Summary

This document is a CompTIA Core 2 practice exam. It includes a variety of questions covering computer networking and information security topics.

Full Transcript

Comptia Core 2 Practice A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addre...

Comptia Core 2 Practice A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern? Operating system updates Remote wipe Antivirus Firewall When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user? Have the user provide a callback phone number to be added to the ticket. Assign the ticket to the department's power user. Register the ticket with a unique user identifier. Provide the user with a unique ticket number that can be referenced on subsequent calls. A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure? WPA2 with TKIP WPA2 with AES WPA3 with AES-256 WPA3 with AES-128 A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading? Right-click the Windows button, then select Run... entering shell:startup and clicking OK, and then move items one by one to the Recycle Bin. Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run. Manually disable all startup tasks currently listed as enabled and reboot, checking for issue resolution at startup. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup. A user contacted the help desk to report pop-ups on a company workstation, indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Choose two.) Scan the computer with the company-provided antivirus software. Install a new hard drive and clone the user's drive to it. Deploy an ad-blocking extension to the browser. Uninstall the company-provided antivirus software. Click the link in the messages to pay for virus removal. Perform a reset on the user's web browser. A user's mobile phone has become sluggish. A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Choose two.) Prevent a device root. Disable biometric authentication. Require a PIN on the unlock screen. Enable developer mode. Block a third-party application installation. Prevent GPS spoofing A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file? Device Manager Indexing Options File Explorer Administrative Tools A technician is replacing the processor in a desktop computer. Prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Choose two.) Utilizing an ESD strap Disconnecting the computer from the power source Ensuring proper ventilation Removing dust from the ventilation fans A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement? MDM EULA IRP AUP Which of the following provide the BEST way to secure physical access to a data center server room? (Choose two.) Biometric lock Badge reader USB token Video surveillance Locking rack Access control vestibule A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in to the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue? Time drift Dual in-line memory module failure Application crash Filesystem errors A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task? Console Disk Utility Time Machine FileVault A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state, but the malware persists. Which of the following would MOST likely resolve the issue? Quarantining system files Reimaging the workstation Encrypting the hard drive Disabling TLS 1.0 support A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning? Spam filter installation Invalid registry settings Malware infection Operating system update After a company installed a new SOHO router, customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website? Port forwarding Firmware updates IP filtering Content filtering An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update. A technician determines there are no error messages on the device. Which of the following should the technician do NEXT? Verify all third-party applications are disabled. Determine if the device has adequate storage available. Check if the battery is sufficiently charged. Confirm a strong internet connection is available using Wi-Fi or cellular data. A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center? Encrypt the workstation hard drives. Lock the workstations after five minutes of inactivity. Install privacy screens. Log off the users when their workstations are not in use. A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away? Use a key combination to lock the computer when leaving. Ensure no unauthorized personnel are in the area. Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity. Turn off the monitor to prevent unauthorized visibility of information. While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue? A bad antivirus signature update was installed. A router was misconfigured and was blocking traffic. An upstream internet service provider was flapping. The time or date was not in sync with the website. A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the BEST choice for accessing the necessary configuration to complete this goal? Security and Maintenance Network and Sharing Center Windows Defender Firewall Internet Options An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation? RDP through RD Gateway Apple Remote Desktop SSH access with SSH keys VNC with username and password A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue? Bridge the LAN connection between the laptop and the desktop. Set the laptop configuration to DHCP to prevent conflicts. Remove the static IP configuration from the desktop. Replace the network card in the laptop, as it may be defective A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email. The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT? Advise the user to run a complete system scan using the OS anti-malware application. Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present. Have the user check for recently installed applications and outline those installed since the link in the email was clicked. Instruct the user to disconnect the Ethernet connection to the corporate network. A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application. The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue? Remove the microphone from the USB hub and plug it directly into a USB port on the PC. Enable the microphone under Windows Privacy settings to allow desktop applications to access it. Delete the microphone from Device Manager and scan for new hardware. Replace the USB microphone with one that uses a traditional 3.5mm plug. A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST? Services in Control Panel to check for overutilization Performance Monitor to check for resource utilization System File Checker to check for modified Windows files Event Viewer to identify errors A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue? The SNTP server is offline. A user changed the time zone on a local machine. The Group Policy setting has disrupted domain authentication on the system. The workstations and the authentication server have a system clock difference. A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the