but the installation will not start. e workstation conguration is: 1 GHz CPU 2 GB of RAM 15 GB of free storage space 1280 x 720 video resolution Which of the following would allow this installation to proceed? ❍ A. Increase free storage space to 32 GB ❍ B. Decrease resolution to 800 x 600 ❍ C. Upgrade to a faster processor ❍ D. Increase RAM to 4 GB e Answer: A. Increase free storage space to 32 GB e latest version of Windows 10 x64 requires a minimum of 32 GB free storage space. e incorrect answers: B. Decrease resolution to 800 x 600 e only video requirement for the Windows 10 installation process is a Microsoft DirectX 9 graphics device with a WDDM driver. C. Upgrade to a faster processor e minimum supported processor to install Windows 10 is a 1 GHz CPU. D. Increase RAM to 4 GB e minimum RAM required to install Windows 10 x64 is 2 GB. More information: 220-1102, Objective 1.1 - An Overview of Windows https://professormesser.link/1102010101 Practice Exam A - Answers 61 A26. A security technician has identied malware running in the OS kernel. Traditional anti-malware scans were not able to identify any problems on the computer. Which of the following would be the BEST description of this malware? ❍ A. Rootkit ❍ B. Worm ❍ C. Botnet ❍ D. Cryptominer e Answer: A. Rootkit A rootkit is a type of malware that modies core system les and can be invisible to the operating system. In this example, malware that runs as part of the kernel and can't be seen by traditional anti-malware is a rootkit. e incorrect answers: B. Worm A virus needs a user to click on a le or to execute an application. A worm is a type of virus that doesn't need any human intervention and can self- replicate between systems. C. Botnet A botnet (robot network) is a group of computers that are under the control of a third-party. Botnets can be used to provide large-scale distributed attacks. D. Cryptominer A cryptominer is malware used to perform calculations in an eort to accumulate a cryptocurrency. is malware often uses extensive CPU cycles and causes performance issues on the system. More information: 220-1102, Objective 2.3 - Malware https://professormesser.link/1102020301 62 Practice Exam A - Answers A27. A help desk technician has been called to a training room that uses Android tablets as presentation devices. An application used for the training program will not start on any of the tablets. When the application is selected, the splash screen appears for a moment and then completely disappears with no error message. Which of the following would be the best NEXT troubleshooting step? ❍ A. Install all operating system updates ❍ B. Uninstall the application ❍ C. Power cycle the tablets ❍ D. Roll back to the previous application version e Answer: C. Power cycle the tablets Before making any changes to the operating system or application software, it would be useful to know if power cycling the tablets would have an eect. If the symptom was to disappear after the restart, then no immediate changes would be required. e incorrect answers: A. Install all operating system updates Making a change to the system without understanding the issue could cause additional problems. It would be a better practice to gather more information about the problem before making changes. B. Uninstall the application Uninstalling the application would make it very dicult to troubleshoot the application, and it's not the best possible option before gathering more information about the problem. D. Roll back to the previous application version A technician wouldn't want to make signicant changes to the application or the operating system until they knew more about the problem and tried to resolve the issue without installing or uninstalling any software. More information: 220-1102, Objective 3.4 - Troubleshooting Mobile Devices https://professormesser.link/1102030401 Practice Exam A - Answers 63 A28. A user on the headquarters network has opened a help desk ticket about their Windows desktop. When starting their computer, the login process proceeds normally but the Windows desktop takes fteen minutes to appear. Yesterday, the desktop would appear in just a few seconds. Which of the following would be the MOST likely reason for this issue? ❍ A. Slow prole load ❍ B. Incorrect boot device order ❍ C. Faulty RAM ❍ D. Incorrect username and password e Answer: A. Slow prole load A roaming user prole is commonly used on enterprise Windows networks to allow a user's desktop to follow them to any computer. When a user logs in, their prole is downloaded to the local computer. If there is any network latency to the domain controller, the login process could be signicantly slower. e incorrect answers: B. Incorrect boot device order A BIOS setting of an incorrect boot device order would cause the computer to boot a completely dierent operating system or no operating system at all. is would not be associated with a slow login process. C. Faulty RAM Faulty RAM would cause the system to fail or crash. Bad RAM would not commonly cause a login process to perform slowly. D. Incorrect username and password Incorrect login credentials would present an error message instead of slowing down the login process. More information: 220-1102,

Use Quizgecko on...
Browser
Browser