Practice Exam B - PDF

Summary

Practice Exam B contains multiple choice and performance-based questions covering computer systems, IT, Windows, and macOS concepts. The questions range from matching commands to descriptions to more complex troubleshooting scenarios.

Full Transcript

Practice Exam B Performance-Based Questions B1. Match the Windows utility to the function. Some functions will not have a match. Commands: Descriptions: Group Policy Editor View the long-term CPU utilization of a server Performance Monitor Add a partition to a vo...

Practice Exam B Performance-Based Questions B1. Match the Windows utility to the function. Some functions will not have a match. Commands: Descriptions: Group Policy Editor View the long-term CPU utilization of a server Performance Monitor Add a partition to a volume Device Manager Make a conguration change across all systems Event Viewer Schedule a batch le to run at 3 AM Update a trusted Root Certicate View the version number of a device driver View the logs associated with an application Answer Page: 163 Practice Exam B - Questions 129 B2. A network administrator is troubleshooting an intermittent Internet link outage to a server at 8.8.8.8. e administrator believes that the outage is occurring on one of the WAN connections between locations. Use a Windows network utility that can identify the router closest to the outage. Answer Page: 165 130 Practice Exam B - Questions B3. Match the scripting language with the most common use. Some uses will not have a match. Scripting Use: Language:.vbs Disable an Active Directory account.js Retrieve statistics from a network device.py Import data into an Excel spreadsheet.bat Add animation to a website login screen Compare les on a Windows workstation Move log les on a Linux server Answer Page: 166 B4. Select the Windows 10 Editions that include the following features. Some features will be included in multiple Windows 10 Editions: Domain access Home Pro Enterprise Supports 6 TB of RAM Home Pro Enterprise BitLocker Home Pro Enterprise Remote Desktop Service Home Pro Enterprise Answer Page: 168 Practice Exam B - Questions 131 B5. A system administrator is concerned that a Windows system may contain logical le system errors. Scan and repair any logical le system errors from the Windows command line. Answer Page: 169 132 Practice Exam B - Questions Practice Exam B Multiple Choice Questions B6. A technician is delivering a new laptop to a user and moving the older laptop to a dierent user. Which of the following would allow the existing hard drive to be used but prevent recovery of any of the previous user’s data? ❍ A. Regular format Quick Answer: 161 ❍ B. Run a defragmentation ❍ C. Connect the laptop to the Windows Domain e Details: 171 ❍ D. Delete the \Users folder B7. A company has just performed annual laser printer maintenance, and has accumulated hundreds of used toner cartridges. Which of the following would be the BEST way to dispose of the old cartridges? ❍ A. Take to a hazardous waste facility Quick Answer: 161 ❍ B. Return to the manufacturer ❍ C. Separate the parts and dispose of normally e Details: 172 ❍ D. Contract with an incineration company B8. A user needs to modify a spreadsheet for an upcoming meeting. e spreadsheet is currently stored on a remote computer in a shared drive. e user would like to access the shared drive as a drive letter inside of Windows File Explorer. Which of the following command line options would provide this functionality? ❍ A. tasklist Quick Answer: 161 ❍ B. net use ❍ C. diskpart e Details: 173 ❍ D. netstat Practice Exam B - Questions 133 B9. A macOS server administrator needs a backup system that will allow the recovery of data from any point in the last thirty days. Which of the following should be used for this requirement? Quick ❍ A. Backup and Restore Answer: 161 ❍ B. Remote Disc e Details: 174 ❍ C. Spaces ❍ D. Time Machine B10. Why would a technician use an ESD strap? Quick ❍ A. Protect electronic parts from extreme heat Answer: 161 ❍ B. Keep electronic parts dry and free from moisture e Details: 175 ❍ C. Prevent damage from static electricity ❍ D. Protect computer parts from dust B11. A desktop administrator is upgrading an older computer to support the 64-bit version of Windows 10 Pro. e computer currently has: 1 GHz CPU 1 GB of RAM 50 GB of free storage space 1024 x 768 video resolution Which of the following should be upgraded to support the Windows 10 installation? ❍ A. CPU Quick Answer: 161 ❍ B. RAM ❍ C. Storage space e Details: 176 ❍ D. Video resolution 134 Practice Exam B - Questions B12. Jack, a technician, is scheduled to replace a faulty motherboard today, but the motherboard delivery has been delayed and will not arrive until tomorrow. e new motherboard will repair a laptop used by a company executive. Which of the following would be the BEST way to handle these events? ❍ A. Move the installation to the next business day Quick ❍ B. Schedule another repair into today's newly Answer: 161 opened time slot e Details: 177 ❍ C. Ask the delivery company for a refund on the shipping charges ❍ D. Contact the end user and inform them of the shipping issue B13. A system administrator has been tasked with locating all of the log les contained within an application folder. e folder currently contains over a thousand les, and only a portion of them have a.log extension. Which of these Windows commands would be the BEST way to nd these les? ❍ A. sfc Quick Answer: 161 ❍ B. diskpart ❍ C. robocopy e Details: 178 ❍ D. dir B14. A user runs a corporate app on their smartphone that downloads a database each time the app is started. is download process normally takes a few seconds, but today the download is taking minutes to complete. Which of the following should a technician follow as the best NEXT troubleshooting step? ❍ A. Disable Bluetooth Quick Answer: 161 ❍ B. Run a network speed check ❍ C. Charge the smartphone battery e Details: 179 ❍ D. Check the cloud storage resource usage Practice Exam B - Questions 135 B15. A system administrator is analyzing a problem with a USB ash drive on a Windows 10 computer. When the ash drive is inserted, the CPU utilization increases to 100%. e administrator would like to disable one of the computer’s USB controllers for troubleshooting. Which of the following would provide this functionality? ❍ A. Services Quick Answer: 161 ❍ B. Performance Monitor ❍ C. Event Viewer e Details: 180 ❍ D. Device Manager B16. A user is reporting some apps launched on their mobile phone will show an error message and then disappear without starting. is problem occurs with a group of apps normally used during the work day. Which of the following tasks would be the FIRST step for troubleshooting this issue? ❍ A. Install the previous version of the apps Quick Answer: 161 ❍ B. Connect the phone to a power source ❍ C. Power cycle the phone e Details: 181 ❍ D. Disable the GPS radio B17. A technician has been asked to power down and store a server that has been exploited by an external attacker. e legal department will be performing tests and gathering information from this server. Which of the following would be MOST important to ensure the integrity of the server data? ❍ A. Report the server location to the proper channels Quick Answer: 161 ❍ B. Compile all support tickets associated with the server e Details: 182 ❍ C. Maintain a chain of custody ❍ D. Take photos of the server in the storage room 136 Practice Exam B - Questions B18. Jack, a user, has opened a help desk ticket to remove malware from his laptop. A previous removal occurred two weeks earlier with a similar malware infection. Which of the following was missed during the rst malware removal? ❍ A. Restart the computer Quick Answer: 161 ❍ B. Educate the end-user ❍ C. Enable System Protection e Details: 183 ❍ D. Quarantine infected systems B19. Which of the following features would be found in Windows 10 Pro but not in Windows 10 Home? ❍ A. 32-bit and 64-bit versions Quick ❍ B. Domain access Answer: 161 ❍ C. RDP client e Details: 184 ❍ D. Windows Workgroup B20. A medical research company is using laptop computers when visiting testing centers. e IT security team is concerned about a data breach if a laptop is lost or stolen. Which of the following would be the BEST way to manage this issue? ❍ A. BIOS password Quick ❍ B. Authenticator application Answer: 161 ❍ C. Full disk encryption e Details: 185 ❍ D. Biometric authentication ❍ E. Cable lock B21. A user would like to encrypt a small group of les in a shared folder without modifying other les on the drive. Which of the following would be the BEST way to accomplish this? ❍ A. EFS Quick Answer: 161 ❍ B. Save the les "as Administrator" ❍ C. BitLocker e Details: 186 ❍ D. Save the les with a dollar sign at the end of the lename Practice Exam B - Questions 137 B22. A mobile user is using apps on their smartphone for all business tasks. To ensure that no data will be lost, the smartphone will need to have multiple backups each day. e user travels most of the time and rarely visits the home oce. Which of the following would be the best way to provide these backups? ❍ A. Connect an external USB drive Quick Answer: 161 ❍ B. Use incremental backups each night ❍ C. Connect the smartphone to a laptop e Details: 187 ❍ D. Use