user's account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the: acceptable use policy. regulatory compliance requirements. non-disclosure agreement. incident response procedures. A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue? Updating the operating system Changing proxy settings Reinstalling the browser Enabling port forwarding An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved? Risk analysis Sandbox testing End user acceptance Lesson Learned A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS? The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit. The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds which causes the application to force quit. The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit. A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor? Rearranging the monitor's position in display settings Swapping the cables for the monitors Using the Ctrl+Alt+=> to correct the display orientation Updating the display drivers for the video card A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi. When the smartphone is connected to Wi-Fi, the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi? The smartphone's line was not provisioned with a data plan The smartphone's SIM card has failed. The smartphone's Bluetooth radio is disabled The smartphone has too many applications open A technician suspects the boot disk of a user’s computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes? Run sfc / scannow on the drive as the administrator Run cleanmgr on the drive as the administrator Run chkdsk on the drive as the administrator Run dfrgui on the drive as the administrator A BSOD appears on a user’s workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause? Stop code Event Viewer Services System Configuration While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT? Send a quick message regarding the delay to the next customer. Cut the current customer's time short and rush to the next customer. Apologize to the next customer when arriving late. Arrive late to the next meeting without acknowledging the time. A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department? Implementing a support portal Creating a ticketing system Commissioning an automated callback system Submitting tickets through email A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment? Multi Factor authentication will be forced for Wi-Fi. All Wi-Fi traffic will be encrypted in transit. Eavesdropping attempts will be prevented. Rogue access points will not connect. A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue? The user is not connected to the VPN. The file server is offline. A low battery is preventing the connection. The log-in script failed. A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script? The instructions from the software company are not being followed. Security controls will treat automated deployments as malware. The deployment script is performing unknown actions. Copying scripts off the internet is considered plagiarism. A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS is several versions out of date. The user is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the issue? The device does not have enough free space to download the OS updates. The device needs user confirmation to update to a major release. The device is not compatible with the newest version of the OS. The device is restricted from updating due to a corporate security policy A technician receives a ticket indicating the user cannot resolve external web pages. However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue? Default gateway Host address Name server Subnet mask An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT? Perform a risk analysis. Implement the deployment. Verify end user acceptance. Document the lessons learned. A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the technician use to make adjustments? eventvwr.msc perfmon.msc gpedit.msc devmgmt.msc Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems? Power off the machine. Run a full antivirus scan. Remove the LAN card. Install a different endpoint solution. A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received: The Audio Driver is not running. Which of the following will MOST likely resolve the issue? compmgmt.msc regedit.exe explorer.exe taskmgr.exe gpmc.msc services.msc A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use? System Indexing Options Device Manager Programs and Features A systems administrator is setting up a Windows computer for a new user. Corporate policy requires a least privileged environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need? Power user account Standard account Guest account Administrator account A technician downloads a validated security tool and notes the vendor hash of a11e11a1. When the download is complete, the technician again validates the hash, but the value returns as 2a222a2b2. Which of the following is the MOST likely cause of the issue? Private-browsing mode Invalid certificate Modified file Browser cache A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task? Degaussing Low-level formatting Recycling Shredding A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause? The GPS application is installing software updates. The GPS application contains malware. The GPS application is updating its geospatial map data. The GPS application is conflicting with the built-in GPS. A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident? Disabling UAC Restricting local administrators Enabling UPnP Turning off AutoPlay A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Choose two.) Device drivers Keyboard backlight settings Installed application license keys Display orientation Target device power supply Disabling express charging A technician installed an application on a user's desktop and received an error message. Which of the following tools can the technician use to research the error? Resource Monitor > CPU > Services Task Manager > Processes > Apps Event Viewer > Windows Logs > Application Device Manager > Computer A technician is configuring a new Windows laptop. Corporate policy requires that mobile devices make use of full disk encryption at all times. Which of the following encryption solutions should the technician choose? Encrypting File System File Vault BitLocker Encrypted LVM A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Choose two.) ipconfig /all hostname netstat /? nslookup localhost arp -a ping ::1 A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to MOST likely resolve the issue? Grant permissions to the installation directory. Attach the external hardware token. Install OS updates. Restart the workstation after installation A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Choose two.) Encryption Antivirus AutoRun Guest accounts Default passwords Backups A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue? Disable unused ports. Remove the guest network. Add a