a cloud backup service B23. A desktop administrator is moving an SSD from one laptop to another. Which of the following should be used to protect the SSD during the move? ❍ A. Padded envelope Quick Answer: 161 ❍ B. Anti-static bag ❍ C. Box with foam ller e Details: 188 ❍ D. Cloth wrap B24. A user is performing a series of Google searches, but the results pages are displaying links and advertisements from a dierent website. is issue occurs each time a Google search is performed. e same Google search on a dierent computer results in a normal Google results page. Which of the following would resolve this issue? ❍ A. Run the search from Safe Mode Quick Answer: 161 ❍ B. Install the latest operating system patches ❍ C. Run a malware removal utility e Details: 189 ❍ D. Login as a dierent user 138 Practice Exam B - Questions B25. Jack, a user in the accounting department, is having an issue with his smartphone reaching websites and retrieving mail when working from home. Inside the oce, the phone appears to work normally. Which of the following would be the best NEXT step for troubleshooting this issue? ❍ A. Verify the network conguration at home Quick Answer: 161 ❍ B. Install the latest operating system updates ❍ C. Connect the phone to power when working e Details: 190 at home ❍ D. Restart the smartphone after arriving at home B26. A security administrator has been asked to reinstall Windows on a web server diagnosed with a rootkit infection. Which of the following installation methods would be the BEST choice for this server? ❍ A. In-place upgrade Quick Answer: 161 ❍ B. Remote network installation ❍ C. Clean install e Details: 191 ❍ D. Repair installation B27. A local coee shop has a public wireless network for customers and a private wireless network for company devices. e shop owner wants to be sure that customers can never connect to the company network. Which of the following should be congured on this network? ❍ A. Install a new access point for company devices Quick ❍ B. Congure WPA3 on the company network Answer: 161 ❍ C. Require static IP addresses on the customer e Details: 192 network ❍ D. Assign MAC lters to the company network ❍ E. Use a rewall between the customer and corporate network Practice Exam B - Questions 139 B28. A user in the shipping department has logged into the Windows domain. However, the desktop does not show the user’s normal wallpaper and all of the user’s spreadsheets and documents in the “My Documents” folder are missing. Which of these would be the BEST way to restore the user’s normal work environment? ❍ A. Rename the user’s folder and delete their prole in the registry Quick ❍ B. Boot into Safe Mode and disable all startup Answer: 161 applications e Details: 193 ❍ C. Add the user to the Administrator group ❍ D. Update to the latest operating system version B29. A company’s shipping department maintains ten dierent computers to print shipping labels and track outgoing shipments. All of the systems are displaying an error when they access a third-party shipping management website over a secure connection. Which of the following would be the MOST likely reason for this issue? ❍ A. e computers have not been updated with the latest OS patches Quick Answer: 161 ❍ B. e website certicate has expired ❍ C. e local computer storage drives are not e Details: 194 encrypted ❍ D. e systems are infected with malware B30. A manufacturing company performs a third-party audit of their accounting records each year. e auditors use laptops provided by the company to access internal resources. When the audit is complete, the auditors should be prevented from logging on until the following audit process begins. Which of the following would be the BEST way to accomplish this? ❍ A. Uninstall the audit software Quick Answer: 161 ❍ B. Disable the user accounts between audits ❍ C. Remove the auditor accounts from all e Details: 195 Windows groups ❍ D. Require two-factor authentication for the auditor accounts 140 Practice Exam B - Questions B31. A manufacturing company is donating some older computers to a local charity. Which of the following should be done to ensure that the existing hard drives could still be used but none of the existing data would be recoverable? ❍ A. Degaussing Quick Answer: 161 ❍ B. Regular format ❍ C. Shredder e Details: 196 ❍ D. Quick format B32. A user's video editing workstation often performs an overnight rendering process. On some mornings, the user is presented with a login screen instead of the rendering completion page. A technician nds the building occasionally loses power overnight. Which of the following should be used to avoid these issues with the video editing workstation? Quick ❍ A. Use a surge suppressor Answer: 161 ❍ B. Save the rendered le to an external storage drive e Details: 197 ❍ C. Create a separate partition for user documents ❍ D. Install a UPS B33. A desktop administrator is troubleshooting an older computer that has been slowing down as more applications and les are stored on the hard drive. Which of the following commands would be the BEST choice for increasing the performance of this computer? ❍ A. defrag Quick Answer: 161 ❍ B. format ❍ C. sfc e Details: 198 ❍ D. xcopy ❍ E. winver Practice Exam B - Questions 141 B34. A user is receiving alerts on their desktop computer stating, "Access to this PC has been blocked for security reasons." A technician has determined this message was not created by the company's security software. Which of the following would be the best NEXT step in this troubleshooting process? Quick Answer: 161 ❍ A. Update the desktop computer operating system ❍ B. Check the certicate of the corporate web server e Details: 199 ❍ C. Restart the desktop computer ❍ D. Run an anti-malware utility B35. A system administrator has inadvertently installed a Trojan horse that has deleted a number of les across many Windows le shares. e Trojan also had access to user documents and login credentials and transmitted numerous documents to an o-site le storage system. Which of the following would limit the scope of future exploits? ❍ A. Require multi-factor authentication Quick Answer: 161 ❍ B. Disable all guest accounts ❍ C. Modify the default permissions e Details: 200 ❍ D. Congure full disk encryption ❍ E. Require complex passwords ❍ F. Require a screensaver password B36. A technician has created a Windows image that can be used across all of the computers in a test lab. Which of the following would be the best way to deploy these images? ❍ A. Clean install Quick Answer: 161 ❍ B. Remote network installation ❍ C. Repair installation e Details: 202 ❍ D. Remote Disc 142 Practice Exam B - Questions B37. Which of the following Windows Share permissions has the priority when assigning access on a mapped drive? ❍ A. Allow Quick Answer: 161 ❍ B. Full control ❍ C. List folder contents e Details: 203 ❍ D. Deny B38. A data center manager would like to ensure that a power fault on a server would not be harmful to employees. Which of the following would be the BEST choice for this requirement? ❍ A. Electrical ground Quick Answer: 161 ❍ B. Battery backup ❍ C. Air lter mask e Details: 204 ❍ D. ESD mat B39. A user in the shipping department has received a call from someone claiming to be from the IT Help Desk. e caller asks the user to disclose their location, employee ID, and login credentials. Which of the following would describe this situation? ❍ A. Denial of service Quick Answer: 161 ❍ B. Social engineering ❍ C. Brute force e Details: 205 ❍ D. Shoulder surng B40. A desktop administrator has just removed malware from a user’s desktop computer and has congured the system to automatically update anti-virus signatures and perform a scan each night. Which of the following should be the NEXT step in the removal process? ❍ A. Enable System Protection Quick Answer: 161 ❍ B. Educate the end-user ❍ C. Quarantine the computer e Details: 206 ❍ D. Boot to Safe Mode Practice Exam B - Questions 143 B41. A security administrator is installing a new VPN connection for remote users. e administrator would like all users to authenticate with their Windows Active Directory credentials. Which of the following technologies would provide this functionality? ❍ A. RADIUS Quick ❍ B. WPA3 Answer: 161 ❍ C. TKIP e Details: 207 ❍ D. AES B42. Which of the following partition types limit a Windows installation to a maximum partition size of 2 TB? ❍ A. FAT32 Quick ❍ B. GPT Answer: 161 ❍ C. APFS e Details: 208 ❍ D. MBR B43. A system administrator has just updated fty servers to the latest version of an application, and the updated software has been working as expected for the last three days. Which of the following change management steps should be followed NEXT? ❍ A. Create a backout plan Quick Answer: 161 ❍ B. Determine the scope of the changes ❍ C. Document the changes e Details: 209 ❍ D. Determine the risk for the upgrade process B44. A help desk technician has been tasked with rebuilding an email server that recently crashed. Which of the following would be the BEST source for this information? ❍ A. Compliance report Quick Answer: 161 ❍ B. Acceptable use policies ❍ C. Network topology map e Details: 210 ❍ D. Knowledge base 144 Practice Exam B - Questions B45. A server administrator is installing a 4 TB drive in a database server