password to the guest network. Change the network channel A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware? Enabling System Restore Educating the user Booting into safe mode Scheduling a scan A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software? VPN MSRA SSH RDP A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred? Ransomware Failed OS updates Adware Missing system files A user is unable to access files on a work PC after opening a text document. The text document was labeled “URGENT PLEASE READ.txt - In active folder,.txt file titled urgent please read”. Which of the following should a support technician do FIRST? Quarantine the host in the antivirus system. Run an antivirus scan for malicious software. Investigate how malicious software was installed. Reimage the computer. A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the MMC console. Which of the following is the NEXT step the technician should take to resolve the issue? Run the antivirus scan. Add the required snap-in. Restore the system backup. Use the administrator console. A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST? Delete the application's cache. Check for application updates. Roll back the OS update. Uninstall and reinstall the application. Which of the following wireless security features can be enabled to allow a user to use login credentials to attach to available corporate SSIDs? TACACS+ Kerberos Preshared key WPA2/AES Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment? Security groups Access control list Group Policy Login script A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use? ipconfig ifconfig arpa Ping A user called the help desk to report an issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop? nslookup net use netstat net user Which of the following operating systems is considered closed source? Ubuntu Android CentOS OSX Which of the following should be used to secure a device from known exploits? Encryption Remote wipe Operating system updates Cross-site scripting Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST? System time IP address DNS servers Windows updates A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security? DNS IPS VPN SSH After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern? Device Manager Administrator Tools Programs and Features Recovery An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented? TKIP RADIUS WPA2 AES Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments? apt-get CIFS Samba Grep A network technician installed a SOHO router for a home office user. The user has read reports about home routers being targeted by malicious actors and then used in DDoS attacks. Which of the following can the technician MOST likely do to defend against this threat? Add network content filtering. Disable the SSID broadcast. Configure port forwarding. Change the default credentials. A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk? Requiring employees to enter their usernames and passwords Setting up facial recognition for each employee Using a PIN and providing it to employees Requiring employees to use their fingerprint A user calls the help desk to report that mapped drives are no longer accessible. The technician verifies that clicking on any of the drives on the user's machine results in an error message. Other users in the office are not having any issues. As a first step, the technician would like to remove and attempt to reconnect the drives. Which of the following command-line tools should the technician use? net use set mkdir Rename A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize? DHCP SMTP DNS RDP All the desktop icons on a user's newly issued PC are very large. The user reports that the PC was working fine until a recent software patch was deployed. Which of the following would BEST resolve the issue? Rolling back video card drivers Restoring the PC to factory settings Repairing the Windows profile Reinstalling the Windows OS A technician is installing a program from an ISO file. Which of the following steps should the technician take? Mount the ISO and run the installation file. Copy the ISO and execute on the server. Copy the ISO file to a backup location and run the ISO file. Unzip the ISO and execute the setup.exe file. The battery life on an employee's new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check FIRST to troubleshoot this issue? (Choose two.) Screen resolution Screen zoom Screen timeout Screen brightness Screen damage Screen motion smoothness Which of the following is an advantage of using WPA2 instead of WPA3? Connection security Encryption key length Device compatibility Offline decryption resistance A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus? Disable System Restore. Schedule a malware scan. Educate the end user. Run Windows Update Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Choose two.) Licensing agreements Chain of custody Incident management documentation Data integrity Retention requirements Which of the following would MOST likely be deployed to enhance physical security for a building? (Choose two.) Multifactor authentication Badge reader Personal identification number Firewall Motion sensor Soft token A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue? Enable firewall ACLs. Examine the localhost file entries. Verify the routing tables. Update the antivirus definitions. A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware? A system patch disabled the antivirus protection and host firewall. The system updates did not include the latest anti-malware definitions. The system restore process was compromised by the malware. The malware was installed before the system restore point was created. Which of the following file system formats would be the BEST choice to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems? APFS ext4 CDFS FAT32 Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue? A forgotten keychain password An employee's Apple ID used on the device An operating system that has been jailbroken An expired screen unlock code Which of the following is the default GUI and file manager in macOS? Disk Utility Finder Dock FileVault A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue? Surge suppressor Battery backup CMOS battery Generator backup A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue? Keylogger Cryptominers Virus Malware Which of the following security methods supports the majority of current Wi-Fi-capable devices without sacrificing security? WPA3 MAC filtering RADIUS TACACS+ A technician needs to override DNS and redirect IP addresses and URLs to different locations. Which of the following should the technician do? Install signal repeaters. Edit the hosts file. Configure the firewall. Enable port forwarding A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement? Password-protected Wi-Fi Port forwarding Virtual private network Perimeter network A technician is investigating options to secure a small office wireless