and would like to use all free space as a single partition. Which of the following technologies should be used with this drive? ❍ A. FAT32 Quick Answer: 161 ❍ B. MBR ❍ C. Active Directory e Details: 211 ❍ D. GPT B46. A user has called the help desk to get assistance with random blue screens on their Windows 10 laptop. e technician nds CPU utilization is constantly high, and many network sites are unavailable or only load half of the site content. e user mentions some random pop- up messages have appeared on the desktop during the workday. Which of the following would be the MOST likely reason for these issues? ❍ A. Storage drive is failing Quick Answer: 161 ❍ B. Network proxy settings are incorrect ❍ C. Operating system needs to be updated e Details: 212 ❍ D. Laptop has a malware infection ❍ E. Video subsystem is faulty B47. A technician is troubleshooting an issue with an iOS tablet randomly restarting during normal use. A check of the device shows no signicant application updates and the operating system was upgraded to a new version three days ago. e user states the tablet was working normally last week. Which of the following would be the MOST likely reason for these random reboots? ❍ A. Faulty OS upgrade Quick Answer: 161 ❍ B. Invalid device certicate ❍ C. Malware infection e Details: 213 ❍ D. Faulty battery ❍ E. Incorrect network settings Practice Exam B - Questions 145 B48. A system administrator needs to modify a le in the \Windows\Installer directory, but the folder doesn’t appear in the le list. Which of these options would help the system administrator with this task? ❍ A. Safe Mode Quick Answer: 161 ❍ B. File Explorer Options ❍ C. User Accounts e Details: 214 ❍ D. Internet Options B49. A Linux administrator is modifying a log le and needs to rename the le. Which of the following should be used to make this change? ❍ A. rm Quick Answer: 161 ❍ B. mv ❍ C. mkdir e Details: 215 ❍ D. pwd B50. A desktop administrator is troubleshooting poor performance on a user’s laptop computer. e system takes an excessive amount of time during the boot process, and pop up messages appear while using the word processor and spreadsheet applications. Which of the following steps should the technician do NEXT? ❍ A. Educate the end-user Quick ❍ B. Schedule periodic anti-virus scans Answer: 161 ❍ C. Enable System Protection e Details: 216 ❍ D. Disconnect the laptop from the network B51. Jack, an executive, has a laptop that runs very slowly after login and continues running slowly throughout the day. Jack has complained that certain applications cannot be started and others will randomly crash. A check of the laptop shows that the memory utilization is very close to 100%. Which of the following would provide a short- term x for this issue? ❍ A. Disable startup items Quick Answer: 161 ❍ B. Update to the latest OS patches ❍ C. Defragment the hard drive e Details: 217 ❍ D. Reboot the computer 146 Practice Exam B - Questions B52. A help desk technician needs to view and control the desktop of a Windows computer at a remote location. Which of the following would be the BEST choice for this task? ❍ A. VPN Quick Answer: 161 ❍ B. VNC ❍ C. SSH e Details: 218 ❍ D. RDP B53. A technician would like to modify a conguration in a user's UEFI BIOS, but the system will not provide a BIOS conguration hotkey after shutting down and powering on the computer. Which of the following would be the BEST way to address this issue? ❍ A. Change the File Explorer Options Quick Answer: 161 ❍ B. Modify the Indexing Options ❍ C. Turn o Fast Startup e Details: 219 ❍ D. Start the computer in Safe Mode ❍ E. Modify the Ease of Access settings B54. A user has noticed their mouse arrow has been moving around the screen without any user intervention. e user has watched the mouse opening applications and changing settings in the Control Panel. Which of the following would be the BEST way for an administrator to resolve this issue? ❍ A. Turn the rewall o and back on again Quick ❍ B. Run an anti-virus scan Answer: 161 ❍ C. Remove all recently installed applications e Details: 220 ❍ D. Upgrade to the latest OS patches Practice Exam B - Questions 147 B55. A server administrator has been planning an operating system upgrade for a group of important services. e administrator has provided a detailed scope and risk assessment of the change, and the plan has been documented. However, the end-user acceptance approvals weren’t completed until Friday afternoon, so the change cannot occur over the weekend. Which of the following is preventing the upgrade from occurring? ❍ A. Upgrade le availability Quick Answer: 161 ❍ B. Change board approval ❍ C. Not enough time to complete the upgrade e Details: 221 ❍ D. Need more people for the upgrade process B56. A user receives a browser security alert on his laptop when visiting any website that uses HTTPS. If he uses his smartphone, he does not receive any error messages. Which of the following would BEST describe this situation? ❍ A. e date and time on the laptop is incorrect Quick Answer: 161 ❍ B. e smartphone is not updated with the latest OS version e Details: 222 ❍ C. e laptop has an incorrect subnet mask ❍ D. e laptop does not have the latest anti-virus signatures B57. A user on the sales team has opened a help desk ticket because of short battery times on a new company- provided tablet. When using the tablet, the battery only lasts a few hours before shutting o. Which of the following would be the BEST choices for improving the battery life? (Select TWO) ❍ A. Install the latest operating system patches Quick Answer: 161 ❍ B. Increase the brightness levels ❍ C. Connect to the corporate VPN e Details: 223 ❍ D. Disable Bluetooth and cellular connections ❍ E. Close apps that work in the background ❍ F. Perform a soft reset 148 Practice Exam B - Questions B58. A system administrator would like to perform a Windows installation while users are away from their desks. Which of the following would be the BEST option for this installation? ❍ A. Unattended install Quick Answer: 161 ❍ B. Multiboot ❍ C. Repair installation e Details: 224 ❍ D. In-place upgrade B59. A user in the accounting department has installed a new application for the upcoming tax year. Although the current application worked perfectly, the newer application runs signicantly slower. Which of the following should be the FIRST troubleshooting step? ❍ A. Roll back to the previous application Quick Answer: 161 ❍ B. Run a repair installation ❍ C. Verify the requirements for the new application e Details: 225 ❍ D. Perform a system le check B60. A macOS user needs encrypt all of the information on their laptop. Which of the following would be the BEST choice for this requirement? ❍ A. Spaces Quick Answer: 161 ❍ B. Remote Disc ❍ C. FileVault e Details: 226 ❍ D. Keychain B61. A data center manager is installing a new access door that will require multi-factor authentication. Which of the following should be used to meet this requirement? (Select TWO) ❍ A. Cabinet locks Quick Answer: 161 ❍ B. Key fobs ❍ C. Privacy lter e Details: 227 ❍ D. Palmprint scanner ❍ E. USB lock ❍ F. Cable lock Practice Exam B - Questions 149 B62. A user has opened a help desk ticket regarding the battery life in her three-year old smartphone. If a power source is not available, the phone battery is usually depleted by the middle of the work day. She uses the smartphone to access resources across the VPN, send and receive email, and run company-related apps. Her average screen time during the day usually exceeds six hours. Which of the following would be the MOST likely reason for this battery issue? ❍ A. e phone is consuming more power than usual Quick ❍ B. e battery capacity is decreased Answer: 161 ❍ C. e company apps need to be updated e Details: 228 ❍ D. e LCD screen is faulty B63. An administrator has identied and removed malware on a corporate desktop computer. Which of the following malware removal steps should be performed NEXT? ❍ A. Disconnect the computer from the corporate network Quick ❍ B. Educate the end-user Answer: 161 ❍ C. Schedule periodic anti-virus scans e Details: 229 ❍ D. Disable System Restore B64. A graphics designer has been editing image les that have become increasingly large over the last few months. e designer is now receiving error messages from their graphics application complaining of low temporary le cache space. Which of the following would be the best NEXT step? Quick ❍ A. Replace all system RAM Answer: 161 ❍ B. Increase available storage space ❍ C. Roll back to a previous restore point e Details: 230 ❍ D. Rebuild the user's prole 150 Practice Exam B - Questions B65. A network administrator is installing a set of upgraded Internet routers in the data center. Which of the following would be the best choices to secure the access to the internal data center door? (Select TWO) ❍ A. Biometric lock Quick Answer: 161 ❍ B. ACL ❍ C. Bollard e Details: 231 ❍ D. Additional lighting ❍ E. Motion sensor ❍ F. Access control vestibule B66. An administrator is troubleshooting an error message that appears each time an application is started. e administrator has uninstalled and reinstalled the application, but the error message still appears. Which of the following would be the BEST next troubleshooting step? Quick Answer: 161 ❍ A. Use Performance Manager to monitor the system ❍ B. Check the Event Viewer logs e Details: 232 ❍ C. View the hardware settings in Device Manager ❍ D. Disable unneeded background processes in Services B67. A user in the accounting department has received an email asking for payment of an outstanding invoice and a link to a third-party payment site. e email contains purchase information that appears to be correct, but additional research shows that the invoice number is not valid. Which of the following would BEST describe this attack type? ❍ A. Phishing Quick Answer: 161 ❍ B. Denial of service ❍ C. Shoulder surng e Details: 233 ❍ D. Evil twin Practice Exam B - Questions 151 B68. A user has dropped o their laptop at the repair desk. A message taped to the laptop states: "Doesn't work." Which of the following would be the BEST next step? ❍ A. Start the laptop and look for any issues Quick Answer: 161 ❍ B. Call the customer and ask for more information ❍ C. Replace the power adapter and try booting e Details: 234 the laptop ❍ D. Use a diagnostics boot CD to run hardware tests B69. Which of these describes a free, open-source operating system? ❍ A. macOS Quick Answer: 161 ❍ B. Linux ❍ C. Windows e Details: 235 ❍ D. iOS B70. An IT manager would like to provide users with the option to recover daily versions of documents and spreadsheets. A user will have the option to roll back to any daily version in the last month. Which of the following would be the BEST way to implement this feature? ❍ A. Create a le-level backup each day Quick Answer: 161 ❍ B. Maintain a monthly image level backup ❍ C. Store full backup tapes at an o-site facility e Details: 236 ❍ D. Assign each user a USB ash drive B71. A network administrator has a report showing a single user with numerous visits to a website. is website is known to violate the company’s AUP. Which of the following should the administrator do NEXT? ❍ A. Create a rewall lter to block the website ❍ B. Scan all computers with the latest anti-malware signatures Quick Answer: 161 ❍ C. Contact the company’s security ocer ❍ D. Change the user’s password e Details: 237 152 Practice Exam B - Questions B72. Which of the following script extensions would commonly be used inside of a Microsoft Oce application? ❍ A..vbs Quick Answer: 161 ❍ B..py ❍ C..bat e Details: 238 ❍ D..js B73. A system administrator has installed a SOHO network of ve Windows computers. e administrator would like to provide a method of sharing documents and spreadsheets between all of the oce computers. Which of the following would be the BEST way to provide this functionality? ❍ A. Domain Quick ❍ B. Proxy server Answer: 161 ❍ C. Workgroup e Details: 239 ❍ D. Remote Desktop B74. An employee used their tablet to take pictures of the company's newest product. ose pictures were posted on an industry rumor website the following week. Which of the following should be evaluated as the MOST likely security concern? ❍ A. Cloud storage Quick Answer: 161 ❍ B. USB ash drive use ❍ C. Application updates e Details: 240 ❍ D. Deleted email messages B75. A manufacturing company in the United States sells monthly subscriptions from their website. Which of the following regulated data types would be the MOST important to manage? ❍ A. Personal government-issued information Quick Answer: 161 ❍ B. Credit card transactions ❍ C. Healthcare data e Details: 241 ❍ D. Software license terms Practice Exam B - Questions 153 B76. A user is traveling to a conference, and they would like to be sure that any messages sent from their phone during the event remain private while using the event’s wireless network. Which of the following should be congured on this user’s phone? ❍ A. VPN Quick Answer: 161 ❍ B. Strong password ❍ C. Network-based rewall e Details: 242 ❍ D. Multi-factor authentication B77. A company is installing a new wireless access point in a conference room. Which of the following would provide the BEST security for this network? ❍ A. SSID Quick Answer: 161 ❍ B. WPA3 ❍ C. TKIP e Details: 243 ❍ D. Kerberos B78. A server administrator has congured an automated process to backup VM snapshots each evening during non-working hours. e backups will be stored on a series of high-density tape drives. How can the administrator conrm that these backups will be useful when a server recovery is needed? ❍ A. Send the backups to an o-site facility Quick Answer: 161 ❍ B. Connect the tape drives to a battery backup ❍ C. Create separate le-level backups e Details: 244 ❍ D. Perform occasional recovery tests B79. A system administrator needs to congure a laptop to support inbound Remote Desktop services for the help desk team. Which of these Control Panel features provides access to these settings? ❍ A. Internet Options Quick Answer: 161 ❍ B. Devices and Printers ❍ C. Network and Sharing Center e Details: 245 ❍ D. System 154 Practice Exam B - Questions B80. A user has dropped o a laptop to the help desk and states the laptop is experiencing a problem during the boot process. Which of these options would be the best path to resolve this issue? ❍ A. When the customer provides enough information, stop them and let them know when they can pick up the laptop Quick ❍ B. Take the laptop and tell the customer to return Answer: 161 tomorrow e Details: 246 ❍ C. Repeat an understanding of the issue back to the customer for verication ❍ D. Provide recommendations to the customer with proper technical IT explanations B81. A technician is upgrading the motherboard in a server. Which of the following should be the FIRST task when beginning this upgrade? ❍ A. Wear safety goggles Quick Answer: 161 ❍ B. Connect an ESD strap ❍ C. Remove any motherboard batteries e Details: 247 ❍ D. Disconnect from all power sources B82. A system administrator is installing a new video editing application on a user’s workstation from an installation USB ash drive. However, the installation process fails due to lack of available drive space. Which of the following would be the BEST way to complete the installation process? ❍ A. Use a share drive for the installation source Quick Answer: 161 ❍ B. Compress the installation les ❍ C. Install the application to a network share e Details: 248 ❍ D. Manually copy the installation les to the application directory Practice Exam B - Questions 155 B83. A user would like to install an image and photo editing program on their home computer, but they would prefer an application without a monthly subscription. Which of the following would be the BEST licensing option for this requirement? ❍ A. Open-source Quick Answer: 161 ❍ B. Corporate ❍ C. Personal e Details: 249 ❍ D. DRM B84. A system administrator is troubleshooting an application issue. e application uses an increasing amount of memory until all available RAM is eventually depleted. e computer must be rebooted every few days when this memory issue occurs. Which of the following utilities would show how much RAM is used by this application? ❍ A. Event Viewer Quick ❍ B. Device Manager Answer: 161 ❍ C. Task Manager e Details: 250 ❍ D. Programs and Features B85. An administrator is troubleshooting a desktop computer experiencing a reboot issue. Before the Windows login screen appears, the system reboots in a continuous loop. Which of the following would be the BEST way to address this issue? Quick Answer: 161 ❍ A. Start Safe Mode and perform a defragmentation ❍ B. Reinstall the operating system from the original e Details: 251 media ❍ C. Update the boot order from the system BIOS ❍ D. Run Startup Repair from the Advanced Boot Options 156 Practice Exam B - Questions B86. A user has downloaded a browser add-on that assists with new car purchases. During the installation, the Windows UAC is requesting administrative permissions to continue with the install. Which of these is the MOST likely situation? ❍ A. e operating system requires an update Quick ❍ B. e software is a Trojan horse Answer: 161 ❍ C. e workstation is already part of a botnet e Details: 252 ❍ D. A worm will be downloaded and installed B87. An organization has distributed new laptops to all of their home-oce employees. Although the users at home can successfully connect through the Internet to resources at the corporate oce, there have been complaints that printers and shared drives at home are not accessible. Which of the following would explain this issue? ❍ A. Incorrect login credentials Quick Answer: 161 ❍ B. Port security is turned on ❍ C. e corporate VPN is enabled e Details: 253 ❍ D. Blocked by DLP B88. A user on the marketing team is experiencing slower load times and ongoing sluggishness with applications on their laptop. A technician examines the Windows Update logs and nds the monthly updates are failing. Which of the following should be the best NEXT step for resolving this issue? ❍ A. Perform an anti-malware scan Quick Answer: 161 ❍ B. Install the Windows Updates manually ❍ C. Increase the amount of RAM in the laptop e Details: 254 ❍ D. Re-install the applications Practice Exam B - Questions 157 B89. A desktop administrator is troubleshooting an error that randomly causes a workstation to spike to 100% utilization. Which of these utilities would help the administrator track and report on system utilization over a 24-hour period? ❍ A. Performance Monitor Quick ❍ B. Device Manager Answer: 161 ❍ C. Services e Details: 255 ❍ D. Task Scheduler B90. Which of these would be the BEST way to prevent an attacker from modifying default routes on a SOHO wireless network? ❍ A. Congure MAC address ltering Quick Answer: 161 ❍ B. Enable WPS connectivity ❍ C. Change the router's default password e Details: 256 ❍ D. Disable unneeded interfaces 158 Practice Exam B - Questions Practice Exam B - Questions 159 160 Practice Exam B - Questions Practice Exam B Multiple Choice Quick Answers B6. A B36. B B66. B B7. A B37. D B67. A B8. B B38. A B68. B B9. D B39. B B69. B B10. C B40. A B70. A B11. B B41. A B71. C B12. D B42. D B72. A B13. D B43. C B73. C B14. B B44. D B74. A B15. D B45. D B75. B B16. C B46. D B76. A B17. C B47. A B77. B B18. B B48. B B78. D B19. B B49. B B79. D B20. C B50. D B80. C B21. A B51. A B81. D B22. D B52. D B82. C B23. B B53. C B83. A B24. C B54. B B84. C B25. A B55. B B85. D B26. C B56. A B86. B B27. B B57. D and E B87. C B28. A B58. A B88. A B29. B B59. C B89. A B30. B B60. C B90. C B31. B B61. B and D B32. D B62. B B33. A B63. C B34. D B64. B B35. C B65. A and F Practice Exam B - Answers 161 162 Practice Exam B - Answers Practice Exam B Performance-Based Answers B1. Match the Windows utility to the function. Some functions will not have a match. Commands: Descriptions: Group Policy Editor Make a conguration change across all systems e Group Policy Editor allows an administrator to make conguration changes to devices on an Active Directory network. Performance Monitor View the long-term CPU utilization of a server Performance Monitor can gather long-term statistics of OS metrics, set alerts and automated actions, store statistics, and display built-in reports. Device Manager View the version number of a device driver All hardware is managed through the Windows Device Manager. Device drivers and hardware congurations can be managed through the Device Manager utility. Event Viewer View the logs associated with an application e Windows Event Viewer is a central log consolidation tool for applications, security events, setup messages, and system details. Unused functions: Task Scheduler Schedule a batch le to run at 3 AM e Windows Task Scheduler allows the user or administrator to run scripts or applications at designated times. Practice Exam B - Answers 163 Disk Management Add a partition to a volume e Disk Management utility allows the administrator to create, change, remove, or format partitions on a storage drive. Certicate Manager Update a trusted Root Certicate e Windows Certicate Manager is used to view, add, or remove local certicates. More information: 220-1102, Objective 1.3 e Microsoft Management Console https://professormesser.link/1102010302 164 Practice Exam B - Answers B2. A network administrator is troubleshooting an intermittent Internet link outage to a server at 8.8.8.8. e administrator believes that the outage is occurring on one of the WAN connections between locations. Use a Windows network utility that can identify the router closest to the outage. e tracert (traceroute) command will display a list of all network hops between two devices. If a route is down, the tracert output will show the last hop before the faulty link. More information: 220-1102, Section 1.2 e Windows Network Command Line https://professormesser.link/1102010202 Practice Exam B - Answers 165 B3. Match the scripting language with the most common use. Some uses will not have a match. Scripting Language: Use:.vbs Import data into an Excel spreadsheet VBScript, (.vbs) (Microsoft Visual Basic Scripting Edition) can be used for many Windows-related scripting purposes, and one of the most common is to automate the functionality of Microsoft Oce applications..js Add animation to a website login screen JavaScript (.js) is used on many web sites to enhance the functionality within a user's browser. is can be used for automation, tracking, interactivity features, and to extend the functionality of the browser..py Retrieve statistics from a network device Python (.py) is a scripting language that can handle almost anything, including a number of tasks in this list. However, Python is the best t for a scripting language that can inter-operate with other devices, including devices across the network..bat Compare les on a Windows workstation A batch le (.bat) commonly runs in the console or command line of a Windows device, and it can automate the same processes that a user would perform manually at the Windows command prompt. 166 Practice Exam B - Answers Unused options:.sh Move log les on a Linux server A shell script (.sh) commonly runs at the command prompt, or shell, of a Unix or Linux device. Since most Linux features can be managed from the command line, shell scripts are powerful automation options..ps1 Disable an Active Directory account PowerShell (.ps1) is a Windows-only scripting environment that extends the functionality of the traditional Windows command line. PowerShell extends the functionality of the command prompt to enable the automation of internal Windows and Active Directory functions. More information: 220-1102, Objective 4.8 - Scripting Languages https://professormesser.link/1102040801 Practice Exam B - Answers 167 B4. Select the Windows 10 Editions that include the following features. Some features will be included in multiple Windows 10 Editions: Domain access Pro Enterprise Connecting to a Windows Domain isn't something you would commonly see on a Home computer, and that feature is only available in Windows 10 Pro and higher editions. Supports 6 TB of RAM Enterprise e maximum RAM supported for Windows 10 Home x64 is 128 GB, the Pro x64 edition supports 2 TB maximum, and the Enterprise edition of Windows 10 x64 supports a maximum of 6 TB. BitLocker Pro Enterprise BitLocker encrypts the entire volume in the Windows operating system, but this feature is not fully implemented in the Home edition of Windows 10. Remote Desktop Service Pro Enterprise e service used by the Remote Desktop Client is not available in Windows 10 Home Edition. More information: 220-1102, Objective 1.1 - Windows Features https://professormesser.link/1102010102 168 Practice Exam B - Answers B5. A system administrator is concerned that a Windows system may contain logical le system errors. Scan and repair any logical le system errors from the Windows command line. e chkdsk (Check Disk) command is used to identify and x logical le system errors and bad physical sectors. e /f option will x the logical le system and the /r option will locate bad sectors and attempt to recover any readable data. In this example, the administrator would run this from the command line: chkdsk /f e scanning and repair process is often completed during a reboot: More information: 220-1102, 1.2 - Windows Command Line Tools https://professormesser.link/1102010201 Practice Exam B - Answers 169 170 Practice Exam B - Answers Practice Exam B Multiple Choice Detailed Answers B6. A technician is delivering a new laptop to a user and moving the older laptop to a dierent user. Which of the following would allow the existing hard drive to be used but prevent recovery of any of the previous user’s data? ❍ A. Regular format ❍ B. Run a defragmentation ❍ C. Connect the laptop to the Windows Domain ❍ D. Delete the \Users folder e Answer: A. Regular format A regular format in Windows will overwrite each sector with zeros and prevent data recovery. e incorrect answers: B. Run a defragmentation Although a defragmentation can overwrite some data, there's no guarantee that defragmenting the drive will result in overwriting all of the data. Recovery software may still be able to undelete data after a defragmentation has completed. C. Connect the laptop to the Windows Domain Associating a device to the Windows Domain allows it to be centrally managed, but it does not provide any protection of data on the hard drive. D. Delete the \Users folder e standard delete command in Windows does not overwrite any data on the hard drive. Recovery software can be used to view and save the previously deleted data. More information: 220-1102, Objective 2.8 - Data Destruction https://professormesser.link/1102020801 Practice Exam B - Answers 171 B7. A company has just performed annual laser printer maintenance, and has accumulated hundreds of used toner cartridges. Which of the following would be the BEST way to dispose of the old cartridges? ❍ A. Take to a hazardous waste facility ❍ B. Return to the manufacturer ❍ C. Separate the parts and dispose of normally ❍ D. Contract with an incineration company e Answer: A. Take to a hazardous waste facility e toner in a laser printer cartridge can be harmful, so it's important to dispose of the cartridges at a local hazardous waste facility. e incorrect answers: B. Return to the manufacturer e manufacturer of the equipment does not have a responsibility to accept old product returns. Once the equipment is purchased, it's the owner's responsibility to properly dispose of the equipment. C. Separate the parts and dispose of normally ere's no need to separate the parts of a toner cartridge, and it would probably create a large mess and put toner particles into the air. Even if the cartridges were dismantled, they would not be thrown out with the normal trash. D. Contract with an incineration company Toner cartridges should not be incinerated, and instead should be properly disposed of at a local hazardous waste utility. More information: 220-1102, Objective 4.5 - Environmental Impacts https://professormesser.link/1102040501 172 Practice Exam B - Answers B8. A user needs to modify a spreadsheet for an upcoming meeting. e spreadsheet is currently stored on a remote computer in a shared drive. e user would like to access the shared drive as a drive letter inside of Windows File Explorer. Which of the following command line options would provide this functionality? ❍ A. tasklist ❍ B. net use ❍ C. diskpart ❍ D. netstat e Answer: B. net use e net use command will assign a local drive letter to a network share. Once the net use command is completed, the drive letter can be used to reference the share in all applications and in the File Explorer. e incorrect answers: A. tasklist e tasklist command will display a list of all running processes in the operating system. e tasklist command will not associate a drive letter with a Windows share. C. diskpart e diskpart command is used to manage disk congurations, partitions, and volumes. e diskpart command is not used for drive letters and shares. D. netstat e netstat utility will display network statistics relating to active connections, application usage, and network activity. e netstat command does not associate drive letters with Windows shares. More information: 220-1102, Objective 1.2 e Windows Network Command Line https://professormesser.link/1102010202 Practice Exam B - Answers 173 B9. A macOS server administrator needs a backup system to allow the recovery of data from any point in the last thirty days. Which of the following should be used for this requirement? ❍ A. Backup and Restore ❍ B. Remote Disc ❍ C. Spaces ❍ D. Time Machine e Answer: D. Time Machine e backup utility included with macOS is called Time Machine. Time Machine will create backups automatically and maintain as many days as the backup media's free space can store. e incorrect answers: A. Backup and Restore e Windows backup utility is called Backup and Restore. ese backups are not compatible with the macOS operating system. B. Remote Disc Remote Disc allows other macOS devices to use an optical drive from another computer across the network. is is designed for copying les and will not work with audio CDs or video DVDs. Remote Disc does not provide a method for backing up macOS data. C. Spaces e Spaces utility can be used in macOS to create multiple desktops and separate work "spaces" that can be used independently of each other. More information: 220-1102, Objective 1.10 - macOS System Preferences https://professormesser.link/1102011002 174 Practice Exam B - Answers B10. Why would a technician use an ESD strap? ❍ A. Protect electronic parts from extreme heat ❍ B. Keep electronic parts dry and free from moisture ❍ C. Prevent damage from static electricity ❍ D. Protect computer parts from dust e Answer: C. Prevent damage from static electricity An ESD (Electrostatic Discharge) strap, or anti-static strap, connects a person to the equipment that they are working on. is commonly connects a wire from a user's wrist to a metal part on the computer or device. e incorrect answers: A. Protect electronic parts from extreme heat An ESD strap does not provide any protection for extreme heat or temperature. B. Keep electronic parts dry and free from moisture An anti-static strap does not provide any protection from the elements, so it would not be used to protect against moisture or water. D. Protect computer parts from dust Anti-static straps do not cover or protect computer components, so it would not protect a system from dust or debris. More information: 220-1102, Objective 4.4 - Managing Electrostatic Discharge https://professormesser.link/1102040401 Practice Exam B - Answers 175 B11. A desktop administrator is upgrading an older computer to support the 64-bit version of Windows 10 Pro. e computer currently has: 1 GHz CPU 1 GB of RAM 50 GB of free storage space 1024 x 768 video resolution Which of the following should be upgraded to support the Windows 10 installation? ❍ A. CPU ❍ B. RAM ❍ C. Storage space ❍ D. Video resolution e Answer: B. RAM e 64-bit version of all Windows 10 editions require a minimum of 2 GB of system memory. Since this system only has 1 GB of RAM, it will need a memory upgrade before Windows 10 x64 can be installed. e incorrect answers: A. CPU A processor running at 1 GHz is supported by both the 32-bit and 64-bit versions of Windows 10. C. Storage space e 64-bit version of Windows 10 requires 32 GB of free disk space. is system has 50 GB of free storage space, so it can easily support an upgrade to Windows 10 Pro x64. D. Video resolution Windows 10 Pro x64 requires a video resolution of 800 x 600, and this system supports a resolution of 1024 x 768 pixels. More information: 220-1102, Objective 1.1 - Windows Features https://professormesser.link/1102010102 176 Practice Exam B - Answers B12. Jack, a technician, is scheduled to replace a faulty motherboard today, but the motherboard delivery has been delayed and will not arrive until tomorrow. e new motherboard will repair a laptop used by a company executive. Which of the following would be the BEST way to handle these events? ❍ A. Move the installation to the next business day ❍ B. Schedule another repair into today's newly opened time slot ❍ C. Ask the delivery company for a refund on the shipping charges ❍ D. Contact the end user and inform them of the shipping issue e Answer: D. Contact the end user and inform them of the shipping issue It's important to always maintain an open line of communication with everyone involved with a project. When the situation is running as expected, a simple update may be all that's necessary. However, if problems occur the other participants may want to make alternative plans. It's up to the technician to manage this open line of communication. e incorrect answers: A. Move the installation to the next business day Moving the scheduled installation to the next business day without any other input would not be the best way to manage this repair. If the repair was time-sensitive, moving the installation may be the worst way to proceed. B. Schedule another repair into today's newly opened time slot Before prioritizing another repair into the existing time, it would be useful to know if there might be another option for the customer rather than to wait a day for the delivery to arrive. C. Ask the delivery company for a refund on the shipping charges Although there may be a case for refunding the shipping information, the current problem that needs resolution is the motherboard repair. ere will be time after the repair is completed to determine if the shipping process was properly managed. More information: 220-1102, Objective 4.7 - Communication https://professormesser.link/1102040701 Practice Exam B - Answers 177 B13. A system administrator has been tasked with locating all of the log les contained within an application folder. e folder currently contains over a thousand les, and only a portion of them have a.log extension. Which of these Windows commands would be the BEST way to nd these les? ❍ A. sfc ❍ B. diskpart ❍ C. robocopy ❍ D. dir e Answer: D. dir e dir (directory) command will display a list of les from the command line. e command includes ltering options, so using "dir *.log" would display all les in the current directory with a.log extension. e incorrect answers: A. sfc e sfc (System File Checker) command will scan the integrity of all protected system les and correct any les that may have been changed since their installation. e sfc command will not display a list of les in the current directory. B. diskpart e diskpart command is a command line utility for viewing and managing volumes on a Windows device. e diskpart command does not provide le management. C. robocopy e robocopy (Robust Copy) command provides additional features over the copy or xcopy commands. e robocopy utility does not provide the le management features required to search and delete certain les in a directory. More information: 220-1102, Objective 1.2 - Windows Command Line Tools https://professormesser.link/1102010201 178 Practice Exam B - Answers B14. A user runs a corporate app on their smartphone that downloads a database each time the app is started. is download process normally takes a few seconds, but today the download is taking minutes to complete. Which of the following should a technician follow as the best NEXT troubleshooting step? ❍ A. Disable Bluetooth ❍ B. Run a network speed check ❍ C. Charge the smartphone battery ❍ D. Check the cloud storage resource usage e Answer: B. Run a network speed check Delays associated with the download process would initially indicate a problem with the network connection. A speed check would evaluate the network connectivity and provide a baseline for download speeds. e incorrect answers: A. Disable Bluetooth e Bluetooth radio would not cause a delay in transmitting trac across the 802.11 network or cellular network. It's unlikely that disabling Bluetooth would provide any change to the download speed. C. Charge the smartphone battery Although some smartphone features may be limited when battery life is low, it would not cause the delays associated with the current download issue. D. Check the cloud storage resource usage e resource usage of a cloud storage platform would not be the most likely cause of the delays with this app. More information: 220-1002, Objective 3.5 Troubleshooting Mobile Device Security https://professormesser.link/1102030501 Practice Exam B - Answers 179 B15. A system administrator is analyzing a problem with a USB ash drive on a Windows 10 computer. When the ash drive is inserted, the CPU utilization increases to 100%. e administrator would like to disable one of the computer’s USB controllers for troubleshooting. Which of the following would provide this functionality? ❍ A. Services ❍ B. Performance Monitor ❍ C. Event Viewer ❍ D. Device Manager e Answer: D. Device Manager e Windows Device Manager provides access to the device drivers that manage the hardware on a computer. Individual drivers can be enabled, disabled, and managed from the Device Manager utility. e incorrect answers: A. Services e Services utility manages background service processes in Windows. e Services utility does not manage or disable hardware components. B. Performance Monitor e Performance Monitor gathers long-term statistics and can alert or create reports for ongoing performance metrics. Performance Monitor does not manage hardware device drivers. C. Event Viewer e Event Viewer contains logs from the applications, operating system, and other services. Although the Event Viewer may provide additional details about this ash drive issue, the administrator would not manage the device drivers from the Event Viewer utility. More information: 220-1102, Objective 1.3 e Microsoft Management Console https://professormesser.link/1102010302 180 Practice Exam B - Answers B16. A user is reporting some apps launched on their mobile phone will show an error message and then disappear without starting. is problem occurs with a group of apps normally used during the work day. Which of the following tasks would be the FIRST step for troubleshooting this issue? ❍ A. Install the previous version of the apps ❍ B. Connect the phone to a power source ❍ C. Power cycle the phone ❍ D. Disable the GPS radio e Answer: C. Power cycle the phone Before making any application or conguration changes, it's useful to power cycle a smartphone to reset the operating system. If the problem continues, then additional changes might be considered. e incorrect answers: A. Install the previous version of the apps ere's no evidence the current version of the apps is the root cause of the issue. Before making changes to the software, it would be useful to perform some non-invasive troubleshooting and information-gathering tasks. B. Connect the phone to a power source Lack of a power source would not commonly cause applications to fail. is would therefore not be the best rst step for troubleshooting these application issues. D. Disable the GPS radio e GPS radio would not commonly cause an app to fail, so disabling the GPS would not commonly be the rst troubleshooting step. More information: 220-1102, Objective 3.4 - Troubleshooting Mobile Devices https://professormesser.link/1102030401 Practice Exam B - Answers 181 B17. A technician has been asked to power down and store a server that has been exploited by an external attacker. e legal department will be performing tests and gathering information from this server. Which of the following would be MOST important to ensure the integrity of the server data? ❍ A. Report the server location to the proper channels ❍ B. Compile all support tickets associated with the server ❍ C. Maintain a chain of custody ❍ D. Take photos of the server in the storage room e Answer: C. Maintain a chain of custody It will be important to ensure the data on the server is not modied. All access to the data should be tracked, so a chain of custody should be maintained at all times. e incorrect answers: A. Report the server location to the proper channels It's useful for everyone to know where the server is located, but providing that information to the proper channels doesn't ensure that the data on the server is not modied. B. Compile all support tickets associated with the server A list of server support tickets may be useful for the incident investigation, but it won't help to ensure the integrity of the existing data on the server. D. Take photos of the server in the storage room A photographic image of the server, regardless of its location, will not help maintain the integrity of the data on the server. More information: 220-1102, Objective 4.6 - Privacy, Licensing, and Policies https://professormesser.link/1102040601 182 Practice Exam B - Answers B18. Jack, a user, has opened a help desk ticket to remove malware from his laptop. A previous removal occurred two weeks earlier with a similar malware infection. Which of the following was missed during the rst malware removal? ❍ A. Restart the computer ❍ B. Educate the end-user ❍ C. Enable System Protection ❍ D. Quarantine infected systems e Answer: B. Educate the end-user Of the available possible answers, this is the only option that would have resulted in a reinfection if not properly followed. Users aren't malware experts, and they may not realize their actions can have a negative eect on their system. Spending some quality time explaining anti-malware best practices can help prevent future infections. e incorrect answers: A. Restart the computer Restarting the computer is not a necessary step in the malware removal process, and it wouldn't cause the computer to be more susceptible to another malware infection. C. Enable System Protection Enabling System Protection after malware has been removed does not make it more likely to receive another infection. D. Q uarantine infected systems e quarantine process would prevent other devices from infection. Missing the quarantine process would not necessarily cause the original system to become infected again. More information: 220-1102, Objective 3.3 - Removing Malware https://professormesser.link/1102030301 Practice Exam B - Answers 183 B19. Which of the following features would be found in Windows 10 Pro but not in Windows 10 Home? ❍ A. 32-bit and 64-bit versions ❍ B. Domain access ❍ C. RDP client ❍ D. Windows Workgroup e Answer: B. Domain access Windows 10 Home does not include any access or connectivity to a Windows Domain. e incorrect answers: A. 32-bit and 64-bit versions Windows 10 includes both 32-bit and 64-bit options when performing an installation. ese versions are available for all editions of Windows 10. C. RDP client An RDP (Remote Desktop Protocol) client is used to connect to an RDP service on another device. All editions of Windows and many non-Windows platforms can use some type of RDP client. D. Windows Workgroup A Windows Workgroup is the fundamental networking available in Windows, and it's most often implemented in a home environment. All editions of Windows support connecting to a Windows Workgroup. More information: 220-1102, Objective 1.1 - Windows Features https://professormesser.link/1102010102 184 Practice Exam B - Answers B20. A medical research company is using laptop computers when visiting testing centers. e IT security team is concerned about a data breach if a laptop is lost or stolen. Which of the following would be the BEST way to manage this issue? ❍ A. BIOS password ❍ B. Authenticator application ❍ C. Full disk encryption ❍ D. Biometric authentication ❍ E. Cable lock e Answer: C. Full disk encryption Encrypting the laptop storage drives would prevent access to any data if the laptops are lost or stolen. e incorrect answers: A. BIOS password A BIOS password would prevent someone from booting the operating system, but the data would still be accessible if the storage drive was removed from the laptop and moved to another system. B. Authenticator application An authenticator application would provide another factor during the login process, but it would not provide any additional security for the data stored on the laptop drive. D. Biometric authentication Using biometrics during the authentication process would ensure that the proper users were logging in, but it would not protect the data if the drives were removed from the laptop. E. Cable lock A cable lock might help prevent the laptop from theft, but it would not provide any data protection if the laptop was lost or stolen. More information: 220-1102, Objective 2.7 - Mobile Device Security https://professormesser.link/1102020701 Practice Exam B - Answers 185 B21. A user would like to encrypt a small group of les in a shared folder without modifying other les on the drive. Which of the following would be the BEST way to accomplish this? ❍ A. EFS ❍ B. Save the les "as Administrator" ❍ C. BitLocker ❍ D. Save the les with a dollar sign at the end of the lename e Answer: A. EFS EFS (Encrypting File System) allows a user to encrypt individual objects at the le system level. With EFS, a single le or group of les can be protected without encrypting any other items on the storage drive. e incorrect answers: B. Save the les "as Administrator" Windows includes the option to execute an application with Administrator rights, but saving les does not include this option. By default, les