network. One requirement is to allow automatic logins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature? RADIUS AES EAP-EKE MFA A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access? Adjust the content filtering. Unmap port forwarding. Disable unused ports. Reduce the encryption strength. A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device? EFS GPT MBR FAT32 The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do NEXT to troubleshoot the issue? Calibrate the phone sensors. Enable the touchscreen. Reinstall the operating system. Replace the screen. A user’s permissions are limited to read on a shared network folder using NTFS security settings. Which of the following describes this type of security control? SMS MFA ACL MDM A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue? Add a user account to the local administrator's group. Configure Windows Defender Firewall to allow access to all networks. Create a Microsoft account. Disable the guest account. A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost, the gateway, and known IP addresses on the internet and receive a response. Which of the following is the MOST likely reason for the issue? A firewall is blocking the application. The wrong VLAN was assigned. The incorrect DNS address was assigned. The browser cache needs to be cleared. Every time a user tries to open the organization's proprietary application on an Android tablet, the application immediately closes. Other applications are operating normally. Which of the following troubleshooting actions would MOST likely resolve the issue? (Choose two.) Uninstalling the application Resetting the web browser cache Deleting the application cache Clearing the application storage A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use? Settings > Personalization Control Panel > Credential Manager Settings > Accounts > Family and Other Users Control Panel > Network and Sharing Center A Windows administrator is creating user profiles that will include home directories and network printers for several new users. Which of the following is the MOST efficient way for the technician to complete this task? Access control Authentication application Group Policy Folder redirection A user's corporate laptop with proprietary work information was stolen from a coffee shop. The user logged in to the laptop with a simple password, and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered? Biometrics Full disk encryption Enforced strong system password Two-factor authentication A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items? msinfo32 perfmon regedit Taskmgr A systems administrator is experiencing issues connecting from a laptop to the corporate network using PKI. Which of the following tools can the systems administrator use to help remediate the issue? certmgr.msc mscontig.exe lusrmgr.msc Perfmon.msc A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on. The technician attempts to boot the computer via the NIC to image the computer, but this method does not work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging system via the network? The computer's CMOS battery failed. The computer's NIC is faulty. The PXE boot option has not been enabled. The Ethernet cable the technician is using to connect the desktop to the network is faulty. A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer's BEST choice for this environment? Workgroup network Public network Wide area network Domain network Which of the following common security vulnerabilities can be mitigated by using put validation? Brute-force attack Cross-site scripting SQL injection Cross-site request forgery A company is looking for a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select? Off-site Synthetic Full Differential A technician needs to establish a remote access session with a user who has a Windows workstation. The session must allow for simultaneous viewing of the workstation by both the user and technician. Which of the following remote access technologies should be used? RDP VPN SSH MSRA A user's iPhone was permanently locked alter several failed login attempts. Which of the following will restore access to the device? Fingerprint and pattern Facial recognition and PIN code Primary account and password Secondary account and recovery code Which of the following macOS utilities uses AES-128 to encrypt the startup disk? fdisk Diskpart Disk Utility FileVault A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the issue? Screen-sharing software Secure shell Virtual private network File transfer software A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take? Inform the customer that the issue is not within the scope of this department. Apologize to the customer and escalate the issue to a manager. Ask the customer to explain the issue and then try to fix it independently. Respond that the issue is something the customer should be able to fix. A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan is unable to locate the source of an infection. Which of the following should the technician check NEXT? Windows updates DNS settings Certificate store Browser plug-ins A user reports a virus is on a PC. The user installs additional real-time protection antivirus software, and the PC begins performing extremely slow. Which of the following steps should the technician take to resolve the issue? Uninstall one antivirus software program and install a different one. Launch Windows Update, and then download and install OS updates. Activate real-time protection on both antivirus software programs. Enable the quarantine feature on both antivirus software programs. Remove the user-installed antivirus software program. A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections? Disable System Restore. Educate the end user. Install the latest OS patches. Clean the environment preinstallation. A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Choose two.) Local Network Connection User Account Control Windows Backup and Restore Windows Firewall Windows Defender Network Packet Analyzer A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet? Resource Monitor Performance Monitor Command Prompt System Information A Windows user recently replaced a computer. The user can access the public internet on the computer; however, an internal site at https://companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue? Default gateway settings DHCP settings IP address settings Firewall settings Antivirus settings A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company's requirements? Biometrics Soft token Access control lists Smart card A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process? Escalating the issue to Tier 2 Verifying warranty status with the vendor Replacing the motherboard Purchasing another PC A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user most likely be able to make this change? System Devices Personalization Accessibility A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task? Network