are saved using the rights and permissions of the current user and changing this option would not provide any encryption features. C. BitLocker BitLocker is a full disk encryption technology that protects all of the data on the volume. BitLocker does not provide a feature to encrypt a single le or group of les. D. Save the les with a dollar sign at the end of the lename Creating a Windows share with a dollar sign at the end of the share name will hide the share from a public list. Saving a lename with a dollar sign at the end does not provide any protection or encryption of the le. More information: 220-1102, Objective 2.5 - Windows Security Settings https://professormesser.link/1102020503 186 Practice Exam B - Answers B22. A mobile user is using apps on their smartphone for all business tasks. To ensure that no data will be lost, the smartphone will need to have multiple backups each day. e user travels most of the time and rarely visits the home oce. Which of the following would be the best way to provide these backups? ❍ A. Connect an external USB drive ❍ B. Use incremental backups each night ❍ C. Connect the smartphone to a laptop ❍ D. Use a cloud backup service e Answer: D. Use a cloud backup service Using a cloud backup service such as Apple iCloud or Google Drive provides an automated method to constantly backup all user data on the smartphone. If the phone is lost or stolen, the user can purchase a new smartphone and restore all of the data from the cloud. e incorrect answers: A. Connect an external USB drive Most smartphones do not support a backup to USB. is option would also require the user to connect the USB drive multiple times and day and to maintain access to the USB ash drive. B. Use incremental backups each night Running nightly backups would not provide ongoing backups throughout the business day. C. Connect the smartphone to a laptop Most smartphone operating systems support the creation of a local backup to a connected computer, but this would not provide backups automatically throughout the day and would require manual intervention by the user. More information: 220-1102, Objective 2.7 - Mobile Device Security https://professormesser.link/1102020701 Practice Exam B - Answers 187 B23. A desktop administrator is moving an SSD from one laptop to another. Which of the following should be used to protect the SSD during the move? ❍ A. Padded envelope ❍ B. Anti-static bag ❍ C. Box with foam ller ❍ D. Cloth wrap e Answer: B. Anti-static bag An anti-static bag would protect the SSD (Solid State Drive) from inadvertent ESD (Electrostatic Discharge) while the component was moved between locations. e incorrect answers: A. Padded envelope A padded envelope would protect against physical damage, but it wouldn't provide any protection for inadvertent static discharge. Since the SSD doesn't include any moving parts, the padded envelope would provide limited protection. C. Box with foam ller e SSD does not have any moving parts, so extensive protection against bumps and movement isn't necessary. It would be more important to protect the delicate electronics on the drive, and the foam ller does not generally provide any anti-static protection. D. Cloth wrap Cloth can create static electricity, making this option one of the worst for transporting electronic equipment and components. More information: 220-1102, Objective 4.4 - Managing Electrostatic Discharge https://professormesser.link/1102040401 188 Practice Exam B - Answers B24. A user is performing a series of Google searches, but the results pages are displaying links and advertisements from a dierent website. is issue occurs each time a Google search is performed. e same Google search on a dierent computer results in a normal Google results page. Which of the following would resolve this issue? ❍ A. Run the search from Safe Mode ❍ B. Install the latest operating system patches ❍ C. Run a malware removal utility ❍ D. Login as a dierent user e Answer: C. Run a malware removal utility If the results page of one website is unexpectedly directing to a dierent site, the browser has most likely been hijacked by malware. Running a malware removal tool would be the best option of the available choices. e incorrect answers: A. Run the search from Safe Mode If malware has infected the system and hijacked the browser, then operating the same browser from Safe Mode would result in the same hijacked page result. B. Install the latest operating system patches Operating system patches would not commonly remove a malware infection, so the redirection would continue to occur after the OS update. D. Login as a dierent user e malware in the current user's browser is most likely associated with all users on that system. Authenticating as a dierent user would not provide any resolution to this browser hijack. More information: 220-1102, Objective 3.2 - Troubleshooting Security Issues https://professormesser.link/1102030201 Practice Exam B - Answers 189 B25. Jack, a user in the accounting department, is having an issue with his smartphone reaching websites and retrieving mail when working from home. Inside the oce, the phone appears to work normally. Which of the following would be the best NEXT step for troubleshooting this issue? ❍ A. Verify the network conguration at home ❍ B. Install the latest operating system updates ❍ C. Connect the phone to power when working at home ❍ D. Restart the smartphone after arriving at home e Answer: A. Verify the network conguration at home If the smartphone is working properly in the oce, then the overall functionality of the smartphone is working as expected. Since the issue is related to both websites and email, the focus should move to the network and the conguration of the user's home network. e incorrect answers: B. Install the latest operating system updates Since the smartphone works properly in the oce, it would be unlikely that an operating system upgrade would resolve any problems at the user's home. C. Connect the phone to power when working at home Connecting to a power source doesn't provide any additional enhancements or connectivity options to websites or email servers. D. Restart the smartphone after arriving at home If the issue is not occurring in the oce, then the smartphone is working as expected. Restarting the smartphone would not provide the most likely resolution to this issue. More information: 220-1102, Objective 3.4 - Troubleshooting Mobile Devices https://professormesser.link/1102030401 190 Practice Exam B - Answers B26. A security administrator has been asked to reinstall Windows on a web server diagnosed with a rootkit infection. Which of the following installation methods would be the BEST choice for this server? ❍ A. In-place upgrade ❍ B. Remote network installation ❍ C. Clean install ❍ D. Repair installation e Answer: C. Clean install A clean install would be the best way to guarantee the removal of any malware. Leaving any portion of the operating system in place could potentially leave malware on the system. e incorrect answers: A. In-place upgrade An in-place upgrade would change the operating system to a dierent version and would potentially leave malware running on the newly upgraded OS. B. Remote network installation Since this computer has been diagnosed with malware, it would not be a good best practice to reconnect the server to the network. D. Repair installation A repair installation is designed to x problems with the operating system, and it does not commonly remove any malware or rootkits. e only way to guarantee the removal of malware is to delete everything and reinstall or restore from a known good backup. More information: 220-1102, Objective 1.9 - Installing Operating Systems https://professormesser.link/1102010901 Practice Exam B - Answers 191 B27. A local coee shop has a public wireless network for customers and a private wireless network for company devices. e shop owner wants to be sure that customers can never connect to the company network. Which of the following should be congured on this network? ❍ A. Install a new access point for company devices ❍ B. Congure WPA3 on the company network ❍ C. Require static IP addresses on the customer network ❍ D. Assign MAC lters to the company network ❍ E. Use a rewall between the customer and corporate network e Answer: B. Congure WPA3 on the company network Enabling WPA3 (Wi-Fi Protected Access version 3) would require a password to connect and would prevent customers from connecting to the company wireless network. e incorrect answers: A. Install a new access point for company devices Installing another access point doesn't inherently provide any additional security. C. Require static IP addresses on the customer network Requiring the conguration of static IP address adds additional administrative overhead without providing any security enhancement. Static IP addressing does not prevent devices from connecting to a wireless network. D. Assign MAC lters to the company network MAC ltering can provide some administrative controls over access, but MAC ltering is not designed as a security control over wireless network access. E. Use a rewall between the customer and corporate network A rewall between networks would not prevent devices from connec

Use Quizgecko on...
Browser
Browser