and Sharing Center net use User Accounts regedit Group Policy While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair? SSL key Preshared key WPA2 key Recovery key Which of the following allows access to the command line in macOS? PsExec command.com Terminal CMD A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user? AAA SSH RDP VPN An engineer is configuring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site? Image deployment Recovery partition Installation Remote network installation Repair installation A desktop technician has received reports that a user's PC is slow to load programs and saved files. The technician investigates and discovers an older HDD with adequate free space. Which of the following should the technician use to alleviate the issue first? Disk Management Disk Defragment Disk Cleanup Device Manager A technician needs to transfer a file to a user's workstation. Which of the following would best accomplish this task utilizing the workstation's built-in protocols? VPN SMB RMM MSRA Which of the following is most likely used to run.vbs files on Windows devices? winmgmt.exe powershell.exe cscript.exe Explorer.exe A technician wants to install Developer Mode on a Windows laptop but is receiving a “failed to install package” message. Which of the following should the technician do first? Ensure internet connectivity. Check for Windows updates. Enable SSH. Reboot computer. When trying to access a secure internal network, the user receives an error messaging stating, "There is a problem with this website's security certificate." The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring? Reimage the system and install SSL. Install Trusted Root Certificate Select View Certificates and then Install Certificate. Continue to access the website. A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized? Document the date and time of the change. Submit a change request form. Determine the risk level of this change. Request an unused IP address. A company recently experienced a security incident in which a USB drive containing malicious software was able to covertly install malware on a workstation. Which of the following actions should be taken to prevent this incident from happening again? (Choose two.) Install a host-based IDS. Restrict log-ln times. Enable a BIOS password. Update the password complexity. Disable AutoRun. Update the antivirus definitions. Restrict user permissions. A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor's performance? Amount of system RAM NIC performance Storage IOPS Dedicated GPU A change advisory board authorized a setting change so a technician is permitted to implement the change. The technician successfully implemented the change. Which of the following should be done next? Document the date and time of change. Document the purpose of the change. Document the risk level. Document the findings of the sandbox test. A user receives the following error while attempting to boot a computer: -BOOTMGR is missing -Press Ctrl+Alt+Del to restart Which of the following should a desktop engineer attempt first to address this issue? Repair Windows. Partition the hard disk. Reimage the workstation. Roll back the updates. A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next? Educate the end user on best practices for security. Quarantine the host in the antivirus system. Investigate how the system was infected with malware. Create a system restore point. A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive? gpupdate net use hostname Dir Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and its files. Which of the following will MOST likely allow all users to access the new folders? Assigning share permissions Enabling inheritance Requiring multi factor authentication Removing archive attribute A Linux technician needs a filesystem type that meets the following requirements: All changes are tracked. The possibility of file corruption is reduced. Data recovery is easy. Which of the following filesystem types best meets these requirements? Ext3 FAT32 exFAT NTFS A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems. Which of the following is the MOST effective method for dealing with this Issue? Adjusting the spam gateway Updating firmware for the spam appliance Adjusting AV settings Providing user training A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do to best address these security and privacy concerns? (Select two). Disable Wi-Fi autoconnect. Stay offline when in public places. Uninstall all recently installed applications. Schedule an antivirus scan. Reboot the device Update the OS Which of the following file systems replaced FAT as the preferred filesystem for Microsoft Windows OS? APFS FAT32 NTFS Ext4 A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue? Services Processes Performance Startup A user wants to back up a Windows 10 device. Which of the following should the user select? Devices and Printers Email and Accounts Update and Security Apps and Features A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next? Run an antivirus and enable encryption. Restore the defaults and reimage the corporate OS. Backup the files and do a system restore. Undo the jailbreak and enable an antivirus A PC is taking a long time to boot. Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two). Installing additional RAM Removing the applications from startup Installing a faster SSD Running the Disk Cleanup utility Defragmenting the hard drive Which of the following file extensions should a technician use for a PowerShell script?.ps1.py.sh.bat A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed: crypt32.d11 is missing not found Which of the following should the technician attempt FIRST? Rebuild Windows profiles. Reimage the workstation Roll back updates Perform a system file check When visiting a particular website, a user receives a message stating, "Your connection is not private." Which of the following describes this issue? Certificate warning Malware JavaScript error Missing OS update Which of the following items require special e-waste recycling? (Select two). Solid-state drive A/C adapter Surge protector Laptop battery CRT monitor Power supply During a network outage, a technician discovers a new network switch that was not listed in the support documentation. The switch was installed during a recent change window when a new office was added to the environment. Which of the following would most likely prevent this type of mismatch after next month's change window? Performing annual network topology reviews Requiring all network changes include updating the network diagrams Allowing network changes once per year Routinely backing up switch configuration files A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue? msconfig chkdsk sfc diskpart Mstsc A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted? Disk Management Device Manager Disk Cleanup Disk Defragmenter

Use Quizgecko on...
